We performed a comparison between Cloudflare and Microsoft Defender for Cloud based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Microsoft Defender for Cloud focuses on regulatory compliance, ransomware protection, access controls, incident alerts, collaborative services, UEBA features, and a single pane of glass view. On the other hand, Cloudflare provides good load balancing, DDoS protection, a user-friendly GUI, and a proxy for hiding servers. Microsoft Defender for Cloud needs work on consistency, customization, integration, collaboration, and resource coverage. Cloudflare could use improvements in reporting, support response time, traffic routing, and on-premise solutions.
Service and Support: Microsoft Defender for Cloud's customer service has received a combination of positive and negative feedback, with some customers reporting satisfactory experiences, while others have encountered difficulties with outsourced support and slow response times. On the other hand, Cloudflare's support is generally considered good, although some users have suggested that it could be enhanced, particularly for those who are new to the service.
Ease of Deployment: Microsoft Defender for Cloud's setup requires prior knowledge and policy creation while Cloudflare's setup is easy and comes with configuration instructions. Deploying Cloudflare may take a few days if many pieces of equipment are needed.
Pricing: Microsoft Defender for Cloud is seen as a fair and cost-effective option, despite complex licensing. In contrast, Cloudflare is generally considered expensive, although some users don't pay for licensing. Both solutions are viewed as cost-effective, but Cloudflare may benefit from a customized pricing model for enterprise customers.
ROI: Microsoft Defender for Cloud provides basic security features and facilitates the management of security service providers, while Cloudflare specializes in website protection and server overload prevention.
Comparison Results: Microsoft Defender for Cloud is the preferred option when compared to Cloudflare. It has a lot more security features, such as regulatory compliance, access controls, and ransomware protection. Despite Cloudflare's decent load balancing and DDoS protection, it falls short in terms of regulatory compliance and ransomware protection.
"With Wiz, we get timely alerts for leaked data or any vulnerabilities already existing in our environment."
"The solution is very user-friendly."
"Our most important features are those around entitlement, external exposure, vulnerabilities, and container security."
"I like Wiz's reporting, and it's easy to do queries. For example, it's pretty simple to find out how many servers we have and the applications installed on each. I like Wiz's security graph because you can use it to see the whole organization even if you have multiple accounts."
"The automation roles are essential because we ultimately want to do less work and automate more. The dashboards are easy to read and visually pleasing. You can understand things quickly, which makes it easy for our other teams. The network and infrastructure teams don't know as much about security as we do, so it helps to have a tool that's accessible and nice to look at."
"The security baseline and vulnerability assessments is the valuable feature."
"The first thing that stood out was the ease of installation and the quick value we got out of the solution."
"The product supports out-of-the-box reporting with context about the asset and allows us to perform complex custom queries on UI."
"There are key things that are used for our enterprise customers, such as Lambda and DNS."
"It's very user-friendly."
"I rate its stability a ten out of ten."
"The most valuable feature is the web application firewall."
"Cloudflare offers CDN and DDoS protection. We have the front end, API, and database in how you structure applications."
"The UI is good."
"DDoS attacks target unprotected machines. Cloudflare detects and stops these attacks using internal systems. It identifies incoming DDoS attacks, issuing challenges or blocking them immediately."
"The DDoS protection is the most valuable aspect of the solution."
"The entire Defender Suite is tightly coupled, integrated, and collaborative."
"When you have commissioned Defender, you have these things visible already on your dashboard. This gives the efficiency to the people to do their actual work rather than bothering about the email, sorting out the email, or looking at it through an ITSM solution, whey they have to look at the description and use cases. Efficiency increases with this optimized, ready-made solution since you don't need to invest in something externally. You can start using the dashboard and auditing capability provided from day one. Thus, you have fewer costs with a more optimized, easier-to-use solution, providing operational efficiency for your team."
"The most valuable features of this solution are the vulnerability assessments and the glossary of compliance."
"Using Security Center, you have a full view, at any given time, of what's deployed, and that is something that is very useful."
"The security alerts and correlated alerts are most valuable. It correlates the logs and gives us correlated alerts, which can be fed into any security information and event management (SIEM) tool. It is an analyzed correlation tool for monitoring security. It gives us alerts when there is any kind of unauthorized access, or when there is any malfunctioning in multifactor authentication (MFA). If our Azure is connected with Azure Security Center, we get to know what types of authentication are happening in our infra."
"With respect to improving our security posture, it helps us to understand where we are in terms of compliance. We can easily know when we are below the standard because of the scores it calculates."
"The dashboard is very good. It gives our clients a lot of information and allows them to have a complete overview of the system. Everything is visible in one glance."
"The integration with Logic Apps allows for automated responses to incidents."
"We're looking at some of the data compliance stuff that they've got Jon offer. I know they're looking at container security, which we gonna be looking at next."
"The only small pain point has been around some of the logging integrations. Some of the complexities of the script integrations aren't supported with some of the more automated infrastructure components. So, it's not as universal. For example, they have great support for cloud formation and other services, but if you're using another type of management utility or governance language for your infrastructure-as-code automation components, it becomes a little bit trickier to navigate that."
"One significant issue is that the searches are case-sensitive, so finding a misconfigured resource can become very challenging."
"The solution's container security could be improved."
"The only thing that needs to be improved is the number of scans per day."
"Wiz's reporting capabilities could be refined a bit. They are making headway on that, but more executive-style dashboards would be nice. They just implemented a community aspect where you can share documents and feedback. This was something users had been requesting for a while. They are listening to customer feedback and making changes."
"Given the level of visibility into all the cloud environments Wiz provides, it would be nice if they could integrate some kind of mechanism to better manage tenants on multiple platforms. For example, let's say that some servers don't have an application they need, such as an antivirus. Wiz could include an API or something to push those applications out to the servers. It would be great if you could remedy these issues directly from the Wiz platform."
"The reporting isn't that great. They have executive summaries, but it's only a compliance report that maps all current issues to specific controls. Whether you look at one subscription or project, regardless of the size, you will get a multipage report on how the issues in that account map to that control. Our CSO isn't going to read through that. He won't filter that out or show that to his leadership and say, "Here's what we're doing." It isn't a helpful report. They're working on it, but it's a poor executive summary."
"The solution could work at being less expensive. It costs a lot to use it."
"Support response time could be improved."
"Although I think it's quite good, it doesn't provide me with all the features I would expect to have if I were using Imperva."
"It should confirm audit findings of the assigned area with auditees to ensure that the audit conclusions are based on an accurate understanding of the issues."
"DNS Management."
"One area of improvement is in the Access Rules. Hypothetically, if we wanted to block or challenge traffic outside of the United States, the only way to currently do that (as far as I know) is to enter every single country outside of the United States. That could be a labor intensive job. A solution could be to enable users to create a rule where traffic is only allowed within a certain country."
"For the free and Pro plans, Cloudflare could use a simple bot to provide information to users. This would improve support, especially for less advanced users who utilize the free components."
"If they improve on the placement of their data centers, it would be better. I'm living in a remote area. I would like to connect to them without any kind of lag."
"From a compliance standpoint, they can include some more metrics and some specific compliances such as GDPR."
"We would like to have better transparency as to how the security score is calculated because as it is now, it is difficult to understand."
"Sometimes, it's very difficult to determine when I need Microsoft Defender for Cloud for a special resource group or certain kinds of products. That's not an issue directly with the product, though."
"The solution is quite complex. A lot of the different policies that actually get applied don't pertain to every client. If you need to have something open for a client application to work, then you get dinged for having a port open or having an older version of TLS available."
"Azure Security Center takes a long time to update, compared to the on-premises version of Microsoft Defender."
"The product was a bit complex to set up earlier, however, it is a bit streamlined now."
"As an analyst, there is no way to configure or create a playbook to automate the process of flagging suspicious domains."
"The remediation process could be improved."
Cloudflare is ranked 11th in Cloud Security Posture Management (CSPM) with 56 reviews while Microsoft Defender for Cloud is ranked 3rd in Cloud Security Posture Management (CSPM) with 46 reviews. Cloudflare is rated 8.4, while Microsoft Defender for Cloud is rated 8.0. The top reviewer of Cloudflare writes "It's easy to set up because you point the DNS to it, and it's working in under 15 minutes". On the other hand, the top reviewer of Microsoft Defender for Cloud writes "Provides multi-cloud capability, is plug-and-play, and improves our security posture". Cloudflare is most compared with Akamai, Azure Front Door, Imperva DDoS, Microsoft Azure Application Gateway and AWS Shield, whereas Microsoft Defender for Cloud is most compared with AWS GuardDuty, Prisma Cloud by Palo Alto Networks, Microsoft Defender XDR, Microsoft Defender for Endpoint and Microsoft Sentinel. See our Cloudflare vs. Microsoft Defender for Cloud report.
See our list of best Cloud Security Posture Management (CSPM) vendors.
We monitor all Cloud Security Posture Management (CSPM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.