TrustRadius: an HG Insights company

F5 Distributed Cloud API Security

Score9.1 out of 10

48 Reviews and Ratings

What is F5 Distributed Cloud API Security?

F5's Distributed Cloud API Security provides discovery and deep insights from use of AI/ML. It can be used to block API attacks in real time and eliminate vulnerabilities at their source. The SaaS-based portal enables users to manage and go deep for threat analytics, forensics, and troubleshooting of modern applications.

Categories & Use Cases

Media

1 / 3

Top Performing Features

  • Denial of Service (DoS) Protection

    Mitigates DoS attacks by monitoring the API traffic for suspicious patterns and blocking or rate limiting requests from potential malicious sources.

    Category average: 9.2

  • Security Notification and Alerts

    Sends real-time notifications and alerts when security events or anomalies are detected, allowing prompt investigation and response to potential threats

    Category average: 9.2

  • API Key Management

    Provides mechanisms to generate, manage, and revoke API keys or tokens that are used for authentication and access control.

    Category average: 9.2

Areas for Improvement

  • Cross-origin Resource Sharing (CORS) Protection

    Enforces restrictions on cross-origin requests, preventing unauthorized access to resources on the API server from web pages served by other domains.

    Category average: 9

  • Input Validation

    Validates and sanitizes user input to prevent common attack vectors such as SQL injection, cross-site scripting, and command injection.

    Category average: 8.8

  • Content Filtering

    Scans the content of API requests and responses for potentially malicious or unwanted content, such as malware or sensitive data, to prevent data leakage and protect against attacks.

    Category average: 8.8

F5 API Cloud Security - A great Product to use for API based applications

Use Cases and Deployment Scope

I use F5 Distributed Cloud API Security to access SWIFT Financial network APIs for pre-validation, GPI and Swift Ref

Pros

  • scalable
  • more secured
  • on-demand service availability

Cons

  • Provide more use case scenarios
  • GUI enhancement
  • Enhanced dashboard to view API usage history and logs

Return on Investment

  • It provides ROI in a shorter time

Usability

Most of F5 products built to address the real world problems

Use Cases and Deployment Scope

We use F5 Distributed Cloud API Security for protecting the ApI’s from misuse and DOD attacks

Pros

  • E-commerce
  • Saas provider

Return on Investment

  • Increase deployment agility
  • Resource savings

Usability

Alternatives Considered

Azure API Management

Secures data pipelines without slowing down Dev.

Use Cases and Deployment Scope

We are using F5 Cloud API Security to monitor and govern all external-facing APIs across our genomics data platforms and third-party clinical integrations. It sits right behind our API gateway layer and works across both our on-prem research servers and cloud-hosted ML pipelines. Our services move quickly, and F5 helps maintain our security posture throughout it all.

Pros

  • It auto-discovers APIs, even the ones engineers forget to document. Then profiles them without needing changes to our codebase.
  • Shadow API exposure.
  • It's pretty decent at abnormal behavior detection.

Cons

  • Their dashboard, in my opinion, has been over-engineered. The insight is there, but bringing it to the surface is no easy task. We've had to build Grafana visualizations.

Return on Investment

  • The biggest one for us so far has been a secure-by-default culture in API development. This now reduces our onboarding time by about 20 percent, all thanks to the inline control and templated policies.
  • Uncountable value in prevention of costly data leakages.

Usability

Alternatives Considered

Salt Security API Protection Platform

Other Software Used

AWS CloudTrail, Trello, Webex App

F5 WAAP becoming like BIG IP.

Use Cases and Deployment Scope

Its features are used to secure our web-based application and API gateways. Business Problems: 1. Safely secure customer transactions via digital apps. 2. It prevents all cyber attacks and keeps applications available in alignment. Use Case: -It prevents data theft and keeps users' confidential data secured -It stops malicious intruders from launching Malicious content.

Pros

  • Protects from DDos attacks.
  • Protects from Bot attacks.
  • Inspects the user data before sending it to the application servers.
  • Monitors real time data.

Cons

  • Bot categories should be listed on console.
  • URL profiles should be created using learning.
  • Rate limiting should be available on URL basis.

Return on Investment

  • Easy to on-boards applications plus.
  • Granular controls almost to stop business loss.
  • Features called malicious user mitigation module provides very good protective layer.

Usability

Alternatives Considered

Barracuda Web Application Firewall

Other Software Used

Barracuda Application Protection, Forcepoint Data Loss Prevention, Forcepoint Secure Web Gateway

F5 Distributed Cloud API Security Review

Use Cases and Deployment Scope

As a protection of our solutions, we have own solutions and we use sappies, different apps.

Pros

  • It is easy to implement and I think it's one of the most friendly solutions in this aspect.

Cons

  • Probably training, more training for final users.

Return on Investment

  • Basically simplification.

Usability