Head Solutions and Innovations at a tech services company with 11-50 employees
Real User
Jul 19, 2020
Most competitor's environments will have their appliance do a hard stop. This means they weigh traffic from real customers and that affects the overall business experience. F5, on the other hand, uses contextual information to be able to specify what is malicious traffic and what is real traffic. That comes from its pool of intelligence, and from its threat intelligence team.
Distributed Denial-of-Service (DDoS) Protection solutions mitigate attacks designed to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of Internet traffic.DDoS Protection involves techniques and technologies that deploy proactive measures to safeguard networks against intentional attempts to make online services unavailable. A knowledgeable audience appreciates the importance of robust DDoS Protection as it ensures business continuity. This...
Most competitor's environments will have their appliance do a hard stop. This means they weigh traffic from real customers and that affects the overall business experience. F5, on the other hand, uses contextual information to be able to specify what is malicious traffic and what is real traffic. That comes from its pool of intelligence, and from its threat intelligence team.
The user interface was recently changed in one of the latest versions, but we find it to be very good. The change was an improvement.