Imperva acquires Distil Networks to bolster cybersecurity capabilities

Imperva, a cybersecurity company focused on protecting customer data, has acquired bot management firm Distil Networks.

Through this deal, Imperva hopes to strengthen its application security services and bolster customer data and application protections.

By integrating Distil Networks into its own system, Imperva customers will be able to access tools which identify, respond and manage automated attacks, regardless of where they are deployed.

The Imperva solution gives companies security tools to protect their digital assets by accurately detecting and blocking incoming threats. Offerings include web application firewall, attack analytics, threat intelligence, DDoS protection, application delivery and runtime application self-protection.

In addition to this, the company offers data security measures which can uncover hidden risks and vulnerabilities, and rogue datasets, through the use of automatic database discovery and classification.

Imperva CEO Chris Hylen said, “Distil Networks is a globally recognized leader in automated attack mitigation, and this deal perfectly aligns with our vision of delivering best-in-class cybersecurity solutions that protect businesses throughout their cloud journey.

“Distil Networks gives us a comprehensive Bot Management solution that identifies, responds to and manages a full range of automated attacks no matter where these applications or APIs are deployed. We believe Imperva and Distil Networks will create the most comprehensive security platform on the market and we’re excited to make this available to our customers worldwide.”

Late last year, California-based Imperva was acquired by private equity firm Thoma Bravo in a cash transaction valued at around $2.1bn. The deal meant Imperva stockholders received $55.75 per share.

Enjoyed the story? 

Subscribe to our weekly RegTech newsletter and get the latest industry news & research

Copyright © 2018 RegTech Analyst

Investors

The following investor(s) were tagged in this article.