What is the best alternative to Verisign?
Here’s the Deal
Slant is powered by a community that helps you make informed decisions. Tell us what you’re passionate about to get your personalized feed and help others.
Incapsula has a bot recognition engine to achieve a low rate of false positives on layer 7 attacks. These attacks are notoriously hard to detect as they are designed to look like regular network traffic. Their always-on recognition solution automatically triggers layer 7 protection without user intervention, protecting you during downtimes like holidays, weekends, and late nights. See More
Rules configured through IncapRules are able to instantly propagate to Incapsula's reverse proxy based global network. This is in contrast to DNS based systems that are subject to TTL/DNS cache delays, which slow down the propagation of custom security rules. See More
IncapRules is a full fledged scripting language that gives clients full and detailed control of security policies. The language provides access to dozens of filters for analyzing incoming traffic, including headers, client type, location, access rates, and more. There are also a multitude of trigger responses on how to deal with the filtered traffic, including alerts, captchas, and blocking. See More
Incapsula's proprietary "Behemoth" machines handle 170 Gbps each, and process up to 100 million packets per second. As of March 10th 2015, they have a network of 13 data centers with these machines, allowing them to process more than 2 Tbps of bandwidth on top of their existing capabilities. See More
Https ("secure") comunications with sites using CloudFlare are intercepted at their servers, decrypted and recrypted with CloudFlare's certificates. This poses huge problem with what users perceive as safe communication - browsers fail to display notice about MitM taking place. See More
Log access is an enterprise feature and priced at the "contact us" level. So when an error code is returned to the user that wasn't returned from your app, debugging this is impossible at the pro level. Unfortunately these logs aren't available to support personnel either so they have no way of tracking/validating issues. See More
Cloudflare was able to deflect 2 massive DDoS attacks. During the March 2013 attack on Spamhaus, they were able to absorb a peak 120Gbps attack that lasted 4 days, as well as a 400Gbps attack in February 2014. Their track record shows their ability to protect against DDoS attacks in practice. See More