Imperva Application Security Platform and HAProxy both compete in the application and infrastructure security category. Based on specific features, Imperva has the upper hand with its advanced threat intelligence and security features, while HAProxy is favored for its flexibility, open-source availability, and cost-effectiveness.
Features: Imperva Application Security Platform excels in its DDoS protection, Web Application Firewall, and the ability to tailor security policies to specific applications. It is noted for its ease of configuration. HAProxy is highly valued for its load balancing capabilities, the flexibility it offers for customization, and its support for various load balancing algorithms.
Room for Improvement: Imperva could improve its user interface, SSL management, and offer more detailed reporting and enhanced customer support communication. Improvements could also be made to ease policy configuration. HAProxy would benefit from an improved management interface, more streamlined configuration options, and enhanced dynamic configuration capabilities, along with better logging features.
Ease of Deployment and Customer Service: Imperva offers flexibility with deployment options in public and hybrid clouds, though its customer service has mixed reviews regarding responsiveness. In contrast, HAProxy, primarily deployed on-premises, is straightforward for those familiar with open-source solutions, but lacks dedicated support for its free version, a limitation compared to its enterprise edition that includes support.
Pricing and ROI: Imperva's pricing is considered a higher investment due to its comprehensive security features, with ROI linked to protection against attacks and enhancing security compliance. On the other hand, HAProxy provides a cost advantage as an open-source solution, ideal for budget-conscious organizations, despite lacking built-in support resources.
For the small project I was working on, using the basic tier provided a huge improvement at zero cost.
In terms of return on investment with Cloudflare, it costs my time to set them up, but basically once they're set up, it's done.
Operational efficiency has improved; we no longer have staff consistently monitoring backend servers during deployment or scaling events, as HAProxy's health checks and hitless reloads allow us to push changes with minimal manual intervention.
This resulted in a drastic decrease in costs and, at the same time, the accuracy of the hits coming on HAProxy was almost around 100% or 99.99%.
I estimate seeing a return on investment with HAProxy, as it significantly reduced staff requirements and enhanced scaling capabilities, particularly when transitioning from NGINX, which faced issues.
They know how much money they are losing while the system is down, so by increasing the possibility of not having a down website or web application, return on investment can be calculated easily.
Cloudflare does not offer hands-on technical support to fix customer problems but rather a self-service model.
I would rate the technical support with Cloudflare as excellent every time I've had to call them.
I have primarily worked not with the tool's customer support but with the product's sales engineers and technical sales engineers, who seem to know their stuff.
Since we are utilizing the open-source edition, community forums, mailing lists, and GitHub have been invaluable, with typically someone having encountered the same problems we faced.
My interactions with HAProxy's customer support were limited, but the feedback from my team indicated satisfactory service.
I would rate the technical support of Imperva DDoS as ten.
It is a SaaS tool, but the fact that they have workloads deployed across the world proves that it is a highly scalable tool.
The tool offers very good performance, even during high-traffic periods.
I rate the solution’s scalability an eight out of ten.
We manage an automatic load balancing feature where we add HAProxy servers dynamically behind the application load balancer to handle more traffic.
HAProxy's scalability is excellent; as our traffic expands, it handles load increases effortlessly.
For scalability, HAProxy meets my needs, supporting our initial horizontal scaling and then adapting to vertical scaling in a VMware environment.
99% of customers are using the cloud version of Imperva DDoS protection, so they just purchase the new license and scale as needed.
I rate the solution’s stability an eight out of ten.
The service is very stable with no impacts during high-traffic periods.
This reliability serves as a key reason for our choice, providing us with confidence even when faced with heavy traffic.
The hot reload feature of HAProxy also really helped us so that we never had to shut it down to reload it.
We have reduced a lot of servers, replacing them with one or two HAProxy servers which deliver better performance, accuracy, and an almost 100% success rate with requests.
The stability of Imperva DDoS is very good, as it seems they have a lot of servers around the world.
Despite these challenges, overall, Cloudflare remains the preferred solution compared to Azure, AWS CloudFront, and Google Cloud Armor.
Areas like how assessment, discovery, and payload are dealt with and how it all comes into your organization can be considered when trying to make suggestions to Cloudflare for improvements.
There are some performance considerations when it comes to dynamic content that involves fetching data from databases or using APIs.
The configuration syntax is powerful yet can become overwhelming for newcomers; a more beginner-friendly interface or a native GUI without relying on third-party tools would ease the onboarding process.
An easier desktop interface to connect to a remote server and make changes on my PC would be beneficial.
The reloading functionality is effective as it allows soft reloads without interrupting traffic patterns.
Maybe Imperva DDoS could use endpoints to get information about the attacks before they commence from the endpoint level or establish cooperation with endpoint vendors to share this information.
I find it to be cheap.
I rate the product’s pricing a five out of ten, where one is cheap, and ten is expensive.
The tool is a premium product, so it is very expensive.
Since we use the open-source edition, there are no licensing fees, with the main cost being the infrastructure running on EC2 instances in AWS, which helps maintain low expenses.
Setting up HAProxy didn't cost anything for me.
The pricing remains competitive compared to other vendors.
I would rate the pricing of Imperva DDoS as five, where one is very cheap and ten is very expensive.
The most valuable features of the solution are performance and security.
Techniques like minification and image compression reduce the size of assets, leading to better performance and faster user load times.
The solution has been able to compare it to the market, and I think the product has taken great strides in automating quite a bit of things, and they use a lot of AI.
By moving all SSL termination to the load balancer, I now manage certificates in a single place, and I can also utilize Let's Encrypt with HAProxy's built-in ACME support, making renewal automatic.
HAProxy positively impacted our organization by exceeding scalability expectations, initially projected at 200k requests but ultimately handling over 15 million transactions per second without any issues.
As a production engineer at that time, I definitely wanted to ensure that the system could handle massive connections, especially since we operated an e-commerce platform where we could not lose any customer calls.
I have utilized Imperva's Intelligent Traffic Filtering feature. This feature helps me understand how the attack is progressing and what is happening inside the requests to our website.
| Product | Market Share (%) |
|---|---|
| Cloudflare | 17.8% |
| Imperva Application Security Platform | 7.7% |
| HAProxy | 1.4% |
| Other | 73.1% |

| Company Size | Count |
|---|---|
| Small Business | 46 |
| Midsize Enterprise | 8 |
| Large Enterprise | 25 |
| Company Size | Count |
|---|---|
| Small Business | 17 |
| Midsize Enterprise | 15 |
| Large Enterprise | 16 |
| Company Size | Count |
|---|---|
| Small Business | 83 |
| Midsize Enterprise | 25 |
| Large Enterprise | 61 |
Cloudflare enhances web performance and security with features like CDN caching and DDoS mitigation while providing easy DNS management and intuitive setup through its user-friendly dashboard.
Cloudflare is recognized for its comprehensive web security and performance solutions. Speed improvements are achieved through caching mechanisms and DDoS protection, combining ease of DNS management with flexible page rules. The robust analytics and threat insight tools provide valuable data, assisted by a user-friendly dashboard allowing quick setup and configuration. An API offers dynamic DNS settings ensuring low latency and high performance across the globe.
What are Cloudflare's key features?Cloudflare finds utility across industries for DNS management and defense mechanisms. Its content delivery network assures fast content distribution and fortified security. Businesses integrate features like web application firewalls, load balancing, end-to-end SSL, and zero trust to protect websites from cyber threats while ensuring resilience and reliable performance.
HAProxy is considered by many in the industry to be one of the fastest and most popular and trusted software load balancer products in the marketplace today. Organizations are able to immediately deploy HAProxy solutions to enable websites and applications to optimize performance, security, and observability. HAProxy solutions are available to scale to any environment.
HAProxy is an open-source product and has a robust, active, reliable community. The solutions are continually tested and improved on by the community. HAProxy offers a dynamic design to support the most modern architectures, microservices, and deployment environments (appliances, containers, virtual, and cloud).
HAProxy utilizes a cloud-native protocol, which makes it a complete solution for cloud services such as Red Hat OpenShift, OVH, Rackspace, Digital Ocean, Amazon Web Services (AWS), and more. It also can be used as the reference load balancer in OpenStack.
HAProxy Products
Reviews from Real Users
“Having the right load balancing solution – which is what HAProxy is – and protection in place gives organizations peace of mind.” - Nathanel S., Platform Architect at SES
“I use HAProxy for individuals who can not buy low balancers. I built NFV in a box and send individuals a pathway into an HAProxy VM. The setup was not difficult; it usually takes a day to complete for a VPC. When it comes to pricing, HAProxy is free.” - Nasir O., Network & Cloud Architect at Koala Compute Inc.
Imperva Application Security Platform delivers comprehensive and continuous web threat protection. Renowned for its ease of use, it shields web applications and databases from various cyber threats while integrating seamlessly with cloud and on-premises environments.
Imperva Application Security Platform protects web environments by offering advanced security measures against threats like DDoS attacks, SQL injections, and cross-site scripting. As a robust web application firewall, it provides extensive monitoring and bot management capabilities. The platform integrates content delivery networks for enhanced performance and scalability, while real-time traffic analysis ensures consistent protection. Despite its strengths, improvements can be made in policy management and customization options. Users seek better integration with third-party tools and more competitive pricing models. The inclusion of AI for enhanced analytics is also anticipated.
What are the key features of Imperva Application Security Platform?Imperva Application Security Platform is implemented in industries needing strong database and application protection. Companies use it to enforce geolocation restrictions and manage bots, benefiting sectors like finance and e-commerce where data security and threat monitoring are critical. Its ability to protect and ensure data accessibility makes it integral to business operations prioritizing cyber resilience.
We monitor all Distributed Denial-of-Service (DDoS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.