Skip to content
Home API Security Tools Imperva API Security
IM

Imperva API Security

NEW
Category: API Security
License: Commercial
Suphi Cankurt
Suphi Cankurt
AppSec Enthusiast
Updated March 23, 2026
5 min read
Key Takeaways
  • ML-powered discovery finds shadow, zombie, and undocumented APIs across cloud and on-prem environments automatically.
  • Real-time BOLA detection and response uses behavioral baselines to block Broken Object Level Authorization exploits.
  • Part of Thales since December 2023 ($3.6B acquisition) with continued API security development.
  • Single platform covers API discovery, schema enforcement, bot protection, and runtime threat detection.
  • Named a KuppingerCole Market Leader in API Security and included in the Gartner Magic Quadrant for WAAP 9 consecutive times.

Imperva API Security is a commercial API security platform that uses machine learning to automatically discover, classify, and protect APIs across cloud and on-premises environments. It combines API discovery, schema enforcement, runtime BOLA detection, and bot protection in a single platform.

Thales Group acquired Imperva in December 2023 for $3.6 billion. The combined operation now has 5,800+ security experts across 68 countries. The Imperva brand and product line continue under Thales’s cybersecurity division, with active API security development.

Imperva is recognized as a KuppingerCole Market Leader in API Security and has been named in the Gartner Magic Quadrant for Web Application and API Protection (WAAP) 9 consecutive times. Unlike tools that only monitor API traffic at the gateway level, Imperva analyzes traffic patterns using ML to find shadow and zombie APIs that organizations did not know existed.

Key Features at a Glance

FeatureDetails
API DiscoveryML-powered continuous discovery of shadow, zombie, internal, and third-party APIs across cloud and on-prem
Data ClassificationAutomatic identification of PII, payment data, and credentials flowing through each endpoint
Schema EnforcementSecurity gap analysis of OpenAPI/Swagger definitions with runtime enforcement
BOLA DetectionBehavioral baselining and ML-driven Broken Object Level Authorization detection in real time
Bot ProtectionNative integration with Imperva Advanced Bot Protection for credential stuffing and API abuse
OWASP API Top 10Coverage across all OWASP API Security Top 10 threat categories
Deployment OptionsCloud-managed, self-managed, agent-based, and agentless deployment models
ComplianceSensitive data flow auditing for GDPR, PCI DSS, and CCPA requirements

Overview

Imperva API Security bundles discovery, risk assessment, and runtime defense in a single platform. Compared to point solutions that require stitching together separate discovery, testing, and protection tools, Imperva covers the full API security lifecycle in one product.

The platform handles four stages: discovering all APIs (including shadow and zombie endpoints), classifying the data flowing through them, assessing schemas for security gaps, and blocking threats in real time.

ML-Powered API Discovery
Continuously discovers internal, external, shadow, and zombie APIs using machine learning analysis of network traffic. Classifies APIs by risk level and data sensitivity automatically.
Runtime BOLA Detection
Profiles API traffic to build behavioral baselines, then detects and blocks Broken Object Level Authorization attacks in real time using ML-driven deviation analysis.
Combined Bot + API Protection
Native integration with Imperva Advanced Bot Protection stops credential stuffing, scraping, and automated API abuse without requiring separate tools.

Key Features

Imperva API Security discovery dashboard showing 622 discovered API endpoints across 22 hosts with OWASP risk indicators and data labels

API Discovery and Classification

The ML-powered discovery engine finds APIs that traditional inventories miss:

  • Shadow APIs — Endpoints deployed without security team awareness
  • Zombie APIs — Deprecated APIs still accessible and potentially vulnerable
  • Internal APIs — Service-to-service communication within microservices
  • Third-party APIs — External integrations and partner endpoints

Each discovered API is automatically classified by risk level. The platform identifies sensitive data types (PII, payment data, credentials) flowing through each endpoint without retaining the raw data itself.

Imperva API Security risk assessment view showing API hosts, resources, and endpoints with call volume metrics across 14 monitored websites

Schema Assessment and Enforcement

Imperva goes beyond simple schema validation:

  • Security gap analysis — Checks API definitions (OpenAPI/Swagger) for missing authentication parameters, weak validation rules, and other security anti-patterns
  • Runtime enforcement — Applies schema protection at runtime to block malformed requests
  • Selective enforcement — Lets teams apply schema protection only to well-defined, stable APIs to reduce false positives during development cycles

API Detection and Response

The ADR capability targets business logic attacks that signature-based tools miss:

  • Behavioral baselining — Learns normal API usage patterns per endpoint
  • BOLA detection — Identifies when users attempt to access objects belonging to other users
  • Anomaly correlation — ML-based incident correlation groups noisy events into prioritized incidents
  • Automated policy suggestions — Recommends protection policies based on observed traffic patterns

Bot Protection Integration

Imperva API Security works alongside Imperva’s bot protection to defend against automated threats:

  • Credential stuffing and account takeover attempts
  • API scraping and data harvesting
  • Business logic abuse from automated scripts
  • Rate limit evasion through distributed attack patterns
Part of Thales Group
Thales completed the acquisition of Imperva in December 2023. The combined cybersecurity division operates across 68 countries with over 5,800 security professionals. Imperva’s API security, WAF, bot protection, and RASP products continue under the Imperva brand.

Use Cases

Microservices environments — Discover and protect the full mesh of service-to-service APIs that perimeter tools cannot see.

Regulated industries — Automatic PII and payment data classification helps meet compliance requirements for GDPR, PCI DSS, and CCPA.

API-first businesses — Organizations exposing APIs to partners and customers need continuous discovery and schema enforcement as APIs evolve.

Bot-targeted APIs — APIs facing automated abuse benefit from the integrated bot protection and behavioral analysis.

Strengths & Limitations

Strengths:

  • ML-based discovery catches shadow and zombie APIs that manual inventories miss
  • Single platform removes the need to stitch together separate discovery, testing, and protection tools
  • Native bot protection integration provides defense against automated API abuse
  • Flexible deployment (cloud-managed, self-managed, agent-based, agentless) fits diverse architectures
  • Part of a large cybersecurity platform with shared threat intelligence across WAF, RASP, and DDoS products

Limitations:

  • Enterprise-focused product with enterprise pricing — less suited for small teams or startups
  • Full platform benefits require broader Imperva/Thales product adoption
  • Self-managed deployments require infrastructure investment and operational expertise
  • ML-based detection needs a baseline traffic period before it can effectively identify anomalies

Getting Started

1
Choose your deployment model — Decide between cloud-managed (Imperva handles infrastructure) or self-managed (full control in your environment). Select agent-based deployment for deep visibility or agentless for network-layer monitoring.
2
Enable API discovery — Once deployed, the ML engine begins analyzing traffic to discover all APIs. Initial discovery typically surfaces shadow and zombie APIs within the first scan cycle.
3
Review and classify — Examine the discovered API inventory. The platform auto-classifies sensitive data types, but review the classifications and risk levels for accuracy.
4
Configure protection policies — Set up schema enforcement for stable APIs, enable BOLA detection, and configure bot protection policies. Start in detection mode before switching to blocking.
5
Integrate with existing tools — Connect to your SIEM, API gateway, and incident response workflows. Imperva supports integration with Splunk, Datadog, and other monitoring platforms.

How Imperva API Security Compares

Imperva API Security competes in the enterprise API security market alongside Salt Security, Noname Security (acquired by Akamai), and Traceable AI (merged with Harness).

Compared to Salt Security and Noname, Imperva’s main differentiator is the single-platform approach that combines API discovery, schema enforcement, runtime protection, and bot management under one vendor. Unlike standalone API security tools, organizations already using Imperva WAF or Imperva RASP get shared threat intelligence across all products without additional integration work.

For teams looking for open-source API security testing, Akto offers API discovery and testing with a community edition. For API-first security testing in CI/CD pipelines, consider APIsec or 42Crunch API protection.

Best for
Enterprise teams managing large API estates that need automated discovery of shadow APIs, runtime BOLA protection, and integrated bot defense. Especially useful for organizations already using Imperva WAF or other Thales security products.

For a broader overview of API security tools and how they compare, see the API security tools category page.

Note: Imperva was acquired by Thales in December 2023 for $3.6B. The Imperva brand continues under Thales's cybersecurity division.

Frequently Asked Questions

What is Imperva API Security?
Imperva API Security is a commercial platform that discovers, classifies, and protects APIs using machine learning. It automatically finds shadow and zombie APIs, enforces schema validation, detects BOLA attacks in real time, and integrates with Imperva’s WAF and bot protection. Imperva is now part of Thales Group.
How does Imperva discover shadow APIs?
Imperva uses ML analysis of network traffic to continuously discover all APIs in your environment, including internal, external, shadow, and zombie APIs. It classifies each API by risk level and identifies sensitive data like PII and payment information flowing through them, without retaining raw data.
Does Imperva API Security detect BOLA attacks?
Yes. Imperva’s API Detection and Response capability profiles API traffic to establish behavioral baselines, then uses ML-driven analysis to spot deviations and block Broken Object Level Authorization (BOLA) exploits in real time. This covers one of the most critical OWASP API Top 10 threats.
How does Imperva API Security deploy?
Imperva offers both cloud-managed and self-managed deployment options. You can deploy agent-based (for deep application-level visibility) or agentless (for network-layer monitoring). It integrates with cloud WAFs, API gateways, microservices environments, and supports encrypted traffic analysis.
Is Imperva API Security related to Imperva RASP?
Both are Imperva products but serve different purposes. Imperva API Security focuses on API discovery, classification, and API-specific threat detection (BOLA, schema violations, bot abuse). Imperva RASP provides runtime application self-protection at the code level. They share threat intelligence within the Imperva platform.
What happened after Thales acquired Imperva?
Thales completed the acquisition of Imperva in December 2023 for approximately $3.6 billion. The Imperva brand and products continue under Thales’s cybersecurity division, which now has 5,800+ cybersecurity experts across 68 countries. Imperva’s API security capabilities remain actively developed.