F5 Advanced WAF! More Advanced than you think
February 13, 2024

F5 Advanced WAF! More Advanced than you think

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with F5 Big-IP Advanced Web Application Firewall

We use the F5 BIG-IP Advanecd WAF every day. It protects us every day against constant bad actors and their attacks, web scraping and just bad traffic probing. We are currently using 80% or more of its capabilities and allows us security responsible teams to have a good night sleep. We rely on it when it matters the most and gives us enough flexibility to work around and mitigate different attack vectors that we always see. We have a publicly facing web application and APIs that get all these undesired visits. Advanced WAF makes our day to day tasks a lot easier and gives us the priceless peace of mind our engineers need at night.
  • Brute Force Protection for critical endpoints
  • Session Tracking for all those bad actors that never want to leave
  • Threat Campaigns and attack signatures for known attack vectors
  • Custom rate limiting
  • Brute force protection not limited to critical POST endpoints
  • Better visibility of blocking and alerting events
  • Every day, it helps prevent information leakage
  • Every day, it prevents DOS attacks
F5 BIG-IP advanced WAF will provide just enough flexibility to protect areas and services the way others just can't.

Do you think F5 Big-IP Advanced Web Application Firewall delivers good value for the price?

Yes

Are you happy with F5 Big-IP Advanced Web Application Firewall's feature set?

Yes

Did F5 Big-IP Advanced Web Application Firewall live up to sales and marketing promises?

Yes

Did implementation of F5 Big-IP Advanced Web Application Firewall go as expected?

Yes

Would you buy F5 Big-IP Advanced Web Application Firewall again?

Yes

F5 BIG-IP Local Traffic Manager (LTM), F5 BIG-IP DNS, F5 BIG-IP Advanced Firewall Manager (AFM)
Advanced WAF is well suited for protection against account enumeration attacks, protection against known and new increasing attack vectors through out of the box attack signatures and threat campaigns. Also, up to date and accurate IP intelligence database to block based on known IP reputation.