We performed a comparison between CyberArk Identity and F5 BIG-IP Access Policy Manager (APM) based on real PeerSpot user reviews.
Find out in this report how the two Access Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable features of CyberArk Identity are its ability to control access to administrative staff."
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"The user identification is simplified, and managing user privileges, whether adding or revoking them, is also quite straightforward when utilizing CyberArk SaaS."
"I like the RBAC (Role-Based Access Control). It basically involves defining various roles, and then simply assigning those roles to users."
"The tool helps with authentication. It acts as an MFA for any kind of privileged access that occurs in our organization."
"The initial setup is straightforward. It takes me up to an hour and a half."
"The most valuable feature of CyberArk Identity is the adaptive interface."
"The setup, via cloud, is simple."
"The portal access was very good."
"We have seen a return on investment from F5 BIG-IP Access Policy Manager. It provided access at a time when we didn't have it."
"F5 BIG-IP APM is relatively easy to use."
"In my opinion, the GUI is perfect with the configuration options provided. F5 BIG-IP has given customization options and policy configuration tools in the GUI. It's good and good enough to work."
"Stickiness is the most valuable feature of the product."
"Our customers have never complained about the stability"
"The performance of the solution is valuable."
"The tool is reliable and easy to configure."
"We would like to see an improvement in the ability to manage mobile devices."
"The tool has issues with the third-party SMS gateway. The solution has its own SMS gateway. Integration support is a challenge when we don’t use their SMS gateway. The tool also needs to improve its scalability."
"More integrations would be better."
"There is room for improvement in documentation. The documentation could be more specific about the changes needed to achieve specific goals."
"I'm not sure what needs improvement. It is a good platform."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
"CyberArk Identity's GUI is an area with certain shortcomings that need improvement."
"The OpenID features could improve in CyberArk Identity."
"The operational deployment is not great."
"The technical support’s response time must be improved."
"I'd suggest improved documentation integration directly within the GUI. Right now, finding comprehensive documentation often requires going to external websites like the community portal."
"The price of this product can be improved."
"The solution’s GUI looks very old."
"The solution is quite costly."
"F5 BIG-IP Access Policy Manager has room for improvement in integration with other products."
"We do not have knowledgeable support teams locally."
More F5 BIG-IP Access Policy Manager (APM) Pricing and Cost Advice →
CyberArk Identity is ranked 8th in Access Management with 17 reviews while F5 BIG-IP Access Policy Manager (APM) is ranked 9th in Access Management with 13 reviews. CyberArk Identity is rated 8.2, while F5 BIG-IP Access Policy Manager (APM) is rated 8.2. The top reviewer of CyberArk Identity writes "Allows Linux and Unix administrators to login with single password ". On the other hand, the top reviewer of F5 BIG-IP Access Policy Manager (APM) writes " Facilitates packet inspection, modification, and offloading and offers visibility and troubleshooting capabilities, allowing for pre-production server testing". CyberArk Identity is most compared with Microsoft Intune, CyberArk Privileged Access Manager, Microsoft Entra ID, SailPoint IdentityIQ and Cloudflare Access, whereas F5 BIG-IP Access Policy Manager (APM) is most compared with Citrix Gateway, CyberArk Privileged Access Manager, Cisco ISE (Identity Services Engine), Microsoft Remote Desktop Services and Ivanti Connect Secure. See our CyberArk Identity vs. F5 BIG-IP Access Policy Manager (APM) report.
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.