Kubernetes WAF

Kubernetes Container Security Solution

Contact Us

Kubernetes Web Application Firewall

Container Security using Kubernetes WAF for Hybrid Cloud (Google Cloud , AWS , Azure )

What is a Kubernetes WAF ?

A KubeWAF stops attacks targeted towards your orchestrated containers deployed in kubernetes. It acts as a Ingress Controller and operated in reverse proxy mode.

Prophaze’s Web Application Firewall, Eagle Eye, is one of the top microservices security solution of 2019 which scans all the ingress requests and classifies the real and legitimate users using its AI Powered Platform.

Offers protection from OWASP TOP 10 threats including SQL Injections and Cross Site Scripting (XSS).

  • Deployment as reverse proxy hides the identity of therefore the original host IP address
  • Artificial Intelligence based attack detection method
  • Daily updated threat signatures
  • Rate Based filtering and custom rules
  • Built on Top of Open Source Technologies
  • Layer 7 Application Firewall
  • Fully Managed WAF
  • Mobile App and API Protection
  • Database Security and SQL Injection Protection for MySQL
  • Microsoft Windows IIS WAF Protection and Virtual Patching
  • Web Service and API Protection
  • PHP WAF Protection
  • WordPress Malware Detection and Cleaning
  • HTTPS / SSL Offloading
  • WordPress Brute Force Protection

Click Here to Read More on How Prophaze EagleEye WAF Works

Deployment Options

* Prophaze kubeWAF can be deployed as an ingress controller in your existing kubernetes cluster

KubeWAF Supports the following cloud platforms

  • Google Cloud WAF
  • Azure WAF

* On premise Installation is done by our waf vendors and partners.


Malware Cleaned


Attacks blocked


Days Protection


Websites Secured

What Does Prophaze EagleEye Do ?

Prophaze Cloud Web Application Firewall can Protect your Web App with
  • OWASP top 10 Protection
  • DDoS Protection
  • Application Learning (Adaptive Profiling)
  • Data leak prevention
  • XSS and CSRF Protection
  • IP Reputation and Geo-IP Monitoring
  • Secure Session Management
  • AI-powered platform learns to deconstruct application logic and create application specific rules
  • EagleEye can act as an additional layer of protection to your existing architecture.
  • Web and Mobile API Protection
  • Bot Mitigation

##Trending in Container Security

Tag Cloud

XSS vulnerability XSS attacks WSO2 IS as Key Manager 5.7.0 wordpress waf wordpresss web application firewall wordpress security Wordpress Firewall Security wordpress firewall wordpress database security wordpress database prefix windows stuck at boot WebSphere eXtreme Scale 8.6 WebSphere Application Server Liberty waf in medical sector waf vBulletin 5.5.4 unrestricted file upload TYPO3 top 10 web application firewall sutecrm security suitecrm xss SuiteCRM stored XSS​ SQL Injection Vulnerability SQL Injection sophos av RHQ Mongo DB Drift Server pre-authentication pimcore before 6.3.0 phpBB version 3.2.7 phpbb 3.0.x-3.0.6 phpBB Philips Taolight Smart Wi-Fi Wiz Connected LED Bulb ntlmhack NSA Ghidra newegg hack NETGEAR SRX5308 Moxa EDR 810 Series mishandles signature medical data protection Matrix Synapse MantisBT version 1.2.12 magecart attack linux vserver labcorp hack KB4499165 KB4499164 Joomla CMS JetBrains javascript sniffer Incorrect Access Control Improper Input Validation Improper Access Control identity protection IBM Security Guardium IBM Security Directory IBM MQ how WAF works hospital waf hospital firewall healthcare waf healthcare data protection FiberHome HG2201T Exim 4.92 Drupal6 version 6.16 Directory Traversal Dell EMC Integrated Data Protection Appliance Dell EMC ECS data security data protection data breach CVE-2019-18980 CVE-2019-18882 CVE-2019-18881 CVE-2019-18835 CVE-2019-18784 CVE-2019-18674 CVE-2019-18650 CVE-2019-17319 CVE-2019-17318 CVE-2019-17317 CVE-2019-17316 CVE-2019-17315 CVE-2019-17314 CVE-2019-17313 CVE-2019-17312 CVE-2019-17311 CVE-2019-17310 CVE-2019-17309 CVE-2019-17308 CVE-2019-17307 CVE-2019-17306 CVE-2019-17305 CVE-2019-17304 CVE-2019-17303 CVE-2019-17302 CVE-2019-17301 CVE-2019-17300 CVE-2019-17299 CVE-2019-17298 CVE-2019-17297 CVE-2019-17296 CVE-2019-17295 CVE-2019-17294 CVE-2019-17293 CVE-2019-17292 CVE-2019-17271 CVE-2019-17187 CVE-2019-17049 CVE-2019-16941 CVE-2019-16928 CVE-2019-16407 CVE-2019-16171 CVE-2019-15259 CVE-2019-15039 CVE-2019-14954 CVE-2019-14952 CVE-2019-13376 CVE-2019-12716 CVE-2019-12715 CVE-2019-12714 CVE-2019-12713 CVE-2019-12712 CVE-2019-12711 CVE-2019-12710 CVE-2019-12707 CVE-2019-12706 CVE-2019-12701 CVE-2019-12700 CVE-2019-12699 CVE-2019-12698 CVE-2019-12697 CVE-2019-12696 CVE-2019-12695 CVE-2019-12694 CVE-2019-12693 CVE-2019-12691 CVE-2019-12690 CVE-2019-12689 CVE-2019-12688 CVE-2019-12687 CVE-2019-12686 CVE-2019-12685 CVE-2019-12684 CVE-2019-12683 CVE-2019-12682 CVE-2019-12681 CVE-2019-12680 CVE-2019-12679 CVE-2019-12678 CVE-2019-12677 CVE-2019-12676 CVE-2019-12675 CVE-2019-12674 CVE-2019-12663 CVE-2019-12660 CVE-2019-12631 CVE-2019-12630 CVE-2019-12422 CVE-2019-12419 CVE-2019-11656 CVE-2019-11655 CVE-2019-11478 CVE-2019-10969 CVE-2019-10963 CVE-2019-10763 CVE-2019-4549 CVE-2019-4542 CVE-2019-4539 CVE-2019-4538 CVE-2019-4520 CVE-2019-4441 CVE-2019-4422 CVE-2019-4141 CVE-2019-4115 CVE-2019-4112 CVE-2019-4109 CVE-2019-4106 CVE-2019-3766 CVE-2019-3747 CVE-2019-3746 CVE-2019-3736 CVE-2019-1915 CVE-2019-0396 CVE-2019-0388 CVE-2019-0374 CVE-2019-0370 CVE-2019-0369 CVE-2019-0367 CVE-2019-0365 CVE-2013-4374 CVE-2013-1811 CVE-2010-2471 CVE-2006-4243 CSRF Token Hijacking Cisco Apache Shiro Apache CXF amca hack amca breach