Compare F5 BIG-IP vs. Safe-T Software-Defined Access

F5 BIG-IP is ranked 1st in Enterprise Infrastructure VPN with 32 reviews while Safe-T Software-Defined Access is ranked 3rd in Enterprise Infrastructure VPN with 8 reviews. F5 BIG-IP is rated 7.8, while Safe-T Software-Defined Access is rated 7.8. The top reviewer of F5 BIG-IP writes "It could be hard to scale because we will be encrypting and decrypting. The connection through the API Gateway worked in no time, which was fantastic". On the other hand, the top reviewer of Safe-T Software-Defined Access writes "The architecture is open to integration and development, making the product very flexible". F5 BIG-IP is most compared with HAProxy , Citrix NetScaler ADC and NGINX Plus, whereas Safe-T Software-Defined Access is most compared with Zscaler Internet Access, F5 BIG-IP and Axway SecureTransport. See our F5 BIG-IP vs. Safe-T Software-Defined Access report.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about F5 BIG-IP vs. Safe-T Software-Defined Access and other solutions. Updated: September 2019.
366,486 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
F5 BIG-IP is used with good applications and functions as an application firewall with additional features. We will not use any feature or any service unless there is a business case and there is a need for implementation.We're able to do load balancing and global load balancing. When you marry those two products together, you can do a lot more. We're able to deliver our applications more securely and faster. It has improved our deliverability where we have more service across the shared data centers. We can intelligently reach all of those client connections across all of the servers and do it fairly quickly. It has helped improve our application delivery and performance.It is a fast and available solution.It is the perfect solution when you have high workloads in your IT environment.It integrates with AWS WAF, which makes it easy to deploy without changes to your infrastructure.It improves the overall performance of applications by decreasing the burden on servers associated with managing and maintaining applications and network sessions, as well as by performing application-specific tasks.Initial setup is easy and pretty standard.It is a very good, flexible solution. It helps us to catch up on flaws in our partner solutions on top of its load balancing feature.

Read more »

the security level is very high. After we tested it and checked all the security aspects of the product, we found that it's highly secure.If you want a very flexible system that you can easily integrate, and develop interfaces for it or plug-ins to other application environments, it's probably the most flexibleSafe-T is very good for users because it has plug-in for Outlook.It's easy to use over the web. A user who is not in the office can use it and securely insert files.

Read more »

Cons
The license terms for "non-commercial" will be a challenge for us.The license terms for "non-commercial" will are challenging for us.There are issues with F5 BIG-IP but they are minor issues not affecting production and services. Sometimes the operations and the facility systems fail. However, there is an alert action from the windows. An ordeal for the manager.I would like to see improvement in the manageability and easier setup.I would like them to have more flexible models.Performance: Using the product, applications are jittery.​Needs to provide a visual interface to follow a customer's activity (from client to BIG-IP to SNAT IP to the chosen server, then back). Today, we are still performing packet captures.We would like to see load balancing between the cloud and the on-premise, a straightforward deployment feature.

Read more »

One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents.The Outlook agent is not working well for installing it in the entire office.

Read more »

Pricing and Cost Advice
They are expensive.We purchased through the AWS Marketplace because it was a popular way to go, and we were intrigued. The price of this product is not an issue. They have good pricing and licensing.Unless the price difference is large, this is not the primary concern for the product. The performance and product-related issues (secure for VPN, multi-function for network device, etc.) are the keys.I would recommend that the cost be lowered.If you are planning to use security features, better to go for strong hardware and the best bundle license, which is great for web security.The price is high.We have found the pricing and licensing on AWS to be competitive.Purchasing through the AWS Marketplace was good. We chose to go through the AWS Marketplace because everything that we needed was a soft appliance. We needed something to work in Amazon, and this product was available there.

Read more »

Information Not Available
report
Use our free recommendation engine to learn which Enterprise Infrastructure VPN solutions are best for your needs.
366,486 professionals have used our research since 2012.
Ranking
Views
38,849
Comparisons
30,749
Reviews
29
Average Words per Review
398
Avg. Rating
7.9
Views
971
Comparisons
241
Reviews
7
Average Words per Review
549
Avg. Rating
7.9
Top Comparisons
Compared 16% of the time.
Compared 14% of the time.
Compared 7% of the time.
Also Known As
BIG-IP, BIG-IP LTM, F5 ASM, Viprion, F5 BIG-IP Virtual Edition , Crescendo Networks Application Delivery Controller, BIG IPSafe-T SDA, Safe-T
Learn
F5
Safe-T
Overview
The BIG-IP family of products offers the application intelligence that network managers need to ensure applications are fast, secure, and available. All BIG-IP products share a common underlying architecture, F5's Traffic Management Operating System (TMOS), which provides unified intelligence, flexibility, and programmability. Together, BIG-IP's powerful platforms, advanced modules, and centralized management system make up the most comprehensive set of application delivery tools in the industry.

Safe-T’s Software-Defined Access is a multi-layered solution, addressing the applications and data access challenge in a hybrid cloud environment. The perimeter is ever expanding, with the introduction of remote access, IOT, BYOD and cloud services. By deploying Safe-T’s solution, you can now unify and streamline all your access and exchange systems and modernize your security perimeter on-premise and in the cloud. It protects and controls access by separating the access layer from the authentication layer, and by segmenting internal networks. This reduces the attack surface and mitigating the risk of external threats such as network DDoS, SSL based attacks, application attacks and more.

Offer
Learn more about F5 BIG-IP
Read More

Download Safe-T's SDP eBook to Learn More

Sample Customers
Riken, TransUnion, Tepco Systems Administration, Daejeon University, G&T Bank, Danamon, CyberAgent Inc.Government of Israel, eviCore Healthcore, Glen Imaging, Sarin, LBG, Rollomatic, Boegli-Gravures SA, Banque Heritage, Groupe Minoteries, Temenos, ZEK, RLM Finsbury, Harel Insurance, Meitav Dash
Top Industries
REVIEWERS
Comms Service Provider26%
Financial Services Firm22%
Healthcare Company11%
Manufacturing Company11%
VISITORS READING REVIEWS
Software R&D Company23%
Financial Services Firm15%
Comms Service Provider14%
Manufacturing Company6%
No Data Available
Company Size
REVIEWERS
Small Business25%
Midsize Enterprise14%
Large Enterprise61%
VISITORS READING REVIEWS
Small Business32%
Midsize Enterprise21%
Large Enterprise47%
No Data Available
Find out what your peers are saying about F5 BIG-IP vs. Safe-T Software-Defined Access and other solutions. Updated: September 2019.
366,486 professionals have used our research since 2012.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Sign Up with Email