We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Our customers have never complained about the stability"
"This is a product that is easy to install and integrate, and it is simple to use."
"The solution is stable and reliable."
"The solution has powerful authentification and authorization. It offers a good way to increase security."
"It's a good solution for identification and access management."
"I have found this solution to be really practical and when a user wants to log in, it is effortless and runs smooth."
"Cloud services are something that F5 Access Policy Manager could do better"
"The price of this product can be improved."
"The solution is quite costly."
"Configuration could be simplified for the end-user."
"The user interface needs to be simplified, it's complex and not user-friendly."
"The solution could be classified as a hilt system. There are a lot of resources being used and it is suitable for very large enterprises or the public sector."
"Recently, they have simplified the licensing"
"The license and costs depend on the amount range of users you have. For just approximately 2,000 users, the price is practical and fair. However, when you have 20,000 users, it starts to become really expensive, and the discount per user is not attractive enough to go ahead and purchase."
F5® BIG-IP® Access Policy Manager® (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access. BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.
Key features of BIG-IP APM are (but not limited to):
• Support for Identity Aware Proxy (IAP) enabling Zero Trust application access
• Context-based authorization with dynamic L4/L7 ACLs
• Integration with third-party MFA solutions
• DTLS 2.0 mode for delivering and securing applications
• SAML 2.0 identity federation support
• Support for OAuth 2.0 authorization protocol
• SSO support for classic authentication (Kerberos, header- based, etc.), credential caching, OAuth 2.0, SAML 2.0, and FIDO2 (U2F)
• AAA server authentication and high-availability
• Integration with leading IAM vendor products (Microsoft, Okta, Ping Identity)
• BIG IP Edge Client and F5 Access integrate with VMware Horizon ONE (AirWatch), Microsoft Intune and IBM MaaS360
• Risk-based access leveraging third-party UEBA and risk engines (HTTP Connector)
IBM Security Access Manager helps you simplify your users' access while more securely adopting web, mobile, IoT and cloud technologies. It can be deployed on-premises, in a virtual or hardware appliance or containerized with Docker. ISAM helps you strike a balance between usability and security through the use of risk-based access, single sign-on, integrated access management control, identity federation and mobile multi-factor authentication. Take back control of your access management with IBM Security Access Manager.
F5 BIG-IP Access Policy Manager (APM) is ranked 11th in Access Management with 3 reviews while IBM Security Access Manager is ranked 12th in Access Management with 3 reviews. F5 BIG-IP Access Policy Manager (APM) is rated 8.6, while IBM Security Access Manager is rated 7.6. The top reviewer of F5 BIG-IP Access Policy Manager (APM) writes "A robust platform that enables our clients to do almost anything". On the other hand, the top reviewer of IBM Security Access Manager writes "Effortless user sign in, highly scalable, and reliable". F5 BIG-IP Access Policy Manager (APM) is most compared with CyberArk Privileged Access Manager, ForgeRock, Azure Active Directory, Amazon Cognito and Auth0, whereas IBM Security Access Manager is most compared with Azure Active Directory, Okta Workforce Identity, ForgeRock, Oracle Access Manager and CyberArk Privileged Access Manager. See our F5 BIG-IP Access Policy Manager (APM) vs. IBM Security Access Manager report.
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.