We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"It is easier to configure and develop documentation to see how we have configured firewalls."
"The most valuable feature is the web application firewall."
"The solution is very good at mitigating threats."
"New and innovative way to protect the client's data."
"It's very user-friendly."
"The DDoS protection is the most valuable aspect of the solution."
"There are key things that are used for our enterprise customers, such as Lambda and DNS."
"From what I've seen so far, there are no negatives to report as of yet"
"Traffic Learning is the most valuable feature."
"Good application firewall."
"The most valuable feature is the proxy."
"iRule feature is useful."
"F5 has many capabilities for load balancing and web application firewall features."
"We always use technical support and the team helps us very well. They're able to effectively find and fix issues and they respond very quickly."
"The product is quite flexible."
"This is a solution that does what it's supposed to do at the price point."
"It should have easier documentation for the configuration. It's very technical and people who aren't technical should also be able to do the configuration."
"There should be a specific price list for enterprise-level customers."
"The solution could use more analytics on the backend to give us more insights into everything. More reports would be helpful."
"Technical support is lacking."
"There are some issues with the CDN services."
"The solution could work at being less expensive. It costs a lot to use it."
"Latencies are always a problem."
"Although I think it's quite good, it doesn't provide me with all the features I would expect to have if I were using Imperva."
"This is a very expensive solution."
"It's a very expensive solution."
"If they made it easier for engineers to get F5 training then it would be better."
"Reporting could be improved and configuration made easier."
"The logging features are too limited and do not give us a solid understanding of what's happening."
"The web interface could be better."
"The cost of the solution is pretty high. It would be ideal if it was more reasonable."
"If we decide to migrate to the cloud, I don't think that BIG-IP is a good solution and we probably won't use it."
"The cost primarily depends on the size of the organization."
"We don't have any issues with the price."
"The price is reasonable."
"There are additional costs depending on what modules or what functionality is required."
"F5 pricing is too high, compared to Citrix."
"When we purchased additional licenses for our other locations, we received a discount of between 20% and 25%."
"F5 BIG-IP can be expensive, although there are trial versions available which are helpful to find out if the solution is right for your company."
"The price should be reduced because it is expensive when compared to the competition."
"The solution is quite expensive if we compare it with the competition."
"It is a bit expensive product. Kemp Loadmaster is much cheaper than F5. Its licensing is on a yearly basis. It can be for one year or three years."
"The price of the solution is sometimes expensive."
Cloudflare is the leading performance and security company helping to build a better Internet. Today the company runs one of the world’s largest networks that powers more than 9 million Internet applications. More than 10 trillion Internet requests flow through Cloudflare’s network each month, accounting for nearly 10% of all Internet requests globally.
Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare have all web traffic routed through its intelligent global network, which gets smarter with each new site added. As a result, they see significant improvement in performance and a decrease in spam and other attacks.
F5 BIG-IP LTM optimizes the speed and reliability of your apps via both network and application layers. Using real-time protocol and traffic management decisions based on app and server and connection management conditions, and TCP and content offloading, BIG-IP LTM dramatically improves application and infrastructure responsiveness. BIG-IP LTM's architecture includes protocol awareness to control traffic for the most important applications. BIG-IP LTM tracks the dynamic performance levels of servers and delivers SSL performance and visibility for inbound and outbound traffic, to protect the user experience by encrypting everything from the client to the server.
BIG-IP LTM provides enterprise-class Application Delivery Controller (ADC). You get granular layer 7 control, SSL offloading and acceleration capabilities, and advanced scaling technologies that deliver performance and reliability on-demand. The highly optimized TCP/IP stack combines TCP/IP techniques and improvements in the latest RFCs with extensions to minimize the effect of congestion and packet loss and recovery. Independent testing tools and customer experiences show LTM's TCP stack delivers up to a 2x performance gain for users and a 4x increase in bandwidth efficiency.
Cloudflare is ranked 2nd in Distributed Denial of Service (DDOS) Protection with 8 reviews while F5 BIG-IP Local Traffic Manager (LTM) is ranked 1st in Application Delivery Controllers (ADC) with 30 reviews. Cloudflare is rated 8.2, while F5 BIG-IP Local Traffic Manager (LTM) is rated 8.2. The top reviewer of Cloudflare writes "Robust, secure and innovative; technical support needs to be improved". On the other hand, the top reviewer of F5 BIG-IP Local Traffic Manager (LTM) writes "Very stable and easy to use with a good GUI". Cloudflare is most compared with Imperva Incapsula, Microsoft Azure Application Gateway, AWS WAF, Akamai and Palo Alto Networks WildFire, whereas F5 BIG-IP Local Traffic Manager (LTM) is most compared with Citrix ADC, Microsoft Azure Application Gateway, NGINX Plus, HAProxy and Kemp LoadMaster. See our Cloudflare vs. F5 BIG-IP Local Traffic Manager (LTM) report.
We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.