Top Rated F5 Distributed Cloud App Infrastructure Protection (AIP) Alternatives
44 F5 Distributed Cloud App Infrastructure Protection (AIP) Reviews
Overall Review Sentiment for F5 Distributed Cloud App Infrastructure Protection (AIP)
Log in to view review sentiment.
It's very easy to deploy. We had difficulties finding an agent that is low overhead and can run in containers and ThreatStack agent runs on our Container-based OS perfectly and provides excellent visibility into Audit events in the system. The rules are categorized into areas to help with Compliance (SOC2, ISO27k, HIPAA, PCI) and there's Configuration Audit option available. ThreatStack SOC oversight helps to filter out the noise and escalate actionable events. Review collected by and hosted on G2.com.
It takes time to tweak the alert rules and suppress noisy false positives. Review collected by and hosted on G2.com.
The way we can write rules and suppressions. Fits to custom needs.
The default rule set helps in customizing them. Review collected by and hosted on G2.com.
Could do better with UI to improve the usability of the tool specially with investigation of alerts and events. Review collected by and hosted on G2.com.
Account managers are highly responsive and security analysts will provide comprehensive analysis of security alerts on request. The Oversight program does remove significant burden from our ops team. Review collected by and hosted on G2.com.
Actually configuring alerts, suppressions and view logs on your own is confusing and not very developer friendly. This issue is avoided if you sign up for one of their managed plans. Review collected by and hosted on G2.com.

Having an actual person looking into our issues and reaching out to us (normally at the same time we are already looking into it) Review collected by and hosted on G2.com.
have had some issues in the past with their older agent causing issues on our linux boxes (resolved now) Review collected by and hosted on G2.com.

Ease of deployment and amofgdfg unt/quality of data being returned by TS agent. Review collected by and hosted on G2.com.
Dashboards is a weak point, while collecting a lot of data, it is not easy to visualize that data. Review collected by and hosted on G2.com.
Threat Stack monitors our security 24/7 freeing our staff to focus on their core competencies. Review collected by and hosted on G2.com.
Threat Stack's vulnerability information relies on software version numbers. This provides an inaccurate assessment for most Linux systems. Review collected by and hosted on G2.com.
There services team is amazing and really make working with the entire a platform a joy. They are like a extension of our devsec ops team. Review collected by and hosted on G2.com.
The biggest issue we have is that they are primarily built around aws workloads. We have workloads that run in all three clouds and their isn't feature parody between clouds Review collected by and hosted on G2.com.

All syscalls are collected to be audited and alerted upon. Very easy to setup, simply install agents on your server. Review collected by and hosted on G2.com.
Suppresion rules are not super flexible to effectively get rid of false positive alerts. Review collected by and hosted on G2.com.
The platform is always there monitoring our configuration and events without much overhead, alerting us to crucial items quickly Review collected by and hosted on G2.com.
The interface can sometimes be a little overwhelming in places Review collected by and hosted on G2.com.

Extensive coverage for alerts and threats Review collected by and hosted on G2.com.
Difficult to setup and onboard during initial phase Review collected by and hosted on G2.com.