Basic Plan $75 1 lakh visits per min
Standard $100 5 lakh visits per min
Professional $250 10 lakh visits per min
Enterprise Contact RTS On-premise deployment or Cloud
|
Know more features of Pricing Plans
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- Basic Plan
-
- Application DDos Attack
- Invalid Browser Attack
- Content Scraping Bot
- Spam attacks
- Fake Search Engine Bots
- Bots with Browser Capabilities
- Account takeover bots
- XSS attacks
- SQL injection attacks
- Identify & Block Malicious App traffic
- Block visitors by IP address
- User agent blocking
- Block Coutry wise visitors
- Block City wise visitors
- Block Region Wise visitors
- Block Malicious Bot Abuse
- OWASP Top 10 common application vulnerabilities.
- HTTP method wise blocking
- Allow Good bots
- Limit duplicate good bots visits
- Referer wise blocking
- Ad campain based monitoring and protection
- VPN & Proxy traffic detection & block
- Http Finger printing
- HTTP header injection indentification
- Standard
-
- Application DDos Attack
- Invalid Browser Attack
- Content Scraping Bot
- Spam attacks
- Fake Search Engine Bots
- Bots with Browser Capabilities
- Account takeover bots
- XSS attacks
- SQL injection attacks
- Identify & Block Malicious App traffic
- Block visitors by IP address
- User agent blocking
- Block Coutry wise visitors
- Block City wise visitors
- Block Region Wise visitors
- Block Malicious Bot Abuse
- OWASP Top 10 common application vulnerabilities.
- HTTP method wise blocking
- Allow Good bots
- Limit duplicate good bots visits
- Referer wise blocking
- Ad campain based monitoring and protection
- VPN & Proxy traffic detection & block
- Http Finger printing
- HTTP header injection indentification
- Professional
-
- Application DDos Attack
- Invalid Browser Attack
- Content Scraping Bot
- Spam attacks
- Fake Search Engine Bots
- Bots with Browser Capabilities
- Account takeover bots
- XSS attacks
- SQL injection attacks
- Identify & Block Malicious App traffic
- Block visitors by IP address
- User agent blocking
- Block Coutry wise visitors
- Block City wise visitors
- Block Region Wise visitors
- Block Malicious Bot Abuse
- OWASP Top 10 common application vulnerabilities.
- HTTP method wise blocking
- Allow Good bots
- Limit duplicate good bots visits
- Referer wise blocking
- Ad campain based monitoring and protection
- VPN & Proxy traffic detection & block
- Http Finger printing
- HTTP header injection indentification
- Enterprise
-
- Application DDos Attack
- Invalid Browser Attack
- Content Scraping Bot
- Spam attacks
- Fake Search Engine Bots
- Bots with Browser Capabilities
- Account takeover bots
- XSS attacks
- SQL injection attacks
- Identify & Block Malicious App traffic
- Block visitors by IP address
- User agent blocking
- Block Coutry wise visitors
- Block City wise visitors
- Block Region Wise visitors
- Block Malicious Bot Abuse
- OWASP Top 10 common application vulnerabilities.
- HTTP method wise blocking
- Allow Good bots
- Limit duplicate good bots visits
- Referer wise blocking
- Ad campain based monitoring and protection
- VPN & Proxy traffic detection & block
- Http Finger printing
- HTTP header injection indentification