Try our new research platform with insights from 80,000+ expert users

Share your experience using Parallels Access

The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.

Use our online form to submit your review. It's quick and you can post anonymously.

Your review helps others learn about this solution
The PeerSpot community is built upon trust and sharing with peers.
It's good for your career
In today's digital world, your review shows you have valuable expertise.
You can influence the market
Vendors read their reviews and make improvements based on your feedback.
Examples of the 98,000+ reviews on PeerSpot:

SalihUcpinar - PeerSpot reviewer
Senior Cyber Security Consultant at KoçSistem
Consultant
Has provided reliable policy controls and secure web access for large enterprises
Pros and Cons
  • "F5 BIG-IP Access Policy Manager (APM) provides excellent WAF and bot defense solutions."
  • "F5 BIG-IP Access Policy Manager (APM) is not user-friendly and operates slowly."

What is our primary use case?

I am using F5 BIG-IP Access Policy Manager (APM) along with Bot Management, API Gateway, API Security, and F5 Cloud.

I am using F5 Advanced WAF, but I switch between ZTNA solutions such as FortiSASE, Prisma Cloud, Palo Alto, and Cloudflare ZTNA.

My customers are using AWS, Cloudflare, and Azure.

This solution serves as a SASE component.

What is most valuable?

I am using Advanced Web Application Firewall (WAF).

F5 BIG-IP Access Policy Manager (APM) provides excellent WAF and bot defense solutions.

We are using on-premises or cloud solutions with the Big-IP platform.

The most valuable features in F5 BIG-IP Access Policy Manager (APM) are the policy manager and public web access controllers.

My customers are using the Single Sign-On feature with SAML, RADIUS, and multi-factor authentication.

F5 BIG-IP Access Policy Manager (APM) is not running Anycast; it operates on-premises or multicast, though Anycast capability is required.

What needs improvement?

F5 BIG-IP Access Policy Manager (APM) is not user-friendly and operates slowly.

Additional features for architecture such as Anycast would be beneficial.

The ability to run the Anycast feature would be valuable, as the current solution only operates on-premises.

The interface is slow, and the speed needs improvement.

For how long have I used the solution?

I have been working with F5 BIG-IP Access Policy Manager (APM) for over 10 years.

What do I think about the stability of the solution?

The solution is stable overall.

Which solution did I use previously and why did I switch?

I replaced F5 BIG-IP Access Policy Manager (APM) with other vendors.

The replacement was necessary because other vendors provide SASE solutions, while F5 BIG-IP Access Policy Manager (APM) is limited to APM functionality.

For cases where F5 BIG-IP Access Policy Manager (APM) doesn't fit the budget, I would recommend a new interface that is very user-friendly and faster, along with functionality such as public host, private host authentication, IPsec, and access control broker.

Which other solutions did I evaluate?

I am familiar with F5 BIG-IP Access Policy Manager (APM) and its capabilities.

What other advice do I have?

I consider Cloudflare when evaluating centralized access control features; Cloudflare utilizes multi-factor authentication and full API support, while F5 BIG-IP Access Policy Manager (APM) needs to enhance its API support.

I recommend F5 BIG-IP Access Policy Manager (APM) for large companies such as Tüpraş and Ford. Tüpraş is one of the biggest companies in Turkey, along with other customers such as Tofaş, Euroko, Koç Holding, and more.

For on-premises deployment, I would rate it a 10. For cloud deployment, I would rate it a seven.

I primarily use it on-premises.

I rate F5 BIG-IP Access Policy Manager (APM) eight out of ten.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Flag as inappropriate
Team lead at Digital Track Solutions Pvt Ltd
Real User
Top 10
Has improved security and enabled remote work flexibility across teams
Pros and Cons
  • "After deploying Check Point Remote Access VPN solution, I can say that our productivity has maximized; users are working from home and even working 24/7, and if they want, they can access our resources at any time, providing flexibility to work from anywhere."
  • "The configuration of Check Point Remote Access VPN could be simplified so that there will be no complex steps to configure it and maintain it."

What is our primary use case?

Mostly, we are using Check Point Remote Access VPN solution to provide our employees remote access to our private network so they can easily access the organization's private resources through remote access. Whenever they are working from home or from outside the organization network, they can easily access and work on whatever they want.

A perfect example of how an employee would use Check Point Remote Access VPN in our organization is during the COVID-19 pandemic when all employees were working from home. During that time, everyone was accessing our private resources through the remote access VPN while working from home.

One more use case I can discuss regarding Check Point Remote Access VPN is whenever any partner needs private access to our network resources. Sometimes, if the partner is deploying a server, we will give them remote access so they can easily work from the remote side.

What is most valuable?

The best features Check Point Remote Access VPN offers are its security features, which stand out to me. Whenever we are giving the remote access VPN to any employees or vendors, we can specify and control particular access. If we want to give access to a particular IP only, we can achieve that via this feature, and we also apply security features such as antivirus and anti-spyware while giving access to any employees or partners.

The ability to control and specify access with Check Point Remote Access VPN, such as limiting to particular IPs or applying antivirus and anti-spyware, makes our environment safe from cyber threats and any types of malicious activities or accessing our private data. We control this through the feature by applying security policies that allow particular users.

After deploying Check Point Remote Access VPN solution, I can say that our productivity has maximized. Users are working from home and even working 24/7. If they want, they can access our resources at any time, providing flexibility to work from anywhere.

Employees say that sometimes they are not available during the working hour, but they can work from home at their flexible timing, needing access to our private network resources. They sit at home or any remote site and connect to our network to work, which is very good.

What needs improvement?

The configuration of Check Point Remote Access VPN could be simplified so that there will be no complex steps to configure it and maintain it.

Sometimes we face disconnectivity with Check Point Remote Access VPN, but it is very rare, so we can consider this a minor issue. Otherwise, the experience and stability are outstanding.

For how long have I used the solution?

We have been using Check Point Remote Access VPN for more than three years.

What do I think about the stability of the solution?

Sometimes we face disconnectivity with Check Point Remote Access VPN, but it is very rare, so we can consider this a minor issue. Otherwise, the experience and stability are outstanding.

What do I think about the scalability of the solution?

We can provide remote access VPN to numerous users as there are no problems with the scalability of Check Point Remote Access VPN.

How are customer service and support?

Customer support for Check Point Remote Access VPN is excellent. They are really helpful, and whenever we face any technical or configuration issues, we reach out to them, and they help us resolve the issues as soon as possible.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We are using this solution exclusively.

How was the initial setup?

The pricing and setup cost for Check Point Remote Access VPN are good and easily affordable compared to its benefits.

What was our ROI?

Check Point Remote Access VPN provides a very good return on investment because our organization's productivity has grown after deploying it, and it is saving time for our employees.

What's my experience with pricing, setup cost, and licensing?

The pricing and setup cost for Check Point Remote Access VPN are good and easily affordable compared to its benefits.

Which other solutions did I evaluate?

We evaluated Fortinet Remote Access VPN before choosing Check Point Remote Access VPN.

What other advice do I have?

I advise any organization that needs VPN features, especially if they are providing work-from-home options to their employees, to consider Check Point Remote Access VPN as the best in the industry.

We are partners.

On a scale of one to ten, I rate Check Point Remote Access VPN a nine.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Flag as inappropriate