Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

6 AWS reviews

External reviews

16 reviews
from

External reviews are not included in the AWS star rating for the product.


4-star reviews ( Show all reviews )

    Abdul Azim

Client-side and mobile app protection with 24/7 support for security

  • December 23, 2024
  • Review from a verified AWS customer

What is our primary use case?

F5 Advanced Web Application Firewall (AWAF) is primarily used in financial sectors like banking to secure web applications against advanced threats, ensuring compliance with industry regulations. Our Key use cases include:

  1. Protection Against OWASP Top 10: Safeguarding banking applications from SQL injection, XSS, and other common vulnerabilities.
  2. Bot Mitigation: Detecting and blocking malicious bots to prevent account takeovers, credential stuffing, and fraud.
  3. DDoS Protection: Defending against application-layer DDoS attacks to ensure service availability.
  4. PCI DSS Compliance: Enforcing security policies to meet compliance standards for protecting sensitive customer data.
  5. API Security: Securing APIs used in banking platforms from abuse and unauthorized access.
  6. Threat Intelligence: Leveraging threat intelligence to identify and mitigate zero-day attacks.
  7. Application Traffic Control: Managing and monitoring application traffic to ensure optimal performance and security.

These use cases help financial institutions maintain secure and resilient applications, critical for trust and compliance.

How has it helped my organization?

F5 Advanced WAF has significantly enhanced our organization's security posture by protecting critical banking applications against sophisticated threats. It ensures compliance with regulatory standards, improves customer trust through robust bot mitigation, and enhances application performance by mitigating DDoS attacks and securing APIs. Additionally, it provides real-time threat intelligence and streamlined security management, reducing downtime and operational risks.

What is most valuable?

  • Bot Protection: Mitigates automated attacks like credential stuffing.

  • API Security: Safeguards APIs against exploitation.

  • Advanced Threat Detection: Protects against OWASP Top 10 vulnerabilities and zero-day threats.

  • DDoS Mitigation: Ensures application availability during attacks.

  • Behavioral Analytics: Detects and mitigates anomalous traffic patterns.

  • Granular Policy Control: Enables precise security policy customization.

  • Threat Intelligence Integration: Offers real-time updates for proactive protection.

  • What needs improvement?

    1. Ease of Deployment: Simplify initial setup and policy configuration.
    2. UI Enhancements: Improve user interface for better navigation and usability.
    3. Integration: Enhance compatibility with third-party tools like SIEMs and DevOps pipelines.
    4. Performance Optimization: Reduce latency during high traffic volumes.

    Suggested Features for Next Release:

    1. AI-Driven Threat Detection: Advanced machine learning for proactive defense.
    2. Comprehensive API Protection: Extended support for GraphQL and WebSocket APIs.
    3. Cloud-Native Integration: Better functionality in hybrid and multi-cloud environments.
    4. Automated Policy Suggestions: AI-based recommendations for policy tuning.

    For how long have I used the solution?

    It's been two years that I've been working with this solution.

    What do I think about the stability of the solution?

    I am not experiencing any significant instability.

    What do I think about the scalability of the solution?

    F5 AWAF offers excellent scalability, enabling organizations to protect applications seamlessly across on-premises, cloud, and hybrid environments. It can handle increasing traffic volumes with minimal latency, ensuring consistent security for both small-scale deployments and enterprise-grade architectures. With its ability to integrate into CI/CD pipelines and auto-scale in cloud environments, F5 AWAF supports dynamic application growth without compromising performance or protection.

    How are customer service and support?

    Customer service is very responsive. If the issue persists beyond my local support capabilities, I open a ticket with F5, and they respond quickly. I rate their technical support 9 out of 10.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Not now just I have checked the comparision and collect reviews from peerspoot and Quadrant

    How was the initial setup?

    The initial setup experience is straightforward, and I did not face any complexities. I recommend deploying the F5 AWAF solution on a single appliance with LTM.

    What's my experience with pricing, setup cost, and licensing?

    F5 is relatively less expensive compared to other solutions as F5 is considered the best.

    Which other solutions did I evaluate?

    Not Now

    What other advice do I have?

    I rate F5 eight to nine out of ten. I recommend F5 to customers who require a robust solution and have the budget for it. However, for customers looking for modest pricing, I would not recommend the F5 solution.

    I'd rate the solution eight out of ten.


      Habib A

    Securing web applications with API and bot protection while enhancing IP intelligence

    • November 20, 2024
    • Review from a verified AWS customer

    What is our primary use case?

    The primary use case is to secure the organization's applications from web-based attacks, securing both web applications and APIs.

    What is most valuable?

    The product is used to secure web applications and has the ability to use API templates and bot protection features, such as blocking requests or presenting CAPTCHA pages to end users. We also implement Swagger files for API security and use custom profiles for device ID threshold management.

    What needs improvement?

    The main improvement needed is related to IP intelligence. Once we start receiving traffic from repetitive IP addresses, we have to report it to the SOC team to block it at the layer four level. Users would like to have an additional IP intelligence license to handle this within WAF itself without needing to engage with the SOC team.

    For how long have I used the solution?

    The solution has been used for three years.

    How are customer service and support?

    Customer service and support depend on the level of support subscribed to, such as silver or platinum support, which determines the response time.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    Deploying the solution involves an application learning and blocking phase. The process includes collecting application data, creating policies, and applying them to lower testing environments like QA or dev before moving to UAT and production. The learning phase is used to handle false positives and fine-tune the policies before going live.

    What about the implementation team?

    The in-house team manages and supports the WAF, handling incidents reported by end users when legitimate traffic is blocked. They update the policies to prevent the recurrence of similar blocks.

    What's my experience with pricing, setup cost, and licensing?

    The pricing and support service levels affect response times from customer service, depending on whether the support level is silver, platinum, etc.

    Which other solutions did I evaluate?

    We are exploring cloud-based solutions like Azure WAF and AWS WAF.

    What other advice do I have?

    I rate F5 Advanced WAF an eight out of ten.


      Rahool Sharma

    Geolocation feature works fine and minimize the effects of attacks

    • July 09, 2024
    • Review from a verified AWS customer

    What is our primary use case?

    We use F5 Advanced WAF to restrict attacks on our remote access VPN. We've implemented geolocations. Our APIs are exposed over the Internet, so we've utilized F5 Advanced WAF to protect those APIs, and it's integrated with our other applications.

    How has it helped my organization?

    The WAF solution works perfectly fine. If we face any issues, we get hotfixes from the solution experts. It is a little bit difficult to engage with a solution expert firsthand, but once they're engaged, they do whatever is best to resolve the issue.

    We faced a lot of outside attacks on our VPNs and APIs, so the geolocation feature works perfectly fine for us. We use iRules as well. Our internal access VPN is advertised from a Cisco firewall, and above that, we have an F5 LTM. We have written some iRules on it to minimize the effects of attacks.

    We are a PCI DSS-compliant organization, and we have a lot of security balance to improve our infrastructure. So we use this software to meet those requirements. It works well. So, F5 helped to meet compliance and regulatory requirements.

    What is most valuable?

    It's pretty smooth. Whichever load we put on it, we've observed minimal chances of the WAF exploiting the memory or sessions hanging.

    The bot protection aspect works perfectly fine. All the solutions and features are renewed and they're working well. I don't see anything that can be improved.

    We also leveraged AI initiatives.

    What needs improvement?

    Support is a little slow, but the solution itself is great. If I compare F5 and Fortinet, the main issue is the support. With Fortinet, it takes less time to engage a support engineer and get things sorted compared to F5.

    For how long have I used the solution?

    I have been using F5 Advanced WAF since last January.

    I work for a US-based firm, and the project I deal with relies heavily on F5 and F5 LTMs.

    I work on both F5 BIG-IP cloud and on-premises and F5 LTM.

    What do I think about the stability of the solution?

    It is a stable product.

    What do I think about the scalability of the solution?

    The physical hardware is not as scalable. We have to decide which version is best for us to procure because it is a costly device. So we try our best to get all the juice out of one box.

    There's around 2500 users getting services from the F5. In my team, we are twelve engineers who are managing the infrastructure.

    How are customer service and support?

    Support is a little slow, but the solution itself is great. If I compare F5 and Fortinet, the main issue is the support. With Fortinet, it takes less time to engage a support engineer and get things sorted compared to F5.

    I'll give F5 a five because it is difficult to engage an engineer and get the issue sorted. For Fortinet, I'd give them a nine.

    How would you rate customer service and support?

    Neutral

    How was the initial setup?

    The initial setup process of the F5 WAF product is straightforward. There isn't an issue in setting up from scratch. We use F5 with the cloud as well, especially in Azure and AWS.

    The deployment took around half an hour for an engineer to get the basic infrastructure done.

    It is not difficult to manage bug fixes, upgrades, and everything. It doesn't take much time. The dashboards are good. All the basic information is given to us on the first page, and it's easy to manage.

    What was our ROI?

    It brings a return on investment.

    What's my experience with pricing, setup cost, and licensing?

    It is a little bit costly, but it has all the features that are required.

    What other advice do I have?

    I would recommend F5 Advanced WAF to other users looking to implement it.

    My advice:

    A lot of organizations are financially constrained when buying devices. So if the organization is capable of maintaining and managing a device like F5, we suggest F5. Otherwise, we suggest other solutions, like Fortinet or Citrix.

    Overall, I would rate it an eight out of ten because of the support.


      reviewer2000166

    Offers features of DDoS protection, bot blocking and HTTP header verifications

    • April 05, 2024
    • Review from a verified AWS customer

    What is our primary use case?

    Our company uses two versions of F5 Advanced WAF. The solution is used to protect against web hacking bots. 

    How has it helped my organization?

    F5 Advanced WAF has improved our organization's security posture by fending off all types of attacks. The solution has been successful in mitigating not just one kind of attack but also rare attacks that disturb the OS and try to achieve a denial of service. The solution has saved our company from performance deterioration and also enhanced security.   

    What is most valuable?

    The solution's most valuable features include application DDoS protection, bot blocking, and HTTP header verifications. The solution protects against seven types of DDoS attacks. 

    What needs improvement?

    More legacy protocols should be added to the solution. The aforementioned protocols are generally less used and might have been phased out from multiple solutions. But some of the large corporations that are clients of our company are unwilling to let go of applications that have been developed.

    The aforementioned clients believe that as some of the new websites do not use these technologies, it wouldn't be ideal to replace the existing applications; for example, a bank with millions of dollars connected to a software wouldn't be willing to replace it instantly.

    It often takes years for enterprise-level businesses to replace applications. The vendor of F5 Advanced WAF needs to consider that even if legacy protocols are not necessarily used for new projects, existing or prior applications projects rely heavily on them, and such protocols need to be protected until they are completely phased out of the market.

    The vendor needs to provide complete support for the legacy protocols, just like the latest protocols in the market, until they are assured that none of the customers are using them. 

    I would like to witness the expansion of the supported protocols set by the solution. The tool should be promoted as an advanced protection solution that supports all types of protocols. In future versions, some protocols offered by the solution need to be more specialized. All public-facing protocols should be added to F5 Advanced WAF. 

    For how long have I used the solution?

    I have been using F5 Advanced WAF since 2018. 

    What do I think about the stability of the solution?

    If the solution is setup by professional services, then it will exhibit outstanding stability, otherwise there might be issues. I would rate the stability an eight out of ten. 

    What do I think about the scalability of the solution?

    I would rate the scalability a nine out of ten. The solution is highly scalable and accommodating. The solution also allows troubleshooting due to its scaling capacity. The backend system of the solution allows the accommodation of solutions that one can pickup. 

    In our company, there are about ten users of F5 Advanced WAF, and it's being used daily. Our organization also plans to increase the usage and the number of users for the solution. The tool's performance has benefitted application delivery in our organization. 

    How are customer service and support?

    I would rate the tech support a seven out of ten. The tech support quality is slightly above average. The support team's first responders to raise tickets are not skilled engineers.

    Large enterprises usually expect their issues to be resolved within a few minutes, so in a support process where first responders collect information and if they are unable to tackle it, the issue gets escalated, which overall becomes a huge, time-consuming process. The vendor should provide highly skilled first responders to large clients of F5 Advanced WAF, as for each second the solution is down, the clients might be losing money. 

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    Before F5 Advanced WAF, our organization used IPS and Fortinet. Fortinet could only handle simple tasks, and F5 Advanced WAF is better for specialized application protection and scalability. Fortinet has a quick and easy setup process that doesn't require highly skilled engineers, making it suitable for resource management. 

    How was the initial setup?

    I would rate the initial setup a seven out of ten. F5 Advanced WAF offers an easy setup process. Our company works with both the cloud and on-premise versions of the product. The solution's deployment, including the configuration, can takefour to five days. One engineer is enough to deploy F5 Advanced WAF for a single system.

    The frequency of maintenance depends upon the setup of the solution; in case of faulty setup, the administration overhead will be greater due to repeated maintenance needs to fix issues. Often, customers invest in professional services to setup F5 Advanced WAF, following which an engineer can implement the maintenance. If professional services are not availed to setup the solution, it can take up to a month. 

    What was our ROI?

    The solution provides an ROI. When professional services install it, it has low administrative overhead and increases performance due to its scaling capacity. The solution can be used with any specific client or application as it allows user programming to be open-source. With F5 Advanced WAF, our company is able to adapt to the versatile requirements of clients. I would rate the ROI of the solution a nine out of ten. 

    What's my experience with pricing, setup cost, and licensing?

    I would rate the pricing as seven out of ten. Sometimes, for specific models, additional licenses over the standard one need to be purchased. F5 Advanced WAF doesn't offer a single license that fits all use cases; the user needs to choose the license format. A structured license is usually preferred for F5 Advanced WAF. 

    Which other solutions did I evaluate?

    Our company also evaluated Palo Alto products, but F5 Advanced WAF offered superior scalability. 

    What other advice do I have?

    The solution mainly provides automated responses; once the solution is set up and trained properly, it requires minimal intervention. As the solution is completely automated our company team has to only check the reports. 

    But there is an elaborate setup process where, as part of our company, we deploy applications in an environment, implement work policies, and use automated software to simulate multi-vendor attacks and web hacking to test the solution's ability to detect attacks and, accordingly, we make adjustments to the flexible solution. 

    After the simulation testing, the policy implemented for the solution is put in a station period where it won't be flexible initially, and then reporting is implemented, which will escalate to the anticipated restriction level soon. 

    After the policies' staging period, when the solution has completed learning through simulations and our company feels confident with the test product in the active environment, the solution becomes automated from that point, and manual intervention is not necessary. A highly skilled team is needed for the abovementioned solution training process. 

    Our company develops multiple applications internally as our work sites are not ready, and varying results are expected from different work sites, webpages, or newly added features. When a new feature is added to the solution, we revert back to the deployment process to test it. Our company needs to ensure that the in-house developed features that are integrated into the solution are not prone to attacks through simulation testing every time.

    Our company feels confident when the solution's policies are developed through the staging, simulation and rule enforcement process. The aforementioned process helps with reports and also with performance. In our company, we have also encountered websites that didn't function well with the solution; even though the websites were functioning properly, the performance deteriorated slowly. Many attackers nowadays venture beyond the threshold, which might be difficult to capture.

    If we consider any service or web applications over the internet that is attacked beyond the threshold, it wouldn't be a blind attack for the application owners as it would get blocked immediately, but instead, they progress slowly with the attack and ramp up once they can change the IP addresses and identify a suitable angle of attack, until these attacks get blocked they can affect your service.

    Sometimes, a few of our organization's clients complain about the solution working slowly, even without apparent attacks. For example, if you're a trader, the website might function well enough most of the time, but sometimes you have to buy or sell within minutes, whereas if it doesn't work, you need to visit a different website, which can also be the goal of attackers. 

    F5 Advanced WAF also allows you to write your own code for the interface.  F5 Advanced WAF specializes in behavior identification, which helps in superior attack mitigation. I would advise others to get the solution setup only by specialized or professional services. I would rate F5 Advanced WAF a nine out of ten. 

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Amazon Web Services (AWS)


      Phani Sundar Mandarapu

    Efficiently protect web servers exposed to the external network and robust stability

    • April 03, 2024
    • Review from a verified AWS customer

    What is our primary use case?

    Primarily, the Advanced WAF sits behind our network perimeter. It centralizes traffic flow to our network, filters requests, and identifies any potential threats.

    How has it helped my organization?

    It helps us detect threats or malicious requests coming into the network, protecting it from being hacked. It helps guard against issues like cross-site scripting (XSS) and other similar threats.

    So, F5 Advanced WAF helped mitigate bot traffic for our web applications.

    Moreover, my experience is that it's pretty straightforward to use. Our firewall team handles requests through a change management tool within scheduled change windows. However, F5 is our only firewall solution.

    What is most valuable?

    It's a valuable tool to protect web servers exposed to the external network. With numerous web applications running on Apache or IIS servers, the F5 Advanced WAF's threat detection capabilities protect the network before traffic reaches those servers.

    It's a fairly easy-to-use and user-friendly tool. My administrators and team also like its ability to customize the rules per the requirements.

    What needs improvement?

    The self-service aspect could be improved.

    The user interface (UI) also seems a bit outdated. Making it more user-friendly would be beneficial.

    For how long have I used the solution?

    We've been using it for approximately five to six years.

    What do I think about the stability of the solution?

    I would rate the stability a ten out of ten. It is a stable product.

    What do I think about the scalability of the solution?

    It is pretty good. I would rate the scalability a seven out of ten.

    Ssometimes, the way our enterprise handles change requests might slow things down because of the internal rules and processes. But these changes, once approved, do take effect immediately on the firewall itself.

    We have a change window twice a week for these requests. I don't think the limitation is with the firewall itself; it's more about our internal procedures.

    What other advice do I have?

    Overall, I would rate the solution an eight out of ten because I have seen that not too much customization is required during setup. The change requests we submit are usually clear and easily applied.

    Overall, the policies work well, and the threat detection is good. It catches deviations and anomalies effectively.

    From a recommendation standpoint, it's a fairly easy tool to use. However, you definitely need some knowledge about scripting, OWASP fundamentals, threat detection, and general cybersecurity principles to get the most out of it.


    showing 1 - 5