We performed a comparison between Cloudflare and Imperva DDoS based on real PeerSpot user reviews.
Find out in this report how the two Distributed Denial of Service (DDOS) Protection solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution offers the flexibility to control configuration rules."
"The most valuable feature is the web application firewall."
"New and innovative way to protect the client's data."
"The technical support is good."
"The web application firewall brought us good security and a view of the accesses/blocks of the entire domain and subdomain that were accessed both by region (country) and IPs."
"Centralized, full-featured DNS."
"We're using dynamic components to build flexible pages to create and manage Git merge requests for code and reviews."
"It's very user-friendly."
"The setup of Imperva DDoS was easy."
"The complete solution is valuable for everything it delivers and the protection it offers."
"Real-time monitoring is also a great tool, as you may watch several parameters in real time."
"It fits our requirements, as well as our budget."
"This product is a reliable defense from malicious attacks on a network environment."
"We have peace of mind that nobody will use malware on us or try to hack our website."
"Integration with IBM AS/400 and Db2 is okay."
"Simplifies putting everything in code."
"Latencies are always a problem."
"It would be beneficial for us if Cloudflare could offer a scrubbing solution. This would involve taking a snapshot of my website and keeping it live during a DDoS attack, ensuring uninterrupted service for our users. DDoS attacks are typically short in duration, and having Cloudflare maintain the site's availability from its secure network would enhance the overall user experience. I would appreciate it if Cloudflare could consider implementing this feature. Many organizations already utilize similar capabilities in their CDN platforms, where a static snapshot of the web page is displayed during DDoS attacks. In terms of features, Cloudflare needs to enhance its resilience and stay more focused on adopting new technologies. For instance, solutions like F5 XC Box, Access Solution, and Distributed Cloud Solution have impressive features, and Cloudflare should strive to match and exceed those capabilities. There's a need for improvement in areas like AI-based DDoS attacks and Layer 7 WAF features. Cloudflare should prioritize enhancements in areas such as behavioral DDoS and protection against SQL injection attacks, considering the prevalent trend of public exposure to the internet for business reasons. Overall, Cloudflare needs to invest more in advancing its feature set."
"DNS Management."
"It should be easier to collect the logs with companies like Sumo. However, based on my discussions with the salespeople, I understand that's how they make their money. With the enterprise product, they want people doing those kinds of enterprise features to do the logging. They want them to pay a lot of money, and that's where I have an issue with them. That should be a default. You should be able to get the log no matter what. The logging should be universal."
"We're facing challenges due to an upgrade in the machine learning model. The problem arises from some users abusing the APIs, resulting in an influx of suspicious traffic. Cloudflare's learning model mistakenly identifies this traffic as human. Consequently, it assigns it a higher trust score, akin to legitimate human traffic, causing complications in our architecture. Previously, such traffic would have been categorized as suspicious, enabling us to apply appropriate blocking rules. However, we encounter difficulties distinguishing between genuine and suspicious traffic with the new categorization. Despite these challenges, overall, Cloudflare remains the preferred solution compared to Azure, AWS CloudFront, and Google Cloud Armor."
"We are a product integrator and reseller, and we would like to have a better partner relationship, similar to a channel sales relationship. Sometimes we are on our own or get diverted by Cloudflare because they have direct sales, which competes with us and makes it difficult to build a relationship with this company since we want to be an MSP or a managed service provider for the solution."
"The reporting can definitely be improved to offer a lot more explanation on something that may have happened or has actually happened."
"It should confirm audit findings of the assigned area with auditees to ensure that the audit conclusions are based on an accurate understanding of the issues."
"Its price could be improved. It is quite expensive. It will be good if we could export the configuration. Currently, to control the configuration, we need to go to each website, which is not very convenient."
"Analytics in the area of risk need to be improved to supply more information to the users for creating better environments."
"It would be better if we were able to manage and apply changes to multiple websites/web applications, and search WAF logs for multiple websites, via the Incapsula dashboard."
"The cost could be lower; our end clients need to have a high budget to purchase this solution."
"The log analytics interface within Incapsula isn't really good. For example, if you have to get all logs from there, it's a very cumbersome process."
"The weakest point of Imperva is their first level of support, which should be improved. They should also improve the access and security logs viewing directly on the portal. I would like to see better access and security logs through the portal and not only through a SIM solution. Currently, if you want to explore your access and security logs from Imperva, you need a SIM tool or a SIM infrastructure on your side to do it. You can't do it manually or directly through the portal, which is a big problem for us. I had a call yesterday with Imperva for the roadmap, and I just told them this. They agreed that this is an improvement point from their side."
"The salespeople tend to exaggerate its capabilities, which can cost you money if you don't verify the information."
"It's quite expensive."
Cloudflare is ranked 1st in Distributed Denial of Service (DDOS) Protection with 57 reviews while Imperva DDoS is ranked 7th in Distributed Denial of Service (DDOS) Protection with 74 reviews. Cloudflare is rated 8.4, while Imperva DDoS is rated 8.8. The top reviewer of Cloudflare writes "It's easy to set up because you point the DNS to it, and it's working in under 15 minutes". On the other hand, the top reviewer of Imperva DDoS writes "I like the content monitoring feature which I haven't seen in other WAF solutions". Cloudflare is most compared with Akamai, Azure Front Door, AWS Shield, Microsoft Azure Application Gateway and Arbor DDoS, whereas Imperva DDoS is most compared with Akamai, Arbor DDoS, Radware DefensePro, AWS WAF and Fastly. See our Cloudflare vs. Imperva DDoS report.
See our list of best Distributed Denial of Service (DDOS) Protection vendors and best CDN vendors.
We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.