Find out what your peers are saying about NetScaler, F5, HAProxy and others in Application Delivery Controllers (ADC).
The major return on investment is the security of our data.
My thoughts on the pricing, setup cost, and licensing of the Imperva SecureSphere Database Security are that it could be more competitive.
I would rate the technical support of F5 BIG-IP Local Traffic Manager (LTM) nine out of ten.
Local vendors provide on-ground support, and if issues cannot be resolved, a support ticket is raised to the OEM via a portal.
Regarding customer support, I would like to see improvements in response time.
The solution works well for large organizations and enterprise levels if appropriately sized during the setup.
The scalability of the Imperva SecureSphere Database Security in accommodating the organization's growth and database security needs is excellent.
It is important to manage it correctly by performing health checks with the vendor.
I rate the stability of Imperva SecureSphere Database Security as nine because there are ongoing integration processes between Imperva and Thales.
We cannot be competitive by price alone, though in terms of quality, Imperva SecureSphere Database Security is the best compared to Russian import products and building products such as Garda, which attempt to copy Imperva's data activity monitoring and database firewall functionality.
The archiving functionalities should be enhanced to allow easy conversion of archived logs into CSV or Excel formats for data analysis.
The product is costly.
The price is high, but it is not as high as competitors like IBM, Guardian, and Oracle.
One of the most beneficial features of F5 BIG-IP Local Traffic Manager (LTM) is its ability to identify compromised traffic and its capabilities in authentication.
Imperva SecureSphere Database Security provides one of the best solutions to analyze data, maintain GDPR compliance, and help investigate any incidents.
The Imperva SecureSphere Database Security has significantly aided my organization in forensic investigations and compliance audits.
If something malicious occurs, I can set a policy to block it, review the action, and decide whether to release it if it's found not to be malicious.
Product | Market Share (%) |
---|---|
F5 BIG-IP Local Traffic Manager (LTM) | 15.9% |
NetScaler | 14.3% |
HAProxy | 11.3% |
Other | 58.5% |
Product | Market Share (%) |
---|---|
Imperva's Data Security Fabric | 27.2% |
IBM Security Guardium Data Protection | 29.5% |
Oracle Audit Vault | 14.8% |
Other | 28.5% |
Company Size | Count |
---|---|
Small Business | 62 |
Midsize Enterprise | 31 |
Large Enterprise | 84 |
Company Size | Count |
---|---|
Small Business | 26 |
Midsize Enterprise | 9 |
Large Enterprise | 32 |
F5 BIG-IP LTM optimizes the speed and reliability of your apps via both network and application layers. Using real-time protocol and traffic management decisions based on app and server and connection management conditions, and TCP and content offloading, BIG-IP LTM dramatically improves application and infrastructure responsiveness. BIG-IP LTM's architecture includes protocol awareness to control traffic for the most important applications. BIG-IP LTM tracks the dynamic performance levels of servers and delivers SSL performance and visibility for inbound and outbound traffic, to protect the user experience by encrypting everything from the client to the server.
BIG-IP LTM provides enterprise-class Application Delivery Controller (ADC). You get granular layer 7 control, SSL offloading and acceleration capabilities, and advanced scaling technologies that deliver performance and reliability on-demand. The highly optimized TCP/IP stack combines TCP/IP techniques and improvements in the latest RFCs with extensions to minimize the effect of congestion and packet loss and recovery. Independent testing tools and customer experiences show LTM's TCP stack delivers up to a 2x performance gain for users and a 4x increase in bandwidth efficiency.
Imperva Data Security Fabric provides cutting-edge database security, featuring capabilities like activity monitoring, web application firewalls, and real-time alerting for comprehensive data protection.
Imperva Data Security Fabric focuses on securing databases through advanced monitoring, logging, and user behavior analysis. With features designed for ease of configuration, it effectively blocks unauthorized access and maintains detailed audit logs. Integration with other systems and automated reporting enhance vulnerability assessments and compliance efforts. Imperva's data discovery, classification, and masking capabilities strengthen security by managing user rights and uncovering vulnerabilities, making it ideal for protecting sensitive data and supporting forensic and compliance needs.
What are the key features of Imperva Data Security Fabric?Imperva Data Security Fabric is widely used across industries like finance and government, focusing on database security, activity monitoring, and user behavior analysis. It is essential for detecting unauthorized access and preventing data breaches while ensuring compliance. Financial institutions and government agencies leverage its capabilities to maintain data integrity and monitor database activities, implementing firewalls and vulnerability assessments that secure on-premises and cloud environments.
We monitor all Application Delivery Controllers (ADC) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.