Bloomberg the Company & Products

Bloomberg Anywhere Login


Connecting decision makers to a dynamic network of information, people and ideas, Bloomberg quickly and accurately delivers business and financial information, news and insight around the world.


Financial Products

Enterprise Products


Customer Support

  • Americas

    +1 212 318 2000

  • Europe, Middle East, & Africa

    +44 20 7330 7500

  • Asia Pacific

    +65 6212 1000


Industry Products

Media Services

Follow Us

Last $59.07 USD
Change Today -0.71 / -1.19%
Volume 398.1K
IMPV On Other Exchanges
New York
As of 8:04 PM 06/2/15 All times are local (Market data is delayed by at least 15 minutes).
text size: T | T
Back to Snapshot
Company Description

Contact Info

3400 Bridge Parkway

Suite 200

Redwood Shores, CA 94065

United States

Phone: 650-345-9000

Fax: 650-345-9004

ed visibility and control through corporate use of cloud and SaaS applications, including employee-adopted SaaS applications, often referred to as shadow IT, applications delivered by cloud providers, and IT-led or sanctioned applications, such as Office 365. These applications are accessible from the Internet, which exposes them to the vulnerabilities intrinsic to public-facing applications. These applications also create security, regulatory and compliance requirements as the responsibility for housing and securing the data is transferred to a third party. The company’s Skyfence service enforces security policy, protects sensitive data from external and internal threats, and ensures compliance with standards by using proprietary network traffic analysis and Dynamic User Fingerprinting technology to profile normal user behavior and detect anomalies that could indicate cyber-attacks or internal threats. The company’s Skyfence solution provides organizations with the power to discover all of the cloud assets that are in use and to uniformly enforce security and compliance policies while controlling user access to sensitive data, privileged user activity and application programming interface access to the service. The company sells its cloud-based products and services using subscription-based pricing plans. It also sells its ThreatRadar services as separate add-on, subscription services to the company’s SecureSphere appliances. The company organizes its SecureSphere, Incapsula and Skyfence product lines into customer-focused capability areas based on their ability to discover assets and vulnerabilities, to protect information wherever it lives – in the cloud or on premises– and to comply with regulations. Discover SecureSphere Database Assessment Server: Finds Sensitive Data and Runs Assessments SecureSphere Database Assessment Server automates the process of discovering databases and sensitive business data on the network and performs a security assessment to identify risks to business-critical data. It identifies database vulnerabilities and measures compliance with industry standards and best practices using tests and assessment policies. By identifying where databases and sensitive data are located on the network, and which databases are vulnerable or misconfigured, Database Assessment Server helps organizations prioritize their database risk mitigation efforts. Incapsula Backdoor Detection: Detects and Blocks Hackers From Installing Or Operating Backdoors Incapsula Backdoor Protection detects and blocks attempts by hackers to install or operate a backdoor, which allows a hacker to remotely operate the Website or server for future exploitation. It also notifies site administrators of the location of any backdoor so it could be removed. Skyfence Cloud Discovery: Enables Comprehensive Visibility of Cloud Applications Skyfence Cloud Discovery eliminates blind spots created by the adoption of cloud applications and the bring-your-own-application and shadow IT trends. Skyfence Cloud Discovery discovers and catalogs all cloud applications accessed by users and provides organizations with detailed visibility into the usage, activities, and risk information associated with such catalogued applications. Protect SecureSphere SecureSphere WAF: Protects Business-critical Web Applications and Data The company’s SecureSphere WAF is a major solution for protecting Web assets from application attacks. Its SecureSphere WAF protects its customers’ business-critical applications and data from large scale cyber-attacks, adapts to evolving threats to prevent data breaches and enables compliance with regulatory requirements. Based on the feature and traffic capacity requirements of its customers, the company’s Web application security products could be deployed as physical or major capabilities of its SecureSphere WAF include dynamic identification of legitimate Web application usage, fortification of Web defenses with research-driven intelligence on current threats from the company’s Application Defense Center (ADC), alerts and requests blocking, as well as virtual patching of application vulnerab


Stock Quotes

Market data is delayed at least 15 minutes.

Company Lookup
Recently Viewed
IMPV:US $59.07 USD -0.71

IMPV Competitors

Market data is delayed at least 15 minutes.

Company Last Change
Barracuda Networks Inc $40.08 USD +0.68
Monotype Imaging Holdings Inc $25.40 USD -0.29
Proofpoint Inc $58.91 USD +0.09
Qualys Inc $39.81 USD -0.60
Radware Ltd $23.39 USD +0.06
View Industry Companies

Industry Analysis


Industry Average

Valuation IMPV Industry Range
Price/Earnings NM Not Meaningful
Price/Sales 9.1x
Price/Book 8.4x
Price/Cash Flow NM Not Meaningful
TEV/Sales 8.9x

Sponsored Financial Commentaries

Sponsored Links

Report Data Issue

To contact IMPERVA INC, please visit Company data is provided by Capital IQ. Please use this form to report any data issues.

Please enter your information in the following field(s):
Update Needed*

All data changes require verification from public sources. Please include the correct value or values and a source where we can verify.

Your requested update has been submitted

Our data partners will research the update request and update the information on this page if necessary. Research and follow-up could take several weeks. If you have questions, you can contact them at