Best Software for 2025 is now live!
Save to My Lists
Paid
Claimed

Cloudflare Application Security and Performance Features

What are the features of Cloudflare Application Security and Performance?

Content

  • Static Content Caching
  • Dynamic Content Routing
  • Cache purging

Security

  • SSL
  • Custom SSL

Management

  • Dashboard
  • Reports
  • Logs

Integration

  • API
  • CMS Integration

Analysis

  • Logging and Reporting
  • Issue Tracking
  • Security Monitoring

Controls

  • Network Controls

Functionality

  • API / Integrations

Filter for Features

File Management

File Type Support

Supports all required file types including but not limited to: Google Docs, MS Office, images, videos, etc.

Not enough data

Metadata

Automatically adds descriptive metadata like file size and upload date, has standard metadata fields like keywords, and allows the definition of custom fields and vocabulary.

Not enough data

OCR Scanning

Can structure unstructured data through Optical Character Recognition or other automated filing/tagging processes for scanned documents.

Not enough data

Versioning

Keep track of incrementally changing versions of the same file.

Not enough data

Collaboration

Multiple users can collaborate on document creation, annotation, and review.

Not enough data

Document Assembly

Autogenerate documents based on templates and form submission.

Not enough data

Form Creation

Able to create and manage submittable user forms.

Not enough data

Portals and Sites

Able to create user portals and sites.

Not enough data

Disposition

Automatically archive, delete, or revoke access to files that have reached the end of their life cycle.

Not enough data

Search

Can easily find files via a simple and/or advanced search.

Not enough data

Web Interface

Ability to access documents via a web interface without a client being installed on a device.

Not enough data

Mobile Apps

iOS, Android and Windows phone apps provide functionality that enable users to perform the same functions as they would on a PC.

Not enough data

Workflow

Process Automation

Specifying a series of conditions and actions can automate internal processes, is customizable to the complexities of organization's needs and easy to set up and execute.

Not enough data

Conditions

The workflow engine provides relevant and customizable conditions on which to execute rules.

Not enough data

Activities

Any action a user can perform in the system can be specified as an automated action.

Not enough data

Records Management

System provides the necessary tools and fuctionality to maintain evidence of business activites and comply with governmental requirements or industry standards.

Not enough data

Case Management

System provides specialized functionality for bundling structured and unstructured content, automating adaptive, multi-person processes and setting deadlines for open cases. Also, cases can be completed and closed with the associated information stored and auditable.

Not enough data

Platform

Internationalization

Allows organizations multi-national organizations to use tool effectively across multiple languages and currencies.

Not enough data

Performance and Reliability

Software is consistently available (up-time) and allows users to complete tasks quickly because they are not waiting for the software to respond to an action they took.

Not enough data

Reporting and Auditing

Access pre-built and custom reports to monitor user activity and storage.

Not enough data

System of Record Integration

Integrates with other systems of record such as CRM, ERP, Outlook, Sharepoint.

Not enough data

APIs

Enables custom integration to external systems.

Not enough data

Content

Static Content Caching

As reported in 235 Cloudflare Application Security and Performance reviews. Caching of static content at distributed PoPs for faster load times.
92%
(Based on 235 reviews)

Dynamic Content Routing

As reported in 220 Cloudflare Application Security and Performance reviews. Routing of dynamic content for faster load time of dynamic pages.
87%
(Based on 220 reviews)

Cache purging

As reported in 224 Cloudflare Application Security and Performance reviews. The ability to purge the cache from different edge location PoPs.
89%
(Based on 224 reviews)

Security

SSL

Based on 224 Cloudflare Application Security and Performance reviews. Shared SSL certificate.
92%
(Based on 224 reviews)

Custom SSL

Based on 165 Cloudflare Application Security and Performance reviews. SSL certificate that you provide to the CDN software, or is provided for you and is not shared.
86%
(Based on 165 reviews)

Domain Validated SSL

Provides Domain Validated SSL certificates.

Not enough data

Issuance Speed

Issues SSL certificates in a timely manner.

Not enough data

Encryption Strength

Provides at least 128-bit encryption during SSL session.

Not enough data

Extended Validation SSL

Provides Extended Validation SSL certificates.

Not enough data

Organization Validated SSL

Provides Organization Validated SSL certificates.

Not enough data

Management

Dashboard

As reported in 236 Cloudflare Application Security and Performance reviews. An easy to read, often single page, real-time user interface, showing a graphical presentation of the current status and historical trends of an organization's Key Performance Indicators (KPIs) to enable instantaneous and informed decisions to be made at a glance.
91%
(Based on 236 reviews)

Reports

Based on 207 Cloudflare Application Security and Performance reviews. Access pre-built and custom reports.
85%
(Based on 207 reviews)

Logs

As reported in 196 Cloudflare Application Security and Performance reviews. Record of data changes taking place in the software.
84%
(Based on 196 reviews)

IT Alerting

Send summary, update, or actionable alerts to administrators to detail activity.

Not enough data

Network Capacity

Provide control over traffic. Limits access to suspicious visitors and monitors for traffic spikes to prevent overloads like DDoS attacks.

Not enough data

Logging

Information on each incident is stored in databases for user reference and analytics.

Not enough data

API / Integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data

Integration

API

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. This feature was mentioned in 175 Cloudflare Application Security and Performance reviews.
86%
(Based on 175 reviews)

CMS Integration

As reported in 164 Cloudflare Application Security and Performance reviews. Standard integrations for common CMS tools.
86%
(Based on 164 reviews)

Orchestration

Asset Management

Lets users group and organize their endpoints to gather threat intelligence on specific technologies.

Not enough data

Security Workflow Automation

Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information.

Not enough data

Deployment

The process in which users integrate their existing security systems and endpoints to the threat intelligence platform.

Not enough data

Sandboxing

A feature that allows security testing and information gathering to occur in a secure, resource independent environment.

Not enough data

Information

Proactive Alerts

Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered.

Not enough data

Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

Not enough data

Intelligence Reports

The ability for users to produce reports outlining detailed and personalized threat information

Not enough data

Personalization

Endpoint Intelligence

Analysis for users to examine threat intelligence data specific to their endpoint devices.

Not enough data

Security Validation

The product has a recurring examination process to update your intelligence reports as new threats emerge.

Not enough data

Dynamic/Code Analysis

The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities.

Not enough data

Administration

Content Delivery

Caching of static or dynamic content at distributed PoPs for faster load times.

Not enough data

Dashboard & Reporting

Reporting and analytics that report on activity and program effectiveness.

Not enough data

Alerting

Identifies and alerts administrators of threats, issues, incidents and requests related to website security.

Not enough data

Integrations / APIs

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. This feature was mentioned in 13 Cloudflare Application Security and Performance reviews.
90%
(Based on 13 reviews)

Administration Console

Provides Administration tools/console that are easy to use and learn for routine maintenance tasks This feature was mentioned in 15 Cloudflare Application Security and Performance reviews.
92%
(Based on 15 reviews)

Availability Control

Based on 14 Cloudflare Application Security and Performance reviews. Helps administrators ensure applications and information is accessible to users
89%
(Based on 14 reviews)

Traffic Management

Limits access to suspicious visitors and monitors for traffic spikes to prevent overloads like DDoS attacks. This feature was mentioned in 15 Cloudflare Application Security and Performance reviews.
91%
(Based on 15 reviews)

Notifications

Self-monitors important metrics and sends notifications to users in-app or through email, text message or otherwise.

Not enough data

Warranty

Ensures reimbursement in the case of money lost during payment on SSL-secured site.

Not enough data

Server License

Providers may limit the number of servers to which SSL certificates may be issued.

Not enough data

Free Reissues

Allows users to reissue SSL information in the case the private key or certificate is lost.

Not enough data

Whitelisting

The ability to green light a specific Domain or system to bypass the scanning process.

Not enough data

Policy Enforcement

Abilities to set DNS protection policy control standards including whitelisting, blacklisting, and application access.

Not enough data

Incident Reports

Produces reports detailing suspicious activity and anomalies related to networks and endpoints.

Not enough data

Domain Categorization

Allows administrators to group users and devices based on IP, Endpoint, or role.

Not enough data

Multi-Network Management

Allows centralized administration and control of DNS protection and policies across multiple networks.

Not enough data

Risk Analysis

Blacklist and Whitelist

Tracking recipient tagging of domains for blacklists and whitelists.

Not enough data

Vulnerability Assessment

Analyzes your existing website and network to outline access points that can be easily compromised.

Not enough data

Security Auditing

Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices.

Not enough data

Threat Protection

Firewall

Protects websites and web applications from a variety of attacks and malware threats.

Not enough data

DDoS Protection

Protects against distributed denial of service (DDoS) attacks.

Not enough data

Malware Detection

Discovers website and web application malware.

Not enough data

Malware Removal

Facilitates the remediation of website and web application malware.

Not enough data

Protect

Login

Offers multi-factor authentication to better protect information.

Not enough data

Data Injections

Protects application's code from data injections

Not enough data

Code

Ability to protect both byte and binary code

Not enough data

Certificate Exploitation

Protects applications against man-in-the-middle attacks

Not enough data

Advanced Awareness

Offers advance detection of potential risks to your application

Not enough data

Digital Content

Ability to protect a variety of different kinds of data, including digital content

Not enough data

Execute

Environment

Gives users a secure enviornment to access and process sensitive data

Not enough data

Compliance

Ensures applications are in compliance with necessary policies and regulations

Not enough data

Cross-Platform Implementation

Ability to run on any device that has software needing protection

Not enough data

Analysis

Logging and Reporting

Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing. This feature was mentioned in 40 Cloudflare Application Security and Performance reviews.
86%
(Based on 40 reviews)

Issue Tracking

Based on 38 Cloudflare Application Security and Performance reviews. Track issues and manage resolutions.
85%
(Based on 38 reviews)

Security Monitoring

Detects anomalies in functionality, user accessibility, traffic flows, and tampering. This feature was mentioned in 39 Cloudflare Application Security and Performance reviews.
90%
(Based on 39 reviews)

Controls

Application-Layer Controls

As reported in 36 Cloudflare Application Security and Performance reviews. Gives user configurable rules to control requests, protocols and policies.
86%
(Based on 36 reviews)

Traffic Controls

As reported in 37 Cloudflare Application Security and Performance reviews. Limits access to suspicious visitors and monitors for traffic spikes to prevent overloads like DDoS attacks.
88%
(Based on 37 reviews)

Network Controls

Lets users provision networks, deliver content, balance loads, and manage traffic. 40 reviewers of Cloudflare Application Security and Performance have provided feedback on this feature.
89%
(Based on 40 reviews)

Functionality

API / Integrations

API / Integrations 39 reviewers of Cloudflare Application Security and Performance have provided feedback on this feature.
86%
(Based on 39 reviews)

Extensibility

Provides the ability to extend the platform to include additional features and functionalities This feature was mentioned in 37 Cloudflare Application Security and Performance reviews.
89%
(Based on 37 reviews)

Bot Traffic

Control and filter bot traffic.

Not enough data

Multi-Domain Support

Supports SSL encryption across multiple website domains

Not enough data

Browser Support

Supports SSL-secured access across required browser types.

Not enough data

Site Seal

Provides a visual indicator for online privacy status.

Not enough data

AI Features

Utilizes AI for certificate lifecycle management functions.

Not enough data

DNS Lookups

Associate information from various domains to identify associated parties and threats.

Not enough data

Threat Intelligence

Develops domain reputation by gathering contextual information related to web-based threats.

Not enough data

Advanced Traffic Filtering

Allows DNS routing to resolve requests across HTTP or HTTPs requests and/or covers IPv4 and IPv6 protocols.

Not enough data

Certificate Discovery

Automatic discovery of certificates directly from Certificate Authorities, network scanning, and deep discovery methods.

Not enough data

Expiration Monitoring

Monitors and notifies administrators of certificate expiration dates.

Not enough data

Automated Certificate Operations

Automates certificate deployment, renewals, and revocations.

Not enough data

Policy And Role-Based Access Controls

Offers granular permissions for assigning certificate owners and other roles.

Not enough data

Workflow

Offers built-in workflows to assign ownership and management of certificates.

Not enough data

Protocol Support

Offers industry-standard protocols such as CMP, ACME, and SCEP.

Not enough data

Reporting And Search

Offers template and custom reports and search functionality.

Not enough data

Audit And Enforcement

Enforces certificate policies and provides audit trails of user and certificate activities to detect issues.

Not enough data

Key Storage

Allows keys to be stored on end devices, on the platform, or hardware security modules.

Not enough data

Media Delivery

Video Delivery

Live streams audio and video from both teacher and student managed devices 11 reviewers of Cloudflare Application Security and Performance have provided feedback on this feature.
86%
(Based on 11 reviews)

Software Distribution

Allows administrative ability to deploy software, applications, and operating systems across endpoints. 12 reviewers of Cloudflare Application Security and Performance have provided feedback on this feature.
89%
(Based on 12 reviews)

Static Content Caching

Caching of static content at distributed PoPs for faster load times. 16 reviewers of Cloudflare Application Security and Performance have provided feedback on this feature.
93%
(Based on 16 reviews)

Dynamic Content Routing

As reported in 14 Cloudflare Application Security and Performance reviews. Routing of dynamic content for faster load time of dynamic pages.
93%
(Based on 14 reviews)

Security and Performance

Patch Deployment

As reported in 12 Cloudflare Application Security and Performance reviews. Allows users to update programs, fix bugs and patch security flaws remotely.
89%
(Based on 12 reviews)

Monitoring

As reported in 13 Cloudflare Application Security and Performance reviews. Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
94%
(Based on 13 reviews)

Firewall

Protects media, websites and web applications from a variety of attacks and malware threats. This feature was mentioned in 15 Cloudflare Application Security and Performance reviews.
91%
(Based on 15 reviews)

Protection

DNS Protection

Detect and protect against attacks targeting domain name servers.

Not enough data

Website Protection

Detect and protect against attacks targeting websites.

Not enough data

Infrastructure Protection

Detect and protect against attacks targeting on-premise or locally controlled infrastructure.

Not enough data

Quarantine

Blocks malicious website or destination, redirecting the user to a secure page

Not enough data

Continuous Monitoring

Monitors 24/7 to detect anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data

Off-Network Protection

Supports agent-based DNS protection with individual endpoint devices on any network.

Not enough data

Guest Network Protection

Allows DNS filtering and protection for guest WiFi networks.

Not enough data

BYOD Protection

Supports bring-your-own-device (BYOD) users, supporting DNS protection across any device connected to a network or equipped with an agent.

Not enough data

Native DNS over HTTPS (DoH)

“DoH” is a protocol that facilitates DNS resolution via HTTPS. Native DoH functionality facilitates DNS over DoH using local agents to manage DNS requests, extending DoH beyond a single browser or network.

Not enough data

Resolution

Attack Mitigation

Monitors for and rids systems of bots, or other threats suspected of committing unauthorized actions.

Not enough data

Network Monitoring

Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.

Not enough data

Security Monitoring

Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data

Anomoly Detection

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.

Not enough data

Resolution Automation

Diagnoses and resolves incidents without the need for human interaction.

Not enough data

API Management

API Discovery

Detects new and undocumented assets as they enter a network and add them to asset inventory.

Not enough data

API Monitoring

Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data

Reporting

Provides results of the simulation and reveals potential security gaps or vulnerabilitites.

Not enough data

Change Management

Tools to track and implement required security policy changes.

Not enough data

Security Testing

Compliance Monitoring

Monitors data quality and send alerts based on violations or misuse.

Not enough data

API Verification

Allows users to set customizable API verification settings to improve security requirements.

Not enough data

API Testing

Runs pre-scripted security tests without requiring manual work.

Not enough data

Security Management

Security and Policy Enforcement

Abilities to set standards for network, application, and API security risk management.

Not enough data

Anomoly Detection

Constantly monitors activity related to user behavior and compares activity to benchmarked patterns.

Not enough data

Bot Detection

Monitors for and rids systems of bots suspected of committing fraud or abusing applications.

Not enough data

Threat Detection and Protection - Client-Side Protection

Continuous Scanning

Continuously scans websites and applications to detect suspicious activities.

Not enough data

Signature-Based Detection

Performs signature-based detection for known threats.

Not enough data

Threat Protection

Protects against a wide range of client-side threats, including XSS attacks, formjacking, digital skimming, and Magecart exploits.

Not enough data

Risk Prioritization

Prioritizes the script's degree of risk based on its behavior.

Not enough data

Heuristic Analysis

Performs heuristic analysis to identify suspicious behavior.

Not enough data

Data Security - Client-Side Protection

First-Party JavaScript Obfuscation

Obscures first-party Javascript code to make it less readable and harder to understand.

Not enough data

Browser Security

Protects against browser-based attacks (e.g., XSS, CSRF) and bloc malicious scripts.

Not enough data

Encryption

Encrypts data in transit and at rest.

Not enough data

Obfuscation

Offers several obfuscation methods, including polymorphic obfuscation, control flow flattening, code hardening, and virtual-machine based obfuscation.

Not enough data

Data Loss Prevention (DLP)

Monitors and prevents data leakage by blocking destinations that are unknown or have illegitimate parameters.

Not enough data

Third-Party Security

Discovers third-party services automatically and continuously with detailed activity tracking.

Not enough data

Endpoint Security

Protects against endpoint attacks such as ransomware and phishing.

Not enough data

Logging and Monitoring - Client-Side Protection

Event Logging

Logs events for security incidents and policy violations.

Not enough data

Reporting

Provides actionable insights and reports for clear visibility into security incidents, vulnerabilities, and compliance status.

Not enough data

Real-Time Monitoring

Monitors client-side activities in real time.

Not enough data

Usability - Load Balancing

User Interface Design

Provides an intuitive interface for managing configurations and monitoring activity.

Not enough data

Setup Simplicity

Simplifies the setup process with clear instructions and minimal technical effort.

Not enough data

Platform Integration

Integrates seamlessly with cloud, on-premises, and hybrid environments.

Not enough data

Container Support

Works effectively with containerized applications and orchestration platforms like Kubernetes.

Not enough data

Performance Optimization - Load Balancing

Global Load Balancing

Distributes traffic across multiple data centers or regions to optimize performance.

Not enough data

Dynamic Resource Allocation

Adjusts resources automatically to handle traffic spikes efficiently.

Not enough data

Server Health Monitoring

Continuously monitors server availability to prevent routing to unresponsive systems.

Not enough data

Disaster Recovery

Restores operations quickly and effectively after failures or disruptions.

Not enough data

Security & Compliance - Load Balancing

SSL/TLS Termination

Efficiently manages encryption and decryption of traffic to secure data in transit.

Not enough data

Application Firewall Integration

Supports integration with web application firewalls (WAF) for additional protection against vulnerabilities.

Not enough data

DDoS Mitigation

Protects against Distributed Denial of Service (DDoS) attacks to maintain service availability.

Not enough data

Access Control

Provides mechanisms to restrict unauthorized access and manage user or system permissions.

Not enough data

IP Whitelisting/Blacklisting

Controls traffic by allowing or blocking specific IP addresses to enhance security.

Not enough data