BeyondTrust Remote Support vs F5 BIG-IP Access Policy Manager (APM) comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between BeyondTrust Remote Support and F5 BIG-IP Access Policy Manager (APM) based on real PeerSpot user reviews.

Find out in this report how the two Remote Access solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed BeyondTrust Remote Support vs. F5 BIG-IP Access Policy Manager (APM) Report (Updated: March 2024).
768,857 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Offers a secure method of access without having to install agents everywhere.""Live chat enabled a new support channel into our service desk, integrating with our Service Management toolset. The meet-in-the-middle remote control functionality bypassed a lot of network restrictions that hampered our previous solution, enabling a far wider reach to our end-users.""The support team who are interfacing with us, are excellent. They are on time for any response.""The file transfer feature allows IT to provide needed drivers and files without interfering with the employee's workflow.""It's very secure, and it works very well. I like their remote support feature. It can be used for our clients' desktops or anywhere where the client can be working. I'd have to say the product is very good. It's a strong solution for us.""I would rate the technical support as a nine out of 10. They are polite, quick, and good with follow-ups.""The remote reboot feature is particularly valuable for rebooting terminal servers that have power controls disabled.""Bomgar is used for connecting with our end users and helping them to resolve any issues that they have on their computer."

More BeyondTrust Remote Support Pros →

"We have seen a return on investment from F5 BIG-IP Access Policy Manager. It provided access at a time when we didn't have it.""The performance of the solution is valuable.""The product allows us to create customized portals for your users.""The load balancing features are valuable.""The tool is reliable and easy to configure.""The portal access was very good.""Our customers have never complained about the stability""This is a product that is easy to install and integrate, and it is simple to use."

More F5 BIG-IP Access Policy Manager (APM) Pros →

Cons
"I would like to see more integration with iOS devices along with better connectivity and communication with these devices.""They need to ensure that the remote support is compatible with the other cloud solution providers, like Huawei. Currently it is only compatible with Azure, AWS and KVM.""The screen annotation tools could be expanded. I would like to see a text/typing annotation tool.""Static notes for hosts: If I could enter notes on a Jump Client and have them appear every time I connect to that Client, it would be a huge benefit.""It lacks voice integration like the other products because they need the compression to support that large amount of concurrent sessions. We've had to sacrifice voice.""It is pricey. It would be nice if it weren't so expensive because then you could afford more licenses and have more people involved, but I get it. They do have something that's unique compared to some of their competitors out on the market. It is a very robust and safe tool. If the price could come down, that'd be great.""There were a few employee devices that failed during the initial deployment, which required a second deployment.""We sometimes have trouble accessing servers because of credentialing and multifactor authentication issues with PAM."

More BeyondTrust Remote Support Cons →

"The solution’s GUI looks very old.""F5 BIG-IP APM disconnects when you leave it for long enough, but that is natural for IT solutions to do. That's a little bit frustrating.""Cloud services are something that F5 Access Policy Manager could do better""I'd suggest improved documentation integration directly within the GUI. Right now, finding comprehensive documentation often requires going to external websites like the community portal.""The price of this product can be improved.""The solution is quite costly.""Integrating identity providers and single sign-on solutions can simplify user authentication and access control.""We do not have knowledgeable support teams locally."

More F5 BIG-IP Access Policy Manager (APM) Cons →

Pricing and Cost Advice
  • "This product provides value for money."
  • "​The product maintenance and licensing costs are on the higher end, so I would carefully review how many licenses you need. The concurrent license model is helpful in this manner.​"
  • "Pricing is reasonable for what the service is offering. If it is looked at from a purely remote control perspective then it might appear expensive, but it is the wider functionality that should be considered too."
  • "Bomgar has a very fair pricing structure."
  • "Although the upfront cost is a bit overwhelming, the appliance will pay for itself in less than two years."
  • "The setup is complex. Purchase the remote implementation service and make them slow down and work with you."
  • "I would like to order more licenses. This would allow us to support more end users concurrently."
  • "I highly recommend using the tech team properly trained by Bomgar. This will help the tool be more useful."
  • More BeyondTrust Remote Support Pricing and Cost Advice →

  • "Recently, they have simplified the licensing"
  • "The product is very expensive."
  • "The tool is a little bit expensive."
  • More F5 BIG-IP Access Policy Manager (APM) Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Remote Access solutions are best for your needs.
    768,857 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable feature of the solution concerns our company's main use case, which is for connection to our remote clients.
    Top Answer:The local partners for BeyondTrust Remote Support are not enough in numbers. There are not enough product partners in Turkey, making it difficult for me to get assistance. The aforementioned area can… more »
    Top Answer:I can recommend the product, but it is important to note that it is expensive. Though I am not a very good expert with BeyondTrust Remote Support, I think one can get and use another product very… more »
    Top Answer:The most valuable feature is the virtual IP creation. It's our most frequently used feature.
    Top Answer:The tool is a little bit expensive. I rate the pricing a six out of ten.
    Top Answer:In my opinion, the GUI side needs some improvement based on my usage. Sometimes, it doesn't work as efficiently as the CLI side. Feature-wise, sometimes when I log in to the GUI and want to see the… more »
    Ranking
    7th
    out of 44 in Remote Access
    Views
    3,114
    Comparisons
    1,774
    Reviews
    7
    Average Words per Review
    503
    Rating
    8.6
    12th
    out of 44 in Remote Access
    Views
    1,065
    Comparisons
    883
    Reviews
    9
    Average Words per Review
    348
    Rating
    8.1
    Comparisons
    Also Known As
    Bomgar Remote Support
    F5 Access Policy Manager
    Learn More
    Overview

    BeyondTrust Remote Support is software built to help organizations gain access to and support nearly any remote computer or mobile device with a single solution. BeyondTrust Remote Support works across Windows, Mac, and Linux and gives you access and control whether a device is on or off the network.

    BeyondTrust Remote Support Features

    BeyondTrust Remote Support has many valuable key features. Some of the most useful ones include:

    • Remote access and control: IT administrators have the ability to resolve issues at light speed, improving productivity and also end-user satisfaction.
    • Efficiency and scale: With BeyondTrust Remote Support, you can manage unattended access to any system and you can also create mass installer packages.
    • Compliance: BeyondTrust Remote Support allows you to automatically monitor activity in real time, record all session activity, and produce a detailed audit log without interfering with service desk processes.
    • Team and permissions administration: By using BeyondTrust Remote Support, you can Implement security across your service desk with granular role and permissions settings.
    • Native 2FA: BeyondTrust Verify is a TOTP native 2FA capability. It can be enabled for any user and verifies the identity of users before a BeyondTrust Remote Support session is actually launched.
    • Credential injection: If users integrate with the BeyondTrust Vault or BeyondTrust Password Safe, they can directly inject credentials into systems and end servers with just one click.

    BeyondTrust Remote Support Benefits

    Some of the benefits of using BeyondTrust Remote Support include:

    • Security and privacy: BeyondTrust Remote Support gives support teams quick access to desktops and IT systems without revealing their credentials and passwords. In addition, integrating BeyondTrust Privileged Access complements and controls access to privileged user accounts to protect mission-critical IT systems.
    • Mobile support: BeyondTrust Remote Support allows IT teams to provide instant remote support to mobile device users. The solution also supports Android smartphones and tablets as well as iOS devices (iPhone, iPad, iPod Touch).
    • ServiceNow integration: BeyondTrust Remote Support offers integrated remote support and secure chat.
    • Support across multiple systems and devices: The BeyondTrust Remote Support solution can help your organization achieve reliable remote support for end users and customers using Windows, Mac, Android, iOS, or any other operating system.

    Reviews from Real Users

    Below are some reviews and helpful feedback written by BeyondTrust Remote Support users.

    A Cybersecurity Architect at a tech vendor says, “The most valuable features are the ease of deployment, performance, pre and post-sales support, the vast majority of the localization they have done and the solution provider that they support. You can't compete with TeamViewer or any other similar products. It's completely in a class of its own.”

    An Enterprise Service Desk Systems Manager at a manufacturing company comments, "Screen sharing, in general, is pretty important for a service desk. Another thing that I have found to be very helpful is that you can also do screen sharing on a cell phone. When people have an issue with their cell phone, it is ordinarily very difficult to troubleshoot the issue. With BeyondTrust Remote Support, you can share the cell phone screen, and somebody can take a look at it remotely. I am not sure if other competing solutions offer this feature. It is pretty user-friendly. It is also good performance-wise."

    PeerSpot user Mark B., Sr VP of Business Operations at Networking Technologies and Support, Inc., explains that he thinks the solution is “Great for delivering end-user support, good at recording sessions, and very stable.


    F5 BIG-IP Access Policy Manager (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access. 

    BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.

    BIG-IP APM Benefits:

    • Ease of use
    • Flexibility
    • Ability to integrate with other systems
    • Security features
    • Granular access control
    • Responsive and helpful support team

    BIG-IP APM Features:

    • Support for Identity Aware Proxy (IAP) enabling Zero Trust application access
    • Context-based authorization with dynamic L4/L7 ACLs
    • Integration with third-party MFA solutions
    • DTLS 2.0 mode for delivering and securing applications
    • SAML 2.0 identity federation support
    • Support for OAuth 2.0 authorization protocol
    • SSO support for classic authentication (Kerberos, header- based, etc.), credential caching, OAuth 2.0, SAML 2.0, and FIDO2 (U2F)
    • AAA server authentication and high-availability
    • Integration with leading IAM vendor products (Microsoft, Okta, Ping Identity)
    • BIG IP Edge Client and F5 Access integrate with VMware Horizon ONE (AirWatch), Microsoft Intune and IBM MaaS360
    • Risk-based access leveraging third-party UEBA and risk engines (HTTP Connector)

    Reviews from Real Users

    Below are some reviews and helpful feedback written by BIG-IP APM users.

    Mahmmoud Rabie, Senior Site Reliability Engineer, writes that BIG-IP APM is "A highly stable solution for load balancing, but the initial setup is complex."

    Clyde LivingstonSenior Process Specialist at Telstra, says that BIG-IP APM is "Easy to use, useful access remotely, but lacking stability."

    Chris LamSenior Solution Consultant at Macroview Telecom Limited, states that BIG-IP APM is "Useful for remote access VPN and VPI integration with VMware.

    Sample Customers
    InterContinental Hotels Group, Williams-Sonoma Inc., eBay, Carbonite, Computer Sciences Corporation
    City Bank, Ricacorp Properties, Miele, American Systems, Bangladesh Post Office
    Top Industries
    REVIEWERS
    Manufacturing Company16%
    Financial Services Firm12%
    University12%
    Consumer Goods Company12%
    VISITORS READING REVIEWS
    Computer Software Company16%
    Government10%
    Financial Services Firm9%
    Manufacturing Company7%
    REVIEWERS
    Comms Service Provider27%
    Media Company18%
    Computer Software Company18%
    Financial Services Firm18%
    VISITORS READING REVIEWS
    Financial Services Firm12%
    Computer Software Company12%
    Government11%
    Manufacturing Company8%
    Company Size
    REVIEWERS
    Small Business37%
    Midsize Enterprise22%
    Large Enterprise41%
    VISITORS READING REVIEWS
    Small Business19%
    Midsize Enterprise13%
    Large Enterprise68%
    REVIEWERS
    Small Business46%
    Large Enterprise54%
    VISITORS READING REVIEWS
    Small Business17%
    Midsize Enterprise14%
    Large Enterprise69%
    Buyer's Guide
    BeyondTrust Remote Support vs. F5 BIG-IP Access Policy Manager (APM)
    March 2024
    Find out what your peers are saying about BeyondTrust Remote Support vs. F5 BIG-IP Access Policy Manager (APM) and other solutions. Updated: March 2024.
    768,857 professionals have used our research since 2012.

    BeyondTrust Remote Support is ranked 7th in Remote Access with 32 reviews while F5 BIG-IP Access Policy Manager (APM) is ranked 12th in Remote Access with 13 reviews. BeyondTrust Remote Support is rated 9.0, while F5 BIG-IP Access Policy Manager (APM) is rated 8.2. The top reviewer of BeyondTrust Remote Support writes "A robust, secure, and complete solution for quickly providing support and monitoring what's going on". On the other hand, the top reviewer of F5 BIG-IP Access Policy Manager (APM) writes " Facilitates packet inspection, modification, and offloading and offers visibility and troubleshooting capabilities, allowing for pre-production server testing". BeyondTrust Remote Support is most compared with Microsoft Remote Desktop Services, TeamViewer, BeyondTrust Privileged Remote Access, LogMeIn Pro and LogMeIn Rescue, whereas F5 BIG-IP Access Policy Manager (APM) is most compared with Citrix Gateway, CyberArk Privileged Access Manager, Cisco ISE (Identity Services Engine), Microsoft Remote Desktop Services and Fortinet FortiNAC. See our BeyondTrust Remote Support vs. F5 BIG-IP Access Policy Manager (APM) report.

    See our list of best Remote Access vendors.

    We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.