Try our new research platform with insights from 80,000+ expert users

F5 Distributed Cloud Services vs Threatx comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare Web Application ...
Sponsored
Ranking in Web Application Firewall (WAF)
7th
Average Rating
8.6
Reviews Sentiment
7.4
Number of Reviews
26
Ranking in other categories
No ranking in other categories
F5 Distributed Cloud Services
Ranking in Web Application Firewall (WAF)
20th
Average Rating
9.0
Reviews Sentiment
6.7
Number of Reviews
4
Ranking in other categories
CDN (10th), API Security (9th)
Threatx
Ranking in Web Application Firewall (WAF)
49th
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
API Security (27th)
 

Mindshare comparison

As of March 2026, in the Web Application Firewall (WAF) category, the mindshare of Cloudflare Web Application Firewall is 5.4%, down from 6.9% compared to the previous year. The mindshare of F5 Distributed Cloud Services is 1.8%, up from 0.8% compared to the previous year. The mindshare of Threatx is 0.4%, up from 0.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Web Application Firewall (WAF) Mindshare Distribution
ProductMindshare (%)
Cloudflare Web Application Firewall5.4%
F5 Distributed Cloud Services1.8%
Threatx0.4%
Other92.4%
Web Application Firewall (WAF)
 

Featured Reviews

DB
CTO at PlayNirvana
Advanced security reporting has protected high-traffic betting platforms from constant attacks
I don't see room for improvement to Cloudflare Web Application Firewall. One thing I don't know much about because we have a dedicated IT team for that, and I'm not involved with Cloudflare much anymore. But if I were to compare them to F5, I would like to see more features that F5 offers. F5 has an option to bring the whole infrastructure, the whole WAF and all their packages, Bot Management, and everything else on your infrastructure. You need to install certain services from their side, and then you can choose if you would like requests to hit your servers immediately or if requests need to be proxied through F5 backbone. That would be a nice addition because we have 90% of the traffic as legit traffic coming from whitelisted servers. If it comes from whitelisted servers, I don't need to go every request through the backbone; I could easily just IP whitelist everything. Then I could maybe have Bot Management on my infrastructure that drastically reduces the price of Cloudflare. I would like to see Push CDN more improved in the next release of Cloudflare Web Application Firewall. And maybe something similar to Pushpin that Fastly has, which is an option where you can push messages that then can be scaled globally over the network. From our perspective, if we have a listener that listens for stock updates, I would just need to have one processor that pushes those updates to the Cloudflare API, and then Cloudflare would broadcast that message to all listeners. Cloudflare will check the order of the message, and if you, as a customer, are not connected or have some kind of network issue, when you reconnect, you will receive the latest state and missing updates.
Mohan Janarthanan - PeerSpot reviewer
Associate Vice President at Novac Technology Solutions
Centralized security has protected APIs and optimized multi‑cloud traffic management
F5 Distributed Cloud Services has been used for two years for DDoS protection, and there is a particular feature called API protection. Within API protection, there is malicious user mitigation, which is one particular technology that has been implemented. This is a kind of advanced bot attack prevention. Malicious user mitigation is an AI/ML-based technology that was introduced by the F5 team, and this particular MUG protects rate limiting. If some users are having anomaly detection or someone is trying to do a bot attack, it will create a CAPTCHA challenge for that particular user alone and not for all users. For example, if someone is trying to act as a rogue, it will create a CAPTCHA challenge in the backend system on that particular system, so they cannot try again and again at the same time. It is for a concurrent session, and it will give the CAPTCHA challenge. This MUG, malicious user mitigation, prevents bot attacks. F5 Distributed Cloud Services includes the real-time intelligence feature, which helps with threat response strategies from a threat intelligence perspective. For example, if there are geo-restrictions or geo-based restrictions, sometimes people may come in through proxy-based servers, and it will prevent that. The load balancing feature optimizes application performance. Observability is the basic piece where F5 got introduced. This observability piece provides end-to-end visibility on the application performance. It gives complete end-to-end visibility across network latency and application performance issues. Sometimes when it is getting more than 200 pages, it throws errors such as 300, 400, or whatever has been configured, including 500 errors. F5 Distributed Cloud Services has helped improve traffic management efficiency. Most applications are hosted in the Check Point and F5 firewall, F5 web application firewall, where applications and traffic management can be accessed in a single dashboard. Automated threat detection is a basic feature of F5 Distributed Cloud Services meant for that purpose. There are two scenarios with automated threat detection, which is provided by F5. It is a completely machine learning solution that came from the bot defense, and it automatically protects against sophisticated attacks.
Use Threatx?
Leave a review
report
Use our free recommendation engine to learn which Web Application Firewall (WAF) solutions are best for your needs.
884,873 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Manufacturing Company
9%
Financial Services Firm
8%
Comms Service Provider
8%
Financial Services Firm
12%
Computer Software Company
10%
Insurance Company
8%
Government
7%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business16
Midsize Enterprise6
Large Enterprise6
No data available
No data available
 

Questions from the Community

What needs improvement with Cloudflare Web Application Firewall?
I don't see room for improvement to Cloudflare Web Application Firewall. One thing I don't know much about because we...
What is your primary use case for Cloudflare Web Application Firewall?
We are using Cloudflare Web Application Firewall's advanced reporting and analytics tools with their Zero Trust, so e...
What is your experience regarding pricing and costs for F5 Distributed Cloud Services?
I am not involved in sales, so I do not deal with the pricing aspect directly. I give the cost of the solution a four...
What needs improvement with F5 Distributed Cloud Services?
Last year there was a downtime of 30 minutes across the cloud distributed console, and that was the only impact obser...
What is your primary use case for F5 Distributed Cloud Services?
F5 Distributed Cloud Services is being used for web application firewall along with API security, bot protection, and...
Ask a question
Earn 20 points
 

Also Known As

Cloudflare WAF
No data available
No data available
 

Overview

 

Sample Customers

crunchbase, udacity, marketo, okcupid, zendesk
Information Not Available
BMC
Find out what your peers are saying about Fortinet, F5, Imperva and others in Web Application Firewall (WAF). Updated: March 2026.
884,873 professionals have used our research since 2012.