We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Traffic Learning is the most valuable feature."
"Good application firewall."
"The most valuable feature is the proxy."
"iRule feature is useful."
"F5 has many capabilities for load balancing and web application firewall features."
"We always use technical support and the team helps us very well. They're able to effectively find and fix issues and they respond very quickly."
"The product is quite flexible."
"This is a solution that does what it's supposed to do at the price point."
"The dynamic profiling of websites is the solution's most valuable feature. The security is also good."
"Compared to other web application firewalls in the market, Imperva does things in the most accurate way."
"If you are using the appliance as opposed to the virtual deployment, it can stand as the network layer-two and provide real transparency."
"Its inline transferring mode is the most valuable because it is 100% transparent. When you change the IP, there is no change on the network side. If you can't and want to try to reach an IP, you can reach the server IP. There are many other advanced security features in it. The smallest appliances of Imperva can handle the highest traffic at a customer site. For example, a smaller appliance from Imperva can provide you the same security as an F5 product."
"The most important feature I have found to be the ease in how to do the backup and restores."
"The solution has been quite stable. I have not seen any bugs at all."
"The solution can scale."
"The solution is stable."
"This is a very expensive solution."
"It's a very expensive solution."
"If they made it easier for engineers to get F5 training then it would be better."
"Reporting could be improved and configuration made easier."
"The logging features are too limited and do not give us a solid understanding of what's happening."
"The web interface could be better."
"The cost of the solution is pretty high. It would be ideal if it was more reasonable."
"If we decide to migrate to the cloud, I don't think that BIG-IP is a good solution and we probably won't use it."
"It would be useful if the solution used more intelligence in attack protection. For example, firewalls are to be dependent on the configuration, but if they could have some data science around it the solution would be even better. The profiling of the traffic, and making decisions surrounding that should be intelligence-based, instead of being based on the configuration of the firewall itself."
"I think that better bot protection is needed in this solution."
"The user interface could be better."
"They can provide an option to create reports, automatically import the entire report, and create rules again. In a real-life crisis, it would be helpful to be able to import a report and generate security rules from that report. I should be able to create a simple query and import the reports automatically. It can maybe also tell us the format of the report."
"The process to upgrade from one version to another can be a lot simpler than it is currently."
"Sometimes our web application firewall will slow down."
"In the past, I have bugs on the WAF. I've contacted Imperva about them. Future releases should be less buggy."
"I loved the approach of the cloud. The cloud has a lot of new features, like advanced web protection and DDoS protection. If those could also be on-boarded onto the on-prem versions, that would be ideal. They need to pay attention to both deployment options and not just favor one."
"There are additional costs depending on what modules or what functionality is required."
"F5 pricing is too high, compared to Citrix."
"When we purchased additional licenses for our other locations, we received a discount of between 20% and 25%."
"F5 BIG-IP can be expensive, although there are trial versions available which are helpful to find out if the solution is right for your company."
"The price should be reduced because it is expensive when compared to the competition."
"The solution is quite expensive if we compare it with the competition."
"It is a bit expensive product. Kemp Loadmaster is much cheaper than F5. Its licensing is on a yearly basis. It can be for one year or three years."
"The price of the solution is sometimes expensive."
"The cost of this solution depends on the platform."
"The price of this solution is a little bit high compared to competitors."
"There are some licenses that you have to buy to use some features. Its price could be better. Price is always important because, at the end of the day, customers have a budget. If you can meet the budget, you can sell, and if you don't, you cannot sell."
"There is a license for this solution and we purchase the license annually with no additional fees."
"There are a couple of different licensing models."
F5 BIG-IP LTM optimizes the speed and reliability of your apps via both network and application layers. Using real-time protocol and traffic management decisions based on app and server and connection management conditions, and TCP and content offloading, BIG-IP LTM dramatically improves application and infrastructure responsiveness. BIG-IP LTM's architecture includes protocol awareness to control traffic for the most important applications. BIG-IP LTM tracks the dynamic performance levels of servers and delivers SSL performance and visibility for inbound and outbound traffic, to protect the user experience by encrypting everything from the client to the server.
BIG-IP LTM provides enterprise-class Application Delivery Controller (ADC). You get granular layer 7 control, SSL offloading and acceleration capabilities, and advanced scaling technologies that deliver performance and reliability on-demand. The highly optimized TCP/IP stack combines TCP/IP techniques and improvements in the latest RFCs with extensions to minimize the effect of congestion and packet loss and recovery. Independent testing tools and customer experiences show LTM's TCP stack delivers up to a 2x performance gain for users and a 4x increase in bandwidth efficiency.
Web application attacks deny services and steal sensitive data. Imperva Web Application Firewall (WAF) analyzes and inspects requests coming in to applications and stops these attacks.
Protect your applications in the cloud and on-premises with the same set of security policies and management capabilities. Safely migrate apps while maintaining full protection.
Deploy Imperva WAF on-premises, in AWS and Azure, or as a cloud service itself. Easily meet the specific security and service level requirements of individual applications.
Imperva WAF protects against the most critical web application security risks: SQL injection, cross-site scripting, illegal resource access, remote file inclusion, and other OWASP Top 10 and Automated Top 20 threats. Imperva security researchers continually monitor the threat landscape and update Imperva WAF with the latest threat data.
F5 BIG-IP Local Traffic Manager (LTM) is ranked 1st in Application Delivery Controllers (ADC) with 30 reviews while Imperva Web Application Firewall is ranked 7th in Web Application Firewall (WAF) with 9 reviews. F5 BIG-IP Local Traffic Manager (LTM) is rated 8.2, while Imperva Web Application Firewall is rated 9.0. The top reviewer of F5 BIG-IP Local Traffic Manager (LTM) writes "Very stable and easy to use with a good GUI". On the other hand, the top reviewer of Imperva Web Application Firewall writes "Simple to maintain, easy to configure, and easy to scale". F5 BIG-IP Local Traffic Manager (LTM) is most compared with Citrix ADC, Microsoft Azure Application Gateway, NGINX Plus, HAProxy and Avi Networks Software Load Balancer, whereas Imperva Web Application Firewall is most compared with AWS WAF, Imperva Incapsula, Fortinet FortiWeb, Microsoft Azure Application Gateway and F5 Advanced WAF. See our F5 BIG-IP Local Traffic Manager (LTM) vs. Imperva Web Application Firewall report.
We monitor all Application Delivery Controllers (ADC) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.