We performed a comparison between Cloudflare and Palo Alto Networks WildFire based on real PeerSpot user reviews.
Find out what your peers are saying about Cloudflare, NETSCOUT, Akamai and others in Distributed Denial of Service (DDOS) Protection."Cloudflare allows us to self-host services such as Rocket.Chat and Node-RED, in high-availability mode, thanks to round robin DNS which allows us to share one hostname between our two locations."
"The UI is good."
"Many websites require an SSL certificate because they sell stuff and want SSL. Cloudflare comes with an SSL certificate built in. It's automatic. You sign yourself up for Cloudflare, and an SSL certificate automatically protects your website. You don't necessarily need a certificate if you have a connection between your website and your host, the server, Cloudflare, and the host."
"We're using dynamic components to build flexible pages to create and manage Git merge requests for code and reviews."
"The technical support is good."
"The DDoS protection is the most valuable aspect of the solution."
"There are key things that are used for our enterprise customers, such as Lambda and DNS."
"Centralized, full-featured DNS."
"Installing this product as a datacenter firewall for segregation and segmentation, and also configuring policies between zones has improved my organization."
"We have found that Palo Alto Networks WildFire is scalable. We currently have six thousand users for the product."
"It is stable and pretty much scalable."
"The solution is easy to use and the Panorama feature is good. The software management or the malware blocking and some authentication management system are good."
"I give the initial setup an eight out of ten."
"WildFire's application encryption is useful."
"For example, if a security Intel threat talks about an IOC. We can then go to our MSP and say, "Is there a signature for this particular type of malware that just came out?" And if they'll say yes, then we'll say, "Okay. Does it apply to these firewalls? And have we seen any hits on it?" There's absolutely value in it."
"It gives a more accurate assessment of a virus in terms of whether it's truly a virus, malware, or a false positive. We have some legacy software that could pop up as being something that is malware. WildFire goes through and inspects it, and then it comes back and lets us know if it's a false positive. Usually, when it finds out that it's not a virus, it lets us know that it's benign, and it can exclude it from that scan, which means I don't even have to worry about that one popping up anymore."
"For the free and Pro plans, Cloudflare could use a simple bot to provide information to users. This would improve support, especially for less advanced users who utilize the free components."
"There should be a specific price list for enterprise-level customers."
"Technical support is lacking."
"If they improve on the placement of their data centers, it would be better. I'm living in a remote area. I would like to connect to them without any kind of lag."
"The product support needs to be accessible from more places, a wider area of coverage."
"One area of improvement is in the Access Rules. Hypothetically, if we wanted to block or challenge traffic outside of the United States, the only way to currently do that (as far as I know) is to enter every single country outside of the United States. That could be a labor intensive job. A solution could be to enable users to create a rule where traffic is only allowed within a certain country."
"Although I think it's quite good, it doesn't provide me with all the features I would expect to have if I were using Imperva."
"I would like Cloudflare to offer a dedicated account manager for large enterprise clients like us."
"The initial setup was complex."
"Our main concern is that everything has to be synced with the WildFire Cloud and has to be checked through the subscription."
"The price could be better."
"The configuration should be made a little bit easier. I understand why it is as it is, but there should be a way to make it easier from the user side."
"The cost of the solution is excessively high."
"Any enhancements should likely be focused on the firewall appliance to further strengthen overall security capabilities, such as refining app and user identity features."
"High availability features are lacking."
"The support is good but they could be faster."
Cloudflare is ranked 1st in Distributed Denial of Service (DDOS) Protection with 56 reviews while Palo Alto Networks WildFire is ranked 3rd in Advanced Threat Protection (ATP) with 58 reviews. Cloudflare is rated 8.4, while Palo Alto Networks WildFire is rated 8.4. The top reviewer of Cloudflare writes "It's easy to set up because you point the DNS to it, and it's working in under 15 minutes". On the other hand, the top reviewer of Palo Alto Networks WildFire writes "Good technical support and provides automatic analysis that saves us time in filtering email". Cloudflare is most compared with Akamai, Azure Front Door, Imperva DDoS, Microsoft Azure Application Gateway and AWS Shield, whereas Palo Alto Networks WildFire is most compared with Cisco Secure Firewall, Fortinet FortiGate, Proofpoint Email Protection, Juniper SRX Series Firewall and Symantec Advanced Threat Protection.
We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.