Compare F5 BIG-IP Access Policy Manager (APM) vs. IBM Security Access Manager

Cancel
You must select at least 2 products to compare!
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"Our customers have never complained about the stability""This is a product that is easy to install and integrate, and it is simple to use.""The solution is stable and reliable."

More F5 BIG-IP Access Policy Manager (APM) Pros »

"The solution has powerful authentification and authorization. It offers a good way to increase security.""It's a good solution for identification and access management.""I have found this solution to be really practical and when a user wants to log in, it is effortless and runs smooth."

More IBM Security Access Manager Pros »

Cons
"Cloud services are something that F5 Access Policy Manager could do better""The price of this product can be improved.""The solution is quite costly."

More F5 BIG-IP Access Policy Manager (APM) Cons »

"Configuration could be simplified for the end-user.""The user interface needs to be simplified, it's complex and not user-friendly.""The solution could be classified as a hilt system. There are a lot of resources being used and it is suitable for very large enterprises or the public sector."

More IBM Security Access Manager Cons »

Pricing and Cost Advice
"Recently, they have simplified the licensing"

More F5 BIG-IP Access Policy Manager (APM) Pricing and Cost Advice »

"The license and costs depend on the amount range of users you have. For just approximately 2,000 users, the price is practical and fair. However, when you have 20,000 users, it starts to become really expensive, and the discount per user is not attractive enough to go ahead and purchase."

More IBM Security Access Manager Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
535,919 professionals have used our research since 2012.
Questions from the Community
Top Answer: The solution is stable and reliable.
Top Answer: The solution is expensive. It's not a cheap product. You do need to pay extra for certain features and services.
Top Answer: The solution is pretty technical. The initial setup is complex. The solution is quite costly. The solution could offer better reporting. The management aspect of the solution needs improvement.
Top Answer: I have found this solution to be really practical and when a user wants to log in, it is effortless and runs smooth.
Top Answer: The solution could be classified as a hilt system. There are a lot of resources being used and it is suitable for very large enterprises or the public sector. In the future, there could be better… more »
Top Answer: I am a provider of mobile authentication and my customers want to upgrade the Single Sign-On platform solution. We then provide them our mobile authentication to plugin with the new version of IBM's… more »
Ranking
11th
out of 28 in Access Management
Views
676
Comparisons
531
Reviews
2
Average Words per Review
388
Rating
8.5
12th
out of 28 in Access Management
Views
1,722
Comparisons
1,410
Reviews
3
Average Words per Review
283
Rating
7.7
Comparisons
Also Known As
F5 Access Policy Manager
ISAM
Learn More
Overview

F5® BIG-IP® Access Policy Manager® (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access. BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.

Key features of BIG-IP APM are (but not limited to):

• Support for Identity Aware Proxy (IAP) enabling Zero Trust application access
• Context-based authorization with dynamic L4/L7 ACLs
• Integration with third-party MFA solutions
• DTLS 2.0 mode for delivering and securing applications
• SAML 2.0 identity federation support
• Support for OAuth 2.0 authorization protocol
• SSO support for classic authentication (Kerberos, header- based, etc.), credential caching, OAuth 2.0, SAML 2.0, and FIDO2 (U2F)
• AAA server authentication and high-availability
• Integration with leading IAM vendor products (Microsoft, Okta, Ping Identity)
• BIG IP Edge Client and F5 Access integrate with VMware Horizon ONE (AirWatch), Microsoft Intune and IBM MaaS360
• Risk-based access leveraging third-party UEBA and risk engines (HTTP Connector)

IBM Security Access Manager helps you simplify your users' access while more securely adopting web, mobile, IoT and cloud technologies. It can be deployed on-premises, in a virtual or hardware appliance or containerized with Docker. ISAM helps you strike a balance between usability and security through the use of risk-based access, single sign-on, integrated access management control, identity federation and mobile multi-factor authentication. Take back control of your access management with IBM Security Access Manager.

Offer
Learn more about F5 BIG-IP Access Policy Manager (APM)
Learn more about IBM Security Access Manager
Sample Customers
City Bank, Ricacorp Properties, Miele, American Systems, Bangladesh Post Office
POST Luxembourg
Top Industries
VISITORS READING REVIEWS
Computer Software Company23%
Comms Service Provider19%
Energy/Utilities Company7%
Educational Organization6%
VISITORS READING REVIEWS
Computer Software Company31%
Insurance Company13%
Comms Service Provider12%
Financial Services Firm12%
Find out what your peers are saying about F5 BIG-IP Access Policy Manager (APM) vs. IBM Security Access Manager and other solutions. Updated: September 2021.
535,919 professionals have used our research since 2012.

F5 BIG-IP Access Policy Manager (APM) is ranked 11th in Access Management with 3 reviews while IBM Security Access Manager is ranked 12th in Access Management with 3 reviews. F5 BIG-IP Access Policy Manager (APM) is rated 8.6, while IBM Security Access Manager is rated 7.6. The top reviewer of F5 BIG-IP Access Policy Manager (APM) writes "A robust platform that enables our clients to do almost anything". On the other hand, the top reviewer of IBM Security Access Manager writes "Effortless user sign in, highly scalable, and reliable". F5 BIG-IP Access Policy Manager (APM) is most compared with CyberArk Privileged Access Manager, ForgeRock, Azure Active Directory, Amazon Cognito and Auth0, whereas IBM Security Access Manager is most compared with Azure Active Directory, Okta Workforce Identity, ForgeRock, Oracle Access Manager and CyberArk Privileged Access Manager. See our F5 BIG-IP Access Policy Manager (APM) vs. IBM Security Access Manager report.

See our list of best Access Management vendors.

We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.