We performed a comparison between Cloudflare and NGINX App Protect based on real PeerSpot user reviews.
Find out in this report how the two Distributed Denial of Service (DDOS) Protection solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The DDoS protection is the most valuable aspect of the solution."
"The solution provides good load balancing and protection against DDoS attacks."
"When using services like Heroku, Cloudflare is very useful for CNAME flattening. I also use it for their end-to-end SSL with TLS authentication on nginx for securing servers."
"Cloudflare offers CDN and DDoS protection. We have the front end, API, and database in how you structure applications."
"The UI is good."
"It's very user-friendly."
"We're using dynamic components to build flexible pages to create and manage Git merge requests for code and reviews."
"Easier http to https redirect using page rules"
"It has the best documentation features."
"The most valuable feature is that I can establish different services from the firewall."
"WAF is useful to track mitigation, inclusion, prevention, and the parametric firewall."
"The stability of the product is very impressive since it handles 60,000 to 70,000 requests or transactions per second."
"We were looking for a product that is capable of complete automation and a container based solution. It's working."
"The tool's most valuable feature is the OWASP certification. Additionally, the tool's ability to enforce strong passwords and OTP within minutes is impressive. With its analytics and recommendations, it is a very good solution."
"I tested specific features and evaluated the solution against the Web Application Firewall. I conducted research to test different detection percentages. I did not use it directly for protection but for evaluation purposes."
"The most valuable feature is that there is a link in the system that will help to analyze the security of an application when something abnormal is found."
"We're facing challenges due to an upgrade in the machine learning model. The problem arises from some users abusing the APIs, resulting in an influx of suspicious traffic. Cloudflare's learning model mistakenly identifies this traffic as human. Consequently, it assigns it a higher trust score, akin to legitimate human traffic, causing complications in our architecture. Previously, such traffic would have been categorized as suspicious, enabling us to apply appropriate blocking rules. However, we encounter difficulties distinguishing between genuine and suspicious traffic with the new categorization. Despite these challenges, overall, Cloudflare remains the preferred solution compared to Azure, AWS CloudFront, and Google Cloud Armor."
"It should be easier to collect the logs with companies like Sumo. However, based on my discussions with the salespeople, I understand that's how they make their money. With the enterprise product, they want people doing those kinds of enterprise features to do the logging. They want them to pay a lot of money, and that's where I have an issue with them. That should be a default. You should be able to get the log no matter what. The logging should be universal."
"They lack a good way to manage DNS as a company, since everything is relegated to single account logins until you get to the higher levels. They have come out with a paid feature to remedy this, but I have not had a chance to fully review it yet to know if it fixes the access problem."
"DNS Management."
"In the last two years, there has been a certain amount of downtime when using the VDM."
"It should confirm audit findings of the assigned area with auditees to ensure that the audit conclusions are based on an accurate understanding of the issues."
"The product support needs to be accessible from more places, a wider area of coverage."
"Even if I wanted to, I wouldn't be able to buy Cloudflare in my country."
"The dashboard could provide a more comprehensive view of the status of the connections."
"NGINX App Protect would be improved with integration with Shape and F5 WAF, which would make it easy for users to manage all their web application security with a single solution."
"As far as scalability, it takes a long time for deployment."
"Currently, the policies have to be handled manually, and you have to create from scratch, which can be a bit time-consuming, in a large environment."
"The setup of NGINX App Protect is complex. The full process took one week to complete. Additionally, we had to change the network infrastructure platform which took one month."
"Areas for improvement would be if NGINX could scan for vulnerabilities and learn and update the signatures of DoS attacks."
"Right now, the tool doesn't provide an option revolving around update feeds, specifically the signature update option in the UI."
"Its technical support could be better."
Cloudflare is ranked 1st in Distributed Denial of Service (DDOS) Protection with 57 reviews while NGINX App Protect is ranked 15th in Web Application Firewall (WAF) with 20 reviews. Cloudflare is rated 8.4, while NGINX App Protect is rated 8.2. The top reviewer of Cloudflare writes "It's easy to set up because you point the DNS to it, and it's working in under 15 minutes". On the other hand, the top reviewer of NGINX App Protect writes "Capable of complete automation but is costly ". Cloudflare is most compared with Akamai, Azure Front Door, Imperva DDoS, AWS Shield and Microsoft Azure Application Gateway, whereas NGINX App Protect is most compared with Microsoft Azure Application Gateway, AWS WAF, Fortinet FortiWeb, F5 Advanced WAF and Azure Web Application Firewall. See our Cloudflare vs. NGINX App Protect report.
We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.