Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

4 AWS reviews

External reviews

28 reviews
from and

External reviews are not included in the AWS star rating for the product.


3-star reviews ( Show all reviews )

    reviewer2811522

Security has improved with accurate bot protection

  • March 25, 2026
  • Review from a verified AWS customer

What is our primary use case?

My main use case for Radware DDoS is security and protection.

A quick, specific example of how I use Radware DDoS for security and protection is that we have enabled the DDoS and bot protection for our main website.

What is most valuable?

In my opinion, the best feature that Radware DDoS offers is bot protection.

When I mention bot protection, what stands out to me is its accuracy.

Radware DDoS also features easy integration, easy use, and a good user interface.

Radware DDoS has positively impacted my organization by improving our security.

After implementing Radware DDoS, my security has improved as I notice less bot traffic and spam traffic for our sales, our emails, and everywhere.

What needs improvement?

To improve Radware DDoS, it would be great to have more performance and more CDN features and all integrations.

I wish there were more functionality for microservices, websites, and configurations regarding the static files and content and CDN.

For how long have I used the solution?

I have been using Radware DDoS for around three years.

What do I think about the stability of the solution?

Radware DDoS is not stable. I have encountered stability issues such as performance issues, network timeout with ESP, slowness per regions, and no CDN feature which gives us a clear picture.

What do I think about the scalability of the solution?

The scalability of Radware DDoS is managed by Radware; I have no knowledge of how it is scalable.

How are customer service and support?

The customer support is good, but it is slow and sometimes there is no resolution.

Which solution did I use previously and why did I switch?

I previously used CloudFlare and AWS CloudFront before Radware DDoS.

How was the initial setup?

I purchased Radware DDoS through the AWS Marketplace.

What about the implementation team?

I use AWS as my cloud provider.

Which other solutions did I evaluate?

Before choosing Radware DDoS, I evaluated CloudFlare and AWS CloudFront.

What other advice do I have?

My advice to others looking into using Radware DDoS is that the basic functionality is great, but additional features require more effort, integration time, and support communication.

Radware DDoS is a great product for basic functionality that you can use, but generally, there are some pros and cons. For example, CloudFlare has issues such as downtimes, whereas Radware was a stable option. However, we had some performance issues and some support cases that delayed us, but it is still good.

My overall rating for this product is 6.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)


    reviewer2797602

Protection has reduced firewall load and mitigates large attacks but cloud controls still need improvement

  • January 20, 2026
  • Review provided by PeerSpot

What is our primary use case?

In my previous company, I used Radware DDoS for more than one and a half years, and it was positioned in front of the perimeter firewall.

Our main use case for Radware DDoS was to protect the external services, which were deployed on Big-IP F5, and then in front of that, a Check Point firewall was there, and in front of the Check Point firewall, Radware DDoS was there, protecting all the external services for that particular company I worked for.

I can give a specific example of an attack where Radware DDoS made a difference; we verified that an attacker tried to generate a TCP flood attack originating from multiple sources, and Radware DDoS was able to mitigate that based on the security features that were enforced on it.

Regarding our use case for Radware DDoS, it was enforced for each and every application, with TPS assigned there for verifying the requests coming from each single source, either based on a single source or distributed sources.

What is most valuable?

In my experience, the best features Radware DDoS offers include the ability to mitigate DDoS attacks such as TCP and SYN flood attacks; we can also mitigate UDP flood attacks, and while using TCP, it can verify the client and many other aspects, being implementable on Layer 7 for more granular information such as user-agent, which is possible if we import the private key of the particular service.

Out of all those features, the one that had the biggest impact for my team was the Layer 3 and Layer 4 DDoS implementation because it was more effective for us; we did not want to have decryption on the first layer of defense as it would introduce latency for our applications.

Radware DDoS has positively impacted my organization by sorting unwanted traffic, specifically malicious traffic targeting the applications, and it has taken the burden off the perimeter firewall during incidents.

For one particular incident, I believe that more than two million requests came through, and I think over twenty million requests were mitigated at the Radware DDoS level.

What needs improvement?

I believe Radware DDoS could be improved for cloud deployments with more granular controls that could provide valuable gains for the company, especially by verifying whether the client is genuine or not with additional metrics.

While I think the support is quite good and the user interface is acceptable, it does require a more friendly interface, although I cannot recall the exact improvements needed.

For how long have I used the solution?

I have been in this field for more than four and a half years.

What do I think about the stability of the solution?

Radware DDoS is stable in my experience, with no downtime or reliability issues; on-premises performance exceeds expectations.

What do I think about the scalability of the solution?

Radware DDoS's scalability is good; scaling up or down is easy without performance issues.

How are customer service and support?

Customer support for Radware DDoS is fine; I would rate them nine out of ten. The learning curve for Radware DDoS was fine; it was easy for my team to get up and running.

Which solution did I use previously and why did I switch?

I do not believe we had any other DDoS solution prior to Radware DDoS; we had F5 Cloud DDoS for cloud, which was good but still used Radware DDoS for on-premises.

What was our ROI?

I have seen a return on investment with Radware DDoS because it reduced our work by mitigating traffic before it reached the perimeter firewall, which lessened the need for extra security policies.

Which other solutions did I evaluate?

I am unsure if we evaluated other options before choosing Radware DDoS; my team likely did, but I was not part of that particular process.

What other advice do I have?

My advice for others looking into using Radware DDoS is that if they are seeking a good solution while also considering budget, Radware DDoS is a suitable option.

I would rate Radware DDoS a seven out of ten because I believe that our board DDoS is much better.

I think we have covered all the aspects of Radware DDoS, but I feel the cloud requires more attention compared to on-premises. I gave this review a rating of seven out of ten.


    reviewer2788470

Adaptive protection has mitigated volumetric attacks and now safeguards legitimate users reliably

  • December 16, 2025
  • Review provided by PeerSpot

What is our primary use case?

I currently use Radware DDoS to mitigate DDoS attacks, specifically highly volumetric DDoS attacks. There is an option to mitigate Layer 7 DDoS attacks to a good limit, though not fully. The better capability of this device is its machine learning capability, as it can create its own signatures on zero-day attacks.

Radware DDoS is effective at mitigating advanced DDoS threats such as burst and DNS attacks. This kind of attack is dealt with well when it comes to mitigations in Radware because the DDoS works efficiently in such scenarios.

Radware's protection ensures that legitimate, normal users are not affected during a DDoS attack because of the quota values. I set up these values based on the historic traffic I see, which is beneficial so that Radware DDoS will only be activated if the traffic is above that particular level. Another way is by using the security template, where I can allow genuine traffic based on the ports and protocols. I can create my own signatures in the security template to always allow them during a mitigation, and through these ways, I can achieve that.

What is most valuable?

The better capability of this device is its machine learning capability, as it can create its own signatures on zero-day attacks.

Radware DDoS's behavior-based detection technology is the best thing I have. I do not need to worry about any new forms of attack that are not pre-configured for filtering because it can create its own signatures based on the quota values I set for each protocol. A higher filter mode is stricter, but in low mode, it works fine. Low and medium modes work well.

What needs improvement?

One downside of Radware DDoS is that the GUI should be more user-friendly. I have experience in other platforms as well, and what I see with Radware is that it is not as user-friendly as the other ones, so that is definitely one thing that needs improvement. Additionally, I do not have an option to open a new tab within the existing GUI. If I want to open something in a new tab and try to compare it with what I have on the previous page, I cannot do it. I also note that as far as I know, Radware DDoS does not have any authentication countermeasures to mitigate any attacks, which needs to be addressed. I know it has protections for SYN floods and all, but that should be changed. It should be more transparent where proper authentication should happen with the source.

In my opinion, Radware DDoS's response times after an attack need to be improved. The response time is pretty bad sometimes.

The SecOps dashboards for monitoring and reporting the metrics are pretty bad. That is where the comparison with NetScout is more applicable because the NetScout reporting is really good. I am referring to the mitigation reports or the forensic reports. It is very hard to get a scaled report in Radware, and even after a mitigation, putting out a report for that specific mitigation is a hard process. That definitely needs improvement.

The aforementioned SecOps dashboards provide historical information on protected objects, networks, and so on, but when it is a sample report, it is not that accurate. As the scale goes bigger, the accuracy of the report also degrades.

Radware has not helped me reduce the number of false positives I receive in response to an attack because, as I mentioned, I do not use Radware DDoS as a detection mechanism. I have other detection mechanisms, so I do not work with Radware regarding false positive reductions. That is handled on a separate platform itself, so it is not needed here.

For how long have I used the solution?

I have been using Radware DDoS for six years.

What do I think about the stability of the solution?

I have not seen any lagging, crashing, downtime, or any sort of instability.

What do I think about the scalability of the solution?

Scalability in Radware DDoS is pretty good for me. The platform is good in that regard.

I would rate the scalability as 8 out of 10.

How are customer service and support?

I have contacted technical support or customer support.

The speed and quality of Radware DDoS's support should be improved. Sometimes I do not get clear answers, and sometimes I do not even get a response for days, which I have experienced. That definitely needs improvement.

How was the initial setup?

The initial deployment of Radware DDoS was moderate for me; it was not that easy, not that hard.

What about the implementation team?

Maintenance for Radware DDoS is a collaborative effort; I take help from Radware on maintenance. If there is an issue with the device, I reach out to them, but the platform is managed by me.

What other advice do I have?

Non-technical users do not use the SecOps dashboards.

If I were to rate them on a scale from one to ten for support, I would give them a score of four.

The average amount of time it takes for Radware DDoS to detect an incident is pretty good because it is less than two minutes. The detection part is impressive, but I do not have an exact time for this because I do not use it for detection most of the time. My detection mechanism is a bit different from what is normal, so I do not use it much in that sense.

It took me maybe a week to fully deploy Radware DDoS for the first time.

I am not sure if Radware DDoS's deployment can be done with one person or requires an entire team, as I was not part of the onboarding of the platform.


    M.A. Faisal

Helps detect attacks in real-time, and is stable, but the cloud scrubbing capabilities need improvement

  • December 14, 2023
  • Review provided by PeerSpot

What is our primary use case?

We are a mobile-based Internet banking organization in Southeast Asia. Our main product is actually, sending money from one place to another place through my application. So we need to be available over the Internet all the time. So if my application goes down, my business will go down. We use Radware DefensePro to protect our on-premises network hardware.

How has it helped my organization?

While Radware DefensePro offers protection against DNS attacks and IoT botnets, our limited use of internet-exposed IoT devices on-premises hinders our ability to fully test its capabilities in this context.

Radware DefensePro is capable of detecting attacks in real time. If a scan is detected from outside our network DefensPro will block it immediately.

What needs improvement?

Radware DefensePro can defend against Layer 3 and Layer 4 DDoS attacks but it is not capable of protecting against Layer 7 attacks.

Radware DefensePro suffers from a high false positive rate of 25 percent and occasionally blocks legitimate traffic, requiring manual unblocking. Additionally, it has been known to miss some threats.

We have not seen a reduction in downtime associated with attacks by using DefensePro.

Radware DefensePro needs to improve its cloud scrubbing capabilities. We have discontinued their cloud services due to poor performance.

The inability to access local technical support during our business hours poses a significant inconvenience. This necessitates extra devices for continuous operation until we can speak to their support. We would appreciate the availability of a team within our time zone for optimal service.

For how long have I used the solution?

I am currently using Radware DefensePro.

What do I think about the stability of the solution?

I would rate the stability of Radware DefensePro an eight out of ten.

How are customer service and support?

I am dissatisfied with the technical support offered. The lack of a local team available during our business hours presents a significant challenge for our operations.

Which solution did I use previously and why did I switch?

While Radware DefensePro serves us well as the best on-prem solution currently available, its full range of security features falls short of our needs. We believe a hybrid or long-term solution is necessary, and unfortunately, DefensePro is not keeping pace. Hence, we adopted Cloudflare's solution a year and a half ago. However, after three years with their regular product, we discontinued their Discovery Center due to its niche nature and switched to Cloudflare's Discovery solution. Our present challenge lies in the integration issue between our on-prem hardware and Cloudflare. Lacking an on-prem solution themselves, Cloudflare cannot resolve this directly. This incompatibility currently represents our primary obstacle.

What about the implementation team?

The implementation was completed by Radware DefensePro's partner, NHQ. They deployed the solution quickly without any issues.

What's my experience with pricing, setup cost, and licensing?

Radware DefensePro is expensive when considering the issue we have and its limitations.

We pay for an annual license and also for the support service.

What other advice do I have?

I would rate Radware DefensePro a seven out of ten.

Radware DefensePro is one of the best solutions for on-premise protection.

We have a team of four people in my cybersecurity operations team who are responsible for the maintenance of Radware DefensePro.

While Radware DefensePro offers good service availability from a failover perspective, it only covers 90 percent of my DDoS protection needs.


showing 1 - 4