Cloudflare, from the company of the same name in San Francisco, provides DDoS and bot mitigation security for business domains, as well as a content delivery network (CDN) and web application firewall (WAF).
$20
per month
Oracle Dyn Managed DNS
Score 8.8 out of 10
Mid-Size Companies (51-1,000 employees)
Oracle Dyn DNS (domain name system) is an infrastructure-as-a-service that is touted by Oracle Dyne as one of the highest performance global networks existent. It is available as a managed DNS with secondary DNS available for more reliable business continuity on higher service tiers.
I view GoDaddy and Oracle Dyn as two ends of the spectrum. In full disclosure I'm a former employee at Dyn. GoDaddy DNS comes free with our domains and is nice and basic. A bit harder to use than CloudFlare, though. Dyn is fantastic but more than we need for a basic site. Plus …
We used CloudFlare for one of our domains because of their CDN. It also handled re-directs and the other usual DNS tasks. UltraDNS was the provider we used for a short time before Dyn. I didn't manage it, so I can't compare.
I love both services, but for my personal use, I still like CloudFlare because of their SSL service and interface. In terms of managed DNS features, I don't notice a difference in features. My company uses Dyn, and I have no issues at all with it. It still serves our specific …
Dyn provided faster lookup times or more granular georouting than the other providers, also previous experience with Dyn in emergency situation make us appreciate their quick response times.
Oracle Dyn Managed DNS is an enterprise solution for when speed and high availability combined with a lot of records/domains is important. It stacks up against the competition well in that regard. Others have a pretty and more intuitive interface and better pricing packages. …
We've had cases where our company was under cyber attack and received phising emails which contained links to malicious and credential stealing websites, impersonating trusted pages, or hosting malicious files to be downloaded. These malicious links were all blocked 95% of the time due to various methods used by CF to detect malicious pages and/or content. We have had a few minor cases where legit pages were blocked, but this was mainly due to domain age, and pages/domains created specifically for joint ventures or projects.
Oracle managed DNS becomes very heavy when there is an ample amount of DNS being managed. However, the DNS creation and updating takes very less time to propagate and is very easy to use. So, for an organization, where there is a modest amount of DNS to manage, it works very well and gives a splendid experience. So, considering the complexity of managing the DNS for an IT company Oracle Dyn managed DNS is the best option to opt.
DNS is quick to set up and seems to propagate quicker than other DNS name servers. Page rules are very convenient for quickly setting up redirects with wildcards.
Setting up a proxy with Cloudflare Workers for my API, which runs on Google Cloud Functions was much simpler than any solution I came across using Google Cloud Platform itself. It also doesn't cost us a lot of money for this use case.
Web Analytics are privacy-focused, so it is nice to get insights into our application without worrying about the data being sold. The interface is very clean. I like being able to query page views by bot score, to see how many bots are viewing pages compared to actual users. Querying this data is also very quick and simple when compared to Google Analytics API.
More responsive sales team to provide relevant QBRs to ensure proper and best practice use of the product/platform
Integration of the Dyn ECT Managed DNS with Dyn Domain Registration would be a nice feature as currently I have to manage two consoles and billing accounts.
Cloudflare features are an integral part of my website, as of now I can’t think about doing without it. It would require an unimaginable time and effort to find and implement alternatives for every feature, considered how large and diverse Cloudflare feature set is
Everything is extremely concise and all settings apply immediately and take effect globally. There is no reason to explicitly plan/think in terms of individual regions as one would have to traditional cloud offerings (AWS, OCI, Azure). All Cloudflare products integrate seamless as part of a single pipeline that executes from request to response.
This is the only real gripe we have with Dyn; their web-UI can be remarkably painful to use. In the "simple" editor, DNS records are arranged in a kind of "node" view, where each record is a node and any records of the same name or longer (i.e. all records called "record.example.com" or "other.record.example.com") fall under it. This creates an odd sort of hierarchical view that's not really representative of the zone file. The "expert" editor doesn't have an actual delete button, just a checkbox. If you want to update conflicting record types (for example, replacing an A record with a CNAME) you have to check the box for the record being deleted, save changes, create the new record, save changes, and finally publish changes. Dyn uses a publish model for changes, where all changes you make are staged and can be reverted or published all at once. This is fine, except that the publish/revert dialog is in a different page. This is nice when you have many changes, but very annoying when you're changing just one or two records across multiple zones. These are relatively minor issues in an otherwise good platform; annoyances more than deal breakers.
Because of Cloudflare Zero trust network security services, Cloudflare Zero Trust Network Access (ZTNA) is the technology that makes it possible to implement a Zero Trust security model. "Zero Trust" is an IT security model that assumes threats are present both inside and outside a network. Consequently, Zero Trust requires strict verification for every user and every device before authorizing them to access internal resources.
The support team at Dyn has always been very helpful and have tried to answer our questions to the best of their knowledge. We have never had any issues from support tickets and they are often resolved in a few hours
All except the greatest DDoS attempts are stopped by Cloudflare's security. Cloudflare is a worldwide cloud network that can safeguard and speed up any website. Cloudflare is ahead of the competition because of its global reach and cutting-edge tools for speeding up and optimizing both static and dynamic web traffic.
We use both Oracle Dyn Managed DNS and Amazon Route 53. We like having our main DNS provider outside our cloud provider in case there's an issue with Amazon and we need to point things somewhere else temporarily. But for all the smaller stuff and internal stuff, we use Route 53 successfully.
It has allow us to use the free plan in several small sites
For medium/big sizes, the plans they offer adjust properly to the needs we require; saving money and making the most of the spent one
Considering we manage several clients; we were able to centralize all of our client's accounts in our own; allowing us to save time in their management and giving them the security that we will only access the parts they require us to access
For the law firm its being used for, it keeps their remote users working. For law firms, time is money, usually every 15 minutes lost can be a big deal to them.
Sometimes it has switched when its not supposed to, and causes downtime. No real way to inform users when the switch is happening, it would be great to have an email alert we can not only send to ourselves but a notification to primary and technical partners in the firm so they don't have to yell at us like something is broken, instead they are aware it had to change.