HAProxy vs Imperva DDoS comparison

Cancel
You must select at least 2 products to compare!
HAProxy Logo
10,386 views|7,014 comparisons
91% willing to recommend
Imperva Logo
3,914 views|3,356 comparisons
94% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between HAProxy and Imperva DDoS based on real PeerSpot user reviews.

Find out what your peers are saying about F5, Citrix, HAProxy and others in Application Delivery Controllers (ADC).
To learn more, read our detailed Application Delivery Controllers (ADC) Report (Updated: May 2024).
772,649 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The features I find valuable in this solution are session control which automatically disconnects users that forget to log off, and the ability to write rules to either allow or block certain file requests.""The feature that I have found the most valuable is that it works for my use case of application load balancing. I'm using it for PeerSense, and it's easy enough for PeerSense.""​It has allowed us to evenly distribute the load across a number of servers, and check their health and automatically react to errors.""I have found HAProxy very helpful in replicating production environment architecture in a development and testing environment.""I can't speak to all of the HAProxy features because we don't use them all, but load balancing is very good.""Performance configuration options with threads, processes, and core stickiness are very valuable.""It improves our scalability and responsiveness services to meet our demanding customer requirements.""The most important features would be the load-balancing of HTTP and TCP requests, according to multiple LB-algorithms (busyness, weighted-busyness, round robin, traffic, etc). Another important feature that we cannot live without is the username/passwd authentication for legacy systems that had none."

More HAProxy Pros →

"Simplifies putting everything in code.""Integration with IBM AS/400 and Db2 is okay.""Imperva DDoS is fairly stable, and its availability is quite high.""Real-time monitoring is also a great tool, as you may watch several parameters in real time.""It is an effective threat mitigation tool.""​Technical support provides good, quick responses.""The three-second service level agreement is already better than the competition.""It's very pretty easy to onboard the URL."

More Imperva DDoS Pros →

Cons
"Documentation could be improved.""Improving the documentation with multiple examples and scenarios would be beneficial. Most users encounter similar situations, so having a variety of scenarios readily available on the tool's website would be helpful. For instance, if I were part of the HAProxy team, I'd create a webpage with different scenarios and provide files for each scenario. This way, users wouldn't have to start from scratch every time.""Maybe HAProxy could be more modular.""We need to handle new connections by dropping, or queuing them while the HAProxy restarts, and because HAProxy does not handle split config files.""The configuration should be more friendly, perhaps with a Web interface. For example, I work with the ClusterControl product for Severalnines, and we have a Web interface to deploy the HAProxy load-balancer.""HAProxy is very weak in the logging and monitoring part and requires improvement.""While troubleshooting, we are having some difficulties. There are no issues when it is running; it is stable and very good; however, if there is a troubleshooting issue or an incident occurs, we will have issues because this is open-source.""If nbproc = 2, you will have two processes of HAProxy running. However, the stats of HAProxy will not be aggregated, meaning you don't really know the collective status in a single point of view."

More HAProxy Cons →

"I miss being able to integrate the dashboard with other BI tools we are using. We have to export and import data to be able to present it, and doing so is a lot of work.""Incapsula services also provides load balancing services for their service IP address environment. So far, with monitoring their services, the IP address was only changed once.""The log analytics interface within Incapsula isn't really good. For example, if you have to get all logs from there, it's a very cumbersome process.""Analytics in the area of risk need to be improved to supply more information to the users for creating better environments.""The cost could be lower; our end clients need to have a high budget to purchase this solution.""I would like to have support for SSL management and secure DNS.""The product could use a broader scope in the area of policies.""Users would benefit from better documentation. There is official documentation, but sometimes we need more detail. We have some use cases that are not so run of the mill. It would be great if there was a knowledge base that we could go to for more answers."

More Imperva DDoS Cons →

Pricing and Cost Advice
  • "HAProxy is free software. There are optional paid products (support/appliances)."
  • "The price is well worth it. HAProxy Enterprise Edition paid for itself within months, simply due to the resiliency it brings. It was a bit more expensive than we were originally interested in paying, but we are thankful we chose to go with HAProxy."
  • "Very good value for the money. One of the simplest licensing schemes in this category of products."
  • "Test/lab virtual machines can be installed without a licence. They can't be used for performance testing but otherwise behave like production nodes."
  • "If you don't have expertise then go with the licensed version. Otherwise, open-source is the best solution."
  • "We use NGINX as well. However, because the health checks are a paid feature, I like to avoid it whenever possible​."
  • "I think that the pricing is very fair, I would definitely recommend buying the Enterprise license."
  • "The only cost is for the image manager, who is responsible for uploading the image, and that is trivial."
  • More HAProxy Pricing and Cost Advice →

  • "For enterprise contracts you will be in touch with a dedicated account manager who will guide you regarding licensing."
  • "​Although the pricing can be a little high, it is worth the protection and security that it offers.​"
  • "The data packages are higher than our needs so we end up paying for data that we don't use."
  • "The cost is on par with other solutions such as Cloudflare and Akamai."
  • "It is not expensive compared to the other similar solutions in this category."
  • "It is a very expensive solution. The price is very high. A lot of customers tell us that they would love to use Imperva more. I have some customers who have 50 websites, but they have only 10 websites on Imperva because of the price. They would love to have all their websites running through Imperva, but they can't. They have to choose the more critical websites to protect because the price is very high. It is a very good product, but it is too expensive. If you buy a plan for 20 megabytes and you don't consume all of your 20 megabytes, it is okay, but if you consume more, you are charged for the superior traffic."
  • "The cost is somewhere around $10,000 a site. For every site, you pay individually. For every DNS entry, you have you pay."
  • "It is expensive."
  • More Imperva DDoS Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Application Delivery Controllers (ADC) solutions are best for your needs.
    772,649 professionals have used our research since 2012.
    Comparison Review
    Anonymous User
    Questions from the Community
    Top Answer:I do recommend HAProxy for more simple applications or for companies with a low budget, since HAProxy is a free, open-source product. HAProxy is also a good choice for someone looking for a stable… more »
    Top Answer:The solution is effective in managing our traffic.
    Top Answer:We use Imperva DDoS to stop DDoS attacks and reduce the amount of unwanted queries against web services or web scraping.
    Top Answer:The solution is very affordable. It's based on the traffic utilization, the average traffic utilization, not the DDoS traffic. Therefore, if you're being DDoSed, you don't pay extra for the absorption… more »
    Top Answer:It’s hard to think of an improvement. The three-second service level agreement is already better than the competition. You would ordinarily say something like API protection. However, they've got that… more »
    Ranking
    Views
    10,386
    Comparisons
    7,014
    Reviews
    15
    Average Words per Review
    424
    Rating
    7.4
    Views
    3,914
    Comparisons
    3,356
    Reviews
    4
    Average Words per Review
    485
    Rating
    8.3
    Comparisons
    Also Known As
    HAProxy Community Edition, HAProxy Enterprise Edition, HAPEE
    Imperva Incapsula
    Learn More
    HAProxy
    Video Not Available
    Overview

    HAProxy is considered by many in the industry to be one of the fastest and most popular and trusted software load balancer products in the marketplace today. Organizations are able to immediately deploy HAProxy solutions to enable websites and applications to optimize performance, security, and observability. HAProxy solutions are available to scale to any environment.

    HAProxy is an open-source product and has a robust, active, reliable community. The solutions are continually tested and improved on by the community. HAProxy offers a dynamic design to support the most modern architectures, microservices, and deployment environments (appliances, containers, virtual, and cloud).

    HAProxy utilizes a cloud-native protocol, which makes it a complete solution for cloud services such as Red Hat OpenShift, OVH, Rackspace, Digital Ocean, Amazon Web Services (AWS), and more. It also can be used as the reference load balancer in OpenStack.

    HAProxy Products

    • HAProxy One: This is a next-gen end-to-end application delivery platform created to secure and streamline modern application architectures. It offers a complete suite of solutions, such as application delivery software, turnkey, and appliance services observed and administered through a central control plane. The product supplies application acceleration, CDN, DDoS, bot management, WAF capabilities, and load balancing.
    • HAProxy Fusion Control Plane: This product enables organizations to streamline workflows, arrange traffic routing and security protocols, enhance the speed of delivery, and scale out of the organization’s applications. HAProxy Fusion Control Plane offers an intuitive user interface to observe and control the complete product lineup and API for administering numerous fleets of HAProxy Enterprise servers, either in the cloud or on premises.
    • HAProxy Edge: This product offering is an application delivery network (ADN) that provides a broad array of turnkey application services with amazing scale and complete visibility. Services include application and content acceleration, advanced security, and load balancing.
    • HAProxy ALOHA Hardware or Virtual Load Balancer: This product is a virtual load balancer or plug-and-play hardware constructed upon HAProxy Enterprise that is designed to support proxying at Layer 4 and Layer 7. It has a user-friendly GUI, simple deployment, and no limit on backend servers, making it a complete product for organizations desiring a reliable system to provide high-end load distribution for critical services.
    • HAProxy Enterprise Kubernetes Ingress Controller: This product is designed to facilitate smooth traffic flow into a Kubernetes cluster. It is able to automatically discover anomalies and changes in an organization's Kubernetes infrastructure and provide precise distribution of traffic to healthy pods, with no downtime caused by poor pod health or scaling changes. The product comes with an embedded WAF to optimize the security of an organization’s applications running in Kubernetes.
    • HAProxy Enterprise: This product is the enterprise-class edition of HAProxy offering a dynamic and sturdy code base with next-generation features, an enterprise suite of add-ons, professional services, and trusted support. 

      • Cluster-wide tracking and rate limiting
      • Advanced DDoS and bot management
      • Web application firewall
      • Reliable expert support
      • High performance modules
      • Device detection and geolocation
      • Real-time dashboard

    Reviews from Real Users

    Having the right load balancing solution – which is what HAProxy is – and protection in place gives organizations peace of mind.” - Nathanel S., Platform Architect at SES

    “I use HAProxy for individuals who can not buy low balancers. I built NFV in a box and send individuals a pathway into an HAProxy VM. The setup was not difficult; it usually takes a day to complete for a VPC. When it comes to pricing, HAProxy is free.” - Nasir O., Network & Cloud Architect at Koala Compute Inc.

    Imperva DDoS is a solution that offers protection for web applications and websites and all their associated business-critical data from cyberattacks. The cloud-based application delivery service helps improve user experiences by improving their performance. Through its security platform, Imperva DDoS also provides DDoS mitigation, a web application firewall, and a global load balancer, and includes a content delivery network — all designed to maximize performance.

    Imperva DDoS Features

    Imperva DDoS has many valuable key features. Some of the most useful ones include:

    • API security
    • Web application firewall
    • Bot management
    • Application delivery
    • Runtime protection (RASP)
    • Discovery and assessment
    • Data protection
    • Data risk analytics
    • Data privacy
    • Application delivery control (ADC)
    • Content delivery network (CDN)
    • DDoS mitigation
    • Global server load-balancing (GSLB)
    • Web application firewall (WAF)
    • Client-side protection
    • Runtime protection

    Imperva DDoS Benefits

    There are several benefits to implementing Imperva DDoS. Some of the biggest advantages the solution offers include:

    • Reduce web application risk: Imperva DDoS includes automatic policy creation and fast rule propagation that give your IT and security departments the ability to use third-party code without risk while working at the pace of DevOps.
    • Security from edge to database: Imperva DDoS’s WAF feature secures from edge to database, so the traffic you receive is only the traffic you want.
    • Safeguard sensitive and personal data: Imperva DDoS provides visibility into sensitive and personal data, with the controls to protect that data and the ability to unify management across cloud, on-premises, and in hybrid environments to help accommodate changing threats, new regulations, and challenging audits.

    Reviews from Real Users

    Below are some reviews and helpful feedback written by Imperva DDoS users.

    PeerSpot user, Etienne W., CDN & Cybersecurity Engineer - Web performance & security at CDN Tech / Ecritel, says, “It is a good solution that allows us to protect websites. It is stable, scalable, quick and easy to use.” He goes on to explain, “WAF protection works almost out-of-the-box. The Anti-DDoS mitigation in less than 1s, I saw it many times in production, I can say it works. CDN has high performances, and the Smart Caching mode is really "smart" (you can do some efficient caching even if you're not a specialist). Its unique interface for managing security performance and ease of use are the most valuable features of this solution."

    An IT Senior Manager at an outsourcing company mentions, “The most valuable features are DDoS protection. The Incapsula [Imperva DDoS] environment helps us monitor all the web activity. All the web activity is passed through their WAF cloud services, then that can help us to monitor those activities. That can help protect against DDoS hacking.”

    Another PeerSpot reviewer, Ben D., Sales Executive at EVVO LABS, comments, "Imperva Incapsula [DDoS] has many valuable features. One, it protects the top 10 OWASP vulnerability, the open web application software platform, this is standard. Secondly, it protects against broken authentication. As well, it has remote execution of code."

    A Solutions Architect at a financial services firm states, “The solution's most valuable aspect is that it is easy to configure. The solution keeps itself up to date itself and there's no customization that we need to do. It makes it extremely easy and cuts back on the amount of work required, and saves us on man-hours.”

    Sample Customers
    Booking.com, GitHub, Reddit, StackOverflow, Tumblr, Vimeo, Yelp
    Hitachi, BNZ, Bitstamp, Moz, InnoGames, BTCChina, Wix, LivePerson, Zillow and more.
    Top Industries
    REVIEWERS
    Financial Services Firm35%
    Retailer13%
    Computer Software Company13%
    Manufacturing Company13%
    VISITORS READING REVIEWS
    Computer Software Company19%
    Financial Services Firm11%
    Government9%
    Manufacturing Company6%
    REVIEWERS
    Financial Services Firm19%
    Non Tech Company11%
    Marketing Services Firm8%
    Media Company8%
    VISITORS READING REVIEWS
    Financial Services Firm16%
    Computer Software Company16%
    Manufacturing Company7%
    Comms Service Provider6%
    Company Size
    REVIEWERS
    Small Business34%
    Midsize Enterprise32%
    Large Enterprise34%
    VISITORS READING REVIEWS
    Small Business25%
    Midsize Enterprise17%
    Large Enterprise58%
    REVIEWERS
    Small Business49%
    Midsize Enterprise13%
    Large Enterprise38%
    VISITORS READING REVIEWS
    Small Business24%
    Midsize Enterprise14%
    Large Enterprise62%
    Buyer's Guide
    Application Delivery Controllers (ADC)
    May 2024
    Find out what your peers are saying about F5, Citrix, HAProxy and others in Application Delivery Controllers (ADC). Updated: May 2024.
    772,649 professionals have used our research since 2012.

    HAProxy is ranked 3rd in Application Delivery Controllers (ADC) with 41 reviews while Imperva DDoS is ranked 7th in Distributed Denial of Service (DDOS) Protection with 74 reviews. HAProxy is rated 8.2, while Imperva DDoS is rated 8.8. The top reviewer of HAProxy writes "Useful for for small and quick load-balancing tasks". On the other hand, the top reviewer of Imperva DDoS writes "I like the content monitoring feature which I haven't seen in other WAF solutions". HAProxy is most compared with Microsoft Azure Application Gateway, NGINX Plus, Kemp LoadMaster and Citrix NetScaler, whereas Imperva DDoS is most compared with Cloudflare, Akamai, Arbor DDoS, Radware DefensePro and F5 Shape Security.

    We monitor all Application Delivery Controllers (ADC) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.