F5 Distributed Cloud WAF Reviews
Overall Satisfaction with F5 Distributed Cloud WAF (Web Application Firewall)
To secure, monitor and manage traffic in the web applications and APIs.
To address problems like manual and slow response to threats, DDOS, and applications and API security risks.
Scope of use case includes securing enterprise web apps, providing security, metering, and routing at API gateways.
To address problems like manual and slow response to threats, DDOS, and applications and API security risks.
Scope of use case includes securing enterprise web apps, providing security, metering, and routing at API gateways.
Pros
- API protection
- Real-time analytics and threat Intel
- Easy deployment
Cons
- To reduce cost for small businesses
- To reduce learning curve for basic use case
- To have a wider community support
- Increases response time to threats using ML-based detection, auto-mitigation, and fast policy updates.
- Protects against OWASP bot attacks, and 0-day vulnerabilities.
Instead of coordinating firewall rules across multiple clouds, and on-prem environments manually, teams can apply one global policy via the F5 Distributed Cloud console or API.
Yes - With F5 Distributed Cloud WAF protects HTTP, HTTPS, API, edge apps by using unified security posture.
Do you think F5 Distributed Cloud WAF (Web Application Firewall) delivers good value for the price?
Yes
Are you happy with F5 Distributed Cloud WAF (Web Application Firewall)'s feature set?
Yes
Did F5 Distributed Cloud WAF (Web Application Firewall) live up to sales and marketing promises?
Yes
Did implementation of F5 Distributed Cloud WAF (Web Application Firewall) go as expected?
Yes
Would you buy F5 Distributed Cloud WAF (Web Application Firewall) again?
Yes
Using F5 Distributed Cloud WAF (Web Application Firewall)
500 - SOC analysts to detect, investigate and respond to web app and API attacks; Infrastructure administrators to ensure consistent security across multiple cloud providers, Kubernetes clusters; Compliance team to ensure policy compliance, review and audit; API developers to secure the APIs without writing custom security code.
20 - API veveloper, software engineer, backend developer: Writing and maintaining APIs, knowledge of security headers, and input validation.
Cloud architect, infrastructure administrator: Container orchestration, network security & routing skills.
Security Analyst, SOC analyst, security engineer: Incident response and triage workflows, log analysis, threat hunting skills.
Cloud architect, infrastructure administrator: Container orchestration, network security & routing skills.
Security Analyst, SOC analyst, security engineer: Incident response and triage workflows, log analysis, threat hunting skills.
- Securing multi-cloud eeb applications
- Securing APIs to comply with policy
- Centralizing threat detection and response for Security Teams
- Use it as a security layer for Edge AI and IoT Apps
- Auto-adaptive security using CI/CD feedback loops
- Integrate threat feeds into custom mitigation rules
- Pre-production app testing and hardening.
- Regulatory compliance and auditing.


Comments
Please log in to join the conversation