Kubernetes WAF

Kubernetes Container Security Solution

Kubernetes Web Application Firewall

Container Security using Kubernetes WAF for Hybrid Cloud (Google Cloud , AWS , Azure )

What is a Kubernetes WAF ?

A KubeWAF stops attacks targeted towards your orchestrated containers deployed in kubernetes. It acts as a Ingress Controller and operated in reverse proxy mode.

Prophaze’s Web Application Firewall, Eagle Eye, is one of the top microservices security solution of 2019 which scans all the ingress requests and classifies the real and legitimate users using its AI Powered Platform.

Offers protection from OWASP TOP 10 threats including SQL Injections and Cross Site Scripting (XSS).

  • Deployment as reverse proxy hides the identity of therefore the original host IP address
  • Artificial Intelligence based attack detection method
  • Daily updated threat signatures
  • Rate Based filtering and custom rules
  • Built on Top of Open Source Technologies
  • Layer 7 Application Firewall
  • Fully Managed WAF
  • Mobile App and API Protection
  • Database Security and SQL Injection Protection for MySQL
  • Microsoft Windows IIS WAF Protection and Virtual Patching
  • Web Service and API Protection
  • PHP WAF Protection
  • WordPress Malware Detection and Cleaning
  • HTTPS / SSL Offloading
  • WordPress Brute Force Protection

Click Here to Read More on How Prophaze EagleEye WAF Works

Deployment Options

* Prophaze kubeWAF can be deployed as an ingress controller in your existing kubernetes cluster

KubeWAF Supports the following cloud platforms

  • Google Cloud WAF
  • AWS WAF
  • Azure WAF

* On premise Installation is done by our waf vendors and partners.

0

Malware Cleaned

0

Attacks blocked

0

Days Protection

0

Websites Secured

What Does Prophaze EagleEye Do ?

Prophaze Cloud Web Application Firewall can Protect your Web App with
  • OWASP top 10 Protection
  • DDoS Protection
  • Application Learning (Adaptive Profiling)
  • Data leak prevention
  • XSS and CSRF Protection
  • IP Reputation and  Geo-IP Monitoring
  • Secure Session Management
  • AI-powered platform learns to deconstruct application logic and create application specific rules
  • EagleEye can act as an additional layer of protection to your existing architecture.
  • Web and Mobile API Protection
  • Bot Mitigation

##Trending in Container Security

Tag Cloud

XSS wordpress waf wordpresss web application firewall wordpress security Wordpress Firewall Security wordpress firewall wordpress database security wordpress database prefix windows stuck at boot WebSphere eXtreme Scale 8.6 WebSphere Application Server Liberty waf in medical sector waf vBulletin 5.5.4 unrestricted file upload top 10 web application firewall Tenda N301 Symantec Messaging Gateway sutecrm security suitecrm xss stored XSS​ SQL Injection Vulnerability SQL Injection sophos av Solr Admin Web Interface vulnerability siemens spectrum waf rockwell automation security Pydio 6.0.8 Pydio pre-authentication phpBB version 3.2.7 phpBB OpManager before 12.4 ntlmhack NSA Ghidra newegg hack NETGEAR SRX5308 Moxa EDR 810 Series medical data protection magecart attack labcorp hack kuberenetes waf KB4499165 KB4499164 JetBrains javascript sniffer Incorrect Access Control Improper Input Validation Improper Access Control identity protection IBM Security Guardium IBM Security Directory IBM MQ how WAF works hospital waf hospital firewall healthcare waf healthcare data protection file sharing FiberHome HG2201T Exim 4.92 docker waf Directory Traversal Dell EMC Integrated Data Protection Appliance Dell EMC ECS data security data protection data breach CVE-2019-17602 CVE-2019-17319 CVE-2019-17318 CVE-2019-17317 CVE-2019-17316 CVE-2019-17315 CVE-2019-17314 CVE-2019-17313 CVE-2019-17312 CVE-2019-17311 CVE-2019-17310 CVE-2019-17309 CVE-2019-17308 CVE-2019-17307 CVE-2019-17306 CVE-2019-17305 CVE-2019-17304 CVE-2019-17303 CVE-2019-17302 CVE-2019-17301 CVE-2019-17300 CVE-2019-17299 CVE-2019-17298 CVE-2019-17297 CVE-2019-17296 CVE-2019-17295 CVE-2019-17294 CVE-2019-17293 CVE-2019-17292 CVE-2019-17271 CVE-2019-17187 CVE-2019-17049 CVE-2019-16941 CVE-2019-16928 CVE-2019-16407 CVE-2019-16171 CVE-2019-15259 CVE-2019-15039 CVE-2019-15033 CVE-2019-15032 CVE-2019-14954 CVE-2019-14952 CVE-2019-14222 CVE-2019-13376 CVE-2019-12751 CVE-2019-12716 CVE-2019-12715 CVE-2019-12714 CVE-2019-12713 CVE-2019-12712 CVE-2019-12711 CVE-2019-12710 CVE-2019-12707 CVE-2019-12706 CVE-2019-12701 CVE-2019-12700 CVE-2019-12699 CVE-2019-12698 CVE-2019-12697 CVE-2019-12696 CVE-2019-12695 CVE-2019-12694 CVE-2019-12693 CVE-2019-12691 CVE-2019-12690 CVE-2019-12689 CVE-2019-12688 CVE-2019-12687 CVE-2019-12686 CVE-2019-12685 CVE-2019-12684 CVE-2019-12683 CVE-2019-12682 CVE-2019-12681 CVE-2019-12680 CVE-2019-12679 CVE-2019-12678 CVE-2019-12677 CVE-2019-12676 CVE-2019-12675 CVE-2019-12674 CVE-2019-12663 CVE-2019-12660 CVE-2019-12631 CVE-2019-12630 CVE-2019-11656 CVE-2019-11655 CVE-2019-11478 CVE-2019-10969 CVE-2019-10963 CVE-2019-4549 CVE-2019-4542 CVE-2019-4539 CVE-2019-4538 CVE-2019-4520 CVE-2019-4441 CVE-2019-4422 CVE-2019-4265 CVE-2019-4141 CVE-2019-4115 CVE-2019-4112 CVE-2019-4109 CVE-2019-4106 CVE-2019-3766 CVE-2019-3747 CVE-2019-3746 CVE-2019-3736 CVE-2019-1915 CVE-2019-0381 CVE-2019-0380 CVE-2019-0379 CVE-2019-0378 CVE-2019-0377 CVE-2019-0376 CVE-2019-0375 CVE-2019-0374 CVE-2019-0370 CVE-2019-0369 CVE-2019-0368 CVE-2019-0367 CVE-2019-0365 CVE-2016-11016 CVE-2016-11015 CVE-2016-11014 CSRF Token Hijacking container waf container security cloud waf Cisco amca hack amca breach Alfresco Community Edition