
What Is REST API? How To Provide Security To REST API?
What is REST API? REST is the acronym of Representational State Transfer (REST). It is an architectural style or pattern
What is REST API? REST is the acronym of Representational State Transfer (REST). It is an architectural style or pattern
What is Remote File Inclusion (RFI)? RFI is also known as Remote file inclusion. In this the attackers or Penetration
What is Session Hijacking? Session Hijacking is the type of attack in which the attacker takes over or hijacks a
What is DNS and how does it work? DNS is the abbreviation for Domain Name System. The task of the
GDPR (General data protection regulation) is regulation to provide uniform data protection by eliminating the inconsistencies in national laws of
What is Content Security Policy (CSP)? Content Security Policy (CSP) is an additional layer of security on the HTTP browser
What is Swagger? Swagger is the way of defining the structure of APIs (Application Programming Interface). Swagger is specifically developed
What is a Supply Chain Attack? The supply chain includes everything from the delivery of materials from suppliers to manufacturers
What Is Clickjacking? Users are tricked into believing they are clicking on one thing when they are actually clicking on
What Is Remote Code Execution? Remote Code Execution or RCE, also known as arbitrary code execution is a network vulnerability
What is Container Runtime Protection? Container runtime protection provides security for containers during runtime. With the evolution of container technology,
What is 2FA? 2FA stands for Two Factor Authentication and has become a near requirement for securing user accounts on
Zero-Configuration Web Application and API Protection for Kubernetes Zero-Configuration Web Application and API Protection (WAAP), DDoS protection and Bot Mitigation
An organization’s security operation center or SOC embraces the team of IT security professionals that works for the organization’s security.
A vulnerability scanner is a program that searches for vulnerabilities on a network, analyzing the attack surface. This software is
Home Kube-native PROPHAZE APPSEC PLATFORM What is Prophaze WAF? How Prophaze WAF Works? System Requirements Performance SSL Termination Modes Of
Home On-Premise PROPHAZE APPSEC PLATFORM What is Prophaze WAF? How Prophaze WAF Works? System Requirements Performance SSL Termination Modes Of
Home Cloud Our Cloud Server span around the globe which only required dns change for application onboarding. PROPHAZE APPSEC PLATFORM
Home Dashboard This document contains user manual on how the WAF dashboard can be used to analyse various attack vectors
Home Traffic Analysis Detailed Log Analyzing with various filter options PROPHAZE APPSEC PLATFORM What is Prophaze WAF? How Prophaze WAF
Home Bot Analysis This is based on ML based detection. PROPHAZE APPSEC PLATFORM What is Prophaze WAF? How Prophaze WAF
Home Attack Analytics Detailed Attack Log Analyzing with various filter options PROPHAZE APPSEC PLATFORM What is Prophaze WAF? How Prophaze
Home Prophaze Documentation Welcome to the Prophaze Documentation! Here, you’ll find step-by-step guides, tutorials, and resources to help you get
Home Rules Page Custom Rules page PROPHAZE APPSEC PLATFORM What is Prophaze WAF? How Prophaze WAF Works? System Requirements Performance