Advanced and flexible protection with Radware Cloud WAF.
What do you like best about the product?
What I value most is its real-time protection capability against advanced attacks, such as Zero-Day, without the need for manual adjustments; its machine learning and predefined policies reduce operational effort.
What do you dislike about the product?
The administration interface can be somewhat unintuitive at first, and some integrations with SIEM require additional customization to achieve full visibility.
What problems is the product solving and how is that benefiting you?
Radware cloud WAF solves the problem of web application exposure to advanced threats such as XSS injections, malicious bots, and Zero-Day attacks. Its machine learning-based model allows for proactive protection without requiring constant manual adjustments, which benefits the company by reducing security incidents, minimizing false positives, and easing the operational burden.
Radware Protects Applications with Real-Time OWASP and DDOS Threat Detection
What do you like best about the product?
Radware cloud application protection services has provided us with strong, reliable application security against OWASP. The solution reduce risk from DDOS attack, bot attack and application vulnerabilities.
What do you dislike about the product?
WAF should support custom ports as well.
What problems is the product solving and how is that benefiting you?
Radware cloud application protection services has provided us with strong, reliable application security against OWASP. The solution reduce risk from DDOS attack, bot attack and application vulnerabilities.
Effectively protects against threats and has user-friendly interface and quick support
What is our primary use case?
We are in the post-implementation phase of using Radware Cloud WAF Service right now, but we have been using a Radware solution for about six years in our company.
Right now, we are working on transitioning our systems to the cloud. We have just obtained the license and are currently testing the system as part of the implementation process. This started back in January of this year, and we are approaching one year of use. While we are in the post-implementation phase, our corporate structure has a lot of approval processes that require multiple steps. Because of this, we can't fully transition to the protection capabilities of Cloud WAF just yet. However, we are actively using and testing it, and we are taking note of all the results.
How has it helped my organization?
Our company works in banking, and every day we face malicious and suspicious requests incoming to our site. Radware Cloud WAF Service is helping protect against these threats effectively. When we were using physical hardware, it would become overloaded and go down, making it impossible to protect our site. Radware Cloud WAF Service protects all of the backend applications and services by defending against malicious and suspicious requests.
Automated analytics are easy to use. When we were using manual detection, it was difficult to detect certain traffic patterns. The automatic detection is very effective.
Radware Cloud WAF Service reduces false positives compared to our previous on-premises system. After implementing Radware Cloud WAF Service, I observed the alerts and noticed a significant reduction in false positive blocking. It has more advanced capabilities, including header request searching.
We have integrated it only with Splunk so far, and it's easy to integrate.
Bot Manager's configuration is straightforward. We input IP addresses, local IPs, and configure log sending to Splunk.
What is most valuable?
The interface is really cool, especially with the dark theme. It looks clean and organized, which I appreciate. It's not complicated at all.
Support is prompt and efficient. The response to our support tickets has been quick, and I'm really happy with that. Overall, I'm glad with my experience so far.
It is easy to use for me. I've already been working with the hardware and the portal for two years now. I know where everything is, so I find it easy.
What needs improvement?
They might need to add more integrations. Adding AI-based search capabilities would be beneficial, allowing us to search for the origins of bot attacks by country. The behavioral analysis could be made more efficient. While Bot Manager has many of these features already, there is room for further enhancement.
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
How are customer service and support?
The support team responds quickly to our tickets, and I am very satisfied with their service.
How would you rate customer service and support?
How was the initial setup?
The Radware deployment process was straightforward and easy to install. Our company has many approvals and processes, so it took over two weeks.
Our SOC team with ten people works with this solution. Our company has two teams working on security systems with three levels of engineers. I am a level two engineer handling configuration and monitoring. The level three engineers manage major updates and have comprehensive knowledge of the system.
Which other solutions did I evaluate?
We conducted POC testing with three systems: Akamai, Imperva, and Radware Cloud WAF Service. We only tested Imperva and Radware because Akamai did not meet our bank corporation's policies regarding reseller companies. Imperva had too many issues.
The Imperva cloud solution was located in Hong Kong, which was too far from Mongolia and caused internet connectivity issues. After testing it, we were not satisfied. We then tested Radware Cloud WAF Service and found it easier to use, particularly since we were already using Radware Bot Manager in the cloud.
What other advice do I have?
Currently, we are not using the API discovery feature as we are in the pre-implementation phase of API protection. We are focusing on getting Radware Cloud WAF Service into production first. After that, we plan to implement additional features such as API security and customer security.
In Mongolia, we do not have a CDN and are currently using Akamai CDN. The situation in Mongolia is restricted and somewhat complicated.
I would recommend this solution. Radware is the largest company in the security solutions industry. They have many prototypes and numerous integrations. This is an important aspect of the purchasing process. Another key point is their support; they provide a quick response to your inquiries. Their service is easy to use. With Radware's cloud solutions, they cover all aspects of security effectively. They are able to provide comprehensive coverage for your needs.
I would rate Radware Cloud WAF Service an eight out of ten.
Advanced protections ensure application security with ease of doing operation
What do you like best about the product?
I really liked the way they integrate all features like security, rules, loadbalancing, network etc with each application . this became easy to operate on any application individually and also corelate it with security events
In the past couple of months, it has successfully mitigated multiple DDoS attacks on my applications without causing any performance degradation or service disruption.
What do you dislike about the product?
while they have many security inspection like network , application protection, which detect and act in first place , but still some of security features are hidden and no visible to us . which result delay in troubleshooting when any block happens. This also needs to visible to isolate problem timey manner and act.
What problems is the product solving and how is that benefiting you?
Radware cloud waf , providing the separate surface attack in cloud, which help to isolate the actual production infra and since it first pop ,which also does not create dependencies because good features and integrate troubleshooting tools
Efficient and easy-to-use Radware WAF
What do you like best about the product?
It is a tool that is easy to implement, easy to use, and helps protect the installation.
What do you dislike about the product?
The latency that may occur when redirecting traffic.
What problems is the product solving and how is that benefiting you?
The problems are the high cost of certain protection modules.
Advanced protections ensure application security and improve threat response
What is our primary use case?
The use case is protection for all web applications. This includes the applications we serve via critical workloads. We are utilizing Radware Cloud WAF Service for this protection.
In addition to protecting our production environment, we also implement Layer 7 protections, DDoS protections, and other security measures. We have established a detailed level of protection for all of our applications.
How has it helped my organization?
I am satisfied with Radware Cloud WAF Service's ability to block unknown threats and attacks, as the moment we enable protection for specific applications, it starts working. For instance, we receive results indicating whether there's any unusual activity. This system operates like Software as a Service (SaaS). You don't have to worry about the underlying algorithms or the conditions that need to be applied. It's essentially a plug-and-play solution, making it easy to use.
The automated analytics of Radware Cloud WAF Service are quite effective. They inspect and remediate DDoS attacks quickly by monitoring any suspicious activity and reporting it, demonstrating the power of their deployed algorithms.
I use the CDN service offered by Radware together with Radware Cloud WAF Service, and I find it feasible because it provides faster responses for users accessing our applications, especially when it's caching configurations and monitoring protection simultaneously.
Radware Cloud WAF Service has saved me more than 30% of my time, as it's very easy to spin up any application with just a few clicks.
I receive reports every 30 days. The live metrics are visible on their dashboard, showing the current status of all applications and the number of hits, including false positives.
The automated source blocking features of Radware Cloud WAF Service have a proactive and holistic approach. It effectively protects applications with default methods for any sort of protection, though some of those methods generate false positives that we need to adjust based on our needs.
In terms of compliance, we are following GDPR, and to adhere to this compliance, we have chosen the required region to ensure all incoming traffic is treated accordingly. I find Radware Cloud WAF Service good with respect to my compliance needs, providing services in all required regions.
What is most valuable?
I really appreciate the DDoS protection that Radware Cloud WAF Service provides, especially because it reacted well to multiple DDoS attacks on my applications in the last couple of months without any signs of issues being reported.
Their Network Operation Center (NOC) is very proactive in monitoring the health status and metrics continuously. Whenever they identify an issue, they do not delay in informing me or my team, making them very proactive.
What needs improvement?
Radware Cloud WAF Service has helped reduce false positives, but we do experience some false positives, such as when certain URIs or headers are incorrectly flagged as malicious, and we need Radware to refine those to treat as genuine traffic, achieving about a 25% reduction in false positives.
There is an area for improvement in Radware Cloud WAF Service, specifically regarding the visibility of default algorithms or source blocking systems that create false positives, as it would help if customers could see these blocks to isolate problems quickly without needing to reach out for tech support. There are various blocking systems in place, including some default algorithms that can block a lot of content. Unfortunately, this can lead to false positives, making it difficult to determine whether an issue is being caused by Radware WAF or something else. As a customer, we can't see what's happening behind the scenes because it's a SaaS service. I would suggest that if there are any blocks, they should be clearly visible to us. This would allow us to isolate the problem and understand whether it's related to the WAF or another source. Currently, these blockings are not transparent; they remain hidden until we reach out to the tech support teams. Often, we only find out about the issues from them, which leaves us unaware of the problems as they aren't displayed in the portal. These behind-the-scenes elements should be available. I understand it would have read-only access. That's acceptable, but it should be visible so we can isolate issues quickly.
For how long have I used the solution?
We have been using it for the last one and a half years.
What do I think about the stability of the solution?
The service is always available to us. I would rate the stability of Radware Cloud WAF Service as a nine out of ten, as we rarely experience downtime, bugs, or glitches.
What do I think about the scalability of the solution?
I rate the scalability of Radware Cloud WAF Service as a seven out of ten, fitting well with our approximately 8,000 users.
How are customer service and support?
I rate the technical support of Radware Cloud WAF Service as an eight out of ten.
How would you rate customer service and support?
How was the initial setup?
I find the deployment of Radware Cloud WAF Service to be moderate in complexity, as it takes months to complete based upon requirement
More than 8,000 users work with Radware Cloud WAF Service. While it does require maintenance, it is not a concern for us since it's a SaaS service, meaning they maintain everything on the backend while we focus on uptime.
What's my experience with pricing, setup cost, and licensing?
The pricing for Radware Cloud WAF Service is cost-efficient for us, especially since we have opted for a big bundle that includes not only the Cloud WAF but also Radware other products.
Which other solutions did I evaluate?
We did not assess any other vendor as we have been using Radware from the beginning and are already familiar with its features, knowing it is fully integrated with our requirements and custom ports for web applications. While comparing Radware Cloud WAF Service with other WAF solutions, the biggest advantage is its seamless integration with my environment, and their tech support and NOC support are better than several other WAF services.
What other advice do I have?
The combination of negative and behavioral-based positive security models is important for my security strategy, and we have defined a ratio of 70% to 30%, where it properly blocks what we define, and false positives are adjusted for all applications.
I would recommend Radware Cloud WAF Service to other users because it offers excellent WAF protection services that work like a plug-and-play solution without needing to worry about algorithms. However, the deployment time could be a drawback.
Overall, I would rate Radware Cloud WAF Service an eight out of ten.
Exceptional performance of Radware
What do you like best about the product?
Excellent tool-side blocking based on OWASP standards, its protection against DDoS attacks, SQL injection, etc.
What do you dislike about the product?
Latency in application traffic due to its deep inspection.
What problems is the product solving and how is that benefiting you?
It is resolving by stopping the massive attacks being a banking institution.
Tool with great capabilities for detecting malicious traffic and Bots
What do you like best about the product?
Botmanager Module, API protection, DDoS
What do you dislike about the product?
The reporting is basic and cannot be customized.
What problems is the product solving and how is that benefiting you?
Identify malicious traffic that saturates the queries of the main pages of the group. The API protection module helps protect the sites through malicious injections.
Robust security and simple to configure
What do you like best about the product?
The ease of configuring the applications to protect with the WAF and the confidence it gives being one of the leaders in cybersecurity
What do you dislike about the product?
Protecting multiple domains can be very expensive, and some features that are included in the base price by competitors may require additional payments in Radware.
What problems is the product solving and how is that benefiting you?
It helps us protect the bank's web pages, APIs, and mobile applications.
Comprehensive Shield for Web Applications
What do you like best about the product?
Honestly, the biggest win with Radware Cloud WAF is how incredibly comprehensive its protection is. It's not just checking off the boxes for the OWASP Top 10 vulnerabilities (which it does, beautifully, against things like SQL injection and cross-site scripting), but it also feels like it's always a step ahead with zero-day protection. That's a huge peace of mind.
What do you dislike about the product?
First off, the initial setup and fine-tuning can be a beast. While the automation is great after it's configured, getting there, especially for complex or highly customized applications, can feel like climbing a steep mountain. It requires a pretty deep understanding, and creating those custom rules isn't always straightforward.
What problems is the product solving and how is that benefiting you?
From my perspective, Radware Cloud WAF really helps us tackle some major security headaches. Primarily, it solves the big problem of keeping our web applications safe from all sorts of online attacks. I'm talking about everything from common vulnerabilities like SQL injection and cross-site scripting (the OWASP Top 10 stuff) to those nasty, unpredictable "zero-day" attacks. It also does a fantastic job of managing unwanted bot traffic and fending off crippling DDoS attacks that could otherwise bring our services down.
The biggest benefits I've seen are the advanced, automated protection it provides, which honestly saves us a ton of manual work. Plus, having their excellent managed support is a huge relief; it means we're not constantly on high alert. In short, it helps us ensure our web applications are secure and reliable, letting our team focus on more strategic tasks instead of constantly battling cyber threats