F5 BIG-IP Primary Use Case

Thomas Hejula
Senior IT Engineer at Lumeris
We use it primarily for WAF. View full review »
Rehan Ghayyur Khan
Technical Product Manager at IIPL
We’re a systems integration company. We propose this solution mostly to our banking customers and large enterprise clients, so that they can load-balance their core banking applications and their main applications. It also provides proxying, the client cannot directly access the server. BIG-IP is a proxy between the user and the server, so the client cannot make connections directly to servers. They land on F5 BIG-IP and then F5 creates connections on servers on behalf of clients. We use the solution for smarter, safer, and reliable connectivity. View full review »
Solutiond87c
Solutions Architect at a tech services company with 5,001-10,000 employees
We are using it for load balancing and security. When someone requests data through the load balancer, we pull the certificate name out to identify who that person is. This is one of the things that F5 does. We haven't able to replicate this so far with the Amazon products. That is why we are going to F5. View full review »
Find out what your peers are saying about F5, Citrix, HAProxy and others in Application Delivery Controllers. Updated: November 2019.
378,124 professionals have used our research since 2012.
Flight9875
User at a logistics company with 1,001-5,000 employees
F5 has performed marvelously. It certainly holds in value and holds its name. View full review »
Reviewer702843
Director Technology Solutions with 11-50 employees
The primary use cases are application load balancing and as a web application firewall. View full review »
Network8776
Network Presales Manager at a comms service provider with 201-500 employees
We use F5 BIG-IP with LTM burst, SM burst, and ETM burst. We use it in our cloud service and all our service centers. We even offer F5 BIG-IP to our partners. View full review »
Eric Foote
Managing Director at a financial services firm with 10,001+ employees
When we migrate workloads into the cloud, we need the same functionality in the cloud, and low balancing is part of that. Being able to manage the platform on cloud, the same as on-premise, is the use case. View full review »
Aliaksei Shyshkou
Lead Network Engineer at a financial services firm with 10,001+ employees
There is more than one use case. The most important is the Local Traffic Manager (LTM). We are using it to load balance our web applications, SSL decryption and application adjusting, along with some TCP features. We are also load balancing traffic between appropriate back-ends for risk. View full review »
Erez Bar On
IT Manager at a tech vendor with 51-200 employees
We use it as an LTM and as a reverse proxy to publish web services. View full review »
Robert Smith
DevOps Manager at TaxAct
We use it for low balancing. It has been in our environment for four to five years, but I have only been using it for a little over a year. View full review »
ChiefSecd99d
Chief Security Architect at a tech services company with 10,001+ employees
We use it for brokering services. View full review »
Joshua Cruz
Associate Systems Engineer at Frontline Education
We use it as a load balancer. View full review »
Bachir Elsitt
Network Security Engineer at Data Consult
F5 delivers a full range of solutions that simplify service providers’ security architectures while mitigating threats. The full proxy architecture of F5 solutions also allows service providers to attain extensive visibility and control throughout layers 4 through 7. This enables granular control of all connections, more extensive security functionality, and comprehensive end-to-end protection against DDoS and other attacks. F5 solutions protect targeted network elements, the DNS infrastructure, devices, and applications with features that include application health monitoring, a robust web application firewall, web access controls, TCP optimization, web acceleration, L7 DDoS protection, and broad SSL support, including SSL inspection and offload. View full review »
Guojun Jin
Staff Engineer at a manufacturing company with 11-50 employees
This is for remote access to an internal network of the organization to do all types of work. The requirement for VPN is secure with high performance. View full review »
ipmplspr538920
Security Governance at a comms service provider with 1,001-5,000 employees
We are using it primarily for load balancing. We also make great use of SSL interception (offloading and onloading), packet inspection, rewriting, and DNS wide IP. View full review »
Samar Choudhury
Assistant Vice President at Nagarro
We have around 12 data centers. On average, in every data center, we have 14 to 15 F5 load balancers. We manage everything from a central location, then we deploy policy for use, giving us a place for our control managers. View full review »
Luis Henriquez
Hewlett Packard Enterprise Solution Architect at a tech services company with 11-50 employees
We use it to deliver services on the cloud. View full review »
Technicab017
Technical Team Leader at a tech services company with 1-10 employees
We use it for local traffic management and for the application firewall. We are trying to deploy virtual appliances in AWS. View full review »
Director1e9d
Director Public Sector at Smart Tronix Inc
We use it for a number of solutions that we build, mostly for identity and access management control. View full review »
Develope0fe0
Developer at a tech vendor with 51-200 employees
* Load balancing * Certificate management * Pooling of services View full review »
Nt3210Sec8
Network Security Administrator at a tech services company with 1,001-5,000 employees
Primary use case is as our main protection. You can use it for brute force and other kinds of cross-site attacks. View full review »
Sathiya Shunmugasundaram
Site Reliability Engineer at Apple
We use it for load balancing and routing. View full review »
Inderjeet Singh
Senior Network Engineer at a financial services firm with 1,001-5,000 employees
The primary use case is the common use case for everyone. It has performed well. View full review »
Jiri Kermes
ACT Solutions Architect ve společnosti with 51-200 employees
Implementing load balancing services inside managed hosting services based on VMware solutions. The solution is presented as IaaS. F5 BIG-IP VE will be implemented in cooperation with the Cisco ACI solution. View full review »
Pablo Vega
Ingeniero at a comms service provider with 1,001-5,000 employees
We use F5 for the load balancing of our equipment. We use it for DDoS functionalities in our security solution. View full review »
ShivSingh
Sr. Advisor at a healthcare company with 10,001+ employees
We are primarily using it for load balancing, and with BIG-IQ managing Layer 7 security policies. View full review »
JackChen3
User
GTM and LTM are the primary uses of the solution. Our company has two active data centers and a data center that is being activated. F5 BIG-IP helps us a lot. View full review »
Kay Jackels
Technology Manager with 1-10 employees
Publishing of many applications through the F5 reverse proxy to the Internet. We are also using the F5 as an IdP server. View full review »
Hu231Anly367
User with 51-200 employees
In Vietnam, F5 provides better services. View full review »
Girisha R
Associate Manager - IT Operations at a tech vendor with 10,001+ employees
Our primary use case is for ADC (Application Delivery Controller) and SSL VPN prospectively worked for the PoC. View full review »
Find out what your peers are saying about F5, Citrix, HAProxy and others in Application Delivery Controllers. Updated: November 2019.
378,124 professionals have used our research since 2012.
Sign Up with Email