Find out what your peers are saying about Cloudflare, Radware, NETSCOUT and others in Distributed Denial-of-Service (DDoS) Protection.
WordPress security can be tricky, and that's where Cloudflare can be absolutely helpful for small businesses.
For the small project I was working on, using the basic tier provided a huge improvement at zero cost.
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
The end users have the authority to reconcile the password or verify it before using session isolation, which is one of the unique features that can be enabled through Privileged Session Manager, preventing any attacks from happening within the organization when connected with sessions through CyberArk Privileged Access Manager.
CyberArk Privileged Access Manager has helped customers save on costs primarily by reducing the number of engineering and information security personnel.
This would help us address issues promptly, especially during unforeseen events like DDoS attacks.
Cloudflare does not offer hands-on technical support to fix customer problems but rather a self-service model.
You can get a support engineer with the best qualifications.
The technical support team is very effective in resolving issues.
Although the team is good, they are not fast, and they lack the skills to manage dynamic attackers.
The technical support for Arbor DDoS is great, though sometimes it can be stalling.
CyberArk has been exceptional in coming back to us with immediate responses.
It could be forever until you talk to someone who knows what they are doing.
They are helpful, but complex issues can take a long time to resolve, which can delay solutions for urgent customer issues.
I rate its scalability a ten out of ten because I had no issues with it.
I rate the scalability a ten out of ten.
It is a SaaS tool, but the fact that they have workloads deployed across the world proves that it is a highly scalable tool.
This would enhance the knowledge about scalability options available for Arbor DDoS, making it more accessible and useful for users.
I find Arbor DDoS to be very scalable.
The CPM can reportedly handle up to 50,000 accounts independently without issue.
I would rate it a ten out of ten for scalability.
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
For DDoS protection, I would not recommend Cloudflare.
I rate the solution’s stability an eight out of ten.
The service is very stable with no impacts during high-traffic periods.
Proper fine-tuning and expertise ensure the product performs well.
Overall, the stability of the solution is high.
It has a large customer base and positive feedback within my network.
There's a need for improvement in areas like AI-based DDoS attacks and Layer 7 WAF features.
Despite these challenges, overall, Cloudflare remains the preferred solution compared to Azure, AWS CloudFront, and Google Cloud Armor.
In future releases, one thing that would be great is if Cloudflare could provide basic WAF rules and security recommendations based on website scanning.
I would like to see an option to decrypt the traffic with Arbor DDoS, as some clients are interested in this, particularly for application layer attacks on port 443.
Enhancing the handshakes between Arbor DDoS and third-party solutions is essential for obtaining better and real-time data that supports any organization’s support team effectively.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
We cannot generate a plug-in for web-based applications.
If they want clients to move to the cloud, they need to support them in real-time.
That's where Cloudflare shines for smaller businesses – it's ten times cheaper than Akamai.
I find it to be cheap.
A free version of the solution is available.
For some customers, the cost is expensive, but for enterprises looking to protect their services, it is affordable.
CyberArk is expensive compared to other products I know.
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
CyberArk's SaaS solution is particularly expensive.
For me, the valuable feature is DDoS protection.
The most valuable features of the solution are performance and security.
Techniques like minification and image compression reduce the size of assets, leading to better performance and faster user load times.
The platform offers quick mitigation of attacks because Arbor DDoS uses BGP Flowspec, enabling very quick mitigation.
The most valuable feature was the ability to detect attacks within two seconds and gain visibility of all the traffic.
The feature I find most valuable is the packet capture, which beautifully shows the communication between the client and the server, identifying potential malicious activity.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
It can integrate with Splunk, SNMP, and other solutions and technologies.
Cloudflare is a highly-regarded Content Delivery Network (CDN) and a Distributed Denial-of-Service (DDoS) protection solution. The robust global connectivity cloud platform that is Cloudflare ensures users are able to connect to the Internet quickly, securely, and reliably. Cloudflare is one of the world's largest networks in the marketplace today. Using Cloudflare, businesses, educational entities, NGOs, vloggers, bloggers, and anyone else with an internet presence can experience more secure, faster websites and applications.
Currently, there are millions of Internet locations on Cloudflare, and the Cloudflare network
continues to grow every day by the thousands. The solution is able to fulfill the requests for
millions of websites seamlessly and serves on average 45 million HTTP requests per second.
Cloudflare has safe, secure data centers in close to 300 cities worldwide to ensure every
client request is filled as quickly as possible. It is Cloudflare’s edge network that makes this
possible by keeping content and other services as close to each client as possible, so the
information requests are always only seconds away.
Many organizations that work in democracy, civil society, human rights, or the arts are able to
access Cloudflare's highest levels of protection for free via Project Galileo. Additionally, official
election websites can be secured from hacking and fraud through Cloudflare’s Project
Athenian, also at no additional cost.
Cloudflare can also help organizations of all sizes develop a robust zero-trust strategy to
ensure the highest levels of productivity and profitability. Employees, stakeholders, and end users have a greater level of satisfaction and overall improved user experience, which can, in
turn, result in higher revenues and overall ROI. Zero-trust and BYOD (bring your own device)
access ensure end users and employees always have the best resources and technology
available to them at all times.
Cloudflare benefits
Cloudflare has many benefits. Some of its most valuable benefits include:
- Faster load times
- Robust DNS security
- Intuitive cloud Web Application Firewall (WAF)
- Free universal SSL
- Image enhancement
- Automatic browser caching
- Next-generation cloud load balancer
- Accelerated Mobile Pages (AMP)
- Rate limiting
- Minification
- Zero-trust capabilities
- Cost-effective
- Reduced carbon footprint
Reviews from real users
“Many websites require an SSL certificate because they sell stuff and want SSL. Cloudflare
comes with an SSL certificate built in. It's automatic. You sign yourself up for Cloudflare, and
an SSL certificate automatically protects your website. If you have a connection between your
website and your host, the server, Cloudflare, and the host, you don't necessarily need a
certificate.” Spencer M., Owner at Tech Exchange
“What I like best about Cloudflare is that my company can use it to trace and manage
applications and monitor traffic. The solution tells you if there's a spike in traffic. Cloudflare
also sends you a link to check your equipment and deployment and track it through peering,
so it's a valuable tool.” Daniel P., Network Engineer at Ufinet
“The most valuable feature of Cloudflare is the GUI. You are able to control the solution very
well through the interface. There is a lot of functionality that is embedded in the service.” PeerSpot user, Competence Center Manager at a tech services company
Arbor DDoS provides effective mitigation against DDoS attacks with a user-friendly interface, integrating cloud and on-premise solutions for real-time traffic control and reporting. It supports large traffic volumes without latency, making it ideal for protecting online infrastructure.
Known for its intuitive GUI and rapid response, Arbor DDoS defends against complex DDoS threats using AI-driven anomaly detection and traffic categorization. It offers packet capture, robust reporting, and deployment flexibility, helping users maintain network stability and performance. While improvements in auto-mitigation, interface modernization, and scalability are needed, its hybrid protection approach efficiently secures networks for service providers and enterprises.
What are the key features of Arbor DDoS?Internet Service Providers and managed service providers utilize Arbor DDoS to secure network infrastructure and service availability. It's implemented in government and finance sectors for safeguarding customer websites and managing server traffic thresholds. Organizations deploy Arbor DDoS both on-premise and via cloud for extensive network protection.
CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.
CyberArk Privileged Access Manager possesses a simplified and unified user interface. Users are able to manage the solution from one place. The UI allows users to view and manage all of the information and controls that administrators need to be able to easily access. Very often, management UIs do not have all of the controls and information streamlined in a single location. This platform provides a level of visibility that ensures users will be able to view all of their system’s most critical information at any time that they wish.
Benefits of CyberArk Privileged Access Manager
Some of CyberArk Privileged Access Manager’s benefits include:
Reviews from Real Users
CyberArk Privileged Access Manager’s software stands out among its competitors for one very fundamental reason. CyberArk Privileged Access Manager is an all-in-one solution. Users are given the ability to accomplish with a single platform what might usually only be accomplished with multiple solutions.
PeerSpot users note the truly all-in-one nature of this solution. Mateusz K., IT Manager at a financial services firm, wrote, "It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."
Hichem T.-B., CDO & Co-Founder at ELYTIK, noted that “This is a complete solution that can detect cyber attacks well. I have found the proxy features most valuable for fast password web access.”
We monitor all Distributed Denial-of-Service (DDoS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.