The bank uses different channels, such as mobile banking, Internet banking, and Creditnet, and we adopted Cloud WAF to prevent blockages and attacks. We have passed the policy review stage and are ready to begin blocking. Right now, we are in reporting mode and heading to the blocking stage.
Radware Cloud WAF
RadwareExternal reviews
External reviews are not included in the AWS star rating for the product.
Bot support
Why to choose Radware Cloud Waf? What protection does it provides
Best experience ever
firewall that protects web applications and api's from various cyber threats.
user friendly.
I really like the product but it takes time to get used to haha.
Easy handling
We benefit from improved security and visibility
What is our primary use case?
How has it helped my organization?
The bank has benefited from improved security and visibility. Two months ago, there was scouting at a national level in Bolivia from Brazil, and it was difficult to find. Cloud WAF gave us that visibility, and as soon as we had a bit of suspicion, we started to block things, mostly traffic. That has benefited us a lot, especially in having more peace of mind and visibility of events and possible attacks.
The network team started with RadWare Alteon, and after that, they began to consider WAF and Cloud WaF. After a month of putting together infrastructure and having clarity, we have already begun to notice the benefit of visibility.
We do have greater visibility of false positives, but we understand that RadWare cannot make the change. It depends more on internal processes to validate false positives. It does provide support by detecting them, and then we need to coordinate internally. For example, we noticed many false positives in SQL injection—around 60 to 70 percent of the false positives were there—so we already have a basis for mitigating them in other channels.
Cloud WAF has freed up our IT staff's time, saving us around 40 percent. For example, because we have visibility on the network level, we do not have to figure things out. If an event occurs in some SIEM or an attack occurs, we can act quickly to prevent the attack and loss of information or economic impact.
From my side, it is a little easier to automatically see these events, show the teams, and coordinate this whole issue rather than spending time investigating, checking logs, and seeing those types of elements on servers, in the DMZ, or in the same application.
What is most valuable?
I like that Cloud WAF provides me with lots of information. All the events and all the possible attacks appear in front of you, and false positives appear through different channels. The solution's automated analytics are excellent. I have several events that appear automatically.
The blocking part seems good. Since I'm just starting on the team, I don't know much about the tool. I'm discovering all its features right now, and they showed me some video tutorials.
We haven't seen any issues with integrating Cloud WAF at the same level of product. For example, we haven't had any problems integrating it with Alteon. I don't have direct experience integrating it with firewalls or other tools, but based on what others are saying, there haven't been any compatibility issues with other applications the bank uses.
What needs improvement?
Cloud WAF's management portal lacks many indicators, and the interface could be more user-friendly. It should provide more detailed information on events, possible solutions, and what each event means. While it does give you the event and block part, it doesn't give you a solution. Let's say, for example, someone wants to go into an SQL injection and find a possible solution other than the blocking part, there are no details. It would be good to have possible solutions or the ability to create an automated report to send to the developers in the portal.
Also, they should offer more Spanish-language tutorial videos. There is only one tutorial in Spanish, which is difficult for us as Latin American customers.
For how long have I used the solution?
I've been using RadWare Cloud WAF for about two to three months.
What do I think about the stability of the solution?
Cloud WAF is very stable. We haven’t had any problems at the portal, tool, or service levels.
What do I think about the scalability of the solution?
We are just starting to figure out Cloud WAF's potential, but we already want to increase the usage in our company.
How are customer service and support?
I rate Radware support eight out of 10. I have seen a lot of willingness from their side to help us, but you need to open the ticket and look for the details in English, and most support is in English, so explaining issues to them is challenging.
How would you rate customer service and support?
Positive
What was our ROI?
The biggest return on investment comes from improved security and avoiding information losses or DDoS attacks. We gain security and the certainty that we will always be operational. The number of attacks has been reduced, and there is a contingency area here that measures the indicators, including the TCO. It's hard to tell, but it looks like approximately 30 to 40 percent.
What other advice do I have?
I rate Radware Cloud WAF eight out of 10. The interface could be a little more detailed. It would be great if Cloud WAF could provide us with alternative solutions to pass along to the developers, infrastructure, security, and all the teams involved in critical events. For example, you have no alternatives if you have a crisis that can be attended to this week or in the next two weeks. You can only block it or not, making things a bit more complicated.
I don't know the tool well yet, but from what I have seen it could be improved by simplifying the team coordination. Also, the categorization could be better because there are only four or five categories: injection, vulnerabilities, etc. If we had more details and options it would benefit us a lot.
I recommend future users learn a little about the tool before using it and have training. It is extensive, so it's critical to know about the events. This tool opened my eyes. We were not covered through all the protocols, we weren’t really safe, this tool gave me a much-needed security.
Foreign Language: (Spanish)
Nos beneficiamos de una mayor seguridad y visibilidad.
¿Cuánto tiempo lleva usando esta solución?
He estado usando RadWare Cloud WAF durante aproximadamente dos o tres meses.
¿Cuál es su principal caso de uso de esta solución? (Incluya detalles sobre su entorno).
El banco utiliza diferentes canales, como banca móvil, banca por Internet y Credinet, adoptamos Cloud WAF para evitar bloqueos y ataques. Hemos pasado la etapa de revisión de políticas y estamos listos para comenzar a bloquear. En este momento, estamos en modo de informe y nos dirigimos a la etapa de bloqueo.
Comparta cómo Radware Cloud WAF Service ha mejorado su organización. Si no fue así, explique por qué.
El banco se ha beneficiado de una mayor seguridad y visibilidad. Hace dos meses hubo scouting a nivel nacional en Bolivia desde Brasil y fue difícil de encontrar. Cloud WAF nos dio esa visibilidad y tan pronto como tuvimos un poco de sospecha, comenzamos a bloquear cosas, principalmente tráfico. Eso nos ha beneficiado mucho, sobre todo en tener más tranquilidad y visibilidad de eventos y posibles ataques.
El equipo de redes comenzó con RadWare Alteon y después de eso, comenzaron a considerar WAF y Cloud WaF. Después de un mes de armar la infraestructura y tener claridad, comenzamos a notar el beneficio de la visibilidad.
Tenemos una mayor visibilidad de los falsos positivos, pero entendemos que el cambio no depende de RadWare. Depende más de procesos internos para validar los falsos positivos. Brinda apoyo al detectarlos y luego necesitamos coordinarnos internamente. Por ejemplo, notamos muchos falsos positivos en la inyección SQL (alrededor del 60 al 70 por ciento de los falsos positivos estaban allí), por lo que ya tenemos una base para mitigarlos en otros canales.
Cloud WAF ha liberado tiempo de nuestro personal de TI, ahorrándonos alrededor del 40 por ciento. Por ejemplo, como tenemos visibilidad a nivel de red, no tenemos que resolver las cosas desde cero. Si ocurre algún evento en algún SIEM o se produce un ataque, podemos actuar rápidamente para evitar el ataque y la pérdida de información o impacto económico.
Por mi parte, es un poco más fácil ver estos eventos de manera automatizada, mostrarselos a los equipos y coordinar todo este asunto en lugar de perder tiempo investigando, revisando registros y buscando ese tipo de elementos en los servidores, en la DMZ o en la misma aplicación.
¿Qué características le han parecido más valiosas y por qué?
Me gusta que Cloud WAF me proporciona mucha información. Todos los eventos y todos los posibles ataques aparecen frente a ti, y aparecen falsos positivos a través de diferentes canales. Los análisis automatizados de la solución son excelentes. Tengo varios eventos que aparecen automáticamente.
La parte del bloqueo me parece buena. Como recién estoy comenzando en el equipo, no sé mucho sobre la herramienta. Estoy descubriendo todas sus características ahora mismo y me mostraron algunos videotutoriales.
No hemos visto ningún problema con la integración de Cloud WAF con otras soluciones de RadWare. Por ejemplo, no hemos tenido ningún problema para integrarlo con Alteon. No tengo experiencia directa en su integración con firewalls u otras herramientas, pero según lo que dicen otros, no ha habido ningún problema de compatibilidad con otras aplicaciones que utiliza el banco.
¿En qué áreas se podría mejorar el producto o servicio?
¿Qué características adicionales deberían incluirse en la próxima versión?
El portal de gestión de Cloud WAF carece de muchos indicadores y la interfaz podría ser más fácil de usar. Debería proporcionar información más detallada sobre los eventos, las posibles soluciones y lo que significa cada evento. Si te brinda la parte de evento y bloqueo, pero no te brinda una solución. Por ejemplo, si alguien quiere realizar una inyección SQL y encontrar una posible solución distinta a la parte de bloqueo, no puede ya que no existen detalles. Sería bueno tener posibles soluciones o la capacidad de crear un informe automatizado para enviarlo a los desarrolladores en el portal.
Además, deberían ofrecer más videos tutoriales en español. Sólo hay un tutorial en español, lo cual es difícil para nosotros como clientes latinoamericanos.
Alternativas y consejos:
¿Utilizó anteriormente una solución diferente? De ser así, ¿por qué la cambió?
Antes de elegir, ¿evaluaste otras opciones? ¿De ser asi, cuales?
¿Tiene algún comentario o consejo adicional sobre esta solución?
Califico a Radware Cloud WAF con ocho sobre 10. La interfaz podría ser un poco más detallada. Sería fantástico si Cloud WAF pudiera brindarnos soluciones alternativas para transmitirlas a los desarrolladores, la infraestructura, la seguridad y todos los equipos involucrados en eventos críticos. Por ejemplo, no tienes alternativas si tienes una crisis que puede ser atendida esta semana o en las próximas dos semanas. Sólo tienes dos opciones: bloquear o no bloquear, lo que complica un poco las cosas.
Aún no conozco bien la herramienta, pero por lo que he visto se podría mejorar simplificando la coordinación del equipo. Además la categorización podría ser mejor porque solo hay cuatro o cinco categorías: inyección, vulnerabilidades, etc. Si tuviéramos más detalles y opciones nos beneficiaría mucho.
Recomiendo a futuros usuarios conocer un poco la herramienta antes de utilizarla y capacitarse. Es extensa, por lo que es fundamental conocer los eventos. Esta herramienta me abrió los ojos. No estábamos cubiertos ante todos los protocolos, no estábamos realmente seguros, esta herramienta nos brindó una seguridad muy necesaria.
Rendimiento
¿Cuáles son sus impresiones sobre la escalabilidad de esta solución?
Apenas estamos empezando a descubrir el potencial de Cloud WAF, pero ya queremos aumentar su uso en nuestra empresa.
¿Cuáles son sus impresiones sobre la estabilidad de esta solución?
Cloud WAF es muy estable. No hemos tenido ningún problema a nivel de portal, herramienta o servicio.
¿Cuál es su retorno de la inversión?
El mayor retorno de la inversión es la mejora en seguridad y el poder evitar pérdidas de información o ataques DDoS. Ganamos seguridad y la certeza de que siempre estaremos operativos. Se ha reducido el número de ataques, aquí existe un área de contingencia que mide los indicadores, incluyendo el TCO. Es difícil saberlo, pero parece que se ha reducido aproximadamente entre el 30 y el 40 por ciento.
Configuración y soporte
¿Lo implementó a través de un equipo de proveedores o uno interno? Si se trata de un equipo de proveedores, ¿cómo calificaría su nivel de experiencia?
Cuéntanos tu experiencia con el servicio de soporte al cliente.
Califico el soporte de Radware con ocho de 10. He visto mucha disposición de su parte para ayudarnos, pero es necesario abrir el ticket y buscar los detalles en inglés, y la mayor parte del soporte es en inglés, a veces explicar el problema es un reto.
¿Cómo calificaría esta solución en una escala del 1 al 10 en cuanto al servicio de soporte?
8.
It's a highly efficient solution for dealing with web shell attacks
What is our primary use case?
We provide our clients with Cloud WAF Service, which enables us to detect and report web shell attacks against their servers.
How has it helped my organization?
The main benefit is that all traffic is shifted by the cloud service, which exists outside the customer's infrastructure. It's highly efficient. Many customers have problems inside the infrastructure that must be efficiently detected. With Cloud WAF we can notify our client when an attack is outside and detect when a web shell script is already running on the server. This information helps the client understand what's happening with the web shell.
We've reduced many false positives using Cloud WAF Service. The learning period is helpful. Radware sends a policy with a lot of information that helps the customer observe and design their policies to eliminate false positives.
Cloud WAF saves us a lot of time because we face many strong attacks. It helps us modify the back end and implement some policies to prevent more attacks.
What is most valuable?
The best feature is the SQL injection signatures, and another is the DDoS protection. Radware is more efficient than other solutions. It handles unknown threats very well. We face many bad requests with malware that are expensive to remedy. Radware's service center in the cloud helps a lot.
What needs improvement?
Radware's bot manager can be improved because it's very complicated to implement for apps. Radware could also add alerts by WhatsApp or Telegram. It only sends notifications via email or SMS.
What do I think about the stability of the solution?
We have had issues with Cloud WAF one or two times, but the service works fine most of the time.
What do I think about the scalability of the solution?
Cloud WAF scales very well.
How are customer service and support?
I rate Radware support nine out of 10. They have a simple platform for opening tickets, and they respond quickly.
How would you rate customer service and support?
Positive
How was the initial setup?
Our previous solution was hard to install, but Cloud WAF is straightforward because it's cloud-based. You add the certificate for the business and point it to the IP. Deployment is very fast. It takes 30 minutes to an hour. Cloud WAF requires some maintenance when a customer changes their website or programs. We need to adjust the policies.
What other advice do I have?
I rate Radware Cloud WAF Service eight out of 10. It is the best solution for stopping DDoS attacks.
Helps reduce false positives, free up IT time, and block unknown threats
What is our primary use case?
After a security breach on one of our web applications, we transitioned to a cloud-based web application firewall solution. We chose Radware Cloud WAF Service to protect our critical web applications.
How has it helped my organization?
I would rate Radware Cloud WAF Service's ability to block unknown threats and attacks as nine out of ten.
Radware Cloud WAF Service initially operated in a learning mode for the first week after deployment, gathering data. Once it switched to action mode, we began to experience the service's full benefits.
Cloud WAF has helped reduce our false positives by 20 percent.
We have implemented Cloud WAF in conjunction with Alteon, and we are currently integrating a bot manager and web application DDoS protection. The integration was easy because we were accompanied by Radware.
Cloud WAF has helped free up our IT team for other projects.
What is most valuable?
The most valuable feature of Radware Cloud WAF Service is the visibility into attacks that are being cut off instantly.
What needs improvement?
It would be ideal if Radware could offer a bundled package that includes Cloud WAF, web DDoS protection, bot manager, and Alteon for a more comprehensive security solution.
For how long have I used the solution?
I have been using Radware Cloud WAF Service for two and a half years.
What do I think about the stability of the solution?
Radware Cloud WAF Service is scalable.
What do I think about the scalability of the solution?
Radware Cloud WAF Service met our scaling requirements.
How are customer service and support?
The technical support is great. I have nothing bad to say about them.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial deployment process went smoothly and was completed in three weeks by a five-person team consisting of two representatives from our organization and three from Radware.
What's my experience with pricing, setup cost, and licensing?
The pricing is fair. We pay for what we need.
Which other solutions did I evaluate?
After evaluating Radware Cloud WAF Service against other options and confirming its leading position in Gartner's Magic Quadrant for Web Application Firewalls, we chose it for our web security needs.
What other advice do I have?
I would rate Radware Cloud WAF Service nine out of ten.
No maintenance is required on our end.
Radware Cloud WAF Service does what is expected and reduces the number of attacks on our web applications.