F5 BIG-IP Access Policy Manager (APM) vs VNC Connect comparison

Cancel
You must select at least 2 products to compare!
F5 Logo
1,053 views|884 comparisons
85% willing to recommend
RealVNC Logo
2,708 views|2,497 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between F5 BIG-IP Access Policy Manager (APM) and VNC Connect based on real PeerSpot user reviews.

Find out what your peers are saying about TeamViewer, Microsoft, Citrix and others in Remote Access.
To learn more, read our detailed Remote Access Report (Updated: April 2024).
771,157 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"In my opinion, the GUI is perfect with the configuration options provided. F5 BIG-IP has given customization options and policy configuration tools in the GUI. It's good and good enough to work.""The performance of the solution is valuable.""F5 BIG-IP APM is relatively easy to use.""The solution is stable and reliable.""Stickiness is the most valuable feature of the product.""The tool is reliable and easy to configure.""Our customers have never complained about the stability""The most valuable feature is the virtual IP creation. It's our most frequently used feature."

More F5 BIG-IP Access Policy Manager (APM) Pros →

"The most valuable features are that it is consistently low profile and consistently works without hiccups or headaches."

More VNC Connect Pros →

Cons
"F5 BIG-IP Access Policy Manager has room for improvement in integration with other products.""I'd suggest improved documentation integration directly within the GUI. Right now, finding comprehensive documentation often requires going to external websites like the community portal.""The operational deployment is not great.""The technical support’s response time must be improved.""Integrating identity providers and single sign-on solutions can simplify user authentication and access control.""The price of this product can be improved.""The solution is quite costly.""F5 BIG-IP APM disconnects when you leave it for long enough, but that is natural for IT solutions to do. That's a little bit frustrating."

More F5 BIG-IP Access Policy Manager (APM) Cons →

"We occasionally have issues with the graphic software of the interface."

More VNC Connect Cons →

Pricing and Cost Advice
  • "Recently, they have simplified the licensing"
  • "The product is very expensive."
  • "The tool is a little bit expensive."
  • More F5 BIG-IP Access Policy Manager (APM) Pricing and Cost Advice →

    Information Not Available
    report
    Use our free recommendation engine to learn which Remote Access solutions are best for your needs.
    771,157 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:In my opinion, the GUI is perfect with the configuration options provided. F5 BIG-IP has given customization options and policy configuration tools in the GUI. It's good and good enough to work.
    Top Answer:The tool is a little bit expensive. I rate the pricing a six out of ten.
    Top Answer:I'd suggest improved documentation integration directly within the GUI. Right now, finding comprehensive documentation often requires going to external websites like the community portal. In the APM… more »
    Ask a question

    Earn 20 points

    Ranking
    10th
    out of 59 in Remote Access
    Views
    1,053
    Comparisons
    884
    Reviews
    10
    Average Words per Review
    372
    Rating
    8.1
    15th
    out of 59 in Remote Access
    Views
    2,708
    Comparisons
    2,497
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Comparisons
    Also Known As
    F5 Access Policy Manager
    Learn More
    Overview

    F5 BIG-IP Access Policy Manager (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access. 

    BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.

    BIG-IP APM Benefits:

    • Ease of use
    • Flexibility
    • Ability to integrate with other systems
    • Security features
    • Granular access control
    • Responsive and helpful support team

    BIG-IP APM Features:

    • Support for Identity Aware Proxy (IAP) enabling Zero Trust application access
    • Context-based authorization with dynamic L4/L7 ACLs
    • Integration with third-party MFA solutions
    • DTLS 2.0 mode for delivering and securing applications
    • SAML 2.0 identity federation support
    • Support for OAuth 2.0 authorization protocol
    • SSO support for classic authentication (Kerberos, header- based, etc.), credential caching, OAuth 2.0, SAML 2.0, and FIDO2 (U2F)
    • AAA server authentication and high-availability
    • Integration with leading IAM vendor products (Microsoft, Okta, Ping Identity)
    • BIG IP Edge Client and F5 Access integrate with VMware Horizon ONE (AirWatch), Microsoft Intune and IBM MaaS360
    • Risk-based access leveraging third-party UEBA and risk engines (HTTP Connector)

    Reviews from Real Users

    Below are some reviews and helpful feedback written by BIG-IP APM users.

    Mahmmoud Rabie, Senior Site Reliability Engineer, writes that BIG-IP APM is "A highly stable solution for load balancing, but the initial setup is complex."

    Clyde LivingstonSenior Process Specialist at Telstra, says that BIG-IP APM is "Easy to use, useful access remotely, but lacking stability."

    Chris LamSenior Solution Consultant at Macroview Telecom Limited, states that BIG-IP APM is "Useful for remote access VPN and VPI integration with VMware.

    Intuitive remote control
    Use the mouse and keyboard (or touchscreen) in front of you as though they belong to the remote computer.

    Send special keys and combinations such as Ctrl-Alt-Del, and copy and paste text in either direction. Type in confidence that characters will be interpreted correctly, whatever your platform, keyboard or input language.

    Tried and tested performance
    As the original inventors of VNC® technology, we know how to create a responsive screen sharing experience that's as good as being there.

    Our patent-protected technology automatically optimizes to the speed of your network, and is especially effective in low-bandwidth and high-latency environments.

    Cross-platform support
    PC to PC and mobile to PC across Windows, Mac, Linux, Raspberry Pi, iOS and Android.

    With an Enterprise subscription, you also get a key to install our VNC® 5.x software on a wide range of older and UNIX operating systems too, so your legacy hardware remains accessible.

    Attended and unattended access
    Connect whether remote computer owners are present or not.

    Remotely access your own computers, monitor or patch equipment in the field, support customers or colleagues, and much more. Learn about the many ways our customers use VNC® Connect.

    Direct and cloud connectivity
    Our cloud service automatically brokers cloud connections between devices wherever they are.

    So you don’t need to rely on a VPN, or conduct complex and insecure port-forwarding and firewall configuration.

    With an Enterprise subscription, you can establish direct connections as well (or instead), perfect for locked down or offline network environments. For more information, start with our document cloud versus direct.

    Pre-install or connect on demand
    Add device access to your subscription, install VNC® Connect on every device you own or manage, and enable access by anyone at any time.

    Alternatively, add instant support to your subscription and connect in seconds on demand, leaving no footprint. Or add both capabilities, and cover every remote access use case.

    File transfer, printing and chat
    During a session, you're not restricted to just interacting with the remote screen.

    You can transfer files in either direction, print files directly to a printer where you are (rather than to a printer attached to the remote computer), and securely chat with other users connected at the same time as you.

    Secure by design
    VNC® Connect is built from the ground up with security in mind, to balance the control you need with the privacy that compliance requires.

    Sessions are encrypted end-to-end using up to 256-bit AES encryption. Authentication is mandatory at the point of connection and never delegated to the cloud. Protect your computers with multi-factor authentication, single-sign on (SSO), granular access control and rich session permissions.

    Multilingual support
    VNC® Connect is available in French, German, Spanish and Brazilian Portuguese as well as English, with more translations on the way.

    Connect-Features-TeamManagement.png
    Online team management
    Manage remote computers, the people you invite into your team to share remote access with, and their roles and permissions from one central location.

    Remote deployment
    With an Enterprise subscription, you can deploy VNC® Connect in bulk, offline or remotely using your standard enterprise tooling.

    In addition, you can configure VNC® Connect remotely using policy, and lock it down to prevent change.

    Virtual desktops under Linux
    With an Enterprise subscription, you can create virtual desktops on Linux computers.

    This might be useful to enable visual remote access to headless Linux systems, or provide separate workspaces for simultaneous users of a shared resource.

    Sample Customers
    City Bank, Ricacorp Properties, Miele, American Systems, Bangladesh Post Office
    Telesat Canada, St. Anthony's School, Pratt and Whitney, City of Sacramento
    Top Industries
    REVIEWERS
    Comms Service Provider27%
    Media Company18%
    Computer Software Company18%
    Financial Services Firm18%
    VISITORS READING REVIEWS
    Financial Services Firm12%
    Computer Software Company11%
    Government11%
    Manufacturing Company8%
    VISITORS READING REVIEWS
    Manufacturing Company30%
    Computer Software Company13%
    Government7%
    Comms Service Provider5%
    Company Size
    REVIEWERS
    Small Business50%
    Large Enterprise50%
    VISITORS READING REVIEWS
    Small Business17%
    Midsize Enterprise14%
    Large Enterprise69%
    VISITORS READING REVIEWS
    Small Business19%
    Midsize Enterprise10%
    Large Enterprise71%
    Buyer's Guide
    Remote Access
    April 2024
    Find out what your peers are saying about TeamViewer, Microsoft, Citrix and others in Remote Access. Updated: April 2024.
    771,157 professionals have used our research since 2012.

    F5 BIG-IP Access Policy Manager (APM) is ranked 10th in Remote Access with 13 reviews while VNC Connect is ranked 15th in Remote Access. F5 BIG-IP Access Policy Manager (APM) is rated 8.2, while VNC Connect is rated 9.0. The top reviewer of F5 BIG-IP Access Policy Manager (APM) writes " Facilitates packet inspection, modification, and offloading and offers visibility and troubleshooting capabilities, allowing for pre-production server testing". On the other hand, the top reviewer of VNC Connect writes "Reliable and trustworthy remote access software, with responsive technical support ". F5 BIG-IP Access Policy Manager (APM) is most compared with Citrix Gateway, CyberArk Privileged Access Manager, Cisco ISE (Identity Services Engine), Ivanti Connect Secure and Microsoft Remote Desktop Services, whereas VNC Connect is most compared with OpenText Exceed TurboX, Apache Guacamole, Dameware Remote Support, Parallels Access and Check Point Remote Access VPN.

    See our list of best Remote Access vendors.

    We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.