We performed a comparison between Cloudflare and NGINX App Protect based on real PeerSpot user reviews.
Find out in this report how the two Distributed Denial of Service (DDOS) Protection solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."What I like best about Cloudflare is that my company can use it to trace and manage applications and monitor traffic. The solution tells you if there's a spike in traffic. Cloudflare also sends you a link to check your equipment and deployment and track it through peering, so it's a valuable tool."
"Cloudflare offers CDN and DDoS protection. We have the front end, API, and database in how you structure applications."
"The DDoS protection is the most valuable aspect of the solution."
"Centralized, full-featured DNS."
"The web application firewall brought us good security and a view of the accesses/blocks of the entire domain and subdomain that were accessed both by region (country) and IPs."
"The most valuable feature is the web application firewall."
"The technical support is good."
"The solution is very good at mitigating threats."
"It is a very good tool for load balancing."
"It's very easy to deploy."
"NGINX App Protect is stable."
"The most valuable feature of NGINX App Protect is the reverse proxy."
"The stability of the product is very impressive since it handles 60,000 to 70,000 requests or transactions per second."
"It has the best documentation features."
"NGINX App Protect's best features are auto-learning, which creates a profile of applications that are deployed, bot protection, and force protection, which lets you configure your brute force policy and alert for and prevent brute force attacks."
"The most valuable feature is that I can establish different services from the firewall."
"One area of improvement is in the Access Rules. Hypothetically, if we wanted to block or challenge traffic outside of the United States, the only way to currently do that (as far as I know) is to enter every single country outside of the United States. That could be a labor intensive job. A solution could be to enable users to create a rule where traffic is only allowed within a certain country."
"We're facing challenges due to an upgrade in the machine learning model. The problem arises from some users abusing the APIs, resulting in an influx of suspicious traffic. Cloudflare's learning model mistakenly identifies this traffic as human. Consequently, it assigns it a higher trust score, akin to legitimate human traffic, causing complications in our architecture. Previously, such traffic would have been categorized as suspicious, enabling us to apply appropriate blocking rules. However, we encounter difficulties distinguishing between genuine and suspicious traffic with the new categorization. Despite these challenges, overall, Cloudflare remains the preferred solution compared to Azure, AWS CloudFront, and Google Cloud Armor."
"I would like Cloudflare to offer a dedicated account manager for large enterprise clients like us."
"It should be easier to collect the logs with companies like Sumo. However, based on my discussions with the salespeople, I understand that's how they make their money. With the enterprise product, they want people doing those kinds of enterprise features to do the logging. They want them to pay a lot of money, and that's where I have an issue with them. That should be a default. You should be able to get the log no matter what. The logging should be universal."
"If they improve on the placement of their data centers, it would be better. I'm living in a remote area. I would like to connect to them without any kind of lag."
"Technical support is lacking."
"It should have easier documentation for the configuration. It's very technical and people who aren't technical should also be able to do the configuration."
"Cloudflare's console should be made more user-friendly."
"The setup of NGINX App Protect is complex. The full process took one week to complete. Additionally, we had to change the network infrastructure platform which took one month."
"Areas for improvement would be if NGINX could scan for vulnerabilities and learn and update the signatures of DoS attacks."
"They could provide a better user interface."
"The product's user interface is an area with shortcomings as it can be quite confusing for users, making it an area where improvements are required."
"As far as scalability, it takes a long time for deployment."
"Right now, the tool doesn't provide an option revolving around update feeds, specifically the signature update option in the UI."
"The integration of NGINX App Protect could improve."
"NGINX App Protect could improve security."
Cloudflare is ranked 1st in Distributed Denial of Service (DDOS) Protection with 57 reviews while NGINX App Protect is ranked 13th in Web Application Firewall (WAF) with 20 reviews. Cloudflare is rated 8.4, while NGINX App Protect is rated 8.2. The top reviewer of Cloudflare writes "It's easy to set up because you point the DNS to it, and it's working in under 15 minutes". On the other hand, the top reviewer of NGINX App Protect writes "Capable of complete automation but is costly ". Cloudflare is most compared with Akamai, Azure Front Door, Imperva DDoS, AWS Shield and Microsoft Azure Application Gateway, whereas NGINX App Protect is most compared with Microsoft Azure Application Gateway, AWS WAF, Fortinet FortiWeb, F5 Advanced WAF and Azure Web Application Firewall. See our Cloudflare vs. NGINX App Protect report.
We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.