We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security."
"Our customers have never complained about the stability"
"This is a product that is easy to install and integrate, and it is simple to use."
"The solution is stable and reliable."
"We would like to see an improvement in the ability to manage mobile devices."
"They can include the Mobile Device Management (MDM) feature."
"Cloud services are something that F5 Access Policy Manager could do better"
"The price of this product can be improved."
"The solution is quite costly."
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"Recently, they have simplified the licensing"
GRANT ACCESS TO YOUR WORKFORCE. GIVE NOTHING TO ATTACKERS.
Your users need quick access to a variety of business resources. You need confidence it’s them knocking – not an attacker. With CyberArk Workforce Identity, you can empower your workforce while keeping threats out.
Frictionless Sign On
Keep workers working, not logging in and out.
Make intelligent access decisions based on AI-powered analytics.
Enable access across any device, anywhere at just the right time.
F5® BIG-IP® Access Policy Manager® (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access. BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.
Key features of BIG-IP APM are (but not limited to):
• Support for Identity Aware Proxy (IAP) enabling Zero Trust application access
• Context-based authorization with dynamic L4/L7 ACLs
• Integration with third-party MFA solutions
• DTLS 2.0 mode for delivering and securing applications
• SAML 2.0 identity federation support
• Support for OAuth 2.0 authorization protocol
• SSO support for classic authentication (Kerberos, header- based, etc.), credential caching, OAuth 2.0, SAML 2.0, and FIDO2 (U2F)
• AAA server authentication and high-availability
• Integration with leading IAM vendor products (Microsoft, Okta, Ping Identity)
• BIG IP Edge Client and F5 Access integrate with VMware Horizon ONE (AirWatch), Microsoft Intune and IBM MaaS360
• Risk-based access leveraging third-party UEBA and risk engines (HTTP Connector)
CyberArk Identity is ranked 10th in Access Management with 2 reviews while F5 BIG-IP Access Policy Manager (APM) is ranked 11th in Access Management with 3 reviews. CyberArk Identity is rated 9.0, while F5 BIG-IP Access Policy Manager (APM) is rated 8.6. The top reviewer of CyberArk Identity writes "A stable solution for accessing on-premises active directory". On the other hand, the top reviewer of F5 BIG-IP Access Policy Manager (APM) writes "A robust platform that enables our clients to do almost anything". CyberArk Identity is most compared with Azure Active Directory, Microsoft Intune, Okta Workforce Identity and SailPoint IdentityIQ, whereas F5 BIG-IP Access Policy Manager (APM) is most compared with IBM Security Access Manager, CyberArk Privileged Access Manager, ForgeRock and Azure Active Directory. See our CyberArk Identity vs. F5 BIG-IP Access Policy Manager (APM) report.
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.