User Reviews of CyberArk Privileged Access Manager & F5 BIG-IP Access Policy Manager (APM)

Updated March 2024

Would you like to learn about products from people using them now? Simplify your research with trusted advice from people like you.

Download our FREE report comparing CyberArk Privileged Access Manager and F5 BIG-IP Access Policy Manager (APM) based on reviews, features, and more!

Where should we email your report?






CyberArk Privileged Access Manager review

SatishIyer
SatishIyer
Assistant Vice President at a financial services firm with 10,001+ employees
Lets you ensure relevant, compliant access in good time and with an audit trail,...
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a...
F5 BIG-IP Access Policy Manager (APM) review

Ishan Shah
Ishan Shah
Senior Network Engineer at a financial services firm with 10,001+ employees
Facilitates packet inspection, modification, and offloading and offers visibility...
From my perspective, the work I do benefits from good visibility before anything goes to production. We can generate traffic with F5's load generators to see how it behaves, exposing any packet errors and other issues. This is valuable for me, as it allows for troubleshooting without involving server personnel. Additionally, we can capture...

Since 2012, we've had 765,234 professionals use our research.

As seen in