BeyondTrust Remote Support vs F5 BIG-IP Access Policy Manager (APM) comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between BeyondTrust Remote Support and F5 BIG-IP Access Policy Manager (APM) based on real PeerSpot user reviews.

Find out in this report how the two Remote Access solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed BeyondTrust Remote Support vs. F5 BIG-IP Access Policy Manager (APM) Report (Updated: March 2024).
768,578 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The support team who are interfacing with us, are excellent. They are on time for any response.""Solution has a good UI.""The solution has been very stable. We haven't had issues at all. It doesn't crash or freeze. There aren't bugs or glitches either.""The seamless integration of chat, our ITSM management software, and remote viewing/control software makes for a valuable tool.""The remote reboot feature is particularly valuable for rebooting terminal servers that have power controls disabled.""The time savings that we experience from being able to get hands on with a device experiencing trouble, and the time to resolve an issue is substantial.""It's very secure, and it works very well. I like their remote support feature. It can be used for our clients' desktops or anywhere where the client can be working. I'd have to say the product is very good. It's a strong solution for us.""One of the largest values that we get from Bomgar Remote Support tool is the ability to assist our drivers with their mobile devices. We were unable to do this previously."

More BeyondTrust Remote Support Pros →

"The solution is stable and reliable.""The tool is reliable and easy to configure.""In my opinion, the GUI is perfect with the configuration options provided. F5 BIG-IP has given customization options and policy configuration tools in the GUI. It's good and good enough to work.""This is a product that is easy to install and integrate, and it is simple to use.""The product allows us to create customized portals for your users.""Stickiness is the most valuable feature of the product.""Our customers have never complained about the stability""The portal access was very good."

More F5 BIG-IP Access Policy Manager (APM) Pros →

Cons
"Technical support for this region can be improved.""I would like more insight into completed sessions. This would be nice, such as a historical log into the technician client application.""Lacks remote support and privileged remote access in the one product.""The Bomgar representative console could do with modernising. The Web rep console introduced is a marked improvement, but is currently not at feature parity with the thick client. This is being worked on.""I would have picked an internal team member who was going to stay on the team for more time. Shortly after we went live, we had a change of staff and lost the main implementer.""Although the learning curve is steep, the product is well-documented.​""I would also like to see better support of Apple devices while using a Windows remote support console.""There are not enough product partners in Turkey, making it difficult for me to get assistance."

More BeyondTrust Remote Support Cons →

"Integrating identity providers and single sign-on solutions can simplify user authentication and access control.""We do not have knowledgeable support teams locally.""The initial setup was complex.""F5 BIG-IP Access Policy Manager has room for improvement in integration with other products.""The solution is quite costly.""The operational deployment is not great.""The technical support’s response time must be improved.""In my opinion, the GUI side needs some improvement based on my usage. Sometimes, it doesn't work as efficiently as the CLI side."

More F5 BIG-IP Access Policy Manager (APM) Cons →

Pricing and Cost Advice
  • "This product provides value for money."
  • "​The product maintenance and licensing costs are on the higher end, so I would carefully review how many licenses you need. The concurrent license model is helpful in this manner.​"
  • "Pricing is reasonable for what the service is offering. If it is looked at from a purely remote control perspective then it might appear expensive, but it is the wider functionality that should be considered too."
  • "Bomgar has a very fair pricing structure."
  • "Although the upfront cost is a bit overwhelming, the appliance will pay for itself in less than two years."
  • "The setup is complex. Purchase the remote implementation service and make them slow down and work with you."
  • "I would like to order more licenses. This would allow us to support more end users concurrently."
  • "I highly recommend using the tech team properly trained by Bomgar. This will help the tool be more useful."
  • More BeyondTrust Remote Support Pricing and Cost Advice →

  • "Recently, they have simplified the licensing"
  • "The product is very expensive."
  • "The tool is a little bit expensive."
  • More F5 BIG-IP Access Policy Manager (APM) Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Remote Access solutions are best for your needs.
    768,578 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable feature of the solution concerns our company's main use case, which is for connection to our remote clients.
    Top Answer:The local partners for BeyondTrust Remote Support are not enough in numbers. There are not enough product partners in Turkey, making it difficult for me to get assistance. The aforementioned area can… more »
    Top Answer:I can recommend the product, but it is important to note that it is expensive. Though I am not a very good expert with BeyondTrust Remote Support, I think one can get and use another product very… more »
    Top Answer:The most valuable feature is the virtual IP creation. It's our most frequently used feature.
    Top Answer:The tool is a little bit expensive. I rate the pricing a six out of ten.
    Top Answer:In my opinion, the GUI side needs some improvement based on my usage. Sometimes, it doesn't work as efficiently as the CLI side. Feature-wise, sometimes when I log in to the GUI and want to see the… more »
    Ranking
    7th
    out of 44 in Remote Access
    Views
    3,114
    Comparisons
    1,774
    Reviews
    7
    Average Words per Review
    503
    Rating
    8.6
    12th
    out of 44 in Remote Access
    Views
    1,065
    Comparisons
    883
    Reviews
    9
    Average Words per Review
    348
    Rating
    8.1
    Comparisons
    Also Known As
    Bomgar Remote Support
    F5 Access Policy Manager
    Learn More
    Overview

    BeyondTrust Remote Support is software built to help organizations gain access to and support nearly any remote computer or mobile device with a single solution. BeyondTrust Remote Support works across Windows, Mac, and Linux and gives you access and control whether a device is on or off the network.

    BeyondTrust Remote Support Features

    BeyondTrust Remote Support has many valuable key features. Some of the most useful ones include:

    • Remote access and control: IT administrators have the ability to resolve issues at light speed, improving productivity and also end-user satisfaction.
    • Efficiency and scale: With BeyondTrust Remote Support, you can manage unattended access to any system and you can also create mass installer packages.
    • Compliance: BeyondTrust Remote Support allows you to automatically monitor activity in real time, record all session activity, and produce a detailed audit log without interfering with service desk processes.
    • Team and permissions administration: By using BeyondTrust Remote Support, you can Implement security across your service desk with granular role and permissions settings.
    • Native 2FA: BeyondTrust Verify is a TOTP native 2FA capability. It can be enabled for any user and verifies the identity of users before a BeyondTrust Remote Support session is actually launched.
    • Credential injection: If users integrate with the BeyondTrust Vault or BeyondTrust Password Safe, they can directly inject credentials into systems and end servers with just one click.

    BeyondTrust Remote Support Benefits

    Some of the benefits of using BeyondTrust Remote Support include:

    • Security and privacy: BeyondTrust Remote Support gives support teams quick access to desktops and IT systems without revealing their credentials and passwords. In addition, integrating BeyondTrust Privileged Access complements and controls access to privileged user accounts to protect mission-critical IT systems.
    • Mobile support: BeyondTrust Remote Support allows IT teams to provide instant remote support to mobile device users. The solution also supports Android smartphones and tablets as well as iOS devices (iPhone, iPad, iPod Touch).
    • ServiceNow integration: BeyondTrust Remote Support offers integrated remote support and secure chat.
    • Support across multiple systems and devices: The BeyondTrust Remote Support solution can help your organization achieve reliable remote support for end users and customers using Windows, Mac, Android, iOS, or any other operating system.

    Reviews from Real Users

    Below are some reviews and helpful feedback written by BeyondTrust Remote Support users.

    A Cybersecurity Architect at a tech vendor says, “The most valuable features are the ease of deployment, performance, pre and post-sales support, the vast majority of the localization they have done and the solution provider that they support. You can't compete with TeamViewer or any other similar products. It's completely in a class of its own.”

    An Enterprise Service Desk Systems Manager at a manufacturing company comments, "Screen sharing, in general, is pretty important for a service desk. Another thing that I have found to be very helpful is that you can also do screen sharing on a cell phone. When people have an issue with their cell phone, it is ordinarily very difficult to troubleshoot the issue. With BeyondTrust Remote Support, you can share the cell phone screen, and somebody can take a look at it remotely. I am not sure if other competing solutions offer this feature. It is pretty user-friendly. It is also good performance-wise."

    PeerSpot user Mark B., Sr VP of Business Operations at Networking Technologies and Support, Inc., explains that he thinks the solution is “Great for delivering end-user support, good at recording sessions, and very stable.


    F5 BIG-IP Access Policy Manager (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access. 

    BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.

    BIG-IP APM Benefits:

    • Ease of use
    • Flexibility
    • Ability to integrate with other systems
    • Security features
    • Granular access control
    • Responsive and helpful support team

    BIG-IP APM Features:

    • Support for Identity Aware Proxy (IAP) enabling Zero Trust application access
    • Context-based authorization with dynamic L4/L7 ACLs
    • Integration with third-party MFA solutions
    • DTLS 2.0 mode for delivering and securing applications
    • SAML 2.0 identity federation support
    • Support for OAuth 2.0 authorization protocol
    • SSO support for classic authentication (Kerberos, header- based, etc.), credential caching, OAuth 2.0, SAML 2.0, and FIDO2 (U2F)
    • AAA server authentication and high-availability
    • Integration with leading IAM vendor products (Microsoft, Okta, Ping Identity)
    • BIG IP Edge Client and F5 Access integrate with VMware Horizon ONE (AirWatch), Microsoft Intune and IBM MaaS360
    • Risk-based access leveraging third-party UEBA and risk engines (HTTP Connector)

    Reviews from Real Users

    Below are some reviews and helpful feedback written by BIG-IP APM users.

    Mahmmoud Rabie, Senior Site Reliability Engineer, writes that BIG-IP APM is "A highly stable solution for load balancing, but the initial setup is complex."

    Clyde LivingstonSenior Process Specialist at Telstra, says that BIG-IP APM is "Easy to use, useful access remotely, but lacking stability."

    Chris LamSenior Solution Consultant at Macroview Telecom Limited, states that BIG-IP APM is "Useful for remote access VPN and VPI integration with VMware.

    Sample Customers
    InterContinental Hotels Group, Williams-Sonoma Inc., eBay, Carbonite, Computer Sciences Corporation
    City Bank, Ricacorp Properties, Miele, American Systems, Bangladesh Post Office
    Top Industries
    REVIEWERS
    Manufacturing Company16%
    Financial Services Firm12%
    University12%
    Consumer Goods Company12%
    VISITORS READING REVIEWS
    Computer Software Company16%
    Government10%
    Financial Services Firm9%
    Manufacturing Company7%
    REVIEWERS
    Comms Service Provider27%
    Media Company18%
    Computer Software Company18%
    Financial Services Firm18%
    VISITORS READING REVIEWS
    Financial Services Firm12%
    Computer Software Company12%
    Government11%
    Manufacturing Company8%
    Company Size
    REVIEWERS
    Small Business37%
    Midsize Enterprise22%
    Large Enterprise41%
    VISITORS READING REVIEWS
    Small Business18%
    Midsize Enterprise13%
    Large Enterprise68%
    REVIEWERS
    Small Business46%
    Large Enterprise54%
    VISITORS READING REVIEWS
    Small Business17%
    Midsize Enterprise14%
    Large Enterprise69%
    Buyer's Guide
    BeyondTrust Remote Support vs. F5 BIG-IP Access Policy Manager (APM)
    March 2024
    Find out what your peers are saying about BeyondTrust Remote Support vs. F5 BIG-IP Access Policy Manager (APM) and other solutions. Updated: March 2024.
    768,578 professionals have used our research since 2012.

    BeyondTrust Remote Support is ranked 7th in Remote Access with 32 reviews while F5 BIG-IP Access Policy Manager (APM) is ranked 12th in Remote Access with 13 reviews. BeyondTrust Remote Support is rated 9.0, while F5 BIG-IP Access Policy Manager (APM) is rated 8.2. The top reviewer of BeyondTrust Remote Support writes "A robust, secure, and complete solution for quickly providing support and monitoring what's going on". On the other hand, the top reviewer of F5 BIG-IP Access Policy Manager (APM) writes " Facilitates packet inspection, modification, and offloading and offers visibility and troubleshooting capabilities, allowing for pre-production server testing". BeyondTrust Remote Support is most compared with Microsoft Remote Desktop Services, TeamViewer, BeyondTrust Privileged Remote Access, LogMeIn Pro and LogMeIn Rescue, whereas F5 BIG-IP Access Policy Manager (APM) is most compared with Citrix Gateway, CyberArk Privileged Access Manager, Cisco ISE (Identity Services Engine), Microsoft Remote Desktop Services and Fortinet FortiNAC. See our BeyondTrust Remote Support vs. F5 BIG-IP Access Policy Manager (APM) report.

    See our list of best Remote Access vendors.

    We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.