TrustRadius: an HG Insights company

F5 Distributed Cloud API Security

Score9.1 out of 10

97 Reviews and Ratings

Learn More

Contact about F5 Distributed Cloud API Security

Please fill out the form below to get in touch.

F5

Connect with F5

What are you interested in?

Already have an account?

You hereby consent to have TrustRadius share the information supplied on this form with F5 so that F5 and TrustRadius may contact you in regard to the information requested.

What is F5 Distributed Cloud API Security?

F5's Distributed Cloud API Security provides discovery and deep insights from use of AI/ML. It can be used to block API attacks in real time and eliminate vulnerabilities at their source. The SaaS-based portal enables users to manage and go deep for threat analytics, forensics, and troubleshooting of modern applications.

Categories & Use Cases

Media

1 / 3

Top Performing Features

  • Denial of Service (DoS) Protection

    Mitigates DoS attacks by monitoring the API traffic for suspicious patterns and blocking or rate limiting requests from potential malicious sources.

    Category average: 8.8

  • Cross-origin Resource Sharing (CORS) Protection

    Enforces restrictions on cross-origin requests, preventing unauthorized access to resources on the API server from web pages served by other domains.

    Category average: 8.8

  • Security Notification and Alerts

    Sends real-time notifications and alerts when security events or anomalies are detected, allowing prompt investigation and response to potential threats

    Category average: 8.7

Areas for Improvement

  • Data Protection

    Protects the data in transit between the API and the client by encrypting it using secure protocols such as SSL/TLS.

    Category average: 8.2

  • Content Filtering

    Scans the content of API requests and responses for potentially malicious or unwanted content, such as malware or sensitive data, to prevent data leakage and protect against attacks.

    Category average: 8.1

  • Input Validation

    Validates and sanitizes user input to prevent common attack vectors such as SQL injection, cross-site scripting, and command injection.

    Category average: 7.8

F5 Distributed Cloud API Security review

Use Cases and Deployment Scope

We use Distributed Cloud to showcase it to our customers. Some of the business problems are mostly application security that our customers are looking to harden off. We have used API to simulate attacks and how XC can prevent it.

Pros

  • Remediate attacks
  • Automatically provision LBs
  • Creation of WAF policies

Cons

  • Better walk throughs
  • Links to kb

Return on Investment

  • We can showcase actual attacks to our customers
  • We have the ability to do creation in real time

Usability

API and WAF Under same Platform

Use Cases and Deployment Scope

We have Hybrid applications which have both API and WEB traffic on the same channel. So we did use F5 Distributed Cloud API Security and discover for providing more security for API traffic.

Pros

  • API Discovery
  • Crawling
  • App scanning

Cons

  • Integration with onprem

Return on Investment

  • Positive impact not looking at other options like No name or Salt Security

Usability

Alternatives Considered

F5 Distributed Cloud Bot Defense

API Security in XC

Use Cases and Deployment Scope

Securing APIs,

Detecting Shadow APIs.

Make specific APIs available only to specific clients

Force Authentication

Pros

  • API Discovery
  • API Security Enforcement

Cons

  • Authentication
  • Authorization

Return on Investment

  • Lowering attack surface
  • Make Devs aware of Shadow APis
  • Provide pre auth

Usability

Alternatives Considered

Azure API Management, Imperva API Security and FortiWeb

Other Software Used

F5 BIG-IP, F5 BIG-IP Access Policy Manager (APM), F5 Big-IP Advanced WAF, F5 BIG-IP Local Traffic Manager (LTM), Palo Alto Networks Next-Generation Firewalls - PA Series, Fortinet FortiGate

F5 XC is user friendly

Use Cases and Deployment Scope

In our organization, we use F5 Distributed Cloud API Security For deploying applications securely and with authentication and authorization,

Pros

  • Web application firewall
  • DNS migration to the F5 XC
  • Global application resiliency
  • Security policy

Cons

  • OAuth JWT token refresh doesn't work
  • Improve support for legacy applications.

Return on Investment

  • Consolidate on-prem F5 hardware for F5 XC

Usability

Other Software Used

Splunk Enterprise, Cribl.Cloud

F5 Distributed Cloud for the Win

Use Cases and Deployment Scope

My customers use F5 Distributed Cloud API Security to add a layer of safeguarding their applications in the cloud.

Pros

  • Examine the https requests and provide safeguards like potential ddos attacks
  • Enforce WAP

Cons

  • More easy-to-access documentation

Return on Investment

  • Increased deployment agility

Usability

Alternatives Considered

Azure DDoS Protection