![]() | Mohamed Yassine Benomar Cyber Security Consultant at a tech company |
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Our customers have never complained about the stability"
"This is a product that is easy to install and integrate, and it is simple to use."
"The solution's most valuable feature is the authentication for the consumers. The integration with other third-party applications is excellent."
"The most valuable features are that it is easy to manage and it's stable."
"We create and define the permissions and configurations for the users."
"ForgeRock has CIAM, which other products didn't have, and they have DevOps ready."
"Even though we have very small business interests with them today, they see that we plan on growing drastically over the next two years. Therefore, we have excellent support and we are now at a point where we are not calling tech support. We pick up a phone and call the Account Manager and they'll get everything resolved for us. We don't have to queue along with everybody else and go through a long process."
"I like the intelligent authentication feature."
"Their access management solution, OpenAM, is most valuable because it meets the needs of a lot of users."
"Cloud services are something that F5 Access Policy Manager could do better"
"The price of this product can be improved."
"The identity management model needs a bit of improvement."
"They should improve the solution by include reporting."
"I find that it's quite expensive for just an open-source system. Support is quite expensive."
"Automatic Deployment needs improvement. it could be made easier."
"We're worried about the scaling. We're told it will be okay and there won't be issues, however, I'm not 100% convinced."
"It should have a better user interface. Its flexibility should also be improved. It is not about simplifying; it is more about flexibility. Each company has its own requirements, and ForgeRock can provide more flexibility in terms of the use of existing modules to implement features for the customers."
"It should be a little bit easier to implement. It is user-friendly, but there is always scope for improvement."
"Recently, they have simplified the licensing"
"It's a bit pricey and could be more competitive."
"We have multiple clients we are looking at right now. We are at a very small number, however, the idea and the goal is to grow. We are looking at about $100,000 and $50,000 a minimum a month cost. That'd be minimum maybe in a couple of years."
"Its price is comparable to other products in the market."
"Its licensing is on a yearly basis, but it also depends on the contract that you have with the vendor. They have multiple types of contracts. There are additional costs to the standard licensing fees. If you need some of the features, you have to pay more."
At F5, we give our customers the freedom to securely deliver every app, anywhere—with confidence. All F5 products are highly programmable and integrate into any environment, whether on premises or in any cloud. To date, 48 of the Fortune 50 companies rely on F5 to deliver apps that customers and employees can securely access at any time, on any device, from any location.
F5 Access Policy Manager is ranked 11th in Access Management with 2 reviews while ForgeRock is ranked 3rd in Access Management with 7 reviews. F5 Access Policy Manager is rated 8.6, while ForgeRock is rated 7.6. The top reviewer of F5 Access Policy Manager writes "A robust platform that enables our clients to do almost anything". On the other hand, the top reviewer of ForgeRock writes "Good for multi-client setups and easy to implement but the scalability seems uncertain". F5 Access Policy Manager is most compared with IBM Security Access Manager, CyberArk PAS, Azure Active Directory, Auth0 and WSO2 Identity Server, whereas ForgeRock is most compared with SailPoint IdentityIQ, Azure Active Directory, Okta Workforce Identity, OpenIAM Identity Governance and CyberArk PAS. See our F5 Access Policy Manager vs. ForgeRock report.
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.