We performed a comparison between Cloudflare and Fortinet FortiADC based on real PeerSpot user reviews.
Find out what your peers are saying about Cloudflare, NETSCOUT, Akamai and others in Distributed Denial of Service (DDOS) Protection."New and innovative way to protect the client's data."
"I rate its stability a ten out of ten."
"The solution offers the flexibility to control configuration rules."
"The web application firewall brought us good security and a view of the accesses/blocks of the entire domain and subdomain that were accessed both by region (country) and IPs."
"Centralized, full-featured DNS."
"The simplicity of the overall dashboard makes it a great product for a user like me who has less understanding of the internet than a developer or other more technical people. It gives me peace of mind. I also love the easy customization of the Page Rules."
"The DDoS protection is the most valuable aspect of the solution."
"We're using dynamic components to build flexible pages to create and manage Git merge requests for code and reviews."
"Although FortiADC has multiple features that I like, the global DNS is the most helpful. It is primarily useful for customers with huge environments and at least two data centers. FortiADC can act as your DNS server. It can check which data center has the lowest latency, and route traffic to that one. It's an intelligent DNS."
"Simple to use and easy to integrate."
"The user interface is very easy and integrates with Sandbox easily."
"I am impressed with the product's load-balancing feature."
"The GSLB, the DR side, is the best part. Because we had our main side in one city, we created another, and we had a complete MPLS over the internet. We used the GSLB and data loss for our business applications."
"I like the solution's load balance with DNS intelligence."
"Key features include SSL Offloading, VM availability, and L7 load balancing."
"The main feature that we use is GSLB (Global Server Load Balancing). GSLB makes the customer's network more reliable by scaling applications across multiple datacenters. GSLB as a disaster recovery solution can direct traffic based on site availability."
"Cloudflare's console should be made more user-friendly."
"If they improve on the placement of their data centers, it would be better. I'm living in a remote area. I would like to connect to them without any kind of lag."
"In the last two years, there has been a certain amount of downtime when using the VDM."
"We're facing challenges due to an upgrade in the machine learning model. The problem arises from some users abusing the APIs, resulting in an influx of suspicious traffic. Cloudflare's learning model mistakenly identifies this traffic as human. Consequently, it assigns it a higher trust score, akin to legitimate human traffic, causing complications in our architecture. Previously, such traffic would have been categorized as suspicious, enabling us to apply appropriate blocking rules. However, we encounter difficulties distinguishing between genuine and suspicious traffic with the new categorization. Despite these challenges, overall, Cloudflare remains the preferred solution compared to Azure, AWS CloudFront, and Google Cloud Armor."
"The solution could use more analytics on the backend to give us more insights into everything. More reports would be helpful."
"The product needs to improve its automation."
"It should have easier documentation for the configuration. It's very technical and people who aren't technical should also be able to do the configuration."
"It would be beneficial for us if Cloudflare could offer a scrubbing solution. This would involve taking a snapshot of my website and keeping it live during a DDoS attack, ensuring uninterrupted service for our users. DDoS attacks are typically short in duration, and having Cloudflare maintain the site's availability from its secure network would enhance the overall user experience. I would appreciate it if Cloudflare could consider implementing this feature. Many organizations already utilize similar capabilities in their CDN platforms, where a static snapshot of the web page is displayed during DDoS attacks. In terms of features, Cloudflare needs to enhance its resilience and stay more focused on adopting new technologies. For instance, solutions like F5 XC Box, Access Solution, and Distributed Cloud Solution have impressive features, and Cloudflare should strive to match and exceed those capabilities. There's a need for improvement in areas like AI-based DDoS attacks and Layer 7 WAF features. Cloudflare should prioritize enhancements in areas such as behavioral DDoS and protection against SQL injection attacks, considering the prevalent trend of public exposure to the internet for business reasons. Overall, Cloudflare needs to invest more in advancing its feature set."
"Because it is so generic, the documentation requires special attention. A person who has not worked on Fortinet FortiADC or a similar product will struggle to understand what the document is trying to say. The documentation could be more specific, and more detailed."
"The user interface could be more friendly and CLI could be more like that of Fortigate."
"Fortinet has some drawbacks, and it can be a bit challenging to scale."
"The initial setup could be simplified."
"Issues with SSL and encrypted traffic."
"Setup could be easier. The company's homework is to redesign those menus to configure with the smallest number of steps."
"Technical support and documentation could both be improved."
"The solution’s pricing could be improved."
Cloudflare is ranked 1st in Distributed Denial of Service (DDOS) Protection with 56 reviews while Fortinet FortiADC is ranked 8th in Application Delivery Controllers (ADC) with 19 reviews. Cloudflare is rated 8.4, while Fortinet FortiADC is rated 7.8. The top reviewer of Cloudflare writes "It's easy to set up because you point the DNS to it, and it's working in under 15 minutes". On the other hand, the top reviewer of Fortinet FortiADC writes "High-level load balancing and routing protocols but scalability is limited to 200 gigabits". Cloudflare is most compared with Akamai, Azure Front Door, Imperva DDoS, Microsoft Azure Application Gateway and AWS Shield, whereas Fortinet FortiADC is most compared with F5 BIG-IP Local Traffic Manager (LTM), Fortinet FortiWeb, Citrix NetScaler, Kemp LoadMaster and Avi Networks Software Load Balancer.
We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.