We performed a comparison between CyberArk Privileged Access Manager and F5 BIG-IP Access Policy Manager (APM) based on real PeerSpot user reviews.
Find out in this report how the two Access Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."All access to our servers by both staff and vendors is monitored and recorded."
"I'm no longer the product owner for PAM, but I can say that the most useful feature is the vault functionality, which keeps all your passwords secure in a digital vault."
"The established sessions on the target systems are fully isolated and the privileged account credentials are never exposed to the end-users or their client applications and devices."
"The product is for hardening access and making the organization more secure, therefore reducing chances of a breach."
"CyberArk has the ability to change the credentials on every platform."
"The implementation of the PSM proxy has reduced the specific risk of "insider attacks" on our domain controllers and SLDAP servers by eliminating direct user login by an open secure connection on the user's behalf without ever revealing the privileged credentials."
"The credentials management capability is key to ensuring that the credentials are kept secure and that access to them is done on a temporary and event-driven basis."
"If any intruder gets inside, they would not be able to move around nor do lateral movements. It minimize any attack problems within our network."
"In my opinion, the GUI is perfect with the configuration options provided. F5 BIG-IP has given customization options and policy configuration tools in the GUI. It's good and good enough to work."
"F5 BIG-IP APM is relatively easy to use."
"Stickiness is the most valuable feature of the product."
"The portal access was very good."
"The most valuable feature is the virtual IP creation. It's our most frequently used feature."
"This is a product that is easy to install and integrate, and it is simple to use."
"The solution is stable and reliable."
"The performance of the solution is valuable."
"The solution needs better features for end users to manage their own whitelisting for API retrieval."
"There is a bit of a learning curve, but it's a pretty complex solution."
"The initial setup was somewhat complex."
"As they grow, the technical support is having growing pains. One of the things is just being able to get somebody on the phone sometimes."
"The scalability, sometimes, is lacking. It works really well for more static environments... But for an environment where you're constantly spinning up new infrastructure or new endpoints, sometimes it has a hard time keeping up."
"PAM could be more user-friendly and CyberArk could update the documentation to include more real-world examples. You have to learn it yourself through trial and error. In particular, the online documentation should have more information about troubleshooting."
"We would, of course, always prefer it if the pricing was cheaper."
"It's a big program. To scale excessively, locally, on an on-prem application, takes a lot of servers."
"I'd suggest improved documentation integration directly within the GUI. Right now, finding comprehensive documentation often requires going to external websites like the community portal."
"The technical support’s response time must be improved."
"In my opinion, the GUI side needs some improvement based on my usage. Sometimes, it doesn't work as efficiently as the CLI side."
"F5 BIG-IP Access Policy Manager has room for improvement in integration with other products."
"The price of this product can be improved."
"Integrating identity providers and single sign-on solutions can simplify user authentication and access control."
"Cloud services are something that F5 Access Policy Manager could do better"
"F5 BIG-IP APM disconnects when you leave it for long enough, but that is natural for IT solutions to do. That's a little bit frustrating."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
More F5 BIG-IP Access Policy Manager (APM) Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews while F5 BIG-IP Access Policy Manager (APM) is ranked 6th in Access Management with 13 reviews. CyberArk Privileged Access Manager is rated 8.8, while F5 BIG-IP Access Policy Manager (APM) is rated 8.2. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of F5 BIG-IP Access Policy Manager (APM) writes " Facilitates packet inspection, modification, and offloading and offers visibility and troubleshooting capabilities, allowing for pre-production server testing". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and BeyondTrust Privileged Remote Access, whereas F5 BIG-IP Access Policy Manager (APM) is most compared with Citrix Gateway, Ivanti Connect Secure, Cisco ISE (Identity Services Engine), Microsoft Entra ID and Aruba ClearPass. See our CyberArk Privileged Access Manager vs. F5 BIG-IP Access Policy Manager (APM) report.
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.