Compare Check Point Remote Access VPN vs. F5 BIG-IP Access Policy Manager (APM)

Cancel
You must select at least 2 products to compare!
Top Review
Find out what your peers are saying about Check Point Remote Access VPN vs. F5 BIG-IP Access Policy Manager (APM) and other solutions. Updated: September 2021.
534,768 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"The ability to create your trigger data domains is the solution's most valuable feature.""The management of the solution is very simple. It allows for a single view of all the endpoints.""The initial set up is not complex.""Our users find the interface very comfortable to use.""It allows everyone to work from home. If no one could work from home, then we wouldn't have a company, especially now during COVID-19. It's mission-critical, especially since it's currently being used. If there is a problem with it, we would really be screwed. We would be hard-pressed because we would have to figure out what solution we're going to go with, how to deploy it, how long it would take to deploy it, and how we'd even get it on people's computers if we couldn't VPN to them. It would be near impossible to just change to a new VPN solution right now.""It is easy to install the Endpoint Remote Access VPN client to different platforms.""The most valuable feature is the seamless access.""The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage."

More Check Point Remote Access VPN Pros »

"Our customers have never complained about the stability""This is a product that is easy to install and integrate, and it is simple to use.""The solution is stable and reliable."

More F5 BIG-IP Access Policy Manager (APM) Pros »

Cons
"The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified.""I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not.""They could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage.""There is always room for innovation and the addition of new features.""When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client.""The Compliance software blade is available only for the Windows operating systems family, so no macOS security checks are implemented and performed.""We would like to see support for a layer seven VPN over UDP.""We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved."

More Check Point Remote Access VPN Cons »

"Cloud services are something that F5 Access Policy Manager could do better""The price of this product can be improved.""The solution is quite costly."

More F5 BIG-IP Access Policy Manager (APM) Cons »

Pricing and Cost Advice
"My understanding is that the pricing and licensing are very competitive, and it's not one of their more expensive products. We buy licenses for the solution and have licenses for the endpoint servers.""The price of this product is good.""Organizations that already have the Check Point NGFW need to purchase an additional license to have access to the VPN functionality."

More Check Point Remote Access VPN Pricing and Cost Advice »

"Recently, they have simplified the licensing"

More F5 BIG-IP Access Policy Manager (APM) Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Remote Access solutions are best for your needs.
534,768 professionals have used our research since 2012.
Questions from the Community
Top Answer: The solution is easy to install, centrally managed, and stable, with good technical support and a straightforward setup.
Top Answer: A saving password option might save time for continuous disconnection to the server due to internet fluctuation problems. They need to increase their timeout. Right now, it will fail after ten… more »
Top Answer: This is a product that is easy to install and integrate, and it is simple to use.
Top Answer: The price of this product can be improved.
Top Answer: The F5 Access Policy Manager is something that I have experience with and I am happy with it. This is a product that I can recommend for others. At this point, we don't have requirements beyond what… more »
Ranking
4th
out of 34 in Remote Access
Views
7,498
Comparisons
5,872
Reviews
15
Average Words per Review
763
Rating
8.5
17th
out of 34 in Remote Access
Views
676
Comparisons
531
Reviews
2
Average Words per Review
388
Rating
8.5
Comparisons
Also Known As
Check Point Remote Access VPN, Check Point Endpoint Remote Access VPN
F5 Access Policy Manager
Learn More
Overview

Provide users with secure, seamless remote access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.

F5® BIG-IP® Access Policy Manager® (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access. BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.

Key features of BIG-IP APM are (but not limited to):

• Support for Identity Aware Proxy (IAP) enabling Zero Trust application access
• Context-based authorization with dynamic L4/L7 ACLs
• Integration with third-party MFA solutions
• DTLS 2.0 mode for delivering and securing applications
• SAML 2.0 identity federation support
• Support for OAuth 2.0 authorization protocol
• SSO support for classic authentication (Kerberos, header- based, etc.), credential caching, OAuth 2.0, SAML 2.0, and FIDO2 (U2F)
• AAA server authentication and high-availability
• Integration with leading IAM vendor products (Microsoft, Okta, Ping Identity)
• BIG IP Edge Client and F5 Access integrate with VMware Horizon ONE (AirWatch), Microsoft Intune and IBM MaaS360
• Risk-based access leveraging third-party UEBA and risk engines (HTTP Connector)

Offer
Learn more about Check Point Remote Access VPN
Learn more about F5 BIG-IP Access Policy Manager (APM)
Sample Customers
Osmose, International Fund for Animal Welfare (IFAW)
City Bank, Ricacorp Properties, Miele, American Systems, Bangladesh Post Office
Top Industries
REVIEWERS
Financial Services Firm24%
Manufacturing Company24%
Program Development Consultancy12%
Logistics Company6%
VISITORS READING REVIEWS
Comms Service Provider26%
Computer Software Company22%
Government7%
Manufacturing Company5%
VISITORS READING REVIEWS
Computer Software Company23%
Comms Service Provider19%
Energy/Utilities Company7%
Insurance Company6%
Company Size
REVIEWERS
Small Business21%
Midsize Enterprise29%
Large Enterprise50%
VISITORS READING REVIEWS
Small Business7%
Midsize Enterprise69%
Large Enterprise24%
No Data Available
Find out what your peers are saying about Check Point Remote Access VPN vs. F5 BIG-IP Access Policy Manager (APM) and other solutions. Updated: September 2021.
534,768 professionals have used our research since 2012.

Check Point Remote Access VPN is ranked 4th in Remote Access with 17 reviews while F5 BIG-IP Access Policy Manager (APM) is ranked 17th in Remote Access with 3 reviews. Check Point Remote Access VPN is rated 8.6, while F5 BIG-IP Access Policy Manager (APM) is rated 8.6. The top reviewer of Check Point Remote Access VPN writes "Allows everyone to work from home, which is mission-critical for our organization". On the other hand, the top reviewer of F5 BIG-IP Access Policy Manager (APM) writes "A robust platform that enables our clients to do almost anything". Check Point Remote Access VPN is most compared with Cisco AnyConnect Secure Mobility Client, OpenVPN Access Server, Zscaler Private Access, TeamViewer and Symantec VIP Access Manager, whereas F5 BIG-IP Access Policy Manager (APM) is most compared with IBM Security Access Manager, CyberArk Privileged Access Manager, ForgeRock, Azure Active Directory and Amazon Cognito. See our Check Point Remote Access VPN vs. F5 BIG-IP Access Policy Manager (APM) report.

See our list of best Remote Access vendors.

We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.