Web Application Security

Wallarm NG WAF is ranked as a “High Performer” by G2, Spring 2021!

We are proud to announce that Wallarm NG WAF was ranked as a “High performer” by G2 in the Web Application Firewall category. This award from the G2 platform confirms that our solution is highly rated by current verified Wallarm WAF users, who left unbiased reviews and answers to WAF-related questions featured in the G2 review form.

To be included in the Web Application Firewalls (WAF) category for G2 reports a product must:

  • Inspect traffic flow at the application level
  • Filter HTTP traffic for web-based applications
  • Block attacks such as SQL injections and cross-site scripting

What do our clients say about us? 

We have 30 new Wallarm WAF reviews from our customers on the G2 platform. You can find some of them below:

“It has a very clean user interface, has a Kubernetes self-hosted option, and is primarily a set it and forget it system.”

“Powerful search capabilities in the events log. A vulnerability scanner is a useful addition to WAF. Convenient UI with all key information on a single dashboard.”

“It has really awesome features like virtual-patching, which has saved our lives several times. Looking forward to the new bot protection functionality.”

“Efficient threat detection with a minimum effort required to support and maintain the product.”

“The best thing I like about the app is the technical assistance from the program team”

“Onboarding speed, effective from day one with false positive drop after tuning”

We want to thank our beloved customers for the positive feedback reviews on G2! If you are already a Wallarm WAF customer, please leave your own review on the G2 platform to highlight your deployment, onboarding and usage experience.

We will do our best to continue to meet the highest requirements of our clients in the future.

About G2

G2 is a leading business solution review website that helps business professionals, investors, and analysts make better purchasing decisions based on satisfaction level of real customers and market presence of the software solutions. Every quarter, G2 highlights the top performing solutions in a given industry.

Recent Posts

The CISO’s Dilemma: How To Scale AI Securely

Your board wants AI. Your developers are building with it. Your budget committee is asking…

4 days ago

Agent-to-Agent Attacks Are Coming: What API Security Teaches Us About Securing AI Systems

AI systems are no longer just isolated models responding to human prompts.  In modern production…

5 days ago

Everyone Knows About Broken Authorization – So Why Does It Still Work for Attackers?

Broken authorization is one of the most widely known API vulnerabilities.  It features in the…

2 weeks ago

From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses

The shadow technology problem is getting worse.  Over the past few years, organizations have scaled…

4 weeks ago

Inside Modern API Attacks: What We Learn from the 2026 API ThreatStats Report

API security has been a growing concern for years. However, while it was always seen…

4 weeks ago

CISO Spotlight: Craig Riddell on Curiosity, Translation, and Why API Security is the New Business Imperative

It’s an unusually cold winter morning in Houston, and Craig Riddell is settling into his…

1 month ago