How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
Our primary use case is for ADC (Application Delivery Controller) and SSL VPN prospectively worked for the PoC.
F5 has performed marvelously. It certainly holds in value and holds its name.
We use F5 BIG-IP with LTM burst, SM burst, and ETM burst. We use it in our cloud service and all our service centers. We even offer F5 BIG-IP to our partners.
We are primarily using it for load balancing, and with BIG-IQ managing Layer 7 security policies.
We use it to deliver services on the cloud.
We use it for brokering services.
We use it as a load balancer.
We are using it for load balancing and security. When someone requests data through the load balancer, we pull the certificate name out to identify who that person is. This is one of the things that F5 does. We haven't able to replicate this so far with the Amazon products. That is why we are going to F5.
* Load balancing * Certificate management * Pooling of services
We use it for local traffic management and for the application firewall. We are trying to deploy virtual appliances in AWS.
We use it for load balancing and routing.
We use it for a number of solutions that we build, mostly for identity and access management control.
We use it for low balancing. It has been in our environment for four to five years, but I have only been using it for a little over a year.
We use it primarily for WAF.
When we migrate workloads into the cloud, we need the same functionality in the cloud, and low balancing is part of that. Being able to manage the platform on cloud, the same as on-premise, is the use case.
We use F5 for the load balancing of our equipment. We use it for DDoS functionalities in our security solution.
In Vietnam, F5 provides better services.
Primary use case is as our main protection. You can use it for brute force and other kinds of cross-site attacks.
F5 delivers a full range of solutions that simplify service providers’ security architectures while mitigating threats. The full proxy architecture of F5 solutions also allows service providers to attain extensive visibility and control throughout layers 4 through 7. This enables granular control of all connections, more extensive security functionality, and comprehensive end-to-end protection against DDoS and other attacks. F5 solutions protect targeted network elements, the DNS infrastructure, devices, and applications with features that include application health monitoring, a robust web application firewall, web access controls, TCP optimization, web acceleration, L7 DDoS protection, and broad SSL support, including SSL inspection and offload.
We have around 12 data centers. On average, in every data center, we have 14 to 15 F5 load balancers. We manage everything from a central location, then we deploy policy for use, giving us a place for our control managers.
We use it as an LTM and as a reverse proxy to publish web services.
There is more than one use case. The most important is the Local Traffic Manager (LTM). We are using it to load balance our web applications, SSL decryption and application adjusting, along with some TCP features. We are also load balancing traffic between appropriate back-ends for risk.
GTM and LTM are the primary uses of the solution. Our company has two active data centers and a data center that is being activated. F5 BIG-IP helps us a lot.
Publishing of many applications through the F5 reverse proxy to the Internet. We are also using the F5 as an IdP server.
We are using it primarily for load balancing. We also make great use of SSL interception (offloading and onloading), packet inspection, rewriting, and DNS wide IP.
This is for remote access to an internal network of the organization to do all types of work. The requirement for VPN is secure with high performance.
We’re a systems integration company. We propose this solution mostly to our banking customers and large enterprise clients, so that they can load-balance their core banking applications and their main applications. It also provides proxying, the client cannot directly access the server. BIG-IP is a proxy between the user and the server, so the client cannot make connections directly to servers. They land on F5 BIG-IP and then F5 creates connections on servers on behalf of clients. We use the solution for smarter, safer, and reliable connectivity.
The primary use cases are application load balancing and as a web application firewall.