Kubernetes WAF

Kubernetes Container Security Solution

Contact Us

Kubernetes Web Application Firewall

Container Security using Kubernetes WAF for Hybrid and Native Cloud

What is a Kubernetes WAF ?

A KubeWAF stops attacks targeted towards your orchestrated containers deployed in kubernetes. It acts as a Ingress Controller and operated in reverse proxy mode.

Prophaze’s Web Application Firewall, Eagle Eye, is one of the top microservices security solution of 2019 which scans all the ingress requests and classifies the real and legitimate users using its AI Powered Platform.

Helps Customers to Comply with HIPAA , GDPR , PCI DSS Compliance

Prophaze offers unmatched data protection for its cusotmers using Next Generation WAAP (Web Application Api Protection)

Offers protection from OWASP TOP 10 threats including SQL Injections and Cross Site Scripting (XSS).

  • Deployment as reverse proxy hides the identity of therefore the original host IP address
  • Artificial Intelligence based attack detection method
  • Daily updated threat signatures
  • Rate Based filtering and custom rules
  • Built on Top of Open Source Technologies
  • Layer 7 Application Firewall
  • Fully Managed WAF
  • Mobile App and API Protection
  • Database Security and SQL Injection Protection for MySQL
  • Microsoft Windows IIS WAF Protection and Virtual Patching
  • Web Service and API Protection
  • PHP WAF Protection
  • WordPress Malware Detection and Cleaning
  • HTTPS / SSL Offloading
  • WordPress Brute Force Protection

Click Here to Read More on How Prophaze EagleEye WAF Works

Deployment Options

* Prophaze kubeWAF can be deployed as an ingress controller in your existing kubernetes cluster

KubeWAF Supports the following cloud platforms

  • Google Cloud WAF
  • Azure WAF
  • Microk8s
  • Kubeadm
  • Rancher

* On premise Installation is done by our waf vendors and partners.


Malware Cleaned


Attacks blocked


Days Protection


Websites Secured

What Does Prophaze EagleEye Do ?

Prophaze Cloud Web Application Firewall can Protect your Web App with
  • OWASP top 10 Protection
  • DDoS Protection
  • Application Learning (Adaptive Profiling)
  • Data leak prevention
  • XSS and CSRF Protection
  • IP Reputation and Geo-IP Monitoring
  • Secure Session Management
  • AI-powered platform learns to deconstruct application logic and create application specific rules
  • EagleEye can act as an additional layer of protection to your existing architecture.
  • Web and Mobile API Protection
  • Bot Mitigation

##Trending in Container Security

Tag Cloud

Zikula 1.3.0 XSS vulnerability XSS attacks WSO2 IS as Key Manager 5.7.0 WebSphere eXtreme Scale 8.6 waf TYPO3 Tiki Wiki TemaTres 3.0 Symfony sutecrm security suitecrm xss SuiteCRM SQL Injection Vulnerability SQL Injection RHQ Mongo DB Drift Server pimcore before 6.3.0 phpBB version 3.2.7 phpbb 3.0.x-3.0.6 phpBB Philips Taolight Smart Wi-Fi Wiz Connected LED Bulb Openfind MAIL2000 OpenBSD Octeth Oempro 4.7 ntlmhack NSA Ghidra newegg hack NETGEAR SRX5308 MITM mishandles signature MediaWiki Matrix Synapse MantisBT version 1.2.12 man-in-the-middle magecart attack linux vserver Joomla CMS JetBrains javascript sniffer Ivanti Workspace Control IBM Security Guardium IBM Security Directory IBM MQ IBM Case Manager FortiOS Exim 4.92 Drupal VBO module Drupal6 version 6.16 Dell EMC Integrated Data Protection Appliance Dell EMC ECS CVE-2019-19774 CVE-2019-19726 CVE-2019-19675 CVE-2019-18980 CVE-2019-18960 CVE-2019-18889 CVE-2019-18888 CVE-2019-18887 CVE-2019-18882 CVE-2019-18881 CVE-2019-18835 CVE-2019-18784 CVE-2019-18674 CVE-2019-18650 CVE-2019-17319 CVE-2019-17318 CVE-2019-17317 CVE-2019-17316 CVE-2019-17315 CVE-2019-17314 CVE-2019-17313 CVE-2019-17312 CVE-2019-17311 CVE-2019-17310 CVE-2019-17309 CVE-2019-17308 CVE-2019-17307 CVE-2019-17306 CVE-2019-17305 CVE-2019-17304 CVE-2019-17303 CVE-2019-17302 CVE-2019-17301 CVE-2019-17300 CVE-2019-17299 CVE-2019-17298 CVE-2019-17297 CVE-2019-17296 CVE-2019-17295 CVE-2019-17294 CVE-2019-17293 CVE-2019-17292 CVE-2019-17049 CVE-2019-16941 CVE-2019-16928 CVE-2019-16771 CVE-2019-16407 CVE-2019-16171 CVE-2019-15705 CVE-2019-15259 CVE-2019-15073 CVE-2019-15072 CVE-2019-15071 CVE-2019-15039 CVE-2019-15006 CVE-2019-14954 CVE-2019-14952 CVE-2019-14344 CVE-2019-13376 CVE-2019-12716 CVE-2019-12715 CVE-2019-12714 CVE-2019-12713 CVE-2019-12712 CVE-2019-12711 CVE-2019-12710 CVE-2019-12707 CVE-2019-12706 CVE-2019-12701 CVE-2019-12700 CVE-2019-12699 CVE-2019-12698 CVE-2019-12697 CVE-2019-12696 CVE-2019-12695 CVE-2019-12694 CVE-2019-12693 CVE-2019-12691 CVE-2019-12690 CVE-2019-12689 CVE-2019-12688 CVE-2019-12687 CVE-2019-12686 CVE-2019-12685 CVE-2019-12684 CVE-2019-12683 CVE-2019-12682 CVE-2019-12681 CVE-2019-12680 CVE-2019-12679 CVE-2019-12678 CVE-2019-12677 CVE-2019-12676 CVE-2019-12675 CVE-2019-12674 CVE-2019-12663 CVE-2019-12660 CVE-2019-12631 CVE-2019-12630 CVE-2019-12422 CVE-2019-12421 CVE-2019-12419 CVE-2019-11325 CVE-2019-11293 CVE-2019-10763 CVE-2019-10083 CVE-2019-10080 CVE-2019-4549 CVE-2019-4542 CVE-2019-4539 CVE-2019-4538 CVE-2019-4520 CVE-2019-4426 CVE-2019-4422 CVE-2019-4141 CVE-2019-4115 CVE-2019-4112 CVE-2019-4109 CVE-2019-4106 CVE-2019-3766 CVE-2019-3747 CVE-2019-3746 CVE-2019-3736 CVE-2019-1915 CVE-2019-0396 CVE-2019-0388 CVE-2015-3425 CVE-2015-3424 CVE-2014-3536 CVE-2013-4374 CVE-2013-1817 CVE-2013-1816 CVE-2013-1811 CVE-2012-1592 CVE-2011-4455 CVE-2011-4454 CVE-2011-3373 CVE-2011-3352 CVE-2010-2471 CVE-2006-4243 CSRF Token Hijacking Cloud Foundry Products Cisco AWS Firecracker Armeria Apache Struts2 Apache Shiro Apache NiFi 1.3.0 - 1.9.2 Apache CXF Accentis Content Resource Management System