My Review on F5 Distributed Cloud WAF
Updated July 10, 2025
My Review on F5 Distributed Cloud WAF

Score 8 out of 10
Vetted Review
Verified User
Overall Satisfaction with F5 Distributed Cloud WAF (Web Application Firewall)
WAF has flexible policies and customer support is very helpful. It has good protection for data leak and scrapping. It has DDOS protection and ML, which can help prevent false alarm and learn office network behavior. At the other hand, it is not suit for beginner as configuration is complex and the cost is high compared to the other brands.
Pros
- well protection to our web portal
- less false alarm
- it has machine learning
Cons
- not easy to configure
- high cost
- more improvement on UI/UX
- protect from DDOS
- machine learning
- customer support
We can use WAF with flexible policies which can easily be configured with customer support. Machine learning is one of the benefits which can prevent false alarms. If used with F5 network appliances, it can provide more benefits compared to other brands of the product. UI/UX should improve in the future.
Do you think F5 Distributed Cloud WAF (Web Application Firewall) delivers good value for the price?
Yes
Are you happy with F5 Distributed Cloud WAF (Web Application Firewall)'s feature set?
Yes
Did F5 Distributed Cloud WAF (Web Application Firewall) live up to sales and marketing promises?
I wasn't involved with the selection/purchase process
Did implementation of F5 Distributed Cloud WAF (Web Application Firewall) go as expected?
I wasn't involved with the implementation phase
Would you buy F5 Distributed Cloud WAF (Web Application Firewall) again?
Yes
Using F5 Distributed Cloud WAF (Web Application Firewall)
3 - Cybersecurity - defining security policies, monitoring for threats, and responding to incidents. Network/Infra operation - deployment, integration, and maintenance of the WAF within our on-premise network and cloud environments. Application Support - It provides input on application-specific behavior to fine-tune WAF rules and minimize false positives.
3 - Network/security guy who knows cloud platforms, DevOps, and SOC experience, and is familiar with log analysis. Also have some experience with automation, monitoring, and integration with broader security infrastructure.
- Block malicious bots and automated attacks
- Real-time threat detection and alerting
- compliance with security standards
- simulate attack scenarios for internal security training
- monitor traffic patterns for application performance
- adjust access policies during high-risk events or region threats
- integrate more deeply with CI/CD pipelines
- automated security testing
- threat detection, and extend protection to APIs

Comments
Please log in to join the conversation