PeerSpot takes a user-centered approach to creating product comparisons that help IT decision-makers arrive at informed decisions. Instead of relying on the word of the companies that create the technological solutions, they go to the users themselves. Real users offer true feedback without any of the partiality that the solutions’ vendors may have. This is a place where peers in the tech world unite to help each other choose the products that are most appropriate for their needs.
PeerSpot’s users have made it easy for decision-makers to choose the Application Delivery Controller (ADC) tools that most fit their business objectives. They have created a ranked list of solutions according to how potentially valuable they feel these products may be to other users. What follows are the top three ranked products for 2022:
1. F5 BIG-IP Local Traffic Manager (LTM)
F5 BIG-IP Local Traffic Manager (LTM) is PeerSpot users’ favorite application delivery controller tool.
F5 BIG-IP Local Traffic Manager (LTM) is an application delivery controller solution that offers users a number of valuable benefits. Users gain the ability to quickly and securely scale up their applications. It ensures that users can expand their services and scale up their applications to meet their customer’s needs without ever having to sacrifice security. BIG-IP LTM provides users with deep insights into all of the traffic entering and exiting their application. This makes it easier than ever for users to secure their applications. It is also highly flexible. It can be deployed in many different environments. BIG-IP LTM can be used in physical, cloud, and virtual environments. Users can easily meet their needs by deploying in the environment that is most convenient for them. This solution is easy for users to both deploy and manage. Users can set the protocols that this solution uses to guard them. Additionally, the solution comes with templates that users can use straight out of the box without devoting a significant amount of resources.
A senior engineer at a computer software company writes, “ Overall the solution keeps our application functional from a client's perspective 24 hours a day, seven days a week. We have rules that are set up to detect if any part of the application in one of the nodes is not functioning correctly, having a problem, or is experiencing any sort of error, it will automatically pull it out of the load balance bundle and alerts somebody to go take action and at the address. This means our clients are happy because they are not receiving strange errors because somebody's typed something somewhere incorrectly and we are happy because our up-time is reliable.”
Jonathan U., a security services professional at a communications service provider, writes, “The product needs to implement some kind of artificial intelligence or machine learning that can start to generate fewer false positive requests. We tend to have a lot of false positives. The policy should be created in such a way as to help lower false positives.”
2. Kemp LoadMaster
Kemp LoadMaster is PeerSpot’s second highest ranked application delivery controller tool.
Kemp LoadMaster is a suite of application delivery controller solutions that has many valuable and powerful features. It allows users to easily integrate their systems with a wide variety of other solutions. This includes solutions that are specifically geared for particular industries or fields, such as education or healthcare. Users can integrate with the software solutions that enable them to meet their needs. Furthermore, users gain the ability to take control of all aspects of both their incoming and outgoing traffic. This tool enables administrators to enforce policies that maintain the quality of service of their networks at all times. Administrators can streamline the process that allows users to access the network and make it so that only those with the proper credentials and who meet the security policies will be admitted. Kemp LoadMaster is also guarded by a firewall that is constantly being upgraded. This firewall allows users to address new threats as they arise. The firewall protects systems from common vulnerabilities. The firewall comes with pre-defined rules as well as the ability to create custom rules to meet a user’s specific security needs.
A systems administrator at Lincoln Land Community College writes, “Failover is seamless and our services are rock solid. Kemp maintains a library of templates pre-configured for a number of services, including Microsoft Skype for Business Server. This makes configuring the virtual services very easy. It also makes it very easy to add additional virtual services as you find new use cases. The convenience of being able to download new or updated templates from Kemp's support site cannot be understated.”
The director of information technology at a computer software company writes, “The UI is very basic and not very attractive, so this could be an area for improvement. In the next release, I would like to see global load balancing and the ability to connect to networks not physically attached to the individual device (VPNs or point-to-point connections, for example).”
3. Microsoft Azure Application Gateway
Microsoft Azure Application Gateway is PeerSpot’s third highest ranked application delivery controller tool.
Microsoft Azure Application Gateway is a powerful solution designed to enable system administrators to take full control of the web traffic that runs through their applications. It safeguards a user’s applications both by employing a standard firewall and by enabling users to create custom protocols. Users can protect themselves from common threats as well as from any specific threats that might arise. They can weed out false positives by creating protocols that address their specific needs. Administrators gain a high level of system flexibility. Microsoft Azure Application Gateway can be set to scale up automatically to accommodate the level of traffic being experienced. Additionally, it encrypts all traffic that is filtered through it. This guarantees that anything private will stay that way.
Tony K., an information technology consultant at Productive IT Solutions, writes, "The health probe is pretty good for your backend health. It tells you whether it's communicating and talking to the endpoint correctly. It is quite useful."
A pre-sales engineer at a technological services company, writes, “The configuration is very specific right now and needs to be much more flexible. They need to work on it so that it's much easier to configure the solution so that it works how we need it to. It needs to be customizable.”