We performed a comparison between Imperva DDoS and Palo Alto Networks WildFire based on real PeerSpot user reviews.
Find out what your peers are saying about Cloudflare, NETSCOUT, Akamai and others in Distributed Denial of Service (DDOS) Protection."This product is a reliable defense from malicious attacks on a network environment."
"IncapRules is one of the most valuable features, as you can create your own security and access control rules on top of your security policy. Using IncapRules we were able to easily block Layer 7 DDoS attacks several times."
"Gives us the ability to trace each connection, and to have logs to be able to differentiate between a positive and a false-positive intruder action."
"Technical support was very helpful."
"I like the user-friendly interface."
"Real-time monitoring is also a great tool, as you may watch several parameters in real time."
"On the site security, I can see which countries have incidents, whether it was a robot attack, a real human user, or non-human user."
"The solution's most valuable aspect is that it is easy to configure."
"The way that the solution quickly updates to adjust to threats is the solution's most valuable aspect. When there's a security attack, within five minutes, all Wildfire subscribers have access to updates so that all systems will be safe. Its threat prevention is way better than other vendor products."
"Scalable ATP solution that's quick to set up. It demonstrates good performance and stability."
"Intuitive threat prevention and analysis solution, with a machine learning feature. Scalable, stable, and protects against zero-day threats."
"Whole team can use the firewall and understand it."
"With this product, we receive the best monitoring and reports."
"Stability is never a concern."
"It is the best device in comparison to other network products in the marketplace."
"Remote access is excellent."
"Incapsula services also provides load balancing services for their service IP address environment. So far, with monitoring their services, the IP address was only changed once."
"Imperva DDoS does not provide version control."
"The weakest point of Imperva is their first level of support, which should be improved. They should also improve the access and security logs viewing directly on the portal. I would like to see better access and security logs through the portal and not only through a SIM solution. Currently, if you want to explore your access and security logs from Imperva, you need a SIM tool or a SIM infrastructure on your side to do it. You can't do it manually or directly through the portal, which is a big problem for us. I had a call yesterday with Imperva for the roadmap, and I just told them this. They agreed that this is an improvement point from their side."
"The solution should integrate with something that looks at continuous security management."
"I am not sure if this application has a policy where you can create your custom policy and run it as our firewall. We should have some ability to also create some custom policy, then run it as a firewall."
"We would like them to hire people in Sweden because it's quite hard when people are sitting in the UK or Belgium because some of the customers really want them to be local."
"It would be beneficial to include vulnerability management in the solution, similar to what they have for their on-premise solution."
"I miss being able to integrate the dashboard with other BI tools we are using. We have to export and import data to be able to present it, and doing so is a lot of work."
"Palo Alto Networks WildFire should be more real-time in nature. The signature updates should happen in a minute or less than a minute to be a very good feature for the customer."
"The initial setup was a little bit complex, mainly due to the GUI console and management challenges."
"The product's false positive logs could be more user-friendly to understand. They could provide examples of precious cases to learn."
"The deployment model could be better."
"The system performance degrades after the solution has been deployed for some time. The data that it gives us becomes a little bit slow. When you try to get some data for troubleshooting, it seems like it's working hard to extract that data."
"Any enhancements should likely be focused on the firewall appliance to further strengthen overall security capabilities, such as refining app and user identity features."
"The VPN and decryption need improvement."
"In terms of what I'd like to see in the next release of Palo Alto Networks WildFire, each release is based on malware that has been identified. The key problem is an average of six months from the time malware is written to the time it's discovered and a signature is created for it. The only advice that I can give is for them to shorten that timeframe. I don't know how they would do it, but if they shorten that, for example, cut it in half, they'll make themselves more famous."
Imperva DDoS is ranked 7th in Distributed Denial of Service (DDOS) Protection with 74 reviews while Palo Alto Networks WildFire is ranked 3rd in Advanced Threat Protection (ATP) with 58 reviews. Imperva DDoS is rated 8.8, while Palo Alto Networks WildFire is rated 8.4. The top reviewer of Imperva DDoS writes "I like the content monitoring feature which I haven't seen in other WAF solutions". On the other hand, the top reviewer of Palo Alto Networks WildFire writes "Good technical support and provides automatic analysis that saves us time in filtering email". Imperva DDoS is most compared with Cloudflare, Akamai, Arbor DDoS, Radware DefensePro and AWS WAF, whereas Palo Alto Networks WildFire is most compared with Cisco Secure Firewall, Fortinet FortiGate, Juniper SRX Series Firewall, Proofpoint Email Protection and Fortinet FortiSandbox.
We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.