


Find out in this report how the two Web Application Firewall (WAF) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
For the small project I was working on, using the basic tier provided a huge improvement at zero cost.
In terms of return on investment with Cloudflare, it costs my time to set them up, but basically once they're set up, it's done.
With AWS WAF, it is easier for us to block unwanted malicious DDoS attacks and threats from coming into our web application.
Cloudflare does not offer hands-on technical support to fix customer problems but rather a self-service model.
I would rate the technical support with Cloudflare as excellent every time I've had to call them.
I have primarily worked not with the tool's customer support but with the product's sales engineers and technical sales engineers, who seem to know their stuff.
Resolving issues can take time because the support personnel may lack product expertise, leading to delays.
They reach out when you send them a ticket, and within 24 hours or less, someone is able to get back to you to solve your problem.
We have not received technical support from Kemp LoadMaster without a license.
It is a SaaS tool, but the fact that they have workloads deployed across the world proves that it is a highly scalable tool.
The tool offers very good performance, even during high-traffic periods.
I rate the solution’s scalability an eight out of ten.
AWS WAF does scale in the sense that it is fully managed and has automatic scaling.
Kemp LoadMaster is a scalable solution.
I rate the solution’s stability an eight out of ten.
The service is very stable with no impacts during high-traffic periods.
Since it protects web applications from common attacks such as SQL injection and XSS, it is very stable.
In terms of reliability, I would rate AWS WAF about six out of ten due to the need for improved signature sets.
We faced issues with AWS WAF when writing the custom rules.
With the license purchase afterwards, if it expires, it begins dropping the HTTP traffic, also the DNS traffic.
Despite these challenges, overall, Cloudflare remains the preferred solution compared to Azure, AWS CloudFront, and Google Cloud Armor.
Areas like how assessment, discovery, and payload are dealt with and how it all comes into your organization can be considered when trying to make suggestions to Cloudflare for improvements.
There are some performance considerations when it comes to dynamic content that involves fetching data from databases or using APIs.
Compared to firewalls, WAFs generally provide limited stateful analysis capabilities.
The way we see it now is just mentioned as a percentage from bots and actual users, which should include proper graphs and detailed information.
Features like bot protection or DDoS mitigation, available with other WAF vendors, do not come natively with AWS WAF.
After that, they said if it was good, we could purchase the license, and while we found it very good, the license cost was too high.
I find it to be cheap.
I rate the product’s pricing a five out of ten, where one is cheap, and ten is expensive.
The tool is a premium product, so it is very expensive.
Due to our status as an AWS shop, AWS WAF is cost-effective for us, and we benefit from discounts due to our extensive use of AWS services.
The licensing cost for AWS WAF is just pay-as-you-go; it is a service-based model.
The most valuable features of the solution are performance and security.
Techniques like minification and image compression reduce the size of assets, leading to better performance and faster user load times.
The solution has been able to compare it to the market, and I think the product has taken great strides in automating quite a bit of things, and they use a lot of AI.
The biggest benefit of AWS WAF for us is to filter malicious requests, so we can protect our environment and application from malicious actors.
It has also helped to improve the posture of our application, prevent all DDoS attacks, and unnecessary traffic and SQL injection that is reducing the performance of our application.
The cloud-native nature of AWS is crucial since most of our workload is in AWS, making AWS WAF native to Amazon Web Services.
We had some issues in patching management, so we deployed this product for virtual patching, the IPS rule, and it gives us very good results because we have very critical servers.


| Company Size | Count |
|---|---|
| Small Business | 46 |
| Midsize Enterprise | 8 |
| Large Enterprise | 25 |
| Company Size | Count |
|---|---|
| Small Business | 22 |
| Midsize Enterprise | 12 |
| Large Enterprise | 26 |
| Company Size | Count |
|---|---|
| Small Business | 24 |
| Midsize Enterprise | 13 |
| Large Enterprise | 16 |
Cloudflare enhances web performance and security with features like CDN caching and DDoS mitigation while providing easy DNS management and intuitive setup through its user-friendly dashboard.
Cloudflare is recognized for its comprehensive web security and performance solutions. Speed improvements are achieved through caching mechanisms and DDoS protection, combining ease of DNS management with flexible page rules. The robust analytics and threat insight tools provide valuable data, assisted by a user-friendly dashboard allowing quick setup and configuration. An API offers dynamic DNS settings ensuring low latency and high performance across the globe.
What are Cloudflare's key features?Cloudflare finds utility across industries for DNS management and defense mechanisms. Its content delivery network assures fast content distribution and fortified security. Businesses integrate features like web application firewalls, load balancing, end-to-end SSL, and zero trust to protect websites from cyber threats while ensuring resilience and reliable performance.
AWS Web Application Firewall (WAF) is a firewall security system that monitors incoming and outgoing traffic for applications and websites based on your pre-defined web security rules. AWS WAF defends applications and websites from common Web attacks that could otherwise damage application performance and availability and compromise security.
You can create rules in AWS WAF that can include blocking specific HTTP headers, IP addresses, and URI strings. These rules prevent common web exploits, such as SQL injection or cross-site scripting. Once defined, new rules are deployed within seconds, and can easily be tracked so you can monitor their effectiveness via real-time insights. These saved metrics include URIs, IP addresses, and geo locations for each request.
AWS WAF Features
Some of the solution's top features include:
Reviews from Real Users
AWS WAF stands out among its competitors for a number of reasons. Two major ones are its user-friendly interface and its integration capabilities.
Kavin K., a security analyst at M2P Fintech, writes, “I believe the most impressive features are integration and ease of use. The best part of AWS WAF is the cloud-native WAF integration. There aren't any hidden deployments or hidden infrastructure which we have to maintain to have AWS WAF. AWS maintains everything; all we have to do is click the button, and WAF will be activated. Any packet coming through the internet will be filtered through.”
Kemp LoadMaster is a powerful load balancing solution that also serves as a web application firewall. Its primary use case is load balancing and application load balancing, making it an ideal solution for organizations that must distribute traffic across multiple servers. Kemp's integration with an active directory for ESP usage, hosting/deployment of SSL certificates, and pricing are some of its most valuable features.
Using Kemp has helped organizations mitigate cross-scripting vulnerabilities, cookie-related issues, and content security policy issues. It has also allowed them to handle everything with Kemp instead of working on each application individually.
We monitor all Web Application Firewall (WAF) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.