Web Application Security

Wallarm NG WAF is ranked as a “High Performer” by G2, Spring 2021!

We are proud to announce that Wallarm NG WAF was ranked as a “High performer” by G2 in the Web Application Firewall category. This award from the G2 platform confirms that our solution is highly rated by current verified Wallarm WAF users, who left unbiased reviews and answers to WAF-related questions featured in the G2 review form.

To be included in the Web Application Firewalls (WAF) category for G2 reports a product must:

  • Inspect traffic flow at the application level
  • Filter HTTP traffic for web-based applications
  • Block attacks such as SQL injections and cross-site scripting

What do our clients say about us? 

We have 30 new Wallarm WAF reviews from our customers on the G2 platform. You can find some of them below:

“It has a very clean user interface, has a Kubernetes self-hosted option, and is primarily a set it and forget it system.”

“Powerful search capabilities in the events log. A vulnerability scanner is a useful addition to WAF. Convenient UI with all key information on a single dashboard.”

“It has really awesome features like virtual-patching, which has saved our lives several times. Looking forward to the new bot protection functionality.”

“Efficient threat detection with a minimum effort required to support and maintain the product.”

“The best thing I like about the app is the technical assistance from the program team”

“Onboarding speed, effective from day one with false positive drop after tuning”

We want to thank our beloved customers for the positive feedback reviews on G2! If you are already a Wallarm WAF customer, please leave your own review on the G2 platform to highlight your deployment, onboarding and usage experience.

We will do our best to continue to meet the highest requirements of our clients in the future.

About G2

G2 is a leading business solution review website that helps business professionals, investors, and analysts make better purchasing decisions based on satisfaction level of real customers and market presence of the software solutions. Every quarter, G2 highlights the top performing solutions in a given industry.

Recent Posts

From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses

The shadow technology problem is getting worse.  Over the past few years, organizations have scaled…

4 days ago

Inside Modern API Attacks: What We Learn from the 2026 API ThreatStats Report

API security has been a growing concern for years. However, while it was always seen…

5 days ago

CISO Spotlight: Craig Riddell on Curiosity, Translation, and Why API Security is the New Business Imperative

It’s an unusually cold winter morning in Houston, and Craig Riddell is settling into his…

2 weeks ago

The Myth of “Known APIs”: Why Inventory-First Security Models Are Already Obsolete

You probably think the security mantra “you can’t protect what you don’t know about” is…

2 weeks ago

Why API Security Is No Longer an AppSec Problem – And What Security Leaders Must Do Instead

APIs are one of the most important technologies in digital business ecosystems. And yet, the…

3 weeks ago

7 Reasons to Get Certified in API Security

API security is becoming more important by the day and skilled practitioners are in high…

1 month ago