Compare F5 BIG-IP vs. Safe-T Secure Application Access

Cancel
You must select at least 2 products to compare!
F5 BIG-IP Logo
46,267 views|35,918 comparisons
Safe-T Secure Application Access Logo
1,124 views|477 comparisons
Most Helpful Review
Use Safe-T Secure Application Access? Share your opinion.
Find out what your peers are saying about F5, Kemp, A10 Networks and others in Application Delivery Controllers. Updated: January 2021.
455,301 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
"They are expensive.""There are additional costs depending on what modules or what functionality is required.""F5 pricing is too high, compared to Citrix.""When we purchased additional licenses for our other locations, we received a discount of between 20% and 25%.""F5 BIG-IP can be expensive, although there are trial versions available which are helpful to find out if the solution is right for your company.""The price should be reduced because it is expensive when compared to the competition."

More F5 BIG-IP Pricing and Cost Advice »

Information Not Available
report
Use our free recommendation engine to learn which Application Delivery Controllers solutions are best for your needs.
455,301 professionals have used our research since 2012.
Questions from the Community
Top Answer: Performance parameters if of Imperva X10K and BIG-IP i2600 may be checked in the following links: https://www.imperva.com/resources/datasheets/Imperva-DS-SECURESPHERE-APPLIANCE-Web092118-1.pdf… more »
Top Answer: Apart from throughout consideration. Radware license charges based on throughput and F5 charges based on features only. For example, if you buy F5 with an appliance throughput of 10g that throughput… more »
Ask a question

Earn 20 points

Ranking
Views
46,267
Comparisons
35,918
Reviews
16
Average Words per Review
406
Rating
8.2
Views
1,124
Comparisons
477
Reviews
0
Average Words per Review
0
Rating
N/A
Popular Comparisons
Compared 13% of the time.
Compared 8% of the time.
Compared 7% of the time.
Compared 6% of the time.
Also Known As
BIG-IP, BIG-IP LTM, F5 ASM, Viprion, F5 BIG-IP Virtual Edition , Crescendo Networks Application Delivery Controller, BIG IPSafe-T SDA, Safe-T, Safe-T Software-Defined Access
Learn
F5
Safe-T
Overview
The BIG-IP family of products offers the application intelligence that network managers need to ensure applications are fast, secure, and available. All BIG-IP products share a common underlying architecture, F5's Traffic Management Operating System (TMOS), which provides unified intelligence, flexibility, and programmability. Together, BIG-IP's powerful platforms, advanced modules, and centralized management system make up the most comprehensive set of application delivery tools in the industry.



Safe-T is a provider of Zero Trust Access solutions which mitigate attacks on enterprises’ business-critical services and sensitive data, while ensuring uninterrupted business continuity. 

Safe-T’s cloud and on-premises solutions ensure that an organization’s access use cases, whether into the organization or from the organization out to the internet, are secured according to the “validate first, access later” philosophy of Zero Trust. 

This means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network or in the cloud. 

Safe-T’s wide range of access solutions reduce organizations’ attack surface and improve their ability to defend against modern cyberthreats. As an additional layer of security, our integrated business-grade global proxy solution cloud service enables smooth and efficient traffic flow, interruption-free service, unlimited concurrent connections, instant scaling and simple integration with our services. 

With Safe-T’s patented reverse-access technology and proprietary routing technology, organizations of all size and type can secure their data, services and networks against internal and external threats. 

At Safe-T, we empower enterprises to safely migrate to the cloud and enable digital transformation.

Offer
Learn more about F5 BIG-IP
Learn more about Safe-T Secure Application Access
Sample Customers
Riken, TransUnion, Tepco Systems Administration, Daejeon University, G&T Bank, Danamon, CyberAgent Inc.Government of Israel, eviCore Healthcore, Glen Imaging, Sarin, LBG, Rollomatic, Boegli-Gravures SA, Banque Heritage, Groupe Minoteries, Temenos, ZEK, RLM Finsbury, Harel Insurance, Meitav Dash
Top Industries
REVIEWERS
Comms Service Provider24%
Financial Services Firm20%
Manufacturing Company10%
Energy/Utilities Company7%
VISITORS READING REVIEWS
Computer Software Company29%
Comms Service Provider22%
Financial Services Firm7%
Government6%
VISITORS READING REVIEWS
Computer Software Company34%
Comms Service Provider23%
Government10%
Media Company7%
Company Size
REVIEWERS
Small Business29%
Midsize Enterprise13%
Large Enterprise58%
VISITORS READING REVIEWS
Small Business14%
Midsize Enterprise28%
Large Enterprise58%
No Data Available
Find out what your peers are saying about F5, Kemp, A10 Networks and others in Application Delivery Controllers. Updated: January 2021.
455,301 professionals have used our research since 2012.

F5 BIG-IP is ranked 1st in Application Delivery Controllers with 17 reviews while Safe-T Secure Application Access is ranked 21st in Enterprise Infrastructure VPN. F5 BIG-IP is rated 8.0, while Safe-T Secure Application Access is rated 0.0. The top reviewer of F5 BIG-IP writes "Stable and easy to set up with good anti-bot protection". On the other hand, F5 BIG-IP is most compared with Citrix ADC, HAProxy, A10 Networks Thunder ADC, Fortinet FortiWeb and NGINX Plus, whereas Safe-T Secure Application Access is most compared with Prisma Access by Palo Alto Networks, OpenVPN Access Server, Zscaler Internet Access, MOVEit and Zscaler Private Access.

See our list of .

We monitor all Application Delivery Controllers reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.