We performed a comparison between Cloudflare and Palo Alto Networks WildFire based on real PeerSpot user reviews.
Find out what your peers are saying about Cloudflare, NETSCOUT, Akamai and others in Distributed Denial of Service (DDOS) Protection."The UI is good."
"The solution provides good load balancing and protection against DDoS attacks."
"When using services like Heroku, Cloudflare is very useful for CNAME flattening. I also use it for their end-to-end SSL with TLS authentication on nginx for securing servers."
"The web application firewall brought us good security and a view of the accesses/blocks of the entire domain and subdomain that were accessed both by region (country) and IPs."
"What I like best about Cloudflare is that my company can use it to trace and manage applications and monitor traffic. The solution tells you if there's a spike in traffic. Cloudflare also sends you a link to check your equipment and deployment and track it through peering, so it's a valuable tool."
"From what I've seen so far, there are no negatives to report as of yet"
"I rate its stability a ten out of ten."
"DDoS attacks target unprotected machines. Cloudflare detects and stops these attacks using internal systems. It identifies incoming DDoS attacks, issuing challenges or blocking them immediately."
"The solution is scalable."
"High availability with active-active and active-passive modes."
"For example, if a security Intel threat talks about an IOC. We can then go to our MSP and say, "Is there a signature for this particular type of malware that just came out?" And if they'll say yes, then we'll say, "Okay. Does it apply to these firewalls? And have we seen any hits on it?" There's absolutely value in it."
"The most valuable feature is the improved security that it offers."
"The most valuable features of this solution are sandbox capabilities."
"The most valuable feature is the cloud-based protection against zero-day malware attacks."
"The way that the solution quickly updates to adjust to threats is the solution's most valuable aspect. When there's a security attack, within five minutes, all Wildfire subscribers have access to updates so that all systems will be safe. Its threat prevention is way better than other vendor products."
"The cloud-based services are a nice feature."
"The timing aspect can lead to it being considered overpriced. This is a particular concern we have with Cloudflare, as they may struggle with accurately detecting the client."
"Cloudflare's console should be made more user-friendly."
"Although I think it's quite good, it doesn't provide me with all the features I would expect to have if I were using Imperva."
"The solution could use more analytics on the backend to give us more insights into everything. More reports would be helpful."
"We're facing challenges due to an upgrade in the machine learning model. The problem arises from some users abusing the APIs, resulting in an influx of suspicious traffic. Cloudflare's learning model mistakenly identifies this traffic as human. Consequently, it assigns it a higher trust score, akin to legitimate human traffic, causing complications in our architecture. Previously, such traffic would have been categorized as suspicious, enabling us to apply appropriate blocking rules. However, we encounter difficulties distinguishing between genuine and suspicious traffic with the new categorization. Despite these challenges, overall, Cloudflare remains the preferred solution compared to Azure, AWS CloudFront, and Google Cloud Armor."
"Support response time could be improved."
"I think the APIs are a little bit hard for us to work with. The APIs could be more open so that we could integrate better with our SolarWinds or our monitoring solution."
"The product needs to improve its automation."
"Many years back an update caused an issue with the firewall. However, Palo Alto not only informed us of said issue, they also sent an update that fixed the issue before I even had time to log in to determine if the issue affected our services."
"The cost of this solution could still be improved, in particular, giving product discounts for charitable causes."
"I would like to see them continue on their developmental roadmap for the product."
"I think it would be nice for Palo Alto to work without the connection to the cloud. It is 100% powerful when connected to the cloud. But, if you disconnect from the cloud, you only get 40-50% power."
"It would be nice if there was an easier way to install and deploy it, such as through the inclusion of wizards."
"The product's false positive logs could be more user-friendly to understand. They could provide examples of precious cases to learn."
"There are some formats that the solution cannot support ."
"Management and web filtering can be improved. There should also be better reporting, particularly around web filtering."
Cloudflare is ranked 1st in Distributed Denial of Service (DDOS) Protection with 56 reviews while Palo Alto Networks WildFire is ranked 3rd in Advanced Threat Protection (ATP) with 58 reviews. Cloudflare is rated 8.4, while Palo Alto Networks WildFire is rated 8.4. The top reviewer of Cloudflare writes "It's easy to set up because you point the DNS to it, and it's working in under 15 minutes". On the other hand, the top reviewer of Palo Alto Networks WildFire writes "Good technical support and provides automatic analysis that saves us time in filtering email". Cloudflare is most compared with Akamai, Azure Front Door, Imperva DDoS, Microsoft Azure Application Gateway and AWS Shield, whereas Palo Alto Networks WildFire is most compared with Cisco Secure Firewall, Fortinet FortiGate, Proofpoint Email Protection, Juniper SRX Series Firewall and Symantec Advanced Threat Protection.
We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.