Try our new research platform with insights from 80,000+ expert users

Pyxsoft Antimalware & WAF vs Sucuri comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare Web Application ...
Sponsored
Ranking in Web Application Firewall (WAF)
7th
Average Rating
8.6
Reviews Sentiment
7.4
Number of Reviews
26
Ranking in other categories
No ranking in other categories
Pyxsoft Antimalware & WAF
Ranking in Web Application Firewall (WAF)
69th
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
No ranking in other categories
Sucuri
Ranking in Web Application Firewall (WAF)
37th
Average Rating
8.4
Reviews Sentiment
7.5
Number of Reviews
6
Ranking in other categories
Distributed Denial-of-Service (DDoS) Protection (26th), Domain Name System (DNS) Security (23rd)
 

Mindshare comparison

As of February 2026, in the Web Application Firewall (WAF) category, the mindshare of Cloudflare Web Application Firewall is 5.6%, down from 6.6% compared to the previous year. The mindshare of Pyxsoft Antimalware & WAF is 0.1%, up from 0.0% compared to the previous year. The mindshare of Sucuri is 1.2%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Web Application Firewall (WAF) Market Share Distribution
ProductMarket Share (%)
Cloudflare Web Application Firewall5.6%
Sucuri1.2%
Pyxsoft Antimalware & WAF0.1%
Other93.1%
Web Application Firewall (WAF)
 

Featured Reviews

DB
CTO at PlayNirvana
Advanced security reporting has protected high-traffic betting platforms from constant attacks
I don't see room for improvement to Cloudflare Web Application Firewall. One thing I don't know much about because we have a dedicated IT team for that, and I'm not involved with Cloudflare much anymore. But if I were to compare them to F5, I would like to see more features that F5 offers. F5 has an option to bring the whole infrastructure, the whole WAF and all their packages, Bot Management, and everything else on your infrastructure. You need to install certain services from their side, and then you can choose if you would like requests to hit your servers immediately or if requests need to be proxied through F5 backbone. That would be a nice addition because we have 90% of the traffic as legit traffic coming from whitelisted servers. If it comes from whitelisted servers, I don't need to go every request through the backbone; I could easily just IP whitelist everything. Then I could maybe have Bot Management on my infrastructure that drastically reduces the price of Cloudflare. I would like to see Push CDN more improved in the next release of Cloudflare Web Application Firewall. And maybe something similar to Pushpin that Fastly has, which is an option where you can push messages that then can be scaled globally over the network. From our perspective, if we have a listener that listens for stock updates, I would just need to have one processor that pushes those updates to the Cloudflare API, and then Cloudflare would broadcast that message to all listeners. Cloudflare will check the order of the message, and if you, as a customer, are not connected or have some kind of network issue, when you reconnect, you will receive the latest state and missing updates.
Use Pyxsoft Antimalware & WAF?
Leave a review
JS
Hardware Engineer at Ministry of Defense
A cost-effective choice for website security and informative support with issues related to CDN quality
One area where they could improve is in providing real-time support options because now you need to open a support ticket and wait for their response. It would greatly benefit customers if they implemented an online chat or messaging system for quicker assistance. I have found their Content Delivery Network service to be lacking in quality, and it could certainly be enhanced to provide better performance. I would also like to see improvements in the deployment process, as it currently takes more time than desirable. Another significant concern is that their service when your website is down, turns it into a static site. This means that if customers try to visit your site during downtime, they will see old content from the static site, which is not ideal. The CDN and tracking services are areas that need improvement, as well as addressing their bandwidth limitations.
report
Use our free recommendation engine to learn which Web Application Firewall (WAF) solutions are best for your needs.
882,594 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Manufacturing Company
9%
Financial Services Firm
8%
Comms Service Provider
7%
No data available
Comms Service Provider
10%
Computer Software Company
9%
Financial Services Firm
8%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business16
Midsize Enterprise6
Large Enterprise6
No data available
No data available
 

Questions from the Community

What needs improvement with Cloudflare Web Application Firewall?
I don't really use the rule-based logic feature or utilize the WAF's ability to scale as a cloud-based service. I don...
What is your primary use case for Cloudflare Web Application Firewall?
I'm using Cloudflare Web Application Firewall on all my domains and any client domains I have; I set them up with a C...
Ask a question
Earn 20 points
Ask a question
Earn 20 points
 

Also Known As

Cloudflare WAF
No data available
No data available
 

Overview

 

Sample Customers

crunchbase, udacity, marketo, okcupid, zendesk
Information Not Available
The Loft Salon, Tom McFarlin, WPBeginner, Taylor Town, Everything Everywhere, Financial Ducks in a Row, Chubstr, Real Advice Gal, Sujan Patel, Wallao, List25, School the World
Find out what your peers are saying about Fortinet, F5, Imperva and others in Web Application Firewall (WAF). Updated: February 2026.
882,594 professionals have used our research since 2012.