We just raised a $30M Series A: Read our story
2017-09-07T08:38:00Z

What is your primary use case for F5 BIG-IP?

139

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

ITCS user
Guest
4848 Answers

author avatar
Top 5Real User

In terms of our primary use cases - all our web services, our main web portals, and our TV service sit behind the F5, so any customer would have to traverse our F5 for the services at the back of it. It serves our backend and front end services.

2021-08-23T11:20:00Z
author avatar
Top 5Real User

We primarily use the solution for security purposes.

2021-08-06T15:38:55Z
author avatar
Top 5Real User

The product can be used for many applications including load balancing and GLB's overload balancing. It depends on the module. If there's a public APM you can use it for WAF and many other use-cases.

2021-06-11T15:09:00Z
author avatar
Top 20Real User

I am not the F5 administrator so I don't use all of the features. I primarily perform daily operations such as checking statistics and deploying new virtual servers.

2021-05-17T13:14:24Z
author avatar
Top 5Real User

We are using it for web application firewall and load balancing features. We have its latest version.

2021-03-31T08:55:00Z
author avatar
Top 10Reseller

Mostly I support my clients in relation to the product.

2021-02-17T14:19:42Z
author avatar
Top 20Real User

We use the solution as a proxy to our websites, load balancing all our servers as clients come onto our website and use our services. Our website provides around 15 different services. We are customers of F5 and I'm a solutions architect for telecom and network infrastructure.

2021-02-10T08:14:32Z
author avatar
Top 5LeaderboardReseller

We are a reseller of F5, but we haven't had many projects that we've deployed with F5. In terms of use cases, it is used when clients have web servers, and they are hosting on their own infrastructure. When they have web applications that are publicly visible, they use F5 to balance that incoming traffic for their web servers.

2021-01-24T08:38:46Z
author avatar
Top 5LeaderboardReseller

The solution is mostly used for the LTM load balancer. Recently more of our customers are using it for the web application firewall. Some of my other customers are using the GTM model also.

2021-01-22T22:09:45Z
author avatar
Top 20Real User

We are a solution provider and we work with a lot of products from F5. In our internal network, we use F5 BIG-IP. We also have a few implementations with this product, including some that are integrated with other solutions such as IBM Guardium. One of the great use cases is capturing an application user through F5 and then pushing it to Guardium. This is very useful for our customers because they can then connect to the database with a real application user, which is something that is very hard to achieve through other vendors.

2021-01-12T21:52:17Z
author avatar
Top 10Real User

We are using this solution as a load balancer and reverse proxy.

2020-12-29T15:57:30Z
author avatar
Top 20Real User

Our engineers use various products from the F5 BIG-IP range when creating application solutions. Primarily, we make use of F5 BIG-IP's ASM (Application Security Manager) and WAF (Web Application Firewall). For most of our applications, we require that our servers, and server-related software, are hosted in virtual machine environments.

2020-12-24T07:37:29Z
author avatar
Top 20Reseller

We are in the security business, basically working in two segments; the first is in the financial sector, with the largest banks in the country, and second, we work with some government organizations and corporate businesses. Only B2B for now, not much retail. We have a few projects in insurance companies. The solution is deployed on-premise in our office and we basically use it for demo and testing purposes. We deploy for our customers both on-premise and on cloud. We are a distribution channel, like a reseller. I'm a channel development manager.

2020-12-10T03:12:56Z
author avatar
Top 20Real User

The F5 is something we purchased for another project that has not been turned on just yet.

2020-12-04T23:51:22Z
author avatar
Top 5LeaderboardReal User

Our company is based in different geographical locations and we need to create SD-WANs with tight security while allowing remote access to our resources. To manage that and to manage the whole network, we use BIG-IP.

2020-12-04T12:31:02Z
author avatar
Top 10Real User

We are using this solution for the web application firewall and load balancing.

2020-11-11T08:06:52Z
author avatar
Top 5LeaderboardReal User

Our primary use case for this solution is as an alternative for ADT. We work with standard enterprise customers because this product is not affordable for the SME, it's not a cheap solution. We are partners with F5 and I'm a pre-sales and technical executive.

2020-07-16T06:21:12Z
author avatar
Top 20MSP

We are a solution provider and this is one of the products that we implement for our clients. Some of our clients use it as a load balancer. It can also be used as a web application firewall to protect your web-based applications from attacks.

2020-07-05T15:50:30Z
author avatar
Top 20Real User

We mainly use this solution for application delivery and application security - the product is used on a daily basis. We are partners of F5 and I'm the head of IT infrastructure.

2020-06-15T07:34:14Z
author avatar
Top 20Real User

We use the whole pallet of the Big-IP products starting with the Application Security Management, the web application firewall for the F5. We use it for the protection of files at sites and we also use the load balancer. I also have experience with the airlock and we're now researching the possibility of exchanging our Big-IP system with something else. We're hoping to find a solution that's better for the cloud but which can be a hybrid. We have a partnership with several vendors and I work as an IT security engineer.

2020-06-15T07:33:53Z
author avatar
Real User

Our primary use case is for ADC (Application Delivery Controller) and SSL VPN prospectively worked for the PoC.

2019-04-14T01:50:00Z
author avatar
Reseller

F5 has performed marvelously. It certainly holds in value and holds its name.

2019-04-02T07:02:00Z
author avatar
Real User

We use F5 BIG-IP with LTM burst, SM burst, and ETM burst. We use it in our cloud service and all our service centers. We even offer F5 BIG-IP to our partners.

2019-03-31T09:41:00Z
author avatar
Real User

We are primarily using it for load balancing, and with BIG-IQ managing Layer 7 security policies.

2019-02-18T17:50:00Z
author avatar
Consultant

We use it to deliver services on the cloud.

2019-01-14T13:16:00Z
author avatar
Real User

We use it for brokering services.

2018-12-11T08:31:00Z
author avatar
Real User

We use it as a load balancer.

2018-12-11T08:31:00Z
author avatar
Real User

We are using it for load balancing and security. When someone requests data through the load balancer, we pull the certificate name out to identify who that person is. This is one of the things that F5 does. We haven't able to replicate this so far with the Amazon products. That is why we are going to F5.

2018-12-11T08:31:00Z
author avatar
Real User

* Load balancing * Certificate management * Pooling of services

2018-12-11T08:31:00Z
author avatar
Real User

We use it for local traffic management and for the application firewall. We are trying to deploy virtual appliances in AWS.

2018-12-11T08:31:00Z
author avatar
Real User

We use it for load balancing and routing.

2018-12-11T08:30:00Z
author avatar
Real User

We use it for a number of solutions that we build, mostly for identity and access management control.

2018-12-11T08:30:00Z
author avatar
Real User

We use it for low balancing. It has been in our environment for four to five years, but I have only been using it for a little over a year.

2018-12-09T08:34:00Z
author avatar
Real User

We use it primarily for WAF.

2018-12-05T07:52:00Z
author avatar
Real User

When we migrate workloads into the cloud, we need the same functionality in the cloud, and low balancing is part of that. Being able to manage the platform on cloud, the same as on-premise, is the use case.

2018-12-04T07:57:00Z
author avatar
Real User

We use F5 for the load balancing of our equipment. We use it for DDoS functionalities in our security solution.

2018-08-05T06:48:00Z
author avatar
Reseller

In Vietnam, F5 provides better services.

2018-08-02T11:48:00Z
author avatar
Real User

Primary use case is as our main protection. You can use it for brute force and other kinds of cross-site attacks.

2018-08-02T11:48:00Z
author avatar
Real User

F5 delivers a full range of solutions that simplify service providers’ security architectures while mitigating threats. The full proxy architecture of F5 solutions also allows service providers to attain extensive visibility and control throughout layers 4 through 7. This enables granular control of all connections, more extensive security functionality, and comprehensive end-to-end protection against DDoS and other attacks. F5 solutions protect targeted network elements, the DNS infrastructure, devices, and applications with features that include application health monitoring, a robust web application firewall, web access controls, TCP optimization, web acceleration, L7 DDoS protection, and broad SSL support, including SSL inspection and offload.

2018-08-02T11:48:00Z
author avatar
Consultant

We have around 12 data centers. On average, in every data center, we have 14 to 15 F5 load balancers. We manage everything from a central location, then we deploy policy for use, giving us a place for our control managers.

2018-08-02T11:48:00Z
author avatar
Vendor

We use it as an LTM and as a reverse proxy to publish web services.

2018-07-30T06:35:00Z
author avatar
Real User

There is more than one use case. The most important is the Local Traffic Manager (LTM). We are using it to load balance our web applications, SSL decryption and application adjusting, along with some TCP features. We are also load balancing traffic between appropriate back-ends for risk.

2018-07-30T06:35:00Z
author avatar
User

GTM and LTM are the primary uses of the solution. Our company has two active data centers and a data center that is being activated. F5 BIG-IP helps us a lot.

2018-07-05T02:00:00Z
author avatar
User

Publishing of many applications through the F5 reverse proxy to the Internet. We are also using the F5 as an IdP server.

2018-05-18T06:14:00Z
author avatar
Real User

We are using it primarily for load balancing. We also make great use of SSL interception (offloading and onloading), packet inspection, rewriting, and DNS wide IP.

2018-04-23T08:11:00Z
author avatar
Real User

This is for remote access to an internal network of the organization to do all types of work. The requirement for VPN is secure with high performance.

2018-03-05T03:45:00Z
author avatar
Top 5Real User

We’re a systems integration company. We propose this solution mostly to our banking customers and large enterprise clients, so that they can load-balance their core banking applications and their main applications. It also provides proxying, the client cannot directly access the server. BIG-IP is a proxy between the user and the server, so the client cannot make connections directly to servers. They land on F5 BIG-IP and then F5 creates connections on servers on behalf of clients. We use the solution for smarter, safer, and reliable connectivity.

2018-02-06T07:39:00Z
author avatar
Reseller

The primary use cases are application load balancing and as a web application firewall.

2017-09-07T08:38:00Z
Learn what your peers think about F5 BIG-IP Local Traffic Manager (LTM). Get advice and tips from experienced pros sharing their opinions. Updated: October 2021.
542,267 professionals have used our research since 2012.