F5 BIG-IP vs. FortiDDoS

F5 BIG-IP is ranked 1st in Web Application Security with 22 reviews vs FortiDDoS which is ranked 10th in Web Application Security with 2 reviews. The top reviewer of F5 BIG-IP writes "Hardware and software partitioning enable us to deploy multiple instances, two vCMPs". The top reviewer of FortiDDoS writes "Purpose-built ASIC mitigates DDoS attack at line-rate without affecting performance. It can be also deployed off-ramp if the user has the know how". F5 BIG-IP is most compared with Citrix NetScaler ADC, A10 Networks Thunder ADC and HAProxy . FortiDDoS is most compared with Arbor DDoS, Radware DefensePro and Check Point DDoS Protector. See our F5 BIG-IP vs. FortiDDoS report.
Cancel
You must select at least 2 products to compare!
+Add products to compare
Most Helpful Review
Find out what your peers are saying about F5 BIG-IP vs. FortiDDoS and others in Web Application Security.
295,143 professionals have used our research since 2012.

Quotes From Members Comparing F5 BIG-IP vs. FortiDDoS

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Pros
It has so many features. ​First of all, it has a full proxy architecture, it has multiple modules. The best feature is the WAF, the web application firewall module. It also has cashing type capabilities. It has all kinds of load-balancing algorithms based on your IT requirements.It provides first-tier firewalling, for you application. And it provides server load-balancing, it provides optimization, and it provides a proxy feature, where your users cannot directly access your server. It acts as a fully proxy architecture. It has client-side and server-side connections, both, and they're separate.It also has an AVR feature: application, visibility, and recording. It's good for customers looking for what is actually happening in their network and where the latency is.it has TCP LAN and WAN optimization features. It has has caching.You can create multiple virtual servers on F5 BIG-IP technology, and within multiple virtual servers you can have multiple nodes, where a node equals two application servers.The occasion in which we needed technical support, we didn't have problems with them, because they always answered our questions without any trouble.I have Big-IP change and control manager, which give me the roll back option. Therefore, I can view the last things which happened on the device.It is very intuitive, easy to deploy, and manage.

Read more »

Among its key features: Detects and mitigates DDoS attacks at L3 to L7; negligible to zero false-positives; Generates and sends reports without the need for an expensive third-party solution.

Read more »

Cons
They need to develop the reporting tools further.The one gap I saw was that pure LBN integration is a little tricky. The insertion of F5 in LBN is a little tricky. They need to work on something, on products by which they can insert F5 in any sort of cloud environment.They need to improve the interface and some of the functionalities.We need best-practice information. They have something called DevCentral and a blog. But we want something from F5 itself regarding how to tackle the false-positive configurations. If you go into detail with so many configurations it will find so many false positives from the moment it is enabled that it will quickly impact your applications, and it will not work.I would like there to be more device security. I would like the tool to support SSL links, along with SSL and TLS.Implementing whitepapers with a lot more applications could easily be added.There is a challenge in Pakistan. This is when there is a hardware failure. Sometimes, it takes more time to get a replacement because it is sent out from the U.S. or some other regional outpost. Thus, it takes two to three days to receive a replacement.I would like to see F-5 implement a regular routing like in other Linux-based devices. When we try and integrate in some complex networks, we have to use some additional routing scenarios from a Layer 3 perspective, then we have some problems. It would be great if this were fixed somehow.

Read more »

All the thresholds that need to be configured should be included in the default so that user will not forget or misconfigure.

Read more »

Pricing and Cost Advice
It's fair, it's not too expensive. Maybe just a little high.The pricing is inclusive of many features.Security should be involved in any base license. When you bring on F5, you only have default license. Then, the ASM product license has to be purchased. It would be great if F5 could include the ASM in the base license.It is the best solution, but that comes with an increased price.Try to negotiate all the software features that you require upfront.The licensing strategy for F5 is good.It's not a cheap product, but there are no other replacements for what we do with it.I would recommend that the cost be lowered.

Read more »

Information Not Available
report
Use our free recommendation engine to learn which Web Application Security solutions are best for your needs.
295,143 professionals have used our research since 2012.
Ranking
RANKING
Views
35,073
Comparisons
24,093
Reviews
20
Followers
600
Avg. Rating
7.9
Views
1,290
Comparisons
738
Reviews
2
Followers
66
Avg. Rating
10.0
Top Comparisons
Top Comparisons
Compared 14% of the time.
Compared 11% of the time.
See more F5 BIG-IP competitors »
Compared 53% of the time.
Compared 15% of the time.
See more FortiDDoS competitors »
Also Known As
Also Known AsBIG-IP, BIG-IP LTM, F5 ASM, Viprion, F5 BIG-IP Virtual Edition , Crescendo Networks Application Delivery ControllerFortinet DDoS
Website/Video
Website/VideoF5
Fortinet
Overview
OverviewThe BIG-IP family of products offers the application intelligence that network managers need to ensure applications are fast, secure, and available. All BIG-IP products share a common underlying architecture, F5's Traffic Management Operating System (TMOS), which provides unified intelligence, flexibility, and programmability. Together, BIG-IP's powerful platforms, advanced modules, and centralized management system make up the most comprehensive set of application delivery tools in the industry.

Distributed Denial of Service (DDoS) attacks are ever-evolving and use a variety of technologies. To successfully combat these attacks, you need a dynamic, multi-layered security solution. FortiDDoS protects from both known and zero day attacks with very low latency. It’s easy to deploy and manage, and includes comprehensive reporting and analysis tools.

OFFER
Learn more about F5 BIG-IP
Learn more about FortiDDoS
Sample Customers
Sample CustomersRiken, TransUnion, Tepco Systems Administration, Daejeon University, G&T Bank, Danamon, CyberAgent Inc.Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Top Industries
Top Industries
REVIEWERS
Comms Service Provider
36%
Financial Services Firm
29%
Manufacturing Company
7%
Insurance Company
7%
VISITORS READING REVIEWS
Financial Services Firm
26%
Comms Service Provider
14%
University
8%
Manufacturing Company
7%
No Data Available
Company Size
Company Size
REVIEWERS
Small Business
22%
Midsize Enterprise
13%
Large Enterprise
66%
VISITORS READING REVIEWS
Small Business
19%
Midsize Enterprise
17%
Large Enterprise
63%
No Data Available
Find out what your peers are saying about F5 BIG-IP vs. FortiDDoS and others in Web Application Security.
Download now
295,143 professionals have used our research since 2012.
We monitor all Web Application Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email