Imperva RASP embeds security directly into Java and .NET applications, protecting them from the inside. The main draw is the two-way integration with Imperva’s WAF — attack patterns detected by RASP feed into WAF rules, and vice versa.
The product evolved from Imperva’s acquisition of Prevoty in 2018. It requires no code changes and no tuning. Deploy the agent, and it starts blocking attacks based on behavioral analysis rather than pattern matching.
| Feature | Details |
|---|---|
| Languages | Java, .NET |
| WAF integration | Two-way threat intelligence sharing with Imperva WAF |
| Deployment | Cloud, on-premises, hybrid |
| Tuning | Zero tuning required |
| Detection | ML-based behavioral analytics |
| Attack types | SQLi, XSS, RCE, auth bypass, business logic |
| File integrity | Built-in file integrity monitoring |
| Container support | Kubernetes and containers |
| Origin | Prevoty acquisition |
What is Imperva RASP?
Imperva RASP sits inside the application runtime, monitoring how requests flow through code. When it spots an attack pattern — SQL injection, XSS, remote code execution, or business logic abuse — it blocks the request before it reaches vulnerable code.
What makes it different from standalone RASP products is the WAF integration. RASP sees attacks that bypass the WAF (encryption, encoding tricks, zero-days). The WAF sees network-level threats RASP cannot. Together, they share threat intelligence and coordinate blocking across both layers.
Key Features
Runtime Protection
The RASP agent protects against:
- SQL injection — context-aware detection inside the database query builder
- Cross-site scripting (XSS) — blocks malicious scripts at the rendering layer
- Remote code execution — prevents unauthorized command execution
- Authentication bypasses — detects forged or manipulated auth tokens
- Business logic attacks — identifies abuse of application workflows
Attack Analytics
Imperva provides attack visibility through:
- Attack visualization and timelines
- Attacker profiling across sessions
- Threat intelligence correlation
- Incident response workflows
File Integrity Monitoring
Monitors file system changes within the application environment. Detects unauthorized modifications to configuration files, application binaries, and system files.
Getting Started
Integrations
When to Use Imperva RASP
Imperva RASP fits organizations that already use Imperva WAF or other Imperva products and want coordinated runtime protection. The zero-tuning approach and WAF integration make it straightforward to deploy.
It is less suited for teams that want standalone RASP without an Imperva WAF dependency, organizations running languages beyond Java and .NET, or those looking for open-source alternatives.
Note: Evolution of Prevoty acquisition
