Thales Introduces Imperva for Google Cloud

Thales Introduces Imperva for Google Cloud

Thales announced the Controlled Availability of Imperva for Google Cloud, bringing the industry’s most trusted application security platform directly into Google Cloud. ​Designed to operate within Google Cloud, the new offering enables organizations to protect web applications and APIs by leveraging Google Cloud’s Service Extension traffic, preserving existing pipelines, integrations, and monitoring workflows. ​

As enterprises accelerate cloud adoption, development teams increasingly standardize on native cloud services to improve speed and reduce operational complexity. Many security solutions, however, require external routing that introduces latency and friction. At the same time, native cloud security tools often lack the depth required to protect mission-critical applications at scale, creating friction between development and security teams.

“Organizations shouldn’t have to choose between performance, simplicity, and protection,” said Tim Chang, Global Vice President and General Manager, Imperva Application Security at Thales, “With Imperva for Google Cloud, security is part of the cloud infrastructure, delivering enterprise-grade protection without disrupting how applications are built and delivered.”

Security Built into the Cloud, Not Bolted On
Rather than forcing enterprises to bolt protection on after the fact, Imperva for Google Cloud embeds advanced application security directly into the infrastructure that developers already rely on. By aligning with Google Cloud’s native architecture, Thales enables security that scales with modern application development, supporting faster innovation while maintaining the level of protection required for high-value digital services.

Security Built for Modern Applications
Imperva for Google Cloud integrates directly with Google Cloud Load Balancing using Private Service Connect, allowing traffic to remain within Google Cloud’s network while being inspected and protected.

Key capabilities include:

  • Deployment without disruption — No DNS changes, SSL management, or re-architecture required
  • Immediate protection with minimal tuning — High-confidence protection from day one, with policies updated daily by a dedicated threat research team
  • Resilient architecture — No single point of failure; applications remain available even during disruption
  • Automation-first design — API-driven deployment with Terraform support for DevOps workflows
  • Reduced operational complexity for DevOps and security teams

 

Designing data sovereignty without slowing innovation

Designing data sovereignty without slowing innovation

Sivaprakash V S, Technical Evangelist at ManageEngine, explains that Middle East…
Structured Cloud Vulnerability Management key for businesses

Structured Cloud Vulnerability Management key for businesses

Hussam Sidani, Vice President for the Middle East & North…
Cybersecurity takes center stage in modern surveillance

Cybersecurity takes center stage in modern surveillance

Steven Kenny, Manager, Architect & Engineering (A&E) Program – EMEA at…
NanoClaw Creator Rejects $20M Buyout, Raises $12M Seed

NanoClaw Creator Rejects $20M Buyout, Raises $12M Seed

NanoCo, the startup behind the fast‑rising secure AI agent framework NanoClaw,…
Stream secures $5.2M seed extension led by BECO Capital

Stream secures $5.2M seed extension led by BECO Capital

Stream, the Riyadh-born payments and billing platform, has announced a $5.2 million…
Exaforce Secures $125M Series B to Scale Real‑Time AI Cyber Defense

Exaforce Secures $125M Series B to Scale Real‑Time AI Cyber Defense

Exaforce, a cybersecurity startup focused on real‑time threat detection and autonomous response,…