Logs are not delayed. Get in touch with Imperva. All rights reserved. Company info Privacy policy Changelog. Dynamic content delivery Non-cacheable content delivery. User login, shopping cart Content Delivery Network. Content Caching. Live video Delivery of live video. Video on demand Delivery of on demand video. Image Compression. Web Application Firewall. Specific product s for this. DDoS Protection. Melbourne - Sydney Auckland. Dubai Tel Aviv Istanbul.
Requests costs Customers pay for client to CDN requests. To add a new site, click the Add Site button and follow the onscreen instructions. The following details are displayed for each website.
The statistics are generated daily and cover the last 7 days, except for bandwidth, which covers the last 30 days.
API Yes. API documentation Yes. API sandbox or test environment Yes. Customisation available Yes. These rules are used to control and manipulate requests or responses according to predefined behaviors. What can be done. Switch content and redirect users based on layer 7 attributes, such as URL patterns, cookies, HTTP headers, and client classification attributes Improve user experience and SEO ranking by rewriting relative and dynamic URLs to clean customer-facing URLs Offload connections and reduce round trip times between your web server and other backend servers Leverage Incapsula client classification to identify bad bots and redirect them to a special site or server with fake content Define rules based on client behavior, using customizable rate thresholds for various parameters Implement backend logic without changing application code Extend role-based control to non-technical users.
Scaling Independence of resources Independence of resources - Our global network consists of 32 data centers with over 3 Tbps capacity designed purely to protect your websites. Analytics Service usage metrics Yes. Reporting types API access Real-time dashboards. Resellers Supplier type Reseller providing extra support. Organisation whose services are being resold Imperva Incapsula. Staff security Staff security clearance Other security clearance. Asset protection Knowledge of data storage and processing locations Yes.
User control over data storage and processing locations Yes. Penetration testing frequency At least every 6 months. Penetration testing approach In-house. Protecting data at rest Other. Other data at rest protection approach We do not hold customer data. Data sanitisation process No. Includes a log collector, and pre-made dashboards for easy implementation.
Data export formats Other. Data import formats Other. Other data import formats Not applicable. Data-in-transit protection Data protection between buyer and supplier networks Private network or public sector network.
Data protection within supplier network TLS version 1. For customers that have purchased the Infrastructure Protection Service and the Infrastructure Monitoring Service and have selected the option to allow Incapsula to automatically route traffic through the Incapsula network, DDoS Mitigation will take place within five minutes after the Infrastructure Monitoring Service has detected a DDoS attack on the customer infrastructure.
Approach to resilience Available on request. Identity and authentication User authentication needed Yes. User authentication 2-factor authentication. Access restrictions in management interfaces and support channels Available upon request.
Access restriction testing frequency At least every 6 months. Management access authentication 2-factor authentication. Audit information for users Access to user activity audit information Users contact the support team to get audit information.
Runtime Protection disrupts supply chain attacks. Client-Side Protection stops web skimming fraud. Serverless Protection continuously secures functions. DDoS Protection ensures continuous operations. Secure CDN securely delivers apps globally. Data Security Secure data everywhere it lives Reaching sensitive data is the goal of every cyberattack.
Cloud Data Security protects managed databases. Data Privacy eases sensitive data management. Data User Behavior Analytics identifies insider threats. Recognized leadership.
0コメント