
I use Imperva Attack Analytics to gain better visibility into attacks and understand what's really happening behind the alerts. It helps us analyze threats faster and focus on the ones that actually matter. I like how it connects the dots between different events and turns raw alerts into a clear story. The attack context and timelines make it much easier to understand what's really going on, instead of just reacting to isolated alerts. These features save us a lot of time, allowing us to see the full flow of an attack and understand intent much faster. The timelines help with investigations and decision-making, especially when things get busy, and you need clarity quickly. It complements well with our WAF and SIEM by adding context and helping us make sense of the alerts we already receive. We moved from more manual analysis using SIEM data and alerts, and Imperva Attack Analytics provided better context and faster insights, making investigations more efficient. The initial setup was straightforward, and once connected to our existing Imperva components, it started delivering value quickly, with a smooth onboarding process. Review collected by and hosted on G2.com.
Sometimes the interface feels a bit heavy, especially when there's a lot of data. Also, having more flexibility in how reports and views are customized would make it even more useful. I'd like to see faster loading and smoother navigation when moving between attack views, timelines, and raw events. On the customization side, it would help to have more control over filters, saved views, and reporting formats. Review collected by and hosted on G2.com.
Validated through LinkedIn
This reviewer was offered a nominal gift card as thank you for completing this review.
Invitation from G2. This reviewer was offered a nominal gift card as thank you for completing this review.

