We performed a comparison between Cloudflare and Nexusguard DDoS Protection based on real PeerSpot user reviews.
Find out in this report how the two Distributed Denial of Service (DDOS) Protection solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."I like Cloudflare's application gateway and DDoS protection."
"The solution provides good load balancing and protection against DDoS attacks."
"New and innovative way to protect the client's data."
"DDoS attacks target unprotected machines. Cloudflare detects and stops these attacks using internal systems. It identifies incoming DDoS attacks, issuing challenges or blocking them immediately."
"The most valuable feature is the web application firewall."
"The simplicity of the overall dashboard makes it a great product for a user like me who has less understanding of the internet than a developer or other more technical people. It gives me peace of mind. I also love the easy customization of the Page Rules."
"Cloudflare has many features."
"The solution offers the flexibility to control configuration rules."
"The support team was helpful."
"Cloud Diversion is another good feature packaged with the whole solution. When attack traffic is detected, Cloud Diversion triggers to automatically route our prefix to Nexusguard’s scrubbing center, ensuring that all attack traffic is dropped in the shortest time possible."
"Based on the support received for implementation, I rate the solution's technical support a nine out of ten."
"Filters can be customized depending on the characteristics of the attack traffic. This feature has made it easier for Nexusguard's SOC team to further isolate any specific attack that can't be blocked by pre-configured mitigation."
"The managed service allows us to confidently rely on Nexusguard’s professional team to take relevant actions as and when required to make sure DDoS attacks are successfully mitigated, ensuring 100% uptime of our service."
"There should be a specific price list for enterprise-level customers."
"Technical support is lacking."
"Cloudflare could offer a better view or maybe dashboards of the main resources used in the client."
"The timing aspect can lead to it being considered overpriced. This is a particular concern we have with Cloudflare, as they may struggle with accurately detecting the client."
"It should be easier to collect the logs with companies like Sumo. However, based on my discussions with the salespeople, I understand that's how they make their money. With the enterprise product, they want people doing those kinds of enterprise features to do the logging. They want them to pay a lot of money, and that's where I have an issue with them. That should be a default. You should be able to get the log no matter what. The logging should be universal."
"One area of improvement is in the Access Rules. Hypothetically, if we wanted to block or challenge traffic outside of the United States, the only way to currently do that (as far as I know) is to enter every single country outside of the United States. That could be a labor intensive job. A solution could be to enable users to create a rule where traffic is only allowed within a certain country."
"I would like Cloudflare to offer a dedicated account manager for large enterprise clients like us."
"It would be beneficial for us if Cloudflare could offer a scrubbing solution. This would involve taking a snapshot of my website and keeping it live during a DDoS attack, ensuring uninterrupted service for our users. DDoS attacks are typically short in duration, and having Cloudflare maintain the site's availability from its secure network would enhance the overall user experience. I would appreciate it if Cloudflare could consider implementing this feature. Many organizations already utilize similar capabilities in their CDN platforms, where a static snapshot of the web page is displayed during DDoS attacks. In terms of features, Cloudflare needs to enhance its resilience and stay more focused on adopting new technologies. For instance, solutions like F5 XC Box, Access Solution, and Distributed Cloud Solution have impressive features, and Cloudflare should strive to match and exceed those capabilities. There's a need for improvement in areas like AI-based DDoS attacks and Layer 7 WAF features. Cloudflare should prioritize enhancements in areas such as behavioral DDoS and protection against SQL injection attacks, considering the prevalent trend of public exposure to the internet for business reasons. Overall, Cloudflare needs to invest more in advancing its feature set."
"The solution must provide features for the post-processing of the traffic type and the traffic quality."
"One of the features that should be added to the next release is report generation. Currently, reports can be downloaded every month and are only available at the beginning of each month. It would be nice to generate the reports based on specific dates that we prefer and not have to wait until the next month for the current month’s report."
"There was a certain level of performance degradation in the solution, which I don't know if it can be tuned...In my experience, it is an area that can be improved while also considering the stability and scalability aspects of the solution."
"The mitigation scope of Origin Protection is not fully efficient as there could be delays in activating the countermeasures."
"One thing that we would like to improve from them is to provide more training to SOC team for them to have a deep understanding of the solution so that they would always be ready to answer anything without the need to escalate queries to senior personnel."
Cloudflare is ranked 1st in Distributed Denial of Service (DDOS) Protection with 57 reviews while Nexusguard DDoS Protection is ranked 13th in Distributed Denial of Service (DDOS) Protection with 5 reviews. Cloudflare is rated 8.4, while Nexusguard DDoS Protection is rated 9.4. The top reviewer of Cloudflare writes "It's easy to set up because you point the DNS to it, and it's working in under 15 minutes". On the other hand, the top reviewer of Nexusguard DDoS Protection writes "A solution requiring straightforward maintenance while remaining cost-effective compared to its competitors in the market". Cloudflare is most compared with Akamai, Azure Front Door, Imperva DDoS, AWS Shield and Linode, whereas Nexusguard DDoS Protection is most compared with Arbor DDoS, Corero, Cloudflare DDoS, Fortinet FortiDDoS and Imperva DDoS. See our Cloudflare vs. Nexusguard DDoS Protection report.
See our list of best Distributed Denial of Service (DDOS) Protection vendors.
We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.