George OndegoManager, IS Security & Infrastructure at Fintech Kenya Limited
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Traffic Learning is the most valuable feature."
"Good application firewall."
"The most valuable feature is the proxy."
"iRule feature is useful."
"F5 has many capabilities for load balancing and web application firewall features."
"We always use technical support and the team helps us very well. They're able to effectively find and fix issues and they respond very quickly."
"The product is quite flexible."
"This is a solution that does what it's supposed to do at the price point."
"It mitigates all of the availabilities of risks around web applications."
"There are some features that are configured by default, so even without doing much, it can still provide a level of protection."
"The solution is very scalable. It is one of the most important features. You can also expand resources and features as well."
"Data masking is the most valuable feature of this solution."
"The dynamic profiling of websites is the solution's most valuable feature. The security is also good."
"Compared to other web application firewalls in the market, Imperva does things in the most accurate way."
"If you are using the appliance as opposed to the virtual deployment, it can stand as the network layer-two and provide real transparency."
"Its inline transferring mode is the most valuable because it is 100% transparent. When you change the IP, there is no change on the network side. If you can't and want to try to reach an IP, you can reach the server IP. There are many other advanced security features in it. The smallest appliances of Imperva can handle the highest traffic at a customer site. For example, a smaller appliance from Imperva can provide you the same security as an F5 product."
"This is a very expensive solution."
"It's a very expensive solution."
"If they made it easier for engineers to get F5 training then it would be better."
"Reporting could be improved and configuration made easier."
"The logging features are too limited and do not give us a solid understanding of what's happening."
"The web interface could be better."
"The cost of the solution is pretty high. It would be ideal if it was more reasonable."
"If we decide to migrate to the cloud, I don't think that BIG-IP is a good solution and we probably won't use it."
"Their portal is very limited and needs improvement."
"It would be helpful to have a "recommended deployment", or even a list of basic features that should either be used or turned on by default."
"The initial setup could be simplified. Every time you have to install the solution you have to get in touch with support or somebody that can to do that for you."
"Some of the features should be included in the next release is a file integrating monitoring tool. This feature should be improved."
"It would be useful if the solution used more intelligence in attack protection. For example, firewalls are to be dependent on the configuration, but if they could have some data science around it the solution would be even better. The profiling of the traffic, and making decisions surrounding that should be intelligence-based, instead of being based on the configuration of the firewall itself."
"I think that better bot protection is needed in this solution."
"The user interface could be better."
"They can provide an option to create reports, automatically import the entire report, and create rules again. In a real-life crisis, it would be helpful to be able to import a report and generate security rules from that report. I should be able to create a simple query and import the reports automatically. It can maybe also tell us the format of the report."
"There are additional costs depending on what modules or what functionality is required."
"F5 pricing is too high, compared to Citrix."
"When we purchased additional licenses for our other locations, we received a discount of between 20% and 25%."
"F5 BIG-IP can be expensive, although there are trial versions available which are helpful to find out if the solution is right for your company."
"The price should be reduced because it is expensive when compared to the competition."
"The solution is quite expensive if we compare it with the competition."
"It is a bit expensive product. Kemp Loadmaster is much cheaper than F5. Its licensing is on a yearly basis. It can be for one year or three years."
"The price of the solution is sometimes expensive."
"Everybody complains about the price of this solution."
"The cost of this solution depends on the platform."
"The price of this solution is a little bit high compared to competitors."
"There are some licenses that you have to buy to use some features. Its price could be better. Price is always important because, at the end of the day, customers have a budget. If you can meet the budget, you can sell, and if you don't, you cannot sell."
"There is a license for this solution and we purchase the license annually with no additional fees."
The BIG-IP family of products offers the application intelligence that network managers need to ensure applications are fast, secure, and available. All BIG-IP products share a common underlying architecture, F5's Traffic Management Operating System (TMOS), which provides unified intelligence, flexibility, and programmability. Together, BIG-IP's powerful platforms, advanced modules, and centralized management system make up the most comprehensive set of application delivery tools in the industry.
Web application attacks deny services and steal sensitive data. Imperva Web Application Firewall (WAF) analyzes and inspects requests coming in to applications and stops these attacks.
Protect your applications in the cloud and on-premises with the same set of security policies and management capabilities. Safely migrate apps while maintaining full protection.
Deploy Imperva WAF on-premises, in AWS and Azure, or as a cloud service itself. Easily meet the specific security and service level requirements of individual applications.
Imperva WAF protects against the most critical web application security risks: SQL injection, cross-site scripting, illegal resource access, remote file inclusion, and other OWASP Top 10 and Automated Top 20 threats. Imperva security researchers continually monitor the threat landscape and update Imperva WAF with the latest threat data.
F5 BIG-IP Local Traffic Manager (LTM) is ranked 1st in Application Delivery Controllers (ADC) with 23 reviews while Imperva Web Application Firewall is ranked 5th in Web Application Firewall (WAF) with 11 reviews. F5 BIG-IP Local Traffic Manager (LTM) is rated 8.2, while Imperva Web Application Firewall is rated 9.0. The top reviewer of F5 BIG-IP Local Traffic Manager (LTM) writes "Very stable and easy to use with a good GUI". On the other hand, the top reviewer of Imperva Web Application Firewall writes "Useful out-of-the-box threat protection, not too complex, and has good technical support". F5 BIG-IP Local Traffic Manager (LTM) is most compared with Citrix ADC, Microsoft Azure Application Gateway, NGINX Plus, HAProxy and Radware Alteon, whereas Imperva Web Application Firewall is most compared with AWS WAF, Imperva Incapsula, Fortinet FortiWeb, Microsoft Azure Application Gateway and F5 Advanced WAF. See our F5 BIG-IP Local Traffic Manager (LTM) vs. Imperva Web Application Firewall report.
See our list of .
We monitor all Application Delivery Controllers (ADC) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.