Clients can use Imperva Application Security Platform for various purposes, and as a reseller, I believe the best advantage in the product is its features that stand out for the client.
The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.
Use our online form to submit your review. It's quick and you can post anonymously.
Clients can use Imperva Application Security Platform for various purposes, and as a reseller, I believe the best advantage in the product is its features that stand out for the client.
I have experience with the real-time traffic inspection feature of Imperva Application Security Platform, and it helps with network security.
I believe the reputational analysis in Imperva Application Security Platform is effective for blocking security threats before impact. I also believe that behavioral and signature-based techniques help to improve threat detection accuracy.
I see valuable benefits from advanced detection and traffic profiling during DDoS attacks, and I track some metrics related to DDoS protection performance.
I see some areas for improvement in Imperva Application Security Platform, especially regarding price. Regarding return on investment, ROI, I can say it is noticeable with Imperva Application Security Platform, and I see some significant differences compared to other firewalls such as Palo Alto, where there are pros and cons between Imperva Application Security Platform and some competitors.
As for the deployment of Imperva Application Security Platform, I would say it can be a complex process, and I ask this because we are partners with AWS. I have not purchased a solution from AWS Marketplace or deployed it on AWS Cloud for a client.
I have been working and selling it for three years so far.
Regarding the scalability of Imperva Application Security Platform, I would say it is a scalable product with some limitations, but it is also a stable product without much glitch or downtime.
My experience with technical support from Imperva Application Security Platform was good when I reached out to them.
Negative
I have been in this domain with firewalls longer than three years, overall in this sphere with firewalls and security solutions.
I see some areas for improvement in Imperva Application Security Platform, especially regarding price. Regarding return on investment, ROI, I can say it is noticeable with Imperva Application Security Platform, and I see some significant differences compared to other firewalls such as Palo Alto, where there are pros and cons between Imperva Application Security Platform and some competitors.
F5 Distributed Cloud Services is being used for web application firewall along with API security, bot protection, and DDoS protection.
There are two scenarios involving web applications and mobile applications with applications hosted across private clouds and public clouds. When switching from one cloud to another, there is no need to change anything on the backend servers on the cloud service provider. Only the DNS level on F5 itself requires changes.
F5 provided a cloud security platform called a SaaS platform, which is a distributed cloud platform where CNAME and DNS changes can be added, and then the application load balancer can be deployed straight away.
F5 Distributed Cloud Services has been used for two years for DDoS protection, and there is a particular feature called API protection. Within API protection, there is malicious user mitigation, which is one particular technology that has been implemented. This is a kind of advanced bot attack prevention.
Malicious user mitigation is an AI/ML-based technology that was introduced by the F5 team, and this particular MUG protects rate limiting. If some users are having anomaly detection or someone is trying to do a bot attack, it will create a CAPTCHA challenge for that particular user alone and not for all users.
For example, if someone is trying to act as a rogue, it will create a CAPTCHA challenge in the backend system on that particular system, so they cannot try again and again at the same time. It is for a concurrent session, and it will give the CAPTCHA challenge. This MUG, malicious user mitigation, prevents bot attacks.
F5 Distributed Cloud Services includes the real-time intelligence feature, which helps with threat response strategies from a threat intelligence perspective. For example, if there are geo-restrictions or geo-based restrictions, sometimes people may come in through proxy-based servers, and it will prevent that.
The load balancing feature optimizes application performance. Observability is the basic piece where F5 got introduced. This observability piece provides end-to-end visibility on the application performance. It gives complete end-to-end visibility across network latency and application performance issues.
Sometimes when it is getting more than 200 pages, it throws errors such as 300, 400, or whatever has been configured, including 500 errors.
F5 Distributed Cloud Services has helped improve traffic management efficiency. Most applications are hosted in the Check Point and F5 firewall, F5 web application firewall, where applications and traffic management can be accessed in a single dashboard.
Automated threat detection is a basic feature of F5 Distributed Cloud Services meant for that purpose. There are two scenarios with automated threat detection, which is provided by F5. It is a completely machine learning solution that came from the bot defense, and it automatically protects against sophisticated attacks.
Last year there was a downtime of 30 minutes across the cloud distributed console, and that was the only impact observed. Since 30 minutes of downtime is huge for applications, maintenance, it impacted RPO, RTO, and all. The F5 CTO and their senior management team addressed that issue.
For availability, they have added additional clusters across all the regional edges in the Kubernetes clusters to enhance availability. However, this improvement needs to be monitored since it was a past incident.
F5 Distributed Cloud Services has been used for more than two years.
F5 Distributed Cloud Services is stable, and they are improving also.
There is no issue on the scalability part of F5 Distributed Cloud Services. The only thing is the initial phase is a challenge; scalability is not a concern. On the initial stage regarding pricing, the moment of committing is the only concern. On the scalability part, there have not been much issues.
Technical support from F5 is good compared to Cisco and HP. This support is very good. F5 provides remote support also. I would provide 9.5 for support.
Positive
F5 Distributed Cloud Services has an easy implementation across all the service providers including AWS, GCP, and Azure. F5 DXE has been implemented everywhere, and it is very easy to integrate.
F5 Distributed Cloud Services was deployed with a partner. Initially, the partner did not support it, but the team manages other solutions, so the people know the technology and have easily adopted it.
There is definitely a return on investment in F5 Distributed Cloud Services.
Compared to other providers, F5 Distributed Cloud Services is a little expensive. However, on the performance side, it is a robust solution. If comparing Check Point and F5 Distributed Cloud Services, F5 is a little expensive. The only difference is in price; technically, they are pretty much the same.
Whenever feedback is given, whether positive or negative, F5 takes it as a serious note and then fixes it. A lack of functionalities is not an issue. At the earlier stage when F5 Distributed Cloud Services was purchased two years ago, there was a lot of technology that was not able to be deployed.
For example, there were three to four different applications from different companies, and they could not be seen in a single dashboard. It was necessary to go to each and every dashboard and collect the centralized access management part. Now F5 has fixed it, and it is working fine. Overall, I would give F5 Distributed Cloud Services a rating of 8 out of 10.