Basic | Pro | Enterprise | |
---|---|---|---|
Total Cost of Ownership (TCO) | |||
Very Low TCO (Price + Maintenance + Staffing) | ![]() | ![]() | ![]() |
Price Includes Threat Updates | ![]() | ![]() | ![]() |
No Maintenance Required | ![]() | ![]() | ![]() |
Simple All Inclusive Pricing | ![]() | ![]() | ![]() |
Ease of Use | |||
Go Live In A Day | ![]() | ![]() | ![]() |
No Monitoring Required | ![]() | ![]() | ![]() |
Modify Rules Without Code Changes | ![]() | ![]() | ![]() |
Easy Drill Down Threat Investigation | ![]() | ![]() | ![]() |
No Expert Level Admin Required | ![]() | ![]() | ![]() |
No Training Required | ![]() | ![]() | ![]() |
WAF Features | |||
OWASP Top 10 Threats Protection | ![]() | ![]() | ![]() |
Bots Protection | ![]() | ![]() | ![]() |
DDoS Protection | ![]() | ![]() | ![]() |
Zero Day Protection | ![]() | ![]() | ![]() |
Real-time Dashboard | ![]() | ![]() | ![]() |
Machine Learning for Accurate Threat Detection | ![]() | ![]() | ![]() |
AI Automated Whitelisting | ![]() | ![]() | ![]() |
Positive and Negative Security Model | ![]() | ![]() | ![]() |
IP to Rule Mapping | ![]() | ![]() | ![]() |
Unlimited Rules Per App | ![]() | ![]() | ![]() |
Custom Rules | ![]() | ![]() | ![]() |
Import/Export Rules, Lists | ![]() | ![]() | ![]() |
Response Filtering | ![]() | ![]() | ![]() |
Geo Filtering | ![]() | ![]() | ![]() |
Rate Limiting | ![]() | ![]() | ![]() |
Virtual Patching Included | ![]() | ![]() | ![]() |
API Protection Included | ![]() | ![]() | ![]() |
OpenAPI (Swagger) Support | ![]() | ![]() | ![]() |
Automated Compliance Included | ![]() | ![]() | ![]() |
Extensive Reports Included | ![]() | ![]() | ![]() |
WAF Deployment | |||
Public Cloud | ![]() | ![]() | ![]() |
Kubernetes Native On Any Cloud | ![]() | ![]() | ![]() |
Multi-Cloud Deployment | ![]() | ![]() | ![]() |
On-Premise Deployment | ![]() | ![]() | ![]() |
IoT Protection | ![]() | ![]() | ![]() |
Auto Scaling | ![]() | ![]() | ![]() |
Multi-Tenancy | ![]() | ![]() | ![]() |
Multi-CDN | ![]() | ![]() | ![]() |
Multi-Domain | ![]() | ![]() | ![]() |
Integrations to SIEM, Monitoring | ![]() | ![]() | ![]() |
Failover Protection | ![]() | ![]() | ![]() |
Support | |||
Drill Down Target Threats | ![]() | ![]() | ![]() |
Security Assessment Included | ![]() | ![]() | ![]() |