Top Rated Broadcom Edge Secure Web Gateway Alternatives
Support Marketplace Deploy
https://aws.amazon.com/marketplace/pp/prodview-n5etbqzoqhnmc Review collected by and hosted on G2.com.
Not support to scale and still not have the cloudformation to deploy cluster with diferrent architecture like VPC Transit Gateway and Multi Account Review collected by and hosted on G2.com.
14 out of 15 Total Reviews for Broadcom Edge Secure Web Gateway
Overall Review Sentiment for Broadcom Edge Secure Web Gateway
Log in to view review sentiment.

I personally appreciate and utilize any security from internal checks to the unknown web. Symantec is great at catching things. Review collected by and hosted on G2.com.
It doesn't catch it and fix it. You have to search and work through the problems instead of being immediately. Review collected by and hosted on G2.com.

Capable of optimizing and accelerating web applications with security, Capable of monitoring 360 degree traffic and people in network Review collected by and hosted on G2.com.
Nothing to dislike implementation and integration was seamless Review collected by and hosted on G2.com.

A lot of features and its easy to configure. Review collected by and hosted on G2.com.
Nothing, for me all the things and functionality are already there Review collected by and hosted on G2.com.

We have used it for our Exchange Server as reverse proxy server Review collected by and hosted on G2.com.
Need more filters to prevent google ads. Review collected by and hosted on G2.com.

The User interface is easy and well laid out Review collected by and hosted on G2.com.
lack of help features and info when trying to find specific answers to specific threats I have seen Review collected by and hosted on G2.com.
Symantec WAF protects and secures applications. I like it because each application can be applied a specific security policy especially for inbound traffic from our external users. It has a lot of signatures that helps to easily identify threats, a plus points compared to other solutions. Review collected by and hosted on G2.com.
I think the downside is the technicla support. We receive support but compared with other solutions, I think their SLA is okay. Review collected by and hosted on G2.com.
During the web assessment, I observed that Symantec detects almost all application payload and attacks and Symantec has very good rules for attack detection. here as the firewall is secondary security so I believe that the application should implement that so if in case any application is vulnerable with any vulnerability it will help you to protect again that attack vector. During the web assessment, I observed that Symantec detects almost all application payload and attacks and Symantec has very good rules for attack detection. here as the firewall is secondary security so I believe that the application should implement that so if in case any application is vulnerable with any vulnerability it will help you to protect again that attack vector. During the web assessment, I observed that Symantec detects almost all application payload and attacks and Symantec has very good rules for attack detection. here as the firewall is secondary security so I believe that application should implement that so if in case any application are vulnerable with any vulnerability it will help you to protect again that attack vector Review collected by and hosted on G2.com.
As per my experience, some payload gets bypass so application teams need to update their rules base on the attack vector, but some attacker vector are present but there are some encoding and some possible fuzzing way helps to bypass that attacks vector. As per my experience, some payload gets bypass so application teams need to update their rules base on the attack vector, but some attacker vector are present but there are some encoding and some possible fuzzing way helps to bypass that attacks vector. As per my experience, some payload gets bypass so application teams need to update their rules base on the attack vector, but some attacker vector are present but there are some encoding and some possible fuzzing way helps to bypass that attacks vector. Review collected by and hosted on G2.com.

- Friendly UI, easy to use
- Up to date application signature
- Fast performance Review collected by and hosted on G2.com.
- Cost is a little bit high
- Need more detail document
- Faster customer support response Review collected by and hosted on G2.com.

The usage of it and graphics desiged for end user Review collected by and hosted on G2.com.
More user friendly to understand the things in better way. Review collected by and hosted on G2.com.