We performed a comparison between Cloudflare and Fortinet FortiDDoS based on real PeerSpot user reviews.
Find out in this report how the two Distributed Denial of Service (DDOS) Protection solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature of Cloudflare is the GUI. You are able to control the solution very well through the interface. There is a lot of functionality that is embedded in the service."
"The most valuable feature of Cloudflare is that it has a free version. They give us the free version with the anti-DDoS features and also the load balancing solution."
"New and innovative way to protect the client's data."
"Easier http to https redirect using page rules"
"The solution offers the flexibility to control configuration rules."
"The web application firewall brought us good security and a view of the accesses/blocks of the entire domain and subdomain that were accessed both by region (country) and IPs."
"Cloudflare offers CDN and DDoS protection. We have the front end, API, and database in how you structure applications."
"From what I've seen so far, there are no negatives to report as of yet"
"The most valuable feature is the cloud DDoS scrubbing capability."
"The product's initial setup phase was really easy."
"The solution is very user-friendly and very easy to use."
"I find the interface easy to use."
"Among its key features: Detects and mitigates DDoS attacks at L3 to L7; negligible to zero false-positives; Generates and sends reports without the need for an expensive third-party solution."
"We have researched them all, and it's a good solution all around."
"It allows me to see all the traffic on my network."
"This solution can protect Layer 3, Layer 4 and Layer 7 attacks of applications for us."
"Even if I wanted to, I wouldn't be able to buy Cloudflare in my country."
"Latencies are always a problem."
"The product support needs to be accessible from more places, a wider area of coverage."
"We're facing challenges due to an upgrade in the machine learning model. The problem arises from some users abusing the APIs, resulting in an influx of suspicious traffic. Cloudflare's learning model mistakenly identifies this traffic as human. Consequently, it assigns it a higher trust score, akin to legitimate human traffic, causing complications in our architecture. Previously, such traffic would have been categorized as suspicious, enabling us to apply appropriate blocking rules. However, we encounter difficulties distinguishing between genuine and suspicious traffic with the new categorization. Despite these challenges, overall, Cloudflare remains the preferred solution compared to Azure, AWS CloudFront, and Google Cloud Armor."
"One area of improvement is in the Access Rules. Hypothetically, if we wanted to block or challenge traffic outside of the United States, the only way to currently do that (as far as I know) is to enter every single country outside of the United States. That could be a labor intensive job. A solution could be to enable users to create a rule where traffic is only allowed within a certain country."
"Technical support is lacking."
"We are a product integrator and reseller, and we would like to have a better partner relationship, similar to a channel sales relationship. Sometimes we are on our own or get diverted by Cloudflare because they have direct sales, which competes with us and makes it difficult to build a relationship with this company since we want to be an MSP or a managed service provider for the solution."
"DNS Management."
"I find that there have been issues in the past year with the solution hanging. It freezes often."
"The tool needs to focus more on the area of application traffic management, where it currently has some shortcomings."
"The only thing they need to do is to automate it. Today, you must create tools that do not require the use of an expert or anyone with special skills."
"I would like to see analytics, big data."
"The web interface could be much better."
"The primary area for improvement is the on-premises capacity limit, currently fixed at 10 GB."
"The solution can be a little more user-friendly and it can be more affordable."
"There aren't really any aspects of the solution we are unhappy with. It's been a positive experience overall."
Cloudflare is ranked 1st in Distributed Denial of Service (DDOS) Protection with 57 reviews while Fortinet FortiDDoS is ranked 16th in Distributed Denial of Service (DDOS) Protection with 12 reviews. Cloudflare is rated 8.4, while Fortinet FortiDDoS is rated 8.4. The top reviewer of Cloudflare writes "It's easy to set up because you point the DNS to it, and it's working in under 15 minutes". On the other hand, the top reviewer of Fortinet FortiDDoS writes "Offers good technical support but has poor scalability". Cloudflare is most compared with Akamai, Azure Front Door, Imperva DDoS, AWS Shield and Microsoft Azure Application Gateway, whereas Fortinet FortiDDoS is most compared with Arbor DDoS, Radware DefensePro, Fortinet FortiWeb, VMware NSX and Azure DDoS Protection. See our Cloudflare vs. Fortinet FortiDDoS report.
See our list of best Distributed Denial of Service (DDOS) Protection vendors.
We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.