


Imperva Application Security Platform and Microsoft Azure Application Gateway compete in the web application security category. Imperva seems to have the upper hand in customizable security features, while Azure Application Gateway excels in integration and scalability within cloud environments.
Features: Imperva Application Security Platform offers intuitive policy configurations, easy deployment, and protection against threats like DDoS attacks and SQL injections with minimal false positives. Microsoft Azure Application Gateway provides strong integration with Microsoft services, ease of use, and autoscaling capabilities, making it valuable for organizations invested in Azure.
Room for Improvement: For Imperva, users have noted the need for improvements in user interface and policy management, along with enhancements in bot protection and analytics depth. Microsoft Azure Application Gateway users desire better configuration flexibility and reporting capabilities, and find the product's limitation to Azure environments challenging for integrating existing infrastructures.
Ease of Deployment and Customer Service: Imperva's cloud deployment is smooth with managed service support, though on-premises support feedback varies. Azure Application Gateway is easy to deploy in existing Azure setups, but some users experience challenges with customer service response times. Both solutions provide reliable support, influenced by deployment specifics and location.
Pricing and ROI: Imperva's pricing is high but justified by strong DDoS protection, offering high ROI by minimizing downtime for frequent attack scenarios. Azure Application Gateway's pay-as-you-go model is attractive within the Azure ecosystem and deemed cheaper for large deployments, with Azure's integration valued by users prioritizing cost management.
My experience with the pricing or licensing of Cloudflare Web Application Firewall is that many features can be accessed for free, so the pricing is definitely reasonable.
They know how much money they are losing while the system is down, so by increasing the possibility of not having a down website or web application, return on investment can be calculated easily.
Regarding return on investment, ROI, I can say it is noticeable with Imperva Application Security Platform.
Microsoft Azure Application Gateway significantly impacts our cost savings while maintaining higher performance.
If we can use a shared resource, then the return on investment is really nice.
We have seen a return on investment in terms of time-saving and cost-saving by not creating our own infrastructure.
I would rate the technical support with Cloudflare as excellent every time I've had to contact them.
The technical support of Cloudflare Web Application Firewall rates between five and seven at maximum.
I would rate the technical support of Imperva DDoS as ten.
The response is satisfactory, though the gaps in enablement and lab sessions are clear.
My experience with technical support from Imperva Application Security Platform was good when I reached out to them.
I would say they provide the best support for Application Gateway because they own the product, so their support is top-notch.
There is room for improvement, specifically in paid support, by providing more direct contact.
I would rate Microsoft support as good because they have a very skilled technical support team in the background
The scalability of Cloudflare Web Application Firewall rates between 8 to 9, as it depends upon the use cases and what exactly the client needs.
99% of customers are using the cloud version of Imperva DDoS protection, so they just purchase the new license and scale as needed.
I have not even needed support after deployment, since it has remained stable.
Microsoft Azure Application Gateway is a very scalable product.
It has the autoscaling feature, so there is not much concern around performance; it can scale significantly.
Microsoft Azure Application Gateway is a scalable solution.
The stability of Cloudflare Web Application Firewall deserves a perfect 10 out of 10.
It is also a stable product without much glitch or downtime.
One notable drawback is that, unlike Fortinet, which offers fast track labs and continuous enablement, Imperva Application Security Platform lacks lab access and fast track labs for enablement and product advertising.
The stability of Imperva DDoS is very good, as it seems they have a lot of servers around the world.
We have been using it for the past two to three years, and there have been good results with no problems so far.
The stability is good, and except for a few instances, I don't see the non-availability of Azure Cloud services.
The product can improve by having more multitenancy capability, which is currently not available.
I think they're doing a good job with DNS and as support for any domains that I create or that my clients create, it's mandatory for me to ensure they have Cloudflare as their DNS provider.
And maybe something similar to Pushpin that Fastly has, which is an option where you can push messages that then can be scaled globally over the network.
To convince my clients, a purely on-prem solution would be ideal since they are financial institutions.
Maybe Imperva DDoS could use endpoints to get information about the attacks before they commence from the endpoint level or establish cooperation with endpoint vendors to share this information.
Regarding return on investment, ROI, I can say it is noticeable with Imperva Application Security Platform.
One feature I mentioned is the support for non-HTTPS protocols such as TCP, which could allow one endpoint for all kinds of protocols.
There is room for improvement in terms of support, such as assigning agents directly for more straightforward engagement.
In future releases of Microsoft Azure Application Gateway, I would like to see more AI functionalities and a better dashboard as well as some customizations.
I would rate the pricing of Imperva DDoS as five, where one is very cheap and ten is very expensive.
We would prefer to have it cheaper, but it is still expensive.
Azure solutions are quite expensive.
When it comes to pricing for Microsoft Azure Application Gateway, I would rate it a seven out of ten.
The custom rules and the geo-redundant geographical rule feature, which allows me to implement geographical rules for customers, add significant value.
The best features of Cloudflare Web Application Firewall are multiple, including the WAF, rate limiter, and bot attack protection.
Cloudflare Web Application Firewall's advanced reporting and analytics tools add a layer that we're able to visualize and see before it actually hits the local firewall.
I have utilized Imperva's Intelligent Traffic Filtering feature. This feature helps me understand how the attack is progressing and what is happening inside the requests to our website.
I believe the reputational analysis in Imperva Application Security Platform is effective for blocking security threats before impact.
The main drawback for signature-based approaches happens when there is a new zero-day attack that is not in the database.
We are using it for some of the security features for our applications, particularly for securing traffic in transit with SSL.
The Web Application Firewall (WAF) in Microsoft Azure Application Gateway has been very effective in protecting applications from security threats.
The gateway's Web Application Firewall feature enhances security as it is the first entry point to your network from the outside world.
| Product | Mindshare (%) |
|---|---|
| Imperva Application Security Platform | 8.1% |
| Microsoft Azure Application Gateway | 4.9% |
| Cloudflare Web Application Firewall | 5.4% |
| Other | 81.6% |
| Company Size | Count |
|---|---|
| Small Business | 16 |
| Midsize Enterprise | 6 |
| Large Enterprise | 6 |
| Company Size | Count |
|---|---|
| Small Business | 84 |
| Midsize Enterprise | 25 |
| Large Enterprise | 62 |
| Company Size | Count |
|---|---|
| Small Business | 22 |
| Midsize Enterprise | 6 |
| Large Enterprise | 24 |
Cloudflare Web Application Firewall's intuitive dashboard enables users to build powerful rules through easy clicks and also provides Terraform integration. Every request to the WAF is inspected against the rule engine and the threat intelligence curated from protecting over 27 Million websites. Suspicious requests can be blocked, challenged or logged as per the needs of the user while legitimate requests are routed to the destination, agnostic of whether it lives on-premise or in the cloud. Analytics and Cloudflare Logs enable visibility into actionable metrics for the user.
Imperva Application Security Platform delivers comprehensive and continuous web threat protection. Renowned for its ease of use, it shields web applications and databases from various cyber threats while integrating seamlessly with cloud and on-premises environments.
Imperva Application Security Platform protects web environments by offering advanced security measures against threats like DDoS attacks, SQL injections, and cross-site scripting. As a robust web application firewall, it provides extensive monitoring and bot management capabilities. The platform integrates content delivery networks for enhanced performance and scalability, while real-time traffic analysis ensures consistent protection. Despite its strengths, improvements can be made in policy management and customization options. Users seek better integration with third-party tools and more competitive pricing models. The inclusion of AI for enhanced analytics is also anticipated.
What are the key features of Imperva Application Security Platform?Imperva Application Security Platform is implemented in industries needing strong database and application protection. Companies use it to enforce geolocation restrictions and manage bots, benefiting sectors like finance and e-commerce where data security and threat monitoring are critical. Its ability to protect and ensure data accessibility makes it integral to business operations prioritizing cyber resilience.
Azure Application Gateway is a web traffic load balancer that enables you to manage traffic to your web applications. Traditional load balancers operate at the transport layer (OSI layer 4 - TCP and UDP) and route traffic based on source IP address and port, to a destination IP address and port.
To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.
We monitor all Web Application Firewall (WAF) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.