We performed a comparison between F5 BIG-IP Access Policy Manager (APM) and WSO2 Identity Server based on real PeerSpot user reviews.
Find out what your peers are saying about Cisco, Zscaler, Palo Alto Networks and others in Secure Web Gateways (SWG)."The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"The solution is stable."
"The portal access was very good."
"The performance of the solution is valuable."
"The tool is reliable and easy to configure."
"Stickiness is the most valuable feature of the product."
"This is a product that is easy to install and integrate, and it is simple to use."
"The most valuable feature is the virtual IP creation. It's our most frequently used feature."
"In my opinion, the GUI is perfect with the configuration options provided. F5 BIG-IP has given customization options and policy configuration tools in the GUI. It's good and good enough to work."
"The load balancing features are valuable."
"Some of the valuable features of the solution are the easy integration with processes, such as Single Sign-On. Overall WSO2 is straightforward and does not need customization."
"The solution gets the job done, and we don't have to do the main configuration."
"I would rate the solution's stability eight or nine out of ten."
"Comprehensive ecosystem."
"The single sign-on procedure itself, as well as the ability to connect to external user sources such as Microsoft Active Directory and LDAP servers, are the solution's most valuable features."
"The keystore feature has been most valuable for us."
"It's very easy to implement everything."
"The product provides easy integration between API manager and IT server components."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"The operational deployment is not great."
"The solution’s GUI looks very old."
"In my opinion, the GUI side needs some improvement based on my usage. Sometimes, it doesn't work as efficiently as the CLI side."
"F5 BIG-IP APM disconnects when you leave it for long enough, but that is natural for IT solutions to do. That's a little bit frustrating."
"The initial setup was complex."
"Cloud services are something that F5 Access Policy Manager could do better"
"The solution is quite costly."
"We do not have knowledgeable support teams locally."
"The high availability architecture has to be improved."
"This solution requires extensive knowledge to be used effectively as certain areas of its use are not user friendly."
"The solution seems to be pretty outdated."
"This solution does not have BPM workflows already integrated, we had to integrate the BPM module externally. They do not provide full-featured auditing and certification modules out of the box."
"I found the initial setup to be very complex."
"The solution could improve its development from a user perspective."
"Sometimes working with the code is difficult because I search for documentation about the code and how to work with the code, which is where I believe they should improve, by providing some documentation on how to work with the code."
"There needs to be a good support model and easy-to-understand documentation."
More F5 BIG-IP Access Policy Manager (APM) Pricing and Cost Advice →
F5 BIG-IP Access Policy Manager (APM) is ranked 16th in Secure Web Gateways (SWG) with 13 reviews while WSO2 Identity Server is ranked 7th in Customer Identity and Access Management (CIAM) with 8 reviews. F5 BIG-IP Access Policy Manager (APM) is rated 8.2, while WSO2 Identity Server is rated 8.2. The top reviewer of F5 BIG-IP Access Policy Manager (APM) writes " Facilitates packet inspection, modification, and offloading and offers visibility and troubleshooting capabilities, allowing for pre-production server testing". On the other hand, the top reviewer of WSO2 Identity Server writes "Provides easy integration with other tools". F5 BIG-IP Access Policy Manager (APM) is most compared with Citrix Gateway, CyberArk Privileged Access Manager, Ivanti Connect Secure, Cisco ISE (Identity Services Engine) and Microsoft Entra ID, whereas WSO2 Identity Server is most compared with Auth0, Amazon Cognito, SAP Identity Management, CyberArk Privileged Access Manager and SecureAuth Identity Platform.
We monitor all Secure Web Gateways (SWG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.