We performed a comparison between CyberArk Identity and F5 BIG-IP Access Policy Manager (APM) based on real PeerSpot user reviews.
Find out in this report how the two Access Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The user identification is simplified, and managing user privileges, whether adding or revoking them, is also quite straightforward when utilizing CyberArk SaaS."
"I like the RBAC (Role-Based Access Control). It basically involves defining various roles, and then simply assigning those roles to users."
"The initial setup is straightforward. It takes me up to an hour and a half."
"The most valuable feature of CyberArk Identity is the adaptive interface."
"The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring."
"The setup, via cloud, is simple."
"The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients."
"It has machine learning and can help clients to learn the environment and understand what is happening."
"Stickiness is the most valuable feature of the product."
"The solution is stable and reliable."
"The performance of the solution is valuable."
"The tool is reliable and easy to configure."
"Our customers have never complained about the stability"
"The product allows us to create customized portals for your users."
"F5 BIG-IP APM is relatively easy to use."
"The most valuable feature is the virtual IP creation. It's our most frequently used feature."
"There is room for improvement in documentation. The documentation could be more specific about the changes needed to achieve specific goals."
"More integrations would be better."
"The OpenID features could improve in CyberArk Identity."
"They can include the Mobile Device Management (MDM) feature."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
"The solution's difficulty in gaining skill sets should be improved because it's a vertical product."
"We would like to see an improvement in the ability to manage mobile devices."
"I'm not sure what needs improvement. It is a good platform."
"The operational deployment is not great."
"The solution is quite costly."
"F5 BIG-IP Access Policy Manager has room for improvement in integration with other products."
"Cloud services are something that F5 Access Policy Manager could do better"
"I'd suggest improved documentation integration directly within the GUI. Right now, finding comprehensive documentation often requires going to external websites like the community portal."
"F5 BIG-IP APM disconnects when you leave it for long enough, but that is natural for IT solutions to do. That's a little bit frustrating."
"The price of this product can be improved."
"The initial setup was complex."
More F5 BIG-IP Access Policy Manager (APM) Pricing and Cost Advice →
CyberArk Identity is ranked 8th in Access Management with 17 reviews while F5 BIG-IP Access Policy Manager (APM) is ranked 5th in Access Management with 13 reviews. CyberArk Identity is rated 8.2, while F5 BIG-IP Access Policy Manager (APM) is rated 8.2. The top reviewer of CyberArk Identity writes "Allows Linux and Unix administrators to login with single password ". On the other hand, the top reviewer of F5 BIG-IP Access Policy Manager (APM) writes " Facilitates packet inspection, modification, and offloading and offers visibility and troubleshooting capabilities, allowing for pre-production server testing". CyberArk Identity is most compared with Microsoft Intune, CyberArk Privileged Access Manager, Microsoft Entra ID, SailPoint IdentityIQ and LastPass, whereas F5 BIG-IP Access Policy Manager (APM) is most compared with Citrix Gateway, CyberArk Privileged Access Manager, Cisco ISE (Identity Services Engine), Ivanti Connect Secure and Microsoft Remote Desktop Services. See our CyberArk Identity vs. F5 BIG-IP Access Policy Manager (APM) report.
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.