Skip to main content
TrustRadius
F5 Distributed Cloud API Security

F5 Distributed Cloud API Security

Overview

What is F5 Distributed Cloud API Security?

F5's Distributed Cloud API Security provides discovery and deep insights from use of AI/ML. It can be used to block API attacks in real time and eliminate vulnerabilities at their source. The SaaS-based portal enables users to manage and go…

Read more

Learn from top reviewers

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is F5 Distributed Cloud API Security?

F5's Distributed Cloud API Security provides discovery and deep insights from use of AI/ML. It can be used to block API attacks in real time and eliminate vulnerabilities at their source. The SaaS-based portal enables users to manage and go deep for threat analytics, forensics, and troubleshooting…

Entry-level set up fee?

  • No setup fee
For the latest information on pricing, visithttps://www.f5.com/cloud/compare

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

1 person also want pricing

Alternatives Pricing

What is Cloudflare?

Cloudflare’s connectivity cloud is a unified platform of cloud-native services designed to help enterprises regain control over their IT environments. Powered by an intelligent, programmable global cloud network, it is built to offer security, performance, visibility, and reliability.

What is Postman?

Postman, headquartered in San Francisco, offers their flagship API development and management free to small teams and independent developers. Higher tiers (Postman Pro and Postman Enterprise) support API management, as well as team collaboration, extended support and other advanced features.

Return to navigation

Product Demos

F5 Distributed Cloud Web App and API Protection: API Discovery and Protection

YouTube
Return to navigation

Features

API Security

Secures network with these features and tools offered by API Security.

8.9
Avg 8.9
Return to navigation

Product Details

What is F5 Distributed Cloud API Security?

A solution that discovers, controls, and mitigates threats to APIs Using machine learning.

F5® Distributed Cloud API Security is a solution to manage APIs across any data center or cloud using a simple and scalable architecture. It helps drive business velocity by enabling automated API deployments and management, while also protecting against API-specific threats.

Distributed Cloud API Security—part of the F5® Distributed Cloud Web App & API Protection (WAAP) solution—delivers advanced security controls in a SaaS-based solution to reduce tool sprawl and architectural complexity. Using advanced analytics on the data collected across users on its multi-tenant platform, Distributed Cloud API Security identifies behavioral anomalies and automatically updates to mitigate threats from users as well as internal apps.

Its discovery and insights leverage machine learning (ML), to block API attacks in real time and eliminate vulnerabilities at their source. A SaaS-based portal will manage and provide threat analytics, forensics, and troubleshooting for the user's application. Detect and block Open Web Application Security Project (OWASP) API Top 10 attacks in real time by using automatic detection at the development and production layers.

F5 Distributed Cloud API Security Features

  • Supported: oAutomated Discovery: generates API schema and swagger files --- discovers an apps APIs, monitor and map normal behavior, usage, methods and detects outliers to identify shadow APIs
  • Supported: oVisualize API Usage: API mapping to more easily identify usage patterns of an apps APIs, correlate good and bad actor activity across all endpoints
  • Supported: oImporting Swagger: from an existing schema, can monitor and secure documented API endpoints, methods, and payloads integrated with CI/CD pipelines
  • Supported: oResponse Analysis: analyzes how servers are responding to queries, identifying persistent outliers that receive bad response codes, but persist in sending bad requests
  • Supported: oBehavior and Time: analyses what endpoints are used, in what order and the frequency of API communications, to identify potentially malicious endpoints who are exhibiting behavior outside the norm
  • Supported: oDetermine Response: blocks suspicious requests -- allow, rate limit or deny a client using APIs

F5 Distributed Cloud API Security Screenshots

Screenshot of Screenshot of Screenshot of

F5 Distributed Cloud API Security Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

F5's Distributed Cloud API Security provides discovery and deep insights from use of AI/ML. It can be used to block API attacks in real time and eliminate vulnerabilities at their source. The SaaS-based portal enables users to manage and go deep for threat analytics, forensics, and troubleshooting of modern applications.

Noname Security, Salt Security API Protection Platform, and Cequence Security are common alternatives for F5 Distributed Cloud API Security.

Reviewers rate Security Notification and Alerts highest, with a score of 9.2.

The most common users of F5 Distributed Cloud API Security are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews From Top Reviewers

(1-1 of 1)

Machine Learning and Fine-Grained Threat Identification platform.

Rating: 10 out of 10
December 26, 2024
MJ
Vetted Review
Verified User
F5 Distributed Cloud API Security
1 year of experience
Cloud API Security helps detect and prevent threats specifically targeted at APIs.
  • Rate Limiting and Quotas.
  • API Threat Protection.
  • Automated API Discovery.
Cons
  • More accurate detection of advanced persistent threats (APTs) targeting APIs.
  • A greater emphasis on checking APIs' schema and contract may prevent them from accepting misconfigurations or malicious input.
  • More customized, dynamic, and targeted protection for high-value APIs or high-risk user groups.
Expanded Threat Intelligence Integration and Increased integration with external threat intelligence sources may increase the accuracy of threat detection and response.
API Security (10)
91%
9.1
Authentication and Authorization
100%
10.0
Data Protection
100%
10.0
Rate Limiting
100%
10.0
Audit Logging
90%
9.0
Input Validation
90%
9.0
Content Filtering
100%
10.0
Denial of Service (DoS) Protection
80%
8.0
Security Notification and Alerts
80%
8.0
API Key Management
80%
8.0
Cross-origin Resource Sharing (CORS) Protection
90%
9.0
  • F5 Distributed Cloud API Security mitigates many API-related security threats, including bot attacks, DDoS, data breaches, and unauthorized access attempts.
  • F5 Distributed Cloud API Security uses robust threat detection, machine learning, and real-time monitoring for speedier identification.
  • Reductions in security events result in fewer breaches, reduced downtime, and lower attack remediation costs.
Granular Access Control and Rate Limiting were too good, providing complete API security across the organization.
The sensitivity of the APIs, the kinds of requests they process, and their accessibility to the public internet will all affect the security settings and rules.
It offers threat intelligence feeds and machine learning capabilities to detect and block emerging threats.
4
APP Support and APP Sec team
2
Team manage the Web application firewall and API Security across the domains hosted on both on prem and cloud environments
  • API Inventory
  • API Auto discovery
  • API Security and Reporting
  • API Auto discovery features
  • API Rate limiting
  • API BOT protection Basic
  • API Recon
  • API Web app scan
  • API Reporting
Since, we are using the product effectively and purpose of usage is fairly met our requirements
Return to navigation