We performed a comparison between Cloudflare and Imperva DDoS based on real PeerSpot user reviews.
Find out in this report how the two Distributed Denial of Service (DDOS) Protection solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The simplicity of the overall dashboard makes it a great product for a user like me who has less understanding of the internet than a developer or other more technical people. It gives me peace of mind. I also love the easy customization of the Page Rules."
"Cloudflare has many features."
"When using services like Heroku, Cloudflare is very useful for CNAME flattening. I also use it for their end-to-end SSL with TLS authentication on nginx for securing servers."
"The most valuable feature is the web application firewall."
"I rate its stability a ten out of ten."
"We're using dynamic components to build flexible pages to create and manage Git merge requests for code and reviews."
"I like Cloudflare's application gateway and DDoS protection."
"There are key things that are used for our enterprise customers, such as Lambda and DNS."
"Imperva Incapsula has many valuable features. One, it protects the top 10 OWAS vulnerability, the open web application software platform, this is standard. Secondly, it protects against broken authentication. As well, it has remote execution of code."
"Technical support provides good, quick responses."
"Real-time monitoring is also a great tool, as you may watch several parameters in real time."
"Setup was straightforward, very simple. I only entered the domain and Incapsula returned the DNS data that I needed to change for the protection to be configured."
"It's very pretty easy to onboard the URL."
"The three-second service level agreement is already better than the competition."
"We use Imperva DDoS to stop DDoS attacks and reduce the amount of unwanted queries against web services or web scraping."
"Imperva DDoS is fairly stable, and its availability is quite high."
"Cloudflare does not have an on-premise solution. If they had different approaches they could be better suited to accommodate more customers, such as on-premise and hybrid deployments. For example, hybrid deployments would be useful where you could move the traffic from the enterprise to the cloud."
"The solution could work at being less expensive. It costs a lot to use it."
"We are a product integrator and reseller, and we would like to have a better partner relationship, similar to a channel sales relationship. Sometimes we are on our own or get diverted by Cloudflare because they have direct sales, which competes with us and makes it difficult to build a relationship with this company since we want to be an MSP or a managed service provider for the solution."
"One area of improvement is in the Access Rules. Hypothetically, if we wanted to block or challenge traffic outside of the United States, the only way to currently do that (as far as I know) is to enter every single country outside of the United States. That could be a labor intensive job. A solution could be to enable users to create a rule where traffic is only allowed within a certain country."
"It should be easier to collect the logs with companies like Sumo. However, based on my discussions with the salespeople, I understand that's how they make their money. With the enterprise product, they want people doing those kinds of enterprise features to do the logging. They want them to pay a lot of money, and that's where I have an issue with them. That should be a default. You should be able to get the log no matter what. The logging should be universal."
"The product needs to improve its automation."
"I would like Cloudflare to offer a dedicated account manager for large enterprise clients like us."
"Even if I wanted to, I wouldn't be able to buy Cloudflare in my country."
"I am not sure if this application has a policy where you can create your custom policy and run it as our firewall. We should have some ability to also create some custom policy, then run it as a firewall."
"A limited tool if you're looking to customize."
"Some maintenance must be performed by our IT team."
"I would like to have support for SSL management and secure DNS."
"It would be better if we were able to manage and apply changes to multiple websites/web applications, and search WAF logs for multiple websites, via the Incapsula dashboard."
"The salespeople tend to exaggerate its capabilities, which can cost you money if you don't verify the information."
"We had an issue when securing the web applications for DDoS protection."
"The rules surrounding the making of web applications could be improved."
Cloudflare is ranked 1st in Distributed Denial of Service (DDOS) Protection with 56 reviews while Imperva DDoS is ranked 7th in Distributed Denial of Service (DDOS) Protection with 74 reviews. Cloudflare is rated 8.4, while Imperva DDoS is rated 8.8. The top reviewer of Cloudflare writes "It's easy to set up because you point the DNS to it, and it's working in under 15 minutes". On the other hand, the top reviewer of Imperva DDoS writes "I like the content monitoring feature which I haven't seen in other WAF solutions". Cloudflare is most compared with Akamai, Azure Front Door, AWS Shield, Microsoft Azure Application Gateway and Arbor DDoS, whereas Imperva DDoS is most compared with Akamai, Arbor DDoS, Radware DefensePro, AWS WAF and Fastly. See our Cloudflare vs. Imperva DDoS report.
See our list of best Distributed Denial of Service (DDOS) Protection vendors and best CDN vendors.
We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.