Protect your web applications, protect your data, protect your availability, and protect your integrity!
Updated July 22, 2025
Protect your web applications, protect your data, protect your availability, and protect your integrity!

Score 7 out of 10
Vetted Review
Verified User
Overall Satisfaction with F5 Distributed Cloud WAF (Web Application Firewall)
This product gives us the ability to protect our web applications from attacks from the internet. This will help strengthen the overall security posture of our organization.
Pros
- Protect against malicious attacks
- Give us visibility into vulnerabilities associated with our cload applications
- Provide our blue teams with valuable threat insights.
Cons
- More streamlined advanced AI capabilities. Sometimes the AI fails to provide answers.
- More simplified less cluttered screens and menus. Too many modules and windows to navigate through. Consider reducing the complexity of the overall application.
- Mitigation of potentially deadly attacks.
- Greater confidence in our web facing apps and their associated data security and integrity
- Increased availability of our systems
Securing our applications is fundamental to enhancing the overall security posture of our organization. As we continue to grow and become larger it is vital that our web apps are protected, secured, and maintain utmost data integrity.
Do you think F5 Distributed Cloud WAF (Web Application Firewall) delivers good value for the price?
Yes
Are you happy with F5 Distributed Cloud WAF (Web Application Firewall)'s feature set?
Yes
Did F5 Distributed Cloud WAF (Web Application Firewall) live up to sales and marketing promises?
Yes
Did implementation of F5 Distributed Cloud WAF (Web Application Firewall) go as expected?
Yes
Would you buy F5 Distributed Cloud WAF (Web Application Firewall) again?
Yes
Using F5 Distributed Cloud WAF (Web Application Firewall)
8 - Our Infrastructure Security Services Team is responsible for managing our Web Application Firewall. We are the principal users. We also closely work with our IS Security Team to evaluate false positives.
8 - We have around 8 full time equivalents involved in managing our Cloud WAF solution. Our team is completely cross trained and able to support multiple disciplines.
- Web application protection from common exploits.
- Web application integrity
- Load balancing distribution capabilities
- Troubleshooting external sponsored link referral errors
- Identifying new threats and exploits.
- Ensuring continued service and uptime / availability of critical applications.
- Leverage additional monitoring and detection capabilities.
- Integrate internal workflows to seamlessly triage potential incidents.
- Introduce new alert systems to proactively identify emerging issues.

Comments
Please log in to join the conversation