Compare F5 Advanced Firewall Manager vs. Neustar DDoS

F5 Advanced Firewall Manager is ranked 10th in DDoS with 6 reviews while Neustar DDoS is ranked 14th in DDoS with 1 review. F5 Advanced Firewall Manager is rated 8.4, while Neustar DDoS is rated 8.0. The top reviewer of F5 Advanced Firewall Manager writes "Enables us to configure the product to the client's exact needs with unprecedented flexibility". On the other hand, the top reviewer of Neustar DDoS writes "Identifies a request that comes up multiple times, block holds that particular IP, and lets the genuine traffic pass through". F5 Advanced Firewall Manager is most compared with , whereas Neustar DDoS is most compared with Cloudflare, Arbor DDoS and Akamai Kona Site Defender.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Arbor Networks, Cloudflare, Imperva and others in DDoS. Updated: March 2020.
406,312 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
The decryption is great.The solution is very straightforward. The usability is great.We use three main features. The first one is access control. The second feature we use is called IP intelligence. Finally, we have a DDoS safety feature.This product excells in every aspect from installation and the interface to providing superior network security.It blocks various attacks and mitigates disasters from occurring.I find the signature base is very helpful to see traffic

Read more »

In the DDoS it's difficult to validate what is a genuine request from an end user. We've started being able to do that with the logistics that they have set up. With the protection that they have provided, they are able to identify what is valid and what is not valid. We see that a person who is getting DDoS Neustar service is able to block that particular user. However, while they are doing that it doesn't affect other customers on the server.

Read more »

Cons
Deployment times vary according to the customer. It needs to be heavily configured. You need to look and you need to observe the behavior of the traffic before you can start configuring everything. It can take time.The pricing of the solution could be a little bit better.Firstly, geolocation currently relies on manual updates. It has to move to automatic updates. There are no automatic updates for this feature. If some IPs, countries, or service providers move to another country, now you will be allow IPs that you previously denied. This is because you depend on the database, which doesn't update automatically. This is really a very important area that they need to improve.This would be absolutely the best network security solution if the price were not so high.We needed to protect the database but the solution didn't offer a certain feature to do so.We would have preferred to have support when we first started

Read more »

I would like to see a dashboard that shows you the data that is transferred from which end. It's where people start looking at abuse management. People keep questioning when the mitigation is on what service it is and how many GBs are passing through. An end user dashboard that will help you identify all of these questions and that can be visible in your entire organization is something that would make sense.

Read more »

Pricing and Cost Advice
It is somewhat on the expensive side although it is worth the additional cost.

Read more »

Information Not Available
report
Use our free recommendation engine to learn which DDoS solutions are best for your needs.
406,312 professionals have used our research since 2012.
Ranking
10th
out of 36 in DDoS
Views
133
Comparisons
13
Reviews
4
Average Words per Review
747
Avg. Rating
8.5
14th
out of 36 in DDoS
Views
1,004
Comparisons
653
Reviews
1
Average Words per Review
890
Avg. Rating
8.0
Top Comparisons
Compared 30% of the time.
Compared 25% of the time.
Also Known As
F5 AFM
Learn
F5
Neustar
Overview

At F5, we give our customers the freedom to securely deliver every app, anywhere—with confidence. All F5 products are highly programmable and integrate into any environment, whether on premises or in any cloud. To date, 48 of the Fortune 50 companies rely on F5 to deliver apps that customers and employees can securely access at any time, on any device, from any location.

Distributed denial of service (DDoS) attacks are growing in size, complexity, and malice. Neustar offers flexible solutions so you can stay connected, reduce the threat of theft, and protect your bottom line:

  • Cloud-Based DDoS Protection: Neustar SiteProtect cloud is the optimal choice for attacks too big for on-premises hardware to manage. Rely on our massive global network and scrubbing capacity to defend your Internet presence.
  • Hybrid DDoS Protection: Get the best of both worlds: on-premises hardware to stop smaller attacks instantly, plus the Neustar SiteProtect cloud when attack volume and complexity explode. We offer the largest and most effective hybrid platform solution.
  • On-Premises DDoS Protection: On-premises Arbor Networks hardware, fully managed by the NSOC, monitors your appliance and mitigates attacks 24/7.
  • Contingency/Failover Service: Gain backup or parallel processing capacity to stop large attacks faster. For SaaS providers, large financial organizations, and carriers especially, it’s a cost-effective way to uphold service quality.
Offer
Learn more about F5 Advanced Firewall Manager
Learn more about Neustar DDoS
Sample Customers
City Bank, Ricacorp Properties, Miele, American Systems, Bangladesh Post OfficeChoxi
Find out what your peers are saying about Arbor Networks, Cloudflare, Imperva and others in DDoS. Updated: March 2020.
406,312 professionals have used our research since 2012.
We monitor all DDoS reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.