F5 WAAP becoming like BIG IP.
Updated June 25, 2025
F5 WAAP becoming like BIG IP.

Score 9 out of 10
Vetted Review
Verified User
Overall Satisfaction with F5 Distributed Cloud API Security
Its features are used to secure our web-based application and API gateways. Business Problems: 1. Safely secure customer transactions via digital apps. 2. It prevents all cyber attacks and keeps applications available in alignment. Use Case: -It prevents data theft and keeps users' confidential data secured -It stops malicious intruders from launching Malicious content.
Pros
- Protects from DDos attacks.
- Protects from Bot attacks.
- Inspects the user data before sending it to the application servers.
- Monitors real time data.
Cons
- Bot categories should be listed on console.
- URL profiles should be created using learning.
- Rate limiting should be available on URL basis.
- Easy to on-boards applications plus.
- Granular controls almost to stop business loss.
- Features called malicious user mitigation module provides very good protective layer.
I believe F5 requires much more time and features to level barracuda cloud waas, but I think F5 will surpass the way Big IP has done easily.
Do you think F5 Distributed Cloud API Security delivers good value for the price?
Yes
Are you happy with F5 Distributed Cloud API Security's feature set?
Yes
Did F5 Distributed Cloud API Security live up to sales and marketing promises?
I wasn't involved with the selection/purchase process
Did implementation of F5 Distributed Cloud API Security go as expected?
I wasn't involved with the implementation phase
Would you buy F5 Distributed Cloud API Security again?
Yes
F5 Distributed Cloud API Security Feature Ratings
Using F5 Distributed Cloud API Security
1 - Finance
1 - -WAF in-depth knowledge
-Understanding of API, API-requests, API request flow, Methods used in APIs, API discovery concepts, Shadow APIs, etc
-Understanding of API data leaks
-How to mitigate API attacks and vulnerabilities
-Understanding of API, API-requests, API request flow, Methods used in APIs, API discovery concepts, Shadow APIs, etc
-Understanding of API data leaks
-How to mitigate API attacks and vulnerabilities
- Securing applications related to finance
- Securing digital transactions
- Securing user confidentiality
- Securing against web attack
- To discover shadow APIs
- API gateway secured before requests reach there
- Can enforce API security controls before API gateway
- Can discover API by using API discovery feature
- Can use YAML file to feed API to secure them against attacks
Evaluating F5 Distributed Cloud API Security and Competitors
- Cloud Solutions
- Scalability
- Ease of Use
-Cloud soution which is quite stable in terms of data path crashes and outages
-Moreover, a lot of security features are there and working is very good in comparison to Barracuda WAAS
-Moreover, a lot of security features are there and working is very good in comparison to Barracuda WAAS
Nothing
F5 Distributed Cloud API Security Implementation
- Implemented in-house
Change management was minimal - At this moment, I cant describe
- Not much issues reported as it was easy to implement when you have knowledge related to cloud WAF
F5 Distributed Cloud API Security Training
- No Training
No, you need have atleast basic understanding of WAF
Configuring F5 Distributed Cloud API Security
Yes - we have customized the interface extensively - It was so easy
Yes - we have added extensive custom code - I beleive we have added a YAML file
F5 Distributed Cloud API Security Support
| Pros | Cons |
|---|---|
Quick Resolution Knowledgeable team Kept well informed No escalation required Immediate help available Support understands my problem Support cares about my success | None |
No, I believe that my knowledge doesn't require premium support
Yes - I dont remember right now
I remember when we were working on some issues with F5 TAC Nisbat Jehan and she delivered outstanding support throughout the resolution process and I believe an engineer like her is always an added advantage to the company's growth and support success.
Using F5 Distributed Cloud API Security
| Pros | Cons |
|---|---|
Like to use Well integrated Consistent Quick to learn Convenient Feel confident using Familiar | None |
- API discovery
- Malicious user mitigation module
- DDos
- Bot Protection
- none
F5 Distributed Cloud API Security Reliability
Integrating F5 Distributed Cloud API Security
- No product
- Cortex
- File import/export
- API (e.g. SOAP or REST)
I dont think so anything is missed here but will post if anything would be missed out
I believe it's very good as of now
Relationship with F5
cannot disclose
Everything fine
Upgrading F5 Distributed Cloud API Security
- not sure
- not sure at present


Comments
Please log in to join the conversation