Cloudflare Enterprise | Prophaze Enterprise |
All Prophaze Business Features | |
Web application firewall (WAF) with unlimited custom rulesets | Unlimited Rule Sets + Free Rule sets from Prophaze Threat Research team |
SSL / TLS 1.2 & 1.3 with shared or multiple custom upload | SSL / TLS 1.2 & 1.3 with shared or multiple custom upload |
125-page rules | Unlimited Rules |
Minimum edge cache expires TTL at 30 seconds or less | Customizable Edge Cache TTL |
Audit logs and Enterprise Raw Logs with destination integrations | Raw/Audit Logs up to 60 days |
Analytics time-range at the 1-minute scope | Real-Time Analytics |
Prioritized customer support: 24x7x365 by phone, chat, and email support | 24×7, Chat, Phone, Email, Zoom/Google Meet/Teams with an instantaneous reply |
100% uptime SLA up to 25x reimbursement | 100% uptime SLA with 2x(Downtime in minutes) Credits for Downtime |
Role-based account control | Role-based account control |
Single-Sign-On support | In Prophaze Labs |
Network prioritization | Enterprise IP Ranges are given prioritization |
Enterprise Bot Management | Bot management with Browser fingerprinting |
Layer-3 Network DDoS protection | Layer 3 DDoS Protection is Available |
Spectrum (for TCP/UDP) | Support for TCP/UDP application is available |
SSL/TLS for SaaS | Available with Prophaze |
China Network access | Chinese CDN Available for users in China |
API security (Including Mobile Apps) | |
IP reputation | |
Advanced Rate Limiting | |
Zone based WAF (Near Zone) | |
Browser Fingerprinting | |
Threat Engine | |
Health Check | |
SIEM Integration | |
Custom Integrations | |
Virtual Patching | |
Kubernetes WAF | |
CI/CD Pipeline Support | |
Multi Cloud | |
Hybrid cloud | |
Multitenant | |
Managed Threat Intelligence | |
Technical Account Manager |
Facebook
Twitter
LinkedIn
Recent Posts
Follow Us
zzcms 2018 template_user.php ml/title code injection
August 26, 2021
No Comments
A vulnerability was found in zzcms 2018 (Content Management System) and classified as critical. This issue affects an unknown function
ZyXEL VPN2S 1.12 Web Server path traversal
September 29, 2021
No Comments
A vulnerability classified as problematic was found in ZyXEL VPN2S 1.12. Affected by this vulnerability is an unknown part of
Zyxel VPN2S 1.12 CGI Program os command injection
September 29, 2021
No Comments
A vulnerability has been found in Zyxel VPN2S 1.12 and classified as critical. This vulnerability affects some unknown processing of
Zyxel USG/USG Flex/Zywall/ATP/VPN up to 4.64 Web-based Management Interface improper authentication
July 2, 2021
No Comments
A vulnerability was found in Zyxel USG, USG Flex, Zywall, ATP and VPN up to 4.64 (Firewall Software). It has
ZyXEL GS1900-8 2.60 LLDP Packet cross site scripting
July 26, 2021
No Comments
A vulnerability was found in ZyXEL GS1900-8 2.60. It has been classified as problematic. This affects an unknown code of
Zynamics BinDiff up to 6 i64 File use after free
June 30, 2021
No Comments
A vulnerability, which was classified as critical, has been found in Zynamics BinDiff up to 6. This issue affects an
Web Application Firewall Solution
CVE-2024-53144 : LINUX KERNEL UP TO 6.1.112/6.6.54/6.10.13/6.11.2 HCI_EVENT PRIVILEGE ESCALATION
December 18, 2024
No Comments
Description In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE This
CVE-2024-50379 : APACHE TOMCAT UP TO 9.0.97/10.1.33/11.0.1 JSP COMPILATION TOCTOU
December 18, 2024
No Comments
Description Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file
CVE-2024-10205 : HITACHI OPS CENTER ANALYZER ON LINUX 64-BIT MISSING AUTHENTICATION
December 18, 2024
No Comments
Description Authentication Bypass vulnerability in Hitachi Ops Center Analyzer on Linux, 64 bit (Hitachi Ops Center Analyzer detail view component),