George OndegoManager, IS Security & Infrastructure at Fintech Kenya Limited
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The most valuable feature of Cloudflare is that it has a free version. They give us the free version with the anti-DDoS features and also the load balancing solution."
"The technical support is good."
"It is easier to configure and develop documentation to see how we have configured firewalls."
"The most valuable feature is the web application firewall."
"The solution is very good at mitigating threats."
"New and innovative way to protect the client's data."
"The compliance is the most valuable aspect."
"It mitigates all of the availabilities of risks around web applications."
"There are some features that are configured by default, so even without doing much, it can still provide a level of protection."
"The solution is very scalable. It is one of the most important features. You can also expand resources and features as well."
"Data masking is the most valuable feature of this solution."
"The dynamic profiling of websites is the solution's most valuable feature. The security is also good."
"Compared to other web application firewalls in the market, Imperva does things in the most accurate way."
"If you are using the appliance as opposed to the virtual deployment, it can stand as the network layer-two and provide real transparency."
"If they improve on the placement of their data centers, it would be better. I'm living in a remote area. I would like to connect to them without any kind of lag."
"The product support needs to be accessible from more places, a wider area of coverage."
"It should have easier documentation for the configuration. It's very technical and people who aren't technical should also be able to do the configuration."
"There should be a specific price list for enterprise-level customers."
"The solution could use more analytics on the backend to give us more insights into everything. More reports would be helpful."
"Technical support is lacking."
"It's a complicated tool to keep."
"Their portal is very limited and needs improvement."
"It would be helpful to have a "recommended deployment", or even a list of basic features that should either be used or turned on by default."
"The initial setup could be simplified. Every time you have to install the solution you have to get in touch with support or somebody that can to do that for you."
"Some of the features should be included in the next release is a file integrating monitoring tool. This feature should be improved."
"It would be useful if the solution used more intelligence in attack protection. For example, firewalls are to be dependent on the configuration, but if they could have some data science around it the solution would be even better. The profiling of the traffic, and making decisions surrounding that should be intelligence-based, instead of being based on the configuration of the firewall itself."
"I think that better bot protection is needed in this solution."
"The user interface could be better."
"There are no additional costs beyond the standard licensing fees."
"The cost primarily depends on the size of the organization."
"Everybody complains about the price of this solution."
"The cost of this solution depends on the platform."
"The price of this solution is a little bit high compared to competitors."
"There are some licenses that you have to buy to use some features. Its price could be better. Price is always important because, at the end of the day, customers have a budget. If you can meet the budget, you can sell, and if you don't, you cannot sell."
Cloudflare is the leading performance and security company helping to build a better Internet. Today the company runs one of the world’s largest networks that powers more than 9 million Internet applications. More than 10 trillion Internet requests flow through Cloudflare’s network each month, accounting for nearly 10% of all Internet requests globally.
Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare have all web traffic routed through its intelligent global network, which gets smarter with each new site added. As a result, they see significant improvement in performance and a decrease in spam and other attacks.
Web application attacks deny services and steal sensitive data. Imperva Web Application Firewall (WAF) analyzes and inspects requests coming in to applications and stops these attacks.
Protect your applications in the cloud and on-premises with the same set of security policies and management capabilities. Safely migrate apps while maintaining full protection.
Deploy Imperva WAF on-premises, in AWS and Azure, or as a cloud service itself. Easily meet the specific security and service level requirements of individual applications.
Imperva WAF protects against the most critical web application security risks: SQL injection, cross-site scripting, illegal resource access, remote file inclusion, and other OWASP Top 10 and Automated Top 20 threats. Imperva security researchers continually monitor the threat landscape and update Imperva WAF with the latest threat data.
Cloudflare is ranked 1st in DDoS with 6 reviews while Imperva Web Application Firewall is ranked 7th in Web Application Firewall (WAF) with 9 reviews. Cloudflare is rated 8.0, while Imperva Web Application Firewall is rated 8.8. The top reviewer of Cloudflare writes "Robust, secure and innovative; technical support needs to be improved". On the other hand, the top reviewer of Imperva Web Application Firewall writes "Useful out-of-the-box threat protection, not too complex, and has good technical support". Cloudflare is most compared with Imperva Incapsula, Microsoft Azure Application Gateway, Akamai, Arbor DDoS and F5 BIG-IP, whereas Imperva Web Application Firewall is most compared with F5 BIG-IP, AWS WAF, Imperva Incapsula, Fortinet FortiWeb and Signal Sciences. See our Cloudflare vs. Imperva Web Application Firewall report.
See our list of .
We monitor all DDoS reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.