We changed our name from IT Central Station: Here's why

F5 SSL Visibility (EOL) OverviewUNIXBusinessApplication

What is F5 SSL Visibility (EOL)?

The majority of malware and data exfiltration hides within SSL/TLS encryption, blinding your security inspection tools. Decrypt and orchestrate to make your controls more effective.

F5 SSL Visibility (EOL) Customers
American Systems, MAXIMUS, Motorists Insurance Group, Talentsoft , ZipWhip, LivePerson, SHINSEGAE INTERNET DUTY FREE
F5 SSL Visibility (EOL) Video

F5 SSL Visibility (EOL) Pricing Advice

What users are saying about F5 SSL Visibility (EOL) pricing:
"The price of the solution is a little high."

F5 SSL Visibility (EOL) Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Sr. Network Engineer at a computer software company with 201-500 employees
Real User
Top 5Leaderboard
Consistent and stable with a straightforward setup
Pros and Cons
  • "The initial setup isn't too difficult."
  • "The most difficult thing that we have to deal with is SSL Hardening. Vulnerabilities are found in various ciphers, getting them removed, identifying them, et cetera."

What is our primary use case?

We primarily use the solution for securing public internet communications.

What is most valuable?

Just the very functionality of the load balancer has been very useful to our organization. It's been essential for our operations to stay up and stay operational. There have been few problems where a particular node has been offline for whatever reason - yet we've been able to maintain consistently due to the fact that we have five load balances and everything. That's been very effective.

The initial setup isn't too difficult.

The solution has a very good community the surrounds the product. 

The solution has been quite stable over the years we've had it running.

What needs improvement?

The most difficult thing that we have to deal with is SSL Hardening. Vulnerabilities are found in various ciphers, getting them removed, identifying them, et cetera.

For how long have I used the solution?

I've been working with the solution for more than five years at this point. It's been a while.

What do I think about the stability of the solution?

The solution is stable. The cluster has been out for five-plus years. It's reliable and the performance has been good. We have no complaints.

What do I think about the scalability of the solution?

From what I'm working on, scalability looks to be very good. I am literally in the midst of a project whereby we'll be hitting that to the nth degree, so to speak. It looks to be good, however, I don't have good firsthand knowledge on that yet.

We're really going to be beginning to cross that in the next couple of weeks. I can't fully answer the question of scalability just yet.

Soon, virtually everybody in the company will be using it to some degree. It's going to be anybody and everybody, however, it depends on if the function is load balanced. If it has public communication and it currently does, we're adding in some scalability. The solution also requires some type of internal and external load balancing to offer scalability from site to site, for the disaster recovery solution. In one way or another, it's touching a lot of our infrastructure.

How was the initial setup?

The initial setup was okay. They've improved the community or they've added more functionality over the years. There have been eight or nine major version releases, and we're currently running 14. We were at eight or nine originally. If I'm about accurate, there have been five or six major releases over the time we've started using the solution. Therefore, initial setups have likely changed a bit. With SSL improving, there's been quite a few changes, modifications, cipher ads, and things of that sort. 

While we have a team of five people capable of maintaining the solution, we only really need two people to maintain it as necessary.

What was our ROI?

In terms of ROI, it's not something that I directly look at, to be honest. My functionality and focus are more along the lines of making sure that the environment is stable, secure, and available. From my standing, those are essential to that process. They're very important.

What's my experience with pricing, setup cost, and licensing?

I'm not sure of the actual pricing. I've never had to renew them yet.

So far the F5 is proven to, according to my analysis at least, to be less expensive than, for example, an Azure load balancer. For our implementation and use, it appears that the F5 is less expensive, over ANTC or TCL than the Azure solution would be.  It's also more functional. Honestly, that has to be 70% to 80% of the reason why the choice got made by the company to go with F5. If that hadn't been there, we would probably have a dispersed topology and I'd have to deal with Azure here and some other thing on-prem and that sort of thing. So it makes my life a lot simpler and things a lot cheaper since it's a single point.

What other advice do I have?

We have a partner relationship with F5.

We work with 1.2 SSL, TLS 1.2 and 1.3.

The most challenging thing is that it just requires a little more understanding than your average web user, server user, or something similar. The solution does require some explicit knowledge. Somewhere down the way, depending on your underlying purpose and how secure you want to be, you're going to need to have a little better knowledge than the layman has as to SSL ciphers, keys, et cetera, to make them function. An organization just needs to be aware that to take advantage of the solution properly they'll want to have someone with knowledge on-hand.

Overall, I would rate the solution at a nine out of ten. We've mostly been very pleased with the product.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Network Architect at a mining and metals company with 201-500 employees
Real User
Top 20Leaderboard
A stable solution with good security features, but needs more cloud features and better support and scalability
Pros and Cons
  • "Its security features are very good. It has normal security, and then it has add-on security with a separate license, which I find very good. It is also very stable."
  • "It can have more features on the cloud side because we are moving a lot of servers to our cloud. Its support and scalability also need improvement. Currently, their technical support is slow, and its scalability is complex. It should have integrated SSL decryption with some special machine algorithm to tell us about certain kinds of security issues. Currently, it can decrypt, but it should also provide more information. It can have some kind of algorithm to inform us about how the packets should or shouldn't be. It should inform us when certain things are happening. When users are going to the internet and it sees an abnormal behavior or abnormal type of traffic, it should alarm us about this. It should tell us that there is some kind of strange traffic, and it shouldn't be like that. Currently, it lacks in this aspect."

What is our primary use case?

We did SSL decryption for our F5 load balancer. It is done not only for the server but also for the users who are going outside of the solution.

What is most valuable?

Its security features are very good. It has normal security, and then it has add-on security with a separate license, which I find very good. It is also very stable.

What needs improvement?

It can have more features on the cloud side because we are moving a lot of servers to our cloud. Its support and scalability also need improvement. Currently, their technical support is slow, and its scalability is complex.

It should have integrated SSL decryption with some special machine algorithm to tell us about certain kinds of security issues. Currently, it can decrypt, but it should also provide more information. It can have some kind of algorithm to inform us about how the packets should or shouldn't be. It should inform us when certain things are happening. When users are going to the internet and it sees an abnormal behavior or abnormal type of traffic, it should alarm us about this. It should tell us that there is some kind of strange traffic, and it shouldn't be like that. Currently, it lacks in this aspect.

For how long have I used the solution?

I have been using this solution for three months.

What do I think about the stability of the solution?

It is very stable.

What do I think about the scalability of the solution?

Scaling is not easy. They should improve it in terms of scalability and make it scalable for different things, such as for the cloud.

How are customer service and technical support?

Their technical support is not good in comparison to other network companies. They take a long time to respond. I am not so happy with their support, and I find it cumbersome.

Which solution did I use previously and why did I switch?

We previously did SSL decryption from the firewall, but the performance was not so good. So, we bought the license for F5. Now we are thinking of implementing this at every location.

How was the initial setup?

It is not so complex, but it is also not so easy. It takes a day to complete the deployment.

What other advice do I have?

I would rate F5 SSL Visibility a seven out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Manager, User Services at a university with 5,001-10,000 employees
Real User
Leaderboard
Secure, highly reliable, and scalable
Pros and Cons
  • "Every scenario we have put the solution through it has been able to handle it one way or another."
  • "The installation is complex but not more than other competitors."

What is our primary use case?

My organization uses the solution by having the endpoint as the F5 and we run some clear traffic on the private internal network behind it. This allows us not to have to keep the SSL channels open, we do not have to deal with that overhead.

What is most valuable?

I have limited use of this solution but I know we rely on it heavily for our traffic load balancing and security. Every scenario we have put the solution through it has been able to handle it one way or another.

For how long have I used the solution?

We have been using the solution for 10 years.

What do I think about the stability of the solution?

The stability of the solution has been fantastic. Over the past 10 years, I can only think of one case where bad firmware or something else gave us problems. One issue out of 10 years, that is excellent.

What do I think about the scalability of the solution?

The scalability seems to be really good and is even getting better with some of the virtualized F5s. This is more useful and is fitting our needs.

How are customer service and technical support?

I did not deal with the technical support directly, but I did hear people talking about it. They have been very responsive and have done a really good job.

How was the initial setup?

The installation is complex but not more than other competitors.

What's my experience with pricing, setup cost, and licensing?

The price of the solution is a little high.

Which other solutions did I evaluate?

We have been looking to do some feature comparison between Azure and what they could offer to us in the cloud, versus what we are currently doing here. It makes sense to move to a virtual F5 to protect the cloud loads when Azure has some native load balancing and application protection.

What other advice do I have?

Given our long, good track record with the solution, I would advise if you can afford this solution then purchase it. It is a great solution. As for rating the solution, nothing is a 10 because there is always something to improve.

I rate F5 SSL Visibility a nine out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.