We performed a comparison between Cloudflare and Nexusguard DDoS Protection based on real PeerSpot user reviews.
Find out in this report how the two Distributed Denial of Service (DDOS) Protection solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The DDoS protection is the most valuable aspect of the solution."
"When using services like Heroku, Cloudflare is very useful for CNAME flattening. I also use it for their end-to-end SSL with TLS authentication on nginx for securing servers."
"The most valuable feature of Cloudflare is that it has a free version. They give us the free version with the anti-DDoS features and also the load balancing solution."
"Centralized, full-featured DNS."
"I like Cloudflare's application gateway and DDoS protection."
"Cloudflare has many features."
"It is easier to configure and develop documentation to see how we have configured firewalls."
"The solution is very good at mitigating threats."
"The support team was helpful."
"Based on the support received for implementation, I rate the solution's technical support a nine out of ten."
"The managed service allows us to confidently rely on Nexusguard’s professional team to take relevant actions as and when required to make sure DDoS attacks are successfully mitigated, ensuring 100% uptime of our service."
"Cloud Diversion is another good feature packaged with the whole solution. When attack traffic is detected, Cloud Diversion triggers to automatically route our prefix to Nexusguard’s scrubbing center, ensuring that all attack traffic is dropped in the shortest time possible."
"Filters can be customized depending on the characteristics of the attack traffic. This feature has made it easier for Nexusguard's SOC team to further isolate any specific attack that can't be blocked by pre-configured mitigation."
"If they improve on the placement of their data centers, it would be better. I'm living in a remote area. I would like to connect to them without any kind of lag."
"They lack a good way to manage DNS as a company, since everything is relegated to single account logins until you get to the higher levels. They have come out with a paid feature to remedy this, but I have not had a chance to fully review it yet to know if it fixes the access problem."
"In the last two years, there has been a certain amount of downtime when using the VDM."
"It should be easier to collect the logs with companies like Sumo. However, based on my discussions with the salespeople, I understand that's how they make their money. With the enterprise product, they want people doing those kinds of enterprise features to do the logging. They want them to pay a lot of money, and that's where I have an issue with them. That should be a default. You should be able to get the log no matter what. The logging should be universal."
"Cloudflare's console should be made more user-friendly."
"The pricing could be improved."
"Although I think it's quite good, it doesn't provide me with all the features I would expect to have if I were using Imperva."
"Cloudflare does not have an on-premise solution. If they had different approaches they could be better suited to accommodate more customers, such as on-premise and hybrid deployments. For example, hybrid deployments would be useful where you could move the traffic from the enterprise to the cloud."
"One of the features that should be added to the next release is report generation. Currently, reports can be downloaded every month and are only available at the beginning of each month. It would be nice to generate the reports based on specific dates that we prefer and not have to wait until the next month for the current month’s report."
"The mitigation scope of Origin Protection is not fully efficient as there could be delays in activating the countermeasures."
"There was a certain level of performance degradation in the solution, which I don't know if it can be tuned...In my experience, it is an area that can be improved while also considering the stability and scalability aspects of the solution."
"One thing that we would like to improve from them is to provide more training to SOC team for them to have a deep understanding of the solution so that they would always be ready to answer anything without the need to escalate queries to senior personnel."
"The solution must provide features for the post-processing of the traffic type and the traffic quality."
Cloudflare is ranked 1st in Distributed Denial of Service (DDOS) Protection with 57 reviews while Nexusguard DDoS Protection is ranked 13th in Distributed Denial of Service (DDOS) Protection with 5 reviews. Cloudflare is rated 8.4, while Nexusguard DDoS Protection is rated 9.4. The top reviewer of Cloudflare writes "It's easy to set up because you point the DNS to it, and it's working in under 15 minutes". On the other hand, the top reviewer of Nexusguard DDoS Protection writes "A solution requiring straightforward maintenance while remaining cost-effective compared to its competitors in the market". Cloudflare is most compared with Akamai, Azure Front Door, Imperva DDoS, AWS Shield and Linode, whereas Nexusguard DDoS Protection is most compared with Arbor DDoS, Corero, Cloudflare DDoS, Fortinet FortiDDoS and Imperva DDoS. See our Cloudflare vs. Nexusguard DDoS Protection report.
See our list of best Distributed Denial of Service (DDOS) Protection vendors.
We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.