Cookie Policy
[vc_row css=”.vc_custom_1592843367172{padding-top: 40px !important;}”][vc_column][vc_column_text]Prophaze Cookie Policy Our website uses cookies to distinguish you from other users of our website. This
[vc_row css=”.vc_custom_1592843367172{padding-top: 40px !important;}”][vc_column][vc_column_text]Prophaze Cookie Policy Our website uses cookies to distinguish you from other users of our website. This
TERMS OF SERVICE (SAAS) PROPHAZE INDIA PVT. LTD. AND/OR ITS AFFILIATES (“PROPHAZE”) IS WILLING TO GRANT ACCESS TO THE SAAS
[vc_row css=”.vc_custom_1592842954841{padding-top: 40px !important;background-position: 0 0 !important;background-repeat: no-repeat !important;}”][vc_column width=”1/2″][vc_column_text css=”.vc_custom_1592822189267{border-right-width: 50px !important;padding-left: 50px !important;}”]Securing multiple customers’ data on a
Integrations Streamline Your Security Infrastructure with Prophaze WAF Integration Prophaze web application firewall is designed to protect web applications from
Virtual Patching Prophaze WAF’s Mitigating Vulnerabilities in Web Applications Prophaze WAF’s virtual patching features in mitigating vulnerabilities of web applications.
Compliance Ensuring Regulatory Compliances and Best Practices E-commerce, FinTech, Health Tech, and organizations that process PII and PHI data find
WAF API Gateway Connecting Your Services with Ease and Efficiency Prophaze API Gateway is a solution that allows businesses to
Automated Security Policy Does The Heavy Lifting Your Organization’s Security Posture with Prophaze Automated Security Policy Prophaze Automated Security Policy
Protection From All Threats Security for Your Data Privacy Prophaze AI firewall blocks malicious requests, execution of fileless attacks, new
[vc_row css=”.vc_custom_1592843367172{padding-top: 40px !important;}”][vc_column width=”1/2″][st_heading title=”Benefits”][/st_heading][vc_column_text] No need for in-house application security experts Fully managed WAF service with zero maintenance
Prophaze Service Level Agreement This Service Level Agreement (“SLA”) is a policy governing the performance of Prophaze Technologies Private Limited.
[vc_row][vc_column][vc_column_text] Overview : In Rockwell Automation RSLinx Classic versions 4.1.00 and prior, an authenticated local attacker could modify a registry
[vc_row][vc_column][vc_column_text] Overview : X.509 certificates generated by the MongoDB Enterprise Kubernetes Operator may allow an attacker with access to the
Overview : A Directory Traversal issue was discovered in CIPPlanner CIPAce 9.1 Build 2019092801. An unauthenticated attacker can make HTTP
Overview : An unrestricted file upload vulnerability in keywordsImport.php in TestLink 1.9.20 allows remote attackers to execute arbitrary code by
Overview : In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might
[vc_row][vc_column][vc_column_text] Overview : A webserver component in Paessler PRTG Network Monitor 19.2.50 to PRTG 20.1.56 allows unauthenticated remote command execution
Overview : The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial
[vc_row][vc_column][vc_column_text] Overview : In NGINX Controller versions prior to 3.2.0, an unauthenticated attacker with network access to the Controller API
[vc_row][vc_column][vc_column_text] Overview : On BIG-IP 15.1.0-15.1.0.1, 15.0.0-15.0.1.1, and 14.1.0-14.1.2.2, under certain conditions, TMM may crash or stop processing new traffic
[vc_row][vc_column][vc_column_text] Overview : GitLab EE/CE 8.11 through 12.9.1 allows blocked users to pull/push docker images. References Note: References are provided for the
[vc_row][vc_column][vc_column_text] Overview : An SQL injection vulnerability was discovered in Micro Focus Service Manager Automation (SMA), affecting versions 2019.08, 2019.05,
Overview : cPanel before 84.0.20 allows a demo account to achieve remote code execution via a cpsrvd rsync shell (SEC-544).
Overview : cPanel before 82.0.18 allows attackers to leverage virtual mail accounts in order to bypass account suspensions (SEC-508). Affected