F5 Distributed Cloud WAF (Web Application Firewall) vs. Salt Security API Protection Platform

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
F5 Distributed Cloud WAF (Web Application Firewall)
Score 8.9 out of 10
N/A
F5 Distributed Cloud WAF leverages F5's Advanced WAF technology, delivering WAF-as-a-Service and combining signature- and behavior-based protection for web applications. It acts as an intermediate proxy to inspect application requests and responses to block and mitigate a broad spectrum of risks stemming from the OW ASP Top 10, persistent and coordinated threat campaigns, bots, and layer 7 DoS.N/A
Salt Security API Protection Platform
Score 8.5 out of 10
Enterprise companies (1,001+ employees)
For API-driven organizations, Salt Security is an API security platform that protects internal, external, and third-party APIs. The Salt C-3A Context-based API Analysis Architecture combines coverage and AI-powered big data to discover APIs and exposed sensitive data - continuous and automatic discovery stop attackers in their tracks - block attackers by integrating with inline devices provide remediation insights - for developers to improve API security…N/A
Pricing
F5 Distributed Cloud WAF (Web Application Firewall)Salt Security API Protection Platform
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
F5 Distributed Cloud WAF (Web Application Firewall)Salt Security API Protection Platform
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
YesNo
Entry-level Setup FeeOptionalNo setup fee
Additional Details
More Pricing Information
Community Pulse
F5 Distributed Cloud WAF (Web Application Firewall)Salt Security API Protection Platform
Top Pros
Top Cons
Best Alternatives
F5 Distributed Cloud WAF (Web Application Firewall)Salt Security API Protection Platform
Small Businesses
Cloudflare
Cloudflare
Score 8.8 out of 10

No answers on this topic

Medium-sized Companies
Cloudflare
Cloudflare
Score 8.8 out of 10
Postman
Postman
Score 8.8 out of 10
Enterprises
F5 Advanced WAF
F5 Advanced WAF
Score 9.2 out of 10
Akamai App & API Protector
Akamai App & API Protector
Score 8.6 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
F5 Distributed Cloud WAF (Web Application Firewall)Salt Security API Protection Platform
Likelihood to Recommend
8.9
(51 ratings)
8.5
(6 ratings)
User Testimonials
F5 Distributed Cloud WAF (Web Application Firewall)Salt Security API Protection Platform
Likelihood to Recommend
F5
So a lot of companies that have a digital side and they have a lot of applications in the cloud, this is one of those areas that it can protect the net so it can lock 'em down, it'll build a baseline so you understand what that application's doing. So if it sees something not normal, it'll get protected against that.
Read full review
Salt Security
Salt is highly recommended for anyone who wants to discover, monitor and protect their APIs against various types of attacks. Salt should not be used as a SIEM.
Read full review
Pros
F5
  • Layer seven attacks are becoming far more common. Traditionally it was always layered three, layer four, where you get an additional firewall, but with the application layer attacks become more frequent, more popular, et cetera. So having the web application firewall protecting us, and then with the recent Log4j, that's the most recent use case when it gave us that instant level of protection whilst we remediated the Log4j that we had that and the F5 Distributed Cloud WAF was protecting us.
  • I have a great relationship with the account manager, my account manager, and I think he drives the best price possible, um, for me, and I'm happy with that price.
  • F5 Distributed Cloud WAF is always innovating and evolving.
  • We run a very competitive proof value where we run numerous competitors against each other, and then we evaluate from that and then make the selection, and F5 Distributed Cloud WAF was the winner.
Read full review
Salt Security
  • PII identification in API traffic.
  • Divergence between API traffic and documentation (swagger files).
  • Potential attacks with information to take counter measures.
Read full review
Cons
F5
  • So we just had some performance issues when it comes to routing. Because the web application firewall sits in front of our website, which is hosted on-site, we had some trouble with the VGP protocols between the two sites and it took us a while to figure it out. So that is probably one area where we could improve. Otherwise, when it comes to the WAF functionality itself, it's really good.
Read full review
Salt Security
  • The platform could have more options for exporting detailed data from attackers' dashboards.
  • The Attackers dashboard could also have more options of filters in order to support the investigations of the attack.
  • The OAS analysis could present a more detailed view of the found issues.
Read full review
Alternatives Considered
F5
Basically, Cloudflare is a more economical solution at the level of DNS balancing, easy to use with a few simple clicks and that has gained an advantage in the market, however, compared to F5, it falls short of the entire protection panorama that the solution provides since F5 does not It's just DNS that goes further and that's where it differentiates and stands out.
Read full review
Salt Security
We tried controls offered by the IaaS providers but these were hard to manage and did not provide the visibility we wanted. We also protected APIs with a normal WAF but this was only helpful for assets we knew about and API attacks were not caught by the WAF.
Read full review
Return on Investment
F5
  • Accelerated time to value as it was a requirement for a workload being provisioned on that cloud
  • As an existing f5 customer, access to their solutions integrator (GridZero) made the sizing, licensing, purchases, and downloading of the software very quick and painless
Read full review
Salt Security
  • Salt Security API Protection Platform has provided detailed information that is helping us to identify and investigate attacks in our environment
Read full review
ScreenShots