Great experience with F5 BIG-IP Advanced Firewall Manager
Use Cases and Deployment Scope
Pros
- Threat Prevention and Mitigation
- Application Layer Security
Cons
- Complex Configuration
- Enhanced Threat Intelligence Integration
Integration with Active Directory and LDAP directories
Category average: 8.5
VPN's implement encryption and anonymize IP addresses
Category average: 9.1
A proxy server changes your IP address and masks the origin of your network traffic
Category average: 8.5
Custom and summary reports, and log files enabling analysis of security incidents, application usage and traffic patterns
Category average: 8.3
Visualization tools present administrators with data on applications traversing the network, who is using them, and the potential security impact.
Category average: 8.1
Either command-line or web-based interface for centralized control and management
Category average: 8.1