F5 BIG-IP vs FortiDDoS

F5 BIG-IP is ranked 1st in Web Application Security with 27 reviews vs FortiDDoS which is ranked 10th in Web Application Security with 2 reviews. The top reviewer of F5 BIG-IP writes "Hardware and software partitioning enable us to deploy multiple instances, two vCMPs". The top reviewer of FortiDDoS writes "Purpose-built ASIC mitigates DDoS attack at line-rate without affecting performance. It can be also deployed off-ramp if the user has the know how". F5 BIG-IP is most compared with Citrix NetScaler ADC, A10 Networks Thunder ADC and HAProxy . FortiDDoS is most compared with Arbor DDoS, Radware DefensePro and Check Point DDoS Protector. See our F5 BIG-IP vs FortiDDoS report.
Cancel
You must select at least 2 products to compare!
+Add products to compare
Most Helpful Review
Find out what your peers are saying about F5 BIG-IP vs FortiDDoS and others in Web Application Security.
288,343 professionals have used our research since 2012.

Quotes From Members Comparing F5 BIG-IP vs FortiDDoS

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Pros
The occasion in which we needed technical support, we didn't have problems with them, because they always answered our questions without any trouble.I have Big-IP change and control manager, which give me the roll back option. Therefore, I can view the last things which happened on the device.It is very intuitive, easy to deploy, and manage.Users can see a remarkable performance difference from a qualitative sense.Our experience has been very good, in terms of performance, and securing our application infrastructure.The Local Traffic Manager (LTM) provides a simple low balance and SSL decryption, in addition to some TCP parameters, for incoming and outgoing traffic to redirect appropriate traffic patterns to appropriate servers.We are using Application Security Manager (ASM) as a web application firewall, where there is a security signature to avoid a web level breach.It helps us recognize sessions from certain IPs that are authorized to manage the application. This is a function we haven't found anywhere else.

Read more »

Among its key features: Detects and mitigates DDoS attacks at L3 to L7; negligible to zero false-positives; Generates and sends reports without the need for an expensive third-party solution.

Read more »

Cons
They need to improve the interface and some of the functionalities.We need best-practice information. They have something called DevCentral and a blog. But we want something from F5 itself regarding how to tackle the false-positive configurations. If you go into detail with so many configurations it will find so many false positives from the moment it is enabled that it will quickly impact your applications, and it will not work.I would like there to be more device security. I would like the tool to support SSL links, along with SSL and TLS.They need to develop the reporting tools further.Implementing whitepapers with a lot more applications could easily be added.There is a challenge in Pakistan. This is when there is a hardware failure. Sometimes, it takes more time to get a replacement because it is sent out from the U.S. or some other regional outpost. Thus, it takes two to three days to receive a replacement.I would like to see F-5 implement a regular routing like in other Linux-based devices. When we try and integrate in some complex networks, we have to use some additional routing scenarios from a Layer 3 perspective, then we have some problems. It would be great if this were fixed somehow.Logging is a bit of a problem. Logging and monitoring are only in plain text. You have to search and you have to know what you are searching for to find anything. So of course, monitoring and getting alerts for abnormal situations is hard. There are no tools for monitoring and alerts

Read more »

All the thresholds that need to be configured should be included in the default so that user will not forget or misconfigure.

Read more »

Pricing and Cost Advice
The pricing is inclusive of many features.Security should be involved in any base license. When you bring on F5, you only have default license. Then, the ASM product license has to be purchased. It would be great if F5 could include the ASM in the base license.It's fair, it's not too expensive. Maybe just a little high.It is the best solution, but that comes with an increased price.Try to negotiate all the software features that you require upfront.The licensing strategy for F5 is good.It's not a cheap product, but there are no other replacements for what we do with it.I would recommend that the cost be lowered.

Read more »

Information Not Available
report
Use our free recommendation engine to learn which Web Application Security solutions are best for your needs.
288,343 professionals have used our research since 2012.
Ranking
RANKING
Views
31,867
Comparisons
23,273
Reviews
21
Followers
588
Avg. Rating
8.0
Views
1,150
Comparisons
652
Reviews
2
Followers
66
Avg. Rating
10.0
Top Comparisons
Top Comparisons
Compared 14% of the time.
Compared 10% of the time.
See more F5 BIG-IP competitors »
Compared 53% of the time.
Compared 15% of the time.
See more FortiDDoS competitors »
Also Known As
Also Known AsBIG-IP, BIG-IP LTM, F5 ASM, Viprion, F5 BIG-IP Virtual Edition , Crescendo Networks Application Delivery ControllerFortinet DDoS
Website/Video
Website/VideoF5
Fortinet
Overview
OverviewThe BIG-IP family of products offers the application intelligence that network managers need to ensure applications are fast, secure, and available. All BIG-IP products share a common underlying architecture, F5's Traffic Management Operating System (TMOS), which provides unified intelligence, flexibility, and programmability. Together, BIG-IP's powerful platforms, advanced modules, and centralized management system make up the most comprehensive set of application delivery tools in the industry.

Distributed Denial of Service (DDoS) attacks are ever-evolving and use a variety of technologies. To successfully combat these attacks, you need a dynamic, multi-layered security solution. FortiDDoS protects from both known and zero day attacks with very low latency. It’s easy to deploy and manage, and includes comprehensive reporting and analysis tools.

OFFER
Learn more about F5 BIG-IP
Learn more about FortiDDoS
Sample Customers
Sample CustomersRiken, TransUnion, Tepco Systems Administration, Daejeon University, G&T Bank, Danamon, CyberAgent Inc.Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Top Industries
Top Industries
REVIEWERS
Comms Service Provider
36%
Financial Services Firm
29%
Media Company
7%
Manufacturing Company
7%
VISITORS READING REVIEWS
Financial Services Firm
25%
Comms Service Provider
14%
University
8%
Manufacturing Company
7%
No Data Available
Company Size
Company Size
REVIEWERS
Small Business
17%
Midsize Enterprise
13%
Large Enterprise
70%
VISITORS READING REVIEWS
Small Business
19%
Midsize Enterprise
17%
Large Enterprise
63%
No Data Available
Find out what your peers are saying about F5 BIG-IP vs FortiDDoS and others in Web Application Security.
Download now
288,343 professionals have used our research since 2012.
We monitor all Web Application Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email