Try our new research platform with insights from 80,000+ expert users
PeerSpot user
Business process Advisor for RTP at a energy/utilities company with 10,001+ employees
Real User
Several issues related to their services highlight that it may be better to stay free and handle your DDoS protection yourself.

Subscribing to Cloudflare (from its website) means changing your nameserver IPs and your web server IPs. 

Many people don't understand issues related to using the Cloudflare service:

Those people who want to hide:

In fact, Cloudflare is used by many people who want to hide the IP of their web servers from local authorities, governments or customers. That's why the Russian government threatens to block all the websites hosted on Cloudflare. Cloudflare at some point didn't cooperate with the Russian authorities and refused to provide the real web servers IP behind Cloudflare who violated the Russian law. 

http://rkn.gov.ru/news/rsoc/news24880.htm

Article in english

As governments become more and more efficient at blocking websites, we may see in the future this kind of issue coming back in other parts of the world. I will not talk about the moral aspect of it but from an IT decision maker point of view. If you have a clean website on one IP from Cloudflare you may suffer from a government decision to block the Cloudflare IP ranges which are public on the Cloudflare website.

 Bad neighborhood:

Subscribing to the free Cloudflare service means getting a new IP address for your server. It is very much like migrating your website to a shared hosting website since many other websites that use Cloudflare also use the same IP address than you. Since the Cloudflare service is open to everybody several of those websites can be spammy. In SEO, this is what we call bad neighborhood. 

You grant all powers to Cloudflare:

Since you use the nameserver from Cloudflare and a Proxy IP from Cloudflare, Cloudflare is the almighty who can do everything. They can stop access to your website. They can slow down access to your website too. They can inject code inside the code of your webpage thanks to the proxy. By the past, the app. smarterrors was a feature that was on when subscribing to Cloudflare. This feature replaced your 404 page by Cloudflare 404 page. So, in this case, it was the crème de la crème in terms of power delegation. They replaced your own pages with their own pages. 

Also, they can spy on everything that the visitors send in clear to your web server. At the end, it is worth than giving your house keys to the NSA. 

One more weak point:

if for some reasons the Cloudflare service is down, your website is also down. Are Cloudflare benefits offsetting this plausible scenario? From time to time, you may see an error 522 issued from Cloudflare when your website isn't available. In this case, you aren't able to know whether the issue come from Cloudflare or whether it comes from your web server. 

Even if the downtime is short, on a yearly basis downtimes related to Cloudflare can be significant for online businesses.

Ddos protection:

Unfortunately, the DDoS protection service of Cloudflare is unclear. It is only a drop down menu defining the level of protection but it does not say anything. On the other hand, there are Anti DDoS techniques that are published and used to face DDoS attacks from a firewall. By the way, and unfortunately, i have seen a website that has been taken down with a DDoS attack even if they used Cloudflare. 

The Pros:

From a technical point of view, Cloudflare is the best CDN. The IP addresses from their network have very good reputation. They are considered generic for Google rather than country specific. Also, their free service is pretty reliable for a free proxy. 

It is also a DNS server free service:

Since Cloudflare is also DNS free service, it is possible to minimize the pressure on your own DNS server and use cloudflare as a DNS server since it is possible to put the cloudflare nameservers on behalf of your nameservers. 

Conclusion:

Even if they provide good services from a technical point of view, the different issues related to the Cloudflare network model highlight that it may be better to stay free and have a longer ping & handling your DDoS protection yourself rather than giving everything to Cloudflare.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user350283 - PeerSpot reviewer
it_user350283Regional Account Manager - Technology Evangelist at a tech vendor with 51-200 employees
Vendor

Devon, thank you for the great insight and facts.

-MG

See all 4 comments
it_user279867 - PeerSpot reviewer
Shift Lead with 501-1,000 employees
MSP
With data centers in Germany and the Netherlands, our sites render quickly for our EU customers, but the load times aren't as quick for our customers outside the EU, like those in Asia.

What is most valuable?

Highly-configurable caching options is what sells this product. Having CloudFlare properly render every page has reduced load times, bandwidth usage, and, most importantly, our server's load. Reducing the load meant we were able to get rid of several PHP/Apache caching modules that consumed a great deal of resources that do the same, if not, a less efficient job.

How has it helped my organization?

CloudFlare has positively improved my site's speed, performance and security. Also, having servers with data centers located in Germany and the Netherlands, it worked great for our EU customers. However, we couldn't exactly deliver the same load times for clients located outside of EU, for example in Asia. Having our websites cached with CloudFlare's servers all over the world, this is no longer an issue.

What needs improvement?

I have found CloudFlare's support to be unresponsive at times, and not very helpful with providing technical details for issues that we have reported over the years.

For how long have I used the solution?

We've been using it for around two years with its cPanel plugin.
.

What do I think about the stability of the solution?

Luckily, we haven't encountered any issues with stability so far. In fact, it has increased our uptime since it wasn't unusual for us to deal with DoS/DDoS attacks on a weekly basis.

What do I think about the scalability of the solution?

Since we are on the same plan since the first day we started with CloudFlare, we haven't had much experience with scalability.

How are customer service and technical support?

Customer Service:

Since customer service goes hand in hand with technical support, I'm afraid we haven't experienced their representatives going above and beyond in terms of:

  • Responses within the SLA
  • Not using predefined answers for issues that were somewhat "unique"
Technical Support:

I have found CloudFlare's support to be unresponsive at times, and not very helpful with providing technical details for issues that we reported over the years.

Which solution did I use previously and why did I switch?

We haven't used CDN networks, but we experimented with Varnish, xCache, Gzip, eAccelerator and other PHP/Apache caching solutions. Since they weren't very configurable (except for Varnish), CloudFlare has provided a much better solution, allowing us to move away from running multiple caching instances on our local servers.

How was the initial setup?

With every service out there, there will be hiccups every now, and then but as far as the deployment goes Cloudflare is extremely simple to implement. It is a low-risk solution since we can manipulate which DNS zones get cached and which don't. In case there's any trouble, we can disable CloudFlare, and switch to our local DNS in less than a couple of minutes.

Setting up CloudFlare is an easy gig. The only issue you might encounter is having your domain registered through a vendor that doesn't allow direct name-server manipulation.
For example, Enom resellers are known to have their domain control interface completely locked, so you have to rely on their support to handle this for you. If their support team has an issue with handling requests within the SLA - you have a problem.

What about the implementation team?

Fortunately, we implemented this directly through CloudFlare as we like to avoid third party resellers whenever possible.

What was our ROI?

Having several sites that sell products, our primary concern is:

  • Content deliverability
  • High availability
  • Fast response times

Since CloudFlare provided a solution for all the above, which indirectly affects and improves our business, our ROI has greatly increased.

What's my experience with pricing, setup cost, and licensing?

The fact that CloudFlare offers a free solution, which is more than enough if you're running a low-medium traffic is just amazing. As far the pricing goes, although it's a bit pricey, it offers great value if you're running your entire business online. Content optimization and delivery is key, and CloudFlare does a great job on providing that.

Which other solutions did I evaluate?

CloudFlare was the first CDN we used, and luckily, we haven't been given a reason to use another solution. In the past, we used server-based software, caching modules, etc.

What other advice do I have?

Since it's a low-risk implementation, I encourage all users that have issues with their response times, occasional DOS attacks and page rendering to give CloudFlare a go.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Cloudflare
September 2025
Learn what your peers think about Cloudflare. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
PeerSpot user
Co Founder at a tech services company with 51-200 employees
Real User
Basic security matters are handled automatically, although it can be bypassed easily by an attacker with knowledge of your main IP address.

What is most valuable?

The most important feature is that they handle the basics of security matters automatically.

How has it helped my organization?

Honestly the product has not really improved the way of my organisation. I just let the product take care of my security in term of networking attacks, but this is not a magic product. You still have to take care of other security matters which are important in network administration.

What needs improvement?

The only thing that I think about is that CloudFlare supercharges your website, as your dedicated IP is covered behind their server. Then, if you are a target of a network attack, they will handle the traffic, and the load, then mitigate the attack. However, depending on how your network system is built if, by any chance, your main IP address is seen by attackers they can easily bypass Cloudflare and directly target your server. In that case, you need to add extra filtering directly onto your dedicated server to avoid breaches out of CloudFlare cover, or add extra anti-DDOS solutions directly onto your dedicated server.

For how long have I used the solution?

I've used this solution for one year. Unfortunately, I'll stop it this month as, rather than being unsatisfied, my needs have changed, and my website no has longer the same traffic. I think that I can (as a System Administrator) handle the security side without it for a while.

What was my experience with deployment of the solution?

Yes I did at the beginning, since I did not understand properly how to install the solution on my NGINX servers. I guess it was a lack of knowledges, but also a problem of speed, since I had to implement the solution in a chaotic atmosphere, since I was under attack at the time and had never faced this before, so I was not prepared.

What do I think about the stability of the solution?

I have not encountered any issues with CloudFlare so far. The solution has worked pretty well, but there are a couple of things which are linked to a webserver environment (NGINX in my case) that you have to be careful about when setting up. Otherwise, you may get some errors, but once the webserver is installed with CloudFlare, it should work like a charm.

What do I think about the scalability of the solution?

Scalability is not a problem for CloudFlare since they are a cloud based solution. I think I had the biggest year for my service in 2014, in terms of traffic. My website was spread over two servers, with CloudFlare on top of them, and everything went well.

How are customer service and technical support?

Customer Service:

9/10. I did not really have the opportunity to use their service as a free user. However, when you are a paying user at CloudFlare, they will answer you very quickly, and with accurate answers. I did contact them on a few occasions, and they gave me good answers.

Technical Support:

9/10. I did not really have the opportunity to use their service as a free user. However, when you are a paying user at CloudFlare, they will answer you very quickly, and with accurate answers. I did contact them on a few occasions, and they gave me good answers.

Which solution did I use previously and why did I switch?

I did not, perhaps I had to, in order to be a little bit more objective about this kind of product, but since I implemented CloudFlare, I have been happy with them.

How was the initial setup?

I'll say that you have to be used to managed webservers such as Apache or NGINX. It's pretty straightforward, but you have to take care with some configuration details. If you do it incorrectly, it could make your website temporarily unavailable sometimes.

What was our ROI?

I first paid for the Business plan, which was 200$/month for the first month when I had those big issues with DDOS. Then I went to the 20$/month plan. In other words, I spent about 400$ more or less on the product. I have not had a DDOS attack, since, or at least not become unavailable due to DDOS which means my ROI is pretty good. I mean when your website is offline, you first lose money like daily revenue, around 400$ for us, but you also lose your customer loyalty, and there are many more issues. No matters what's going on (attacks or not) a website must be online at all time.

What's my experience with pricing, setup cost, and licensing?

In my opinion the Pro plan 20$/month is the best solution. It includes the core features of CloudFlare which is pretty much enough. If you do not have SSL, you can also use the free plan, which is almost exactly the same as Pro, just without the SSL support. The free plan has SSL support, but it does only support modern web browsers. This means that some of your customers may not reach your website if you are using SSL with a free plan.

Which other solutions did I evaluate?

I did not evaluate other options.

What other advice do I have?

Prepare your implementation while making tests in a pre-production environment. Do not let CloudFlare take care of everything, you still have to take care of security matters for your services.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
IT Consultant, Business Owner, Lecturer at a tech consulting company with 10,001+ employees
Real User
It improved the speed of my site significantly, reducing the page loading times to appropriate levels, but there were a few times when some of their CDN nodes would fail.

What is most valuable?

  1. CDN
  2. Security

How has it helped my organization?

One of my projects, ancient-origins.net, gets 3 million views per month, so serving the page fast is an important element. Using the CDN of Cloudflare improved the speed significantly, reducing the page loading times to appropriate levels. Additionally their security features make sure to block attacks on our site.

What needs improvement?

Their CDN features, although good, still lack in speed in comparison to their competitors (e.g. Incapsula, MaxCDN, etc.).

For how long have I used the solution?

I've been using it for almost one year.

What was my experience with deployment of the solution?

No issues with the deployment. Their process is pretty simple and fast.

What do I think about the stability of the solution?

Yes, there were a few times when some of their CDN nodes would fail, creating serious speed issues with the site without any warning or notification from their side. Also, many times, even if our server is working properly, Cloudflare would report it as being down.

What do I think about the scalability of the solution?

No scalability issues so far.

How are customer service and technical support?

Customer Service:

I would give them a 9/10. They respond pretty fast to requests.

Technical Support:

I would give an 8/10 to their technical support. We haven’t had many issues, but when we do, it appears that sometimes they are not willing to look deeper into them to try and find a solution.

Which solution did I use previously and why did I switch?

We used MaxCDN, but we switched to Cloudflare because MaxCDN lacks security features.

How was the initial setup?

The initial setup is pretty straightforward and doesn’t require any technical knowledge, since everything is done on their site.

What about the implementation team?

The implementation was done in-house, since it is a simple process.

What was our ROI?

This is difficult to calculate; however, improving the page loading speed always impacts the traffic on a site positively.

What's my experience with pricing, setup cost, and licensing?

The original setup cost was zero, and the monthly cost is around $30 for three sites using the Business Cloudflare plan.

Which other solutions did I evaluate?

We evaluated MaxCDN and Incapsula.

What other advice do I have?

If your budget is low, then Cloudflare is the only cost effective solution, at least to begin with. The best combination of CDN and security features at a low price. At a slightly higher budget, Incapsula may be a better solution especially since they provide a faster CDN and better security features.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user242517 - PeerSpot reviewer
Information Security Consultant at a tech services company with 51-200 employees
Consultant
It is an incredibly advanced content delivery network, however, it has the non-strict version of Full SSL.

CloudFlare is an incredibly advanced content delivery network (CDN) that offers boosts to the security and performance of your site. They act as a reverse proxy and shield your web server from exposure to the wider Internet. You get huge bandwidth savings and a reduction in the resources consumed on your server, so why have I just decided to 'go it alone'?

Introduction

CloudFlare launched their beta in June 2010 and very soon after they followed with their official launch in September of the same year. Their free accounts come with many of the great features they offer and their blog makes for some really interesting reading. This all sounds like a match made in heaven but I recently found myself faced with the tough decision of leaving CloudFlare and losing their support. This meant having my domain name resolve directly to the IP of my server. Whilst that may sound like a totally normal prospect for most, after you've enjoyed the protection and security of having someone act as your doorman, it's a slightly daunting prospect. Not only would I lose their security, but I'd also be subjecting my server to the full force of any traffic aimed at my domain name.

A Brief Overview

Because CloudFlare act as a reverse proxy, a user's browser connects to the CloudFlare servers which then request the content from the host server on behalf of the user. This puts CloudFlare directly between you and your visitors, allowing them to cache content and protect your server by not allowing users to connect directly to it. This is fine when the site is loading over http but when you want to start loading over https, it brings up a few problems. There isn't really a requirement as such for me to serve content over https, I don't have user logins and the site doesn't serve sensitive or confidential data. For me, it was mainly about the learning process and showing that it can be done for free. If you head over to StartSSL and pick up one of their free SSL/TLS certificates, it will bear your domain name. This immediately presents a problem when the browser is not connecting to your server when a user enters that domain name into the address bar. Now, CloudFlare offer different solutions to this problem depending on which type of account you have. Their free accounts do not support any form of SSL, you have to step up to at least a Pro account ($20 a month) to get SSL support. At the Pro level, the account I used to have, you can enable SSL support and take advantage of the benefits of CloudFlare but serve over https instead.

Flexible SSL

Once you're on a paid account plan, you can enable SSL on your site with a single click thanks to CloudFlare's Flexible SSL. The CloudFlare servers present their own SSL certificate to the user so that the transfer of information between them is encrypted. From here, as the data travels from CloudFlare to the hosting server, you can use your standard SSL certificate issued by a CA, a self signed certificate, or, worryingly, nothing.

Once I started investigating the upgrade to a paid plan so that I could get SSL support, I was startled at the prospect of Flexible SSL. Here, we have a solution that seems to break two of the key principles of implementing SSL/TLS. When we visit a site and see https in the address bar, I think it's fair to say there are some assumptions that we could generally make and should be able to make. The SSL certificate assures us that the site we are connected to is the site we typed in the address bar, and that our traffic is encrypted during transmission to that site. Flexible SSL seems to break both of these principles. The certificate that is issued belongs to CloudFlare and not the site you're trying to connect to, and traffic on the other side of CloudFlare between their network and the host site is not encrypted. There is of course the option to move to Full SSL, you can even use a self signed certificate between CloudFlare and the host, but I imagine there are sites out there that don't. The ability to present your site over https when the full route is not encrypted seems to be a breach of the trust that the user places on the indications their browser is giving them. There is the argument that encrypting part of the transport layer is better than encrypting none of it. Anyone between the user and their nearest CloudFlare server, like an attacker on a local network or even their ISP or government, wouldn't be able to access their traffic, but after the CloudFlare server it's back into the wild without any protection. Given that it's really easy to create your own self signed certificate, or you can get a free one from StartSSL, I just can't see the requirement for Flexible SSL. The benefits of encrypting the first leg of the transport layer are far outweighed by the detriment of giving false impressions on securely transmitting data. If you're on a shared hosting plan that would be costly to upgrade to SSL support, or don't know how or can't implement it on your server, Flexible SSL is nothing more than an illusion of security that you're presenting to your visitors.

Full SSL

If you want to ensure that data is always encrypted whilst it's being transported, you need to enable Full SSL, which requires SSL on the host server. As I've mentioned, you don't need to pay for a certificate as you can use a self signed certificate or get one from StartSSL. Once that's installed and you enable Full SSL, CloudFlare will only communicate with the host using a secure transport layer.

Now we're up and running, all traffic will be encrypted during transit. Problem solved, right? Well, even though I was using Full SSL, I still had my concerns. Whilst CloudFlare are a trusted party in all of this, I didn't feel comfortable with the idea of having a man in the middle of my secure transport layer. That, and the certificate being issued to the browser still carried someone else's name. For most users, when you connect to a site and see https in the address bar, I think it's fair to say there would be an expectation they were talking to me, directly. Not only that, but there is still a point in the transport layer where data isn't encrypted, inside CloudFlare. I think CloudFlare apps are a prime example of this, allowing the ability to inject Google Analytics code into your pages for example. I want to be clear that this isn't a criticism of CloudFlare, the services they offer are fantastic, I just have my reservations when it comes to running your secure transport layer through a third party. For a site that loads over http no one can have a realistic expectation that someone else hasn't seen or altered your traffic during transit. The other problem with this is that CloudFlare never used to validate the certificate between them and the host. It would accept any certificate and go with it.

Full SSL (Strict)

The lack of certificate validation has been recently resolved with a new feature announced by CloudFlare, Full SSL (Strict). This means CloudFlare will now validate the certificate presented by the host server. This came as quite a surprise to me as I was already using a valid certificate so just assumed that it was being validated and accepted by CloudFlare. As it turns out, I could have literally used just about any certificate I'd liked and it would have worked just fine. Not only that, but anyone could MiTM my perfectly valid SSL certificate, swap it out, and CloudFlare would have been just as happy. To me, their blog post should be more along the lines of 'we now do SSL properly' than 'hey we added a new feature'. Connecting to a host securely and then not validating the certificate means that you're not connecting to the host securely. If there was some way to pin a self signed cert in the CloudFlare control panel, this option would be perfectly acceptable, which is what I expected you should have to do if using a self signed certificate. As it turns out, there is no such option. Worryingly, the non-strict version of Full SSL will remain. CloudFlare are going to automatically switch everyone with a valid certificate to Full SSL (Strict), but for those that don't read the CloudFlare blog, I wonder if they will ever find out.

Business And Enterprise Accounts

It is possible to get around the issue of serving your visitors a CloudFlare issued SSL certificate by upgrading to a Business or even Enterprise account. Starting at $200 a month for the Business account, or an average $5,000 a month for Enterprise accounts, you can upload your own certificate and private key to CloudFlare. Whilst your visitors are now being served with your own SSL certificate, I can't see the benefit this brings. The user, much like with the Flexible SSL option, is now under the impression that they're communicating with you directly and securely. Even if they check the certificate, they will see that it is issued to your domain and have no reason to suspect that their traffic isn't travelling directly to the host before being decrypted. To set this up requires the disclosure of your private key, something that in itself should highlight the kind of breach to transport layer security this causes.

The Aftermath

One of my biggest concerns with coming out from behind CloudFlare was the impact it would have on my server. I'm currently using DigitalOcean (referral link) to host my blog and with the ability to rapidly scale the hardware capabilities of my VPS, I cautiously flipped the switch. Within the first hour it was immediately clear just how much of the demand on your resources CloudFlare can alleviate. I saw jumps in traffic at the network interface and CPU utilisation as soon as I hit the button. Whilst none of these increases were enough to cause any worries, it does provide evidence for the claims CloudFlare make about just how much they can save you in resource terms. At almost double the average daily bandwidth usage, I can say that CloudFlare were saving me about 45% of the bandwidth used by traffic hitting my site. This is from both their efforts in caching my content and serving it on my behalf, and traffic that they will have dropped and not allowed through based on it appearing malicious. I'm also seeing average CPU loads approaching double what they were, but still only falling well within the single digit range. As it turns out, my VPS is perfectly capable of handling the regular traffic my blog gets but I am still acutely aware of the greater exposure I now face. That being said, I feel the value of honouring the core principles of SSL/TLS to be worthwhile.

Conclusion

I know I mentioned it earlier, but I wanted to be clear that this isn't a complaint about CloudFlare. I still use CloudFlare to resolve my DNS queries as they run one of the fastest DNS services around. Thanks for that guys! Their free account offers an awful lot of functionality and savings alone, before you get on to the minimal $20 a month for a Pro account which comes with it's own great list of features. If you're hosting a site that serves content over http it's really a no brainer as to whether or not you should make use of a free CloudFlare account. If you're hosting a huge amount of content there's little reason not to use them. My only real problem comes with the introduction of SSL/TLS and the unavoidable requirement to have a man in the middle of your secure connection. If you truly have a requirement for a secure transport layer I have to question the sanity of breaking the chain of custody of your data.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user242514 - PeerSpot reviewer
Owner/Developer at a marketing services firm with 51-200 employees
Vendor
I needed to do something differently because we were getting hacked often.

I’ve been with CloudFlare for a year and a half at the time of writing this post and realized that I never gave it a review of any kind. What kind of terrible person am I?

I worked for a couple a few years ago who was using a content management system called Joomla to build their clients’ sites. We would launch a site by simply pointing the DNS settings to our servers and calling it good.

Then we started getting hacked. A lot.

With the number of sites we had on our server, the exploits found in the plugins being used, as well as poor server practices, we had a huge target on our chest.

A while later I decided to leave to company to go on to do other things. One of those things was to open my own web development and hosting shop.

First things first: Get away from Joomla.

Next: Learn WordPress.

Now let’s get a server setup.

The first thing I did when I got my server setup was make sure that no one was allowed to host on my server unless we ran all of the DNS through CloudFlare. No exceptions.

A couple of things I noticed when I got all this in place:

  • My sites ran faster
  • My server load was lower

Most importantly: My sites never got hacked (fingers crossed).

I attribute the latter to a couple of things, but mostly I would like to think that CloudFlare had a huge part in that. If you don’t know what CloudFlare is, watch their promotional video.

Here’s some other cool stuff about this site from the last 30 days:

  • CloudFlare saved me more than 54,000 server requests
  • Cloudflare saved me more than 600 MB of bandwidth
  • Cloudflare blocked 50 threats to my site

And how much do I pay for CloudFlare? Nothing.

That’s pretty amazing stuff! I didn’t have to pay anything for better website security and reduced server load.

If you’re looking for the same, be sure to go get signed up at CloudFlare. It’s easy to setup and the results speak for themselves.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user241758 - PeerSpot reviewer
Systems Engineer at a tech services company with 51-200 employees
Consultant
It allows us to deploy websites using less hardware but more insight into analytics and threats would be a good.

What is most valuable?

The aggressive caching and DDOS mitigation are the most valuable features offered by Cloudflare. Website traffic analytics and threat insights are also very useful.

How has it helped my organization?

Utilizing Cloudflare allows us to deploy websites using less hardware due to their caching and helps us serve pages to our customers more quickly and efficiently.

What needs improvement?

More insight into analytics and threats would be a good place to start improving cloudflare. Also less 501 and 504 errors would be good too.

For how long have I used the solution?

I've used Cloudflare since 2012 and am currently using the latest version. I've utilized it with several different websites successfully.

What was my experience with deployment of the solution?

No issues encountered.

What do I think about the stability of the solution?

Only the occasional network issues, some in 2013, where all Cloudflare customers were affected, but much less lately.

What do I think about the scalability of the solution?

No issues encountered.

How are customer service and technical support?

Customer Service:

Good, as the few times I've required customer service, it was more technical but they were always helpful in directing me to the people I needed to speak to.

Technical Support:

Excellent. The representatives are knowledgeable and online documentation is great.

Which solution did I use previously and why did I switch?

Cloudflare was the first service of this type I've used.

How was the initial setup?

It was very easy to get setup on Cloudflare. They have made it even easier recently, and all that needs to be done is to enter your DNS records into their interface and the configuration is done.

What about the implementation team?

We implemented it in-house.

What's my experience with pricing, setup cost, and licensing?

Setup cost was zero and currently we are using the $20 a month plan. I've used the business tier in the past which costs $200 a month.

Which other solutions did I evaluate?

I don't know of other vendors who offer a comparable service.

What other advice do I have?

I would recommend that you use it. It has been very useful and well worth the cost to me over the last three years.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
CEO with 51-200 employees
Vendor
Very fast, very secure and easy to work with

Valuable Features:

The speed improvements / CDN caching / Railgun.

Improvements to My Organization:

Because our website is blazing fast it improves our conversion rates.

Use of Solution:

More than one year

Stability Issues:

We experienced some downtime in the fall of 2013, causing us to switch to Incapsula. That was a bad decision, because Incapsula is much slower.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Cloudflare Report and get advice and tips from experienced pros sharing their opinions.
Updated: September 2025
Buyer's Guide
Download our free Cloudflare Report and get advice and tips from experienced pros sharing their opinions.