HAProxy vs Imperva DDoS comparison

Cancel
You must select at least 2 products to compare!
HAProxy Logo
10,205 views|6,812 comparisons
91% willing to recommend
Imperva Logo
3,819 views|3,201 comparisons
94% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between HAProxy and Imperva DDoS based on real PeerSpot user reviews.

Find out what your peers are saying about F5, Citrix, HAProxy and others in Application Delivery Controllers (ADC).
To learn more, read our detailed Application Delivery Controllers (ADC) Report (Updated: May 2024).
772,679 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"​​Reliability. HAProxy is the most reliable product I have ever used.""It is stable. Period. Will not fail unless you do something wrong.""It is a crucial tool in ensuring smooth service provision without any interruptions.""HAProxy's TCP load balancer is excellent and super stable.""Having the right load balancing solution – which is what HAProxy is – and protection in place gives organizations peace of mind.""​It has allowed us to evenly distribute the load across a number of servers, and check their health and automatically react to errors.""Load balancing is valuable, and we are also using the WAF feature.""The most valuable feature of HAProxy is that its open source."

More HAProxy Pros →

"The three-second service level agreement is already better than the competition.""On the activity log, I can see the exact details, the visit, and the threat.""IncapRules is one of the most valuable features, as you can create your own security and access control rules on top of your security policy. Using IncapRules we were able to easily block Layer 7 DDoS attacks several times.""Its unique interface for managing security performance and ease of use are the most valuable features of this solution.""The dashboard is good and user-friendly.""The solution has a very good interface.""It fits our requirements, as well as our budget.""It is an effective threat mitigation tool."

More Imperva DDoS Pros →

Cons
"​It needs proper HTTP/2 support.​""I would like to see better search handling, and a user interface, with a complete functional graphical unit""HAProxy could improve by making the dashboards easier to use, and better reports and administration tickets.""While troubleshooting, we are having some difficulties. There are no issues when it is running; it is stable and very good; however, if there is a troubleshooting issue or an incident occurs, we will have issues because this is open-source.""The solution can be improved by controlling TCP behavior better and mandating to clients what the expected outcome must be in order to avoid receiving contestant timeout logs.""Documentation could be improved.""The basic clustering is not usable in our very specific setup. The clustering is mainly a configuration replication and is great in a case of active-passive usage. In the case of an active-active (or with more than two nodes) where the configuration is not fully identical, it cannot be used as-is.""Sometimes it's challenging to get through the log, and you need a log to understand what is going on. It isn't easy to map the logging with the documentation, and every time I read the log, I have to pull out the documentation to understand what I'm reading."

More HAProxy Cons →

"It would be better if we were able to manage and apply changes to multiple websites/web applications, and search WAF logs for multiple websites, via the Incapsula dashboard.""The log analytics interface within Incapsula isn't really good. For example, if you have to get all logs from there, it's a very cumbersome process.""The rules surrounding the making of web applications could be improved.""Imperva now offers add-ons to add functionality, but I would like to see these included in the product, even if it would cost more.""Certificate management could be improved.""Imperva DDoS does not provide version control.""Some maintenance must be performed by our IT team.""Imperva always needs to adjust to new versions of cyber attacks, it needs to be faster, improve the resiliency of the software of the solution."

More Imperva DDoS Cons →

Pricing and Cost Advice
  • "HAProxy is free software. There are optional paid products (support/appliances)."
  • "The price is well worth it. HAProxy Enterprise Edition paid for itself within months, simply due to the resiliency it brings. It was a bit more expensive than we were originally interested in paying, but we are thankful we chose to go with HAProxy."
  • "Very good value for the money. One of the simplest licensing schemes in this category of products."
  • "Test/lab virtual machines can be installed without a licence. They can't be used for performance testing but otherwise behave like production nodes."
  • "If you don't have expertise then go with the licensed version. Otherwise, open-source is the best solution."
  • "We use NGINX as well. However, because the health checks are a paid feature, I like to avoid it whenever possible​."
  • "I think that the pricing is very fair, I would definitely recommend buying the Enterprise license."
  • "The only cost is for the image manager, who is responsible for uploading the image, and that is trivial."
  • More HAProxy Pricing and Cost Advice →

  • "For enterprise contracts you will be in touch with a dedicated account manager who will guide you regarding licensing."
  • "​Although the pricing can be a little high, it is worth the protection and security that it offers.​"
  • "The data packages are higher than our needs so we end up paying for data that we don't use."
  • "The cost is on par with other solutions such as Cloudflare and Akamai."
  • "It is not expensive compared to the other similar solutions in this category."
  • "It is a very expensive solution. The price is very high. A lot of customers tell us that they would love to use Imperva more. I have some customers who have 50 websites, but they have only 10 websites on Imperva because of the price. They would love to have all their websites running through Imperva, but they can't. They have to choose the more critical websites to protect because the price is very high. It is a very good product, but it is too expensive. If you buy a plan for 20 megabytes and you don't consume all of your 20 megabytes, it is okay, but if you consume more, you are charged for the superior traffic."
  • "The cost is somewhere around $10,000 a site. For every site, you pay individually. For every DNS entry, you have you pay."
  • "It is expensive."
  • More Imperva DDoS Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Application Delivery Controllers (ADC) solutions are best for your needs.
    772,679 professionals have used our research since 2012.
    Comparison Review
    Anonymous User
    Questions from the Community
    Top Answer:I do recommend HAProxy for more simple applications or for companies with a low budget, since HAProxy is a free, open-source product. HAProxy is also a good choice for someone looking for a stable… more »
    Top Answer:The solution is effective in managing our traffic.
    Top Answer:We use Imperva DDoS to stop DDoS attacks and reduce the amount of unwanted queries against web services or web scraping.
    Top Answer:The solution is very affordable. It's based on the traffic utilization, the average traffic utilization, not the DDoS traffic. Therefore, if you're being DDoSed, you don't pay extra for the absorption… more »
    Top Answer:It’s hard to think of an improvement. The three-second service level agreement is already better than the competition. You would ordinarily say something like API protection. However, they've got that… more »
    Ranking
    Views
    10,205
    Comparisons
    6,812
    Reviews
    15
    Average Words per Review
    424
    Rating
    7.4
    Views
    3,819
    Comparisons
    3,201
    Reviews
    4
    Average Words per Review
    485
    Rating
    8.3
    Comparisons
    Also Known As
    HAProxy Community Edition, HAProxy Enterprise Edition, HAPEE
    Imperva Incapsula
    Learn More
    HAProxy
    Video Not Available
    Overview

    HAProxy is considered by many in the industry to be one of the fastest and most popular and trusted software load balancer products in the marketplace today. Organizations are able to immediately deploy HAProxy solutions to enable websites and applications to optimize performance, security, and observability. HAProxy solutions are available to scale to any environment.

    HAProxy is an open-source product and has a robust, active, reliable community. The solutions are continually tested and improved on by the community. HAProxy offers a dynamic design to support the most modern architectures, microservices, and deployment environments (appliances, containers, virtual, and cloud).

    HAProxy utilizes a cloud-native protocol, which makes it a complete solution for cloud services such as Red Hat OpenShift, OVH, Rackspace, Digital Ocean, Amazon Web Services (AWS), and more. It also can be used as the reference load balancer in OpenStack.

    HAProxy Products

    • HAProxy One: This is a next-gen end-to-end application delivery platform created to secure and streamline modern application architectures. It offers a complete suite of solutions, such as application delivery software, turnkey, and appliance services observed and administered through a central control plane. The product supplies application acceleration, CDN, DDoS, bot management, WAF capabilities, and load balancing.
    • HAProxy Fusion Control Plane: This product enables organizations to streamline workflows, arrange traffic routing and security protocols, enhance the speed of delivery, and scale out of the organization’s applications. HAProxy Fusion Control Plane offers an intuitive user interface to observe and control the complete product lineup and API for administering numerous fleets of HAProxy Enterprise servers, either in the cloud or on premises.
    • HAProxy Edge: This product offering is an application delivery network (ADN) that provides a broad array of turnkey application services with amazing scale and complete visibility. Services include application and content acceleration, advanced security, and load balancing.
    • HAProxy ALOHA Hardware or Virtual Load Balancer: This product is a virtual load balancer or plug-and-play hardware constructed upon HAProxy Enterprise that is designed to support proxying at Layer 4 and Layer 7. It has a user-friendly GUI, simple deployment, and no limit on backend servers, making it a complete product for organizations desiring a reliable system to provide high-end load distribution for critical services.
    • HAProxy Enterprise Kubernetes Ingress Controller: This product is designed to facilitate smooth traffic flow into a Kubernetes cluster. It is able to automatically discover anomalies and changes in an organization's Kubernetes infrastructure and provide precise distribution of traffic to healthy pods, with no downtime caused by poor pod health or scaling changes. The product comes with an embedded WAF to optimize the security of an organization’s applications running in Kubernetes.
    • HAProxy Enterprise: This product is the enterprise-class edition of HAProxy offering a dynamic and sturdy code base with next-generation features, an enterprise suite of add-ons, professional services, and trusted support. 

      • Cluster-wide tracking and rate limiting
      • Advanced DDoS and bot management
      • Web application firewall
      • Reliable expert support
      • High performance modules
      • Device detection and geolocation
      • Real-time dashboard

    Reviews from Real Users

    Having the right load balancing solution – which is what HAProxy is – and protection in place gives organizations peace of mind.” - Nathanel S., Platform Architect at SES

    “I use HAProxy for individuals who can not buy low balancers. I built NFV in a box and send individuals a pathway into an HAProxy VM. The setup was not difficult; it usually takes a day to complete for a VPC. When it comes to pricing, HAProxy is free.” - Nasir O., Network & Cloud Architect at Koala Compute Inc.

    Imperva DDoS is a solution that offers protection for web applications and websites and all their associated business-critical data from cyberattacks. The cloud-based application delivery service helps improve user experiences by improving their performance. Through its security platform, Imperva DDoS also provides DDoS mitigation, a web application firewall, and a global load balancer, and includes a content delivery network — all designed to maximize performance.

    Imperva DDoS Features

    Imperva DDoS has many valuable key features. Some of the most useful ones include:

    • API security
    • Web application firewall
    • Bot management
    • Application delivery
    • Runtime protection (RASP)
    • Discovery and assessment
    • Data protection
    • Data risk analytics
    • Data privacy
    • Application delivery control (ADC)
    • Content delivery network (CDN)
    • DDoS mitigation
    • Global server load-balancing (GSLB)
    • Web application firewall (WAF)
    • Client-side protection
    • Runtime protection

    Imperva DDoS Benefits

    There are several benefits to implementing Imperva DDoS. Some of the biggest advantages the solution offers include:

    • Reduce web application risk: Imperva DDoS includes automatic policy creation and fast rule propagation that give your IT and security departments the ability to use third-party code without risk while working at the pace of DevOps.
    • Security from edge to database: Imperva DDoS’s WAF feature secures from edge to database, so the traffic you receive is only the traffic you want.
    • Safeguard sensitive and personal data: Imperva DDoS provides visibility into sensitive and personal data, with the controls to protect that data and the ability to unify management across cloud, on-premises, and in hybrid environments to help accommodate changing threats, new regulations, and challenging audits.

    Reviews from Real Users

    Below are some reviews and helpful feedback written by Imperva DDoS users.

    PeerSpot user, Etienne W., CDN & Cybersecurity Engineer - Web performance & security at CDN Tech / Ecritel, says, “It is a good solution that allows us to protect websites. It is stable, scalable, quick and easy to use.” He goes on to explain, “WAF protection works almost out-of-the-box. The Anti-DDoS mitigation in less than 1s, I saw it many times in production, I can say it works. CDN has high performances, and the Smart Caching mode is really "smart" (you can do some efficient caching even if you're not a specialist). Its unique interface for managing security performance and ease of use are the most valuable features of this solution."

    An IT Senior Manager at an outsourcing company mentions, “The most valuable features are DDoS protection. The Incapsula [Imperva DDoS] environment helps us monitor all the web activity. All the web activity is passed through their WAF cloud services, then that can help us to monitor those activities. That can help protect against DDoS hacking.”

    Another PeerSpot reviewer, Ben D., Sales Executive at EVVO LABS, comments, "Imperva Incapsula [DDoS] has many valuable features. One, it protects the top 10 OWASP vulnerability, the open web application software platform, this is standard. Secondly, it protects against broken authentication. As well, it has remote execution of code."

    A Solutions Architect at a financial services firm states, “The solution's most valuable aspect is that it is easy to configure. The solution keeps itself up to date itself and there's no customization that we need to do. It makes it extremely easy and cuts back on the amount of work required, and saves us on man-hours.”

    Sample Customers
    Booking.com, GitHub, Reddit, StackOverflow, Tumblr, Vimeo, Yelp
    Hitachi, BNZ, Bitstamp, Moz, InnoGames, BTCChina, Wix, LivePerson, Zillow and more.
    Top Industries
    REVIEWERS
    Financial Services Firm35%
    Retailer13%
    Computer Software Company13%
    Manufacturing Company13%
    VISITORS READING REVIEWS
    Computer Software Company19%
    Financial Services Firm12%
    Government9%
    Manufacturing Company6%
    REVIEWERS
    Financial Services Firm19%
    Non Tech Company11%
    Marketing Services Firm8%
    Media Company8%
    VISITORS READING REVIEWS
    Financial Services Firm16%
    Computer Software Company16%
    Manufacturing Company7%
    Comms Service Provider6%
    Company Size
    REVIEWERS
    Small Business34%
    Midsize Enterprise32%
    Large Enterprise34%
    VISITORS READING REVIEWS
    Small Business25%
    Midsize Enterprise17%
    Large Enterprise58%
    REVIEWERS
    Small Business49%
    Midsize Enterprise13%
    Large Enterprise38%
    VISITORS READING REVIEWS
    Small Business24%
    Midsize Enterprise14%
    Large Enterprise62%
    Buyer's Guide
    Application Delivery Controllers (ADC)
    May 2024
    Find out what your peers are saying about F5, Citrix, HAProxy and others in Application Delivery Controllers (ADC). Updated: May 2024.
    772,679 professionals have used our research since 2012.

    HAProxy is ranked 3rd in Application Delivery Controllers (ADC) with 41 reviews while Imperva DDoS is ranked 7th in Distributed Denial of Service (DDOS) Protection with 74 reviews. HAProxy is rated 8.2, while Imperva DDoS is rated 8.8. The top reviewer of HAProxy writes "Useful for for small and quick load-balancing tasks". On the other hand, the top reviewer of Imperva DDoS writes "I like the content monitoring feature which I haven't seen in other WAF solutions". HAProxy is most compared with Microsoft Azure Application Gateway, NGINX Plus, Kemp LoadMaster and Citrix NetScaler, whereas Imperva DDoS is most compared with Cloudflare, Akamai, Arbor DDoS, Radware DefensePro and F5 Shape Security.

    We monitor all Application Delivery Controllers (ADC) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.