Over 279,728 professionals have used IT Central Station research.
Compare the best Enterprise Infrastructure VPN vendors based on product reviews, ratings, and comparisons.
All reviews and ratings are from real users, validated by our triple authentication process.
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score.
The score is calculated as follows: The product with the highest count in each area gets the highest available score.
(20 points for Reviews; 16 points for Views, Comparisons, and Followers.)
Every other product gets assigned points based on its total in proportion to the #1 product in
that area. For example, if a product has 80% of the number of reviews compared to the product
with the most reviews then the product's score for reviews would be 20% (weighting factor) *
80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our
rating scale of 1-10. If a product has fewer than ten reviews, the point contribution
for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews;
two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old,
as well as those written by resellers, are completely excluded from the ranking algorithm.
It has so many features. First of all, it has a full proxy architecture, it has multiple modules. The best feature is the WAF, the web application firewall module. It also has cashing type capabilities. It has all kinds of load-balancing... more»
It has multi-tenancy features, like hardware clustering. It has software partitioning so that you can partition F5. For example, in my recent deployments, I deployed F5 in a bank where they had two load balancers. One was Cisco Ace and the... more»
The room for improvement is that the product is a little costly. I live in the Third World, Pakistan. We have budget constraints, even in big enterprise servers. My team said that this product is too costly, and why don't we go with another... more»
We have a lot of in-house applications that we must integrate with a secure email system. We are a financial institute, so we must use it to send emails to our customers securely, because these emails contain sensitive customer data. The... more»
One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents. I'm talking about the second model in this product... more»
The most valuable feature is the F5 LTM most organisations will be using most. It provides the core functionality to be able to load balance services and the means and the intelligence to be able to load balance based on advanced logic, e.g.,... more»
It has enabled us to keep a sustainable and supported load balancing platform. This is partly due to Cisco withdrawing a large number of their load balancing products and also related to Microsoft Network Load Balancing not scaling enough to... more»
I would like F5 to incorporate the ability to create your own custom roles and customised permissions within the product set. I have seen many customers wanting to give a certain level of access for the purposes of out-of-hours servicing to... more»
iRule: It's a great feature that helped us multiple times have an advantage over competition Appliance Performance: One of the main advantages we always have over competition is in hardware performance, where the smallest F5 appliances compete with competitors’ medium to high-end appliances, while high-end devices can sit in the datacenter without risking... more»
* Reporting: One of the negative things about F5 is there is no place to generate a summary/executive/detailed report about everything happening on the box, especially for WAF & APM events. The only way to get some kind of report is enable the AVR module, and manually export the data required into PDF/XLS documents. * GUI interface: F5 appliances lack a... more»
We like the capability to combine the content switching with the intrusion prevention and adding the security roles, so we can expose certain sub-pieces outside without exposing everything. Another feature that we like is how they integrate nicely with the Oracle PeopleSoft application, and since that's one of my main focuses, I really like that they have the... more»
I have been really happy with what they have been doing. They could improve the synchronization between their main site and the failover site. Sometimes, we run into issues where it does not sync well, so I would like to see that improved. The synchronization does works fairly well. However, if I were to make changes, I would make it easier to start the sync... more»
We need to deliver some very sensitive data to some of our colleagues in another organization. This product allows us to actually send it straight from our email to the other person's email in a safe way, where we can meet all our regulations... more»
Better UI. A better UI for the people that manage all the processes of Safe-T. Some of the UI is not as intuitive as you would like it to be. Sometimes, when you configure the process that you want to work with, it's more complicated than you... more»
We have two features that we use. One is the Outlook add-on, where we're sending emails from Outlook to external users. Every employee has this add-on in his Outlook email account. And the other, if there is a machine that sends emails... more»
It's improved the security for our customers, because we are sending a lot of customers a bill with financial data and ID, things that are confidential. So, the security of our customer data, this is really an improvement. Also, because we... more»
A lot of the improvements I have wanted, I already notified them about them. And there are really improving it. They really consider my suggestions and improve that feature. I don't think there is something critical that is problematic, that... more»
For Safe-T SDA, the feature of two factor authentication using SMS OTP to access the internal applications is the most valuable. This is because if anyone steals my user ID and static password, they still cannot access my internal... more»
Safe-T SDA has allow my organization to secure my office applications. It makes it harder for hackers to be able to hack into my internal office web applications. For Safe-T SDE, it has allow my organization to be able to store large files,... more»
For Safe-T SDA, one area of improvement would be the way the license is done. Whenever any of the IP addresses of the Safe-T SDA is changed, a new license request needs to be created and a new license needs to be imported. Another area of... more»
One of the new features of it is you can change the default port. Instead of 1194, like everybody expects, you can change it to whichever port you want to use. Another thing is that you can do local subnet blocking.
They may have this already, but it would be nice to be able to get more notifications if a site drops unexpectedly. It would be nice with all these features, if they could send some examples of each one; just small sample scripts to look at... more»
Interoperability between different offices. We didn't have to keep exchanging documents via email and other tech. We were able to maintain a common file store because of the complete VPN setup we had using OpenVPN.
Some of the issues we faced were things like, if someone's key is not working, or if we had to remove someone's permission from it, or maybe an employee left the company and we had to take their key out. That seemed a little bit more... more»
A valuable feature for us is its ability to see the new Citrix server as a local server within the company. And it allows us to test abroad. We have a couple other sites that we want to try to get people to remote into. Having that feature... more»
The user interface that we had to implement. I would like to see a simpler interface, so that we can make the connection between the local network using the LAN IP. Also, I would be more happy with the idea of licensing to have a reduced... more»
I have been working on the LTM and GTM lines. Both of the products are awesome. I would consider the Wide IP and ZoneRunner features of GTM extremely useful. For the overall product, I would say provisioning is a good feature. There are other... more»
The only area that has room for improvement would be pricing. Other than that, the v11 clustering is a new technology they have brought in that does not require improvement. They are the leader in the space.
The file scanner is a solution of various types of files through commercial professional scanning engines, allowing entry of material to personal computers and networks. Safe-T SMFT « Secure Managed File Transfer » Safe-T assures the management of contents and collaboration for companies by offering a management of transfer of files (SMFT) through a secure... more»
The cloud solution is not that great specially with Swiss customers. An on-premise server should still be a solution available (always). It should not be restrained to cloud technology. At the same time, we can see some improvement, but Safe-T must always care to have the right amount of support people trained depending on their personal development.
This open-source solution provided the easiest UX for our end-users and had the greatest interoperability with all the operating systems we used, including but not limited to: iOS, Android, OS X, Windows, and Linux.
It allowed people to remotely access files from their mobile devices. It was so easy for end-users to use that they were able to work more efficiently no matter where they were, whether at a client’s campus, home, traveling – wherever they... more»
The upgrade path from older versions was more difficult than we wanted to tackle, so we ran an older version of the software for longer than I wanted. Patching, updating, and migrating to newer versions was a problem for us. That said, we... more»
Performance is the first thing and most critical issue that needs improvement. Supporting more Clients would be nice, but without improving performance, F5 will not widely be used for critical work. It killed an international meeting the... more»
Head of Data Centers Operations at a comms service provider with 1,001-5,000 employees
Feb 27 2017
What do you think of F5 BIG-IP?
Room for Improvement
I think the product is a good product. I think where they can improve is in the licensing. It's quite expensive. They could make it more aligned with the business model than with the hardware.
• Use of Solution
I have been using F5 for about two years.
• Stability Issues
It is a stable product but sometimes we have some issues. I have other products that are competitors of F5, and they are also good. The performance of F5 so far is good. Usually, because we are responsible for providing high availability, we run our architecture with redundancy. Usually, for example, when I have F5, I have a couple of F5s, the active one and the standby one. Today, I had problems. I don't know what happened; it couldn't reload automatically. The other one assumed that...
We only use this feature. This feature works well, so I don't know what else would need improvement. Maybe the Outlook agent is not working well for installing it in the entire office, but most of the users work over the web and not with the... more»
Security Architect at a comms service provider with 501-1,000 employees
Apr 26 2018
What do you think of F5 BIG-IP?
Primary Use Case
We are using it primarily for load balancing. We also make great use of SSL interception (offloading and onloading), packet inspection, rewriting, and DNS wide IP.
• Improvements to My Organization
It is a very good, flexible solution. It helps us to catch up on flaws in our partner solutions on top of its load balancing feature.
• Valuable Features
Along with load balancing, we perform a lot of packet inspections, URL rewriting, and SSL interceptions via iRule.
• Room for Improvement
I would recommend that the cost be lowered. User tracking: Needs to provide a visual interface to follow a customer's activity (from client to BIG-IP to SNAT IP to the chosen server, then back). Today, we are still performing packet captures.
• Use of...
* Easy administration * A lot of features * Scriptable (iRules and REST API) I have some experience with other load balancing providers. The BIG-IP’s interface is more intuitive than other GUIs. It is well structured, not overloaded, and does... more»
The ASM administration is quite complex. I am a technical GUI expert (not UI). They did improve the ASM administration in each version, but added new features, too. The topic itself is pretty complex, so it is not easy to provide a nice,... more»