Barracuda Web Application Firewall vs. F5 BIG-IP

Barracuda Web Application Firewall is ranked 9th in Web Application Security with 3 reviews vs F5 BIG-IP which is ranked 1st in Web Application Security with 22 reviews. The top reviewer of Barracuda Web Application Firewall writes "Give us visibility into server connections/sessions, real-time alerts, KPIs". The top reviewer of F5 BIG-IP writes "Hardware and software partitioning enable us to deploy multiple instances, two vCMPs". Barracuda Web Application Firewall is most compared with F5 BIG-IP, Citrix NetScaler ADC and KEMP LoadMaster. F5 BIG-IP is most compared with Citrix NetScaler ADC, A10 Networks Thunder ADC and HAProxy . See our Barracuda Web Application Firewall vs. F5 BIG-IP report.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Use Null Product? Share your opinion.
Find out what your peers are saying about Barracuda Web Application Firewall vs. F5 BIG-IP and others in Web Application Security.
302,095 professionals have used our research since 2012.

Quotes From Members Comparing Barracuda Web Application Firewall vs. F5 BIG-IP

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Pros
It allows us to scale out to multiple phase servers.We run it with no downtime, because it has good support.This product gives us visibility into what is going on in two servers, including connections and sessions, real-time alerts, very good reporting, and KPIs. It makes managing security of a critical server very easy, with a friendly GUI.There is no one special feature, but the WAF itself is valuable: user-friendly protection against web attacks etc., authentication, reporting, accountability, alerting, and hardened OS.

Read more »

It has so many features. ​First of all, it has a full proxy architecture, it has multiple modules. The best feature is the WAF, the web application firewall module. It also has cashing type capabilities. It has all kinds of load-balancing algorithms based on your IT requirements.It provides first-tier firewalling, for you application. And it provides server load-balancing, it provides optimization, and it provides a proxy feature, where your users cannot directly access your server. It acts as a fully proxy architecture. It has client-side and server-side connections, both, and they're separate.It also has an AVR feature: application, visibility, and recording. It's good for customers looking for what is actually happening in their network and where the latency is.it has TCP LAN and WAN optimization features. It has has caching.You can create multiple virtual servers on F5 BIG-IP technology, and within multiple virtual servers you can have multiple nodes, where a node equals two application servers.The occasion in which we needed technical support, we didn't have problems with them, because they always answered our questions without any trouble.I have Big-IP change and control manager, which give me the roll back option. Therefore, I can view the last things which happened on the device.It is very intuitive, easy to deploy, and manage.

Read more »

Read more »

Cons
If you know nothing about networks, then you can't set it up.It is not stable nor mature.This product could easily progress to be among the industry leaders. I think they need to improve enterprise level automation. It integrates with a small number of vulnerability scanners, so report results should be imported manually; same for SIEM integration.

Read more »

They need to develop the reporting tools further.The one gap I saw was that pure LBN integration is a little tricky. The insertion of F5 in LBN is a little tricky. They need to work on something, on products by which they can insert F5 in any sort of cloud environment.They need to improve the interface and some of the functionalities.We need best-practice information. They have something called DevCentral and a blog. But we want something from F5 itself regarding how to tackle the false-positive configurations. If you go into detail with so many configurations it will find so many false positives from the moment it is enabled that it will quickly impact your applications, and it will not work.I would like there to be more device security. I would like the tool to support SSL links, along with SSL and TLS.Implementing whitepapers with a lot more applications could easily be added.There is a challenge in Pakistan. This is when there is a hardware failure. Sometimes, it takes more time to get a replacement because it is sent out from the U.S. or some other regional outpost. Thus, it takes two to three days to receive a replacement.I would like to see F-5 implement a regular routing like in other Linux-based devices. When we try and integrate in some complex networks, we have to use some additional routing scenarios from a Layer 3 perspective, then we have some problems. It would be great if this were fixed somehow.

Read more »

Read more »

Pricing and Cost Advice
They have competitive pricing.The pricing is less compared to other web applications.

Read more »

It's fair, it's not too expensive. Maybe just a little high.The pricing is inclusive of many features.Security should be involved in any base license. When you bring on F5, you only have default license. Then, the ASM product license has to be purchased. It would be great if F5 could include the ASM in the base license.It is the best solution, but that comes with an increased price.Try to negotiate all the software features that you require upfront.The licensing strategy for F5 is good.It's not a cheap product, but there are no other replacements for what we do with it.I would recommend that the cost be lowered.

Read more »

Information Not Available
report
Use our free recommendation engine to learn which Web Application Security solutions are best for your needs.
302,095 professionals have used our research since 2012.
Ranking
Views
2,781
Comparisons
1,843
Reviews
3
Followers
69
Avg. Rating
9.0
Views
36,742
Comparisons
24,610
Reviews
20
Followers
612
Avg. Rating
7.9
Views
0
Comparisons
0
Reviews
1
Followers
1
Avg. Rating
5.0
Top Comparisons
See more Barracuda Web Application Firewall competitors »
Compared 14% of the time.
Compared 11% of the time.
See more F5 BIG-IP competitors »
Compared 25% of the time.
Also Known As
BIG-IP, BIG-IP LTM, F5 ASM, Viprion, F5 BIG-IP Virtual Edition , Crescendo Networks Application Delivery Controller, BIG IP
Website/Video
Barracuda Networks
F5
Null Vendor
Overview

Barracuda Web Application Firewall is the ideal solution for organizations looking to protect web applications from data breaches and defacement. With the Barracuda Web Application Firewall, administrators do not need to wait for clean code or even know how an application works to secure their applications. Organizations can ensure robust security with a Barracuda Web Application Firewall hardware or virtual appliance, deployed either on-premises or in the cloud.

The BIG-IP family of products offers the application intelligence that network managers need to ensure applications are fast, secure, and available. All BIG-IP products share a common underlying architecture, F5's Traffic Management Operating System (TMOS), which provides unified intelligence, flexibility, and programmability. Together, BIG-IP's powerful platforms, advanced modules, and centralized management system make up the most comprehensive set of application delivery tools in the industry.
Information Not Available
OFFER
Learn more about Barracuda Web Application Firewall
Learn more about F5 BIG-IP
Learn more about Null Product
Sample Customers
Oracle, CBS, Pioneer, Hyundai, Publix, Barnes Noble, Calzedonia, Nordstrom, Samsung, NascarRiken, TransUnion, Tepco Systems Administration, Daejeon University, G&T Bank, Danamon, CyberAgent Inc.
Information Not Available
Find out what your peers are saying about Barracuda Web Application Firewall vs. F5 BIG-IP and others in Web Application Security.
Download now
302,095 professionals have used our research since 2012.
We monitor all Web Application Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email