TrustRadius: an HG Insights company

F5 Distributed Cloud WAF (Web Application Firewall)

Score9.2 out of 10

262 Reviews and Ratings

Learn More

Contact about F5 Distributed Cloud WAF (Web Application Firewall)

Please fill out the form below to get in touch.

F5

Connect with F5

What are you interested in?

Already have an account?

You hereby consent to have TrustRadius share the information supplied on this form with F5 so that F5 and TrustRadius may contact you in regard to the information requested.

What is F5 Distributed Cloud WAF (Web Application Firewall)?

F5 Distributed Cloud WAF leverages F5's Advanced WAF technology, delivering WAF-as-a-Service and combining signature- and behavior-based protection for web applications. It acts as an intermediate proxy to inspect application requests and responses to block and mitigate a broad spectrum of risks stemming from the OW ASP Top 10, persistent and coordinated threat campaigns, bots, and layer 7 DoS.

Media

1 / 2

A great alternative to Akamai products

Use Cases and Deployment Scope

We are currently in testing phase of our deployment, thus far everything is working as we want it, the one thing we wanted is to get the graphs to have by the minute vs by the 10 minute span in time -- when looking at he current screen it does not give precise info as it does averages over time. If my app went down for 50 seconds, I would like to have a clear way to explain it

Pros

  • It works like on-prem WAF
  • It gathers lots of statistics
  • It is easy to run through the GUI to build the config

Cons

  • When looking at graphs we need the time span to show by the minute, currently only shows in 10 minute slots

Return on Investment

  • TCO
  • Security simplicity ( I coined that )

Alternatives Considered

Akamai Prolexic, Akamai Edge DNS, Akamai CDN and Akamai Bot Manager

[...] Review

Use Cases and Deployment Scope

Fairly new to the GFS team but this is my first experience with the F5 Distributed Cloud WAF, and I love its mobility with ease of use.

Pros

  • application protection

Cons

  • Still exploring what all it can and cannot do.

Return on Investment

  • Simplification of use
  • Easier navigation

Other Software Used

F5 BIG-IP

[...]'s review

Use Cases and Deployment Scope

In our organization, We are still in the F5 Distributed Cloud WAF (Web Application Firewall) evaluation process

Pros

  • bot detection
  • threat detection
  • API discovery

Cons

  • needs on prem option

Return on Investment

  • The impact F5 Distributed Cloud WAF (Web Application Firewall) has on our organization's overall business objectives is that F5 Distributed Cloud WAF (Web Application Firewall) Stopped many 0 day threats

Other Software Used

Cloudflare, Palo Alto Networks Advanced Threat Prevention

[...]

Use Cases and Deployment Scope

In our organization, we use F5 Distributed Cloud WAF (Web Application Firewall) as a test environment and lab validation for external facing app

Pros

  • security
  • integration
  • easy deployment
  • managable

Cons

  • I think there is room for improvement in F5 Distributed Cloud WAF (Web Application Firewall) with more signature
  • I think there is room for improvement in F5 Distributed Cloud WAF (Web Application Firewall) with less false positive
  • I think there is room for improvement in F5 Distributed Cloud WAF (Web Application Firewall) with AI

Return on Investment

  • low cost
  • reliability
  • stabillity

Alternatives Considered

AWS WAF

Other Software Used

Dell ECS, AI21 Studio powered by Jamba, JAVA Genius

good

Use Cases and Deployment Scope

we use F5 Distributed Cloud WAF (Web Application Firewall) to protect our web applications and APIs from cyber threats such as OWASP attacks,bots and ddos. it helps improve security visibility ,reduces, risk and support our hybrid cload

Pros

  • protects against OWASP attacks and bots
  • easy centralized security management
  • helps mitigate ddos and improves availability

Cons

  • user interface can be more intuitive
  • policy tuning may require more automation
  • reporting and analytics could be more detailed

Return on Investment

  • improved overall security posture
  • reduces risk of downtime and attacks
  • better visibility across environments