Cisco Umbrella and F5 BIG-IP Access Policy Manager (APM) are key players in network security solutions. Cisco Umbrella offers an advantage due to its robust DNS security, while F5 BIG-IP APM provides superior access control features.
Features: Cisco Umbrella stands out with its DNS security, domain history tracking, and malware protection functionality. It seamlessly integrates into existing infrastructures without requiring client-side software, making it versatile across varied network environments. F5 BIG-IP APM excels in access control capabilities with a wide support range for authentication protocols and is renowned for secure, customizable remote access to applications.
Room for Improvement:Cisco Umbrella users suggest enhancing its reporting features, analytics, and integration with threat feeds and SIEM products. Improvements in DLP capabilities and IP-based security features are also desired. F5 BIG-IP APM requires better cloud integration and a simpler setup process, with users also seeking enhancements in its graphical interface and documentation for streamlined SaaS progression.
Ease of Deployment and Customer Service:Cisco Umbrella is praised for its deployment options in cloud and hybrid environments, with commendable public cloud integration support. Customer service is mostly well-regarded, though response times for complex issues could improve. F5 BIG-IP APM, geared towards on-premises and hybrid cloud setups, offers good customer and technical support; however, its initial setup can be intricate, with some users expecting a more personalized experience.
Pricing and ROI:Cisco Umbrella's premium pricing reflects its extensive DNS protection and integration capabilities, offering flexible licensing plans tailored to organizational needs. It provides significant ROI by reducing security breach risks and saving costs on other security infrastructure. F5 BIG-IP APM, while expensive, is valued for its reliability and robust feature set. Despite its pricing possibly being a barrier, the quality and reliability provide good returns for companies seeking secure application access.
iboss offers a comprehensive security platform designed for diverse use cases such as web filtering, data loss protection, corporate proxy services, and URL filtering.
iboss integrates advanced features to address dynamic security needs, leveraging its strength in SASE, ZTNA, AI initiatives, and cloud integration, while ensuring seamless operations for remote work. It excels in historical forensics, malware protection, and flexible cloud deployments. Users benefit from comprehensive traffic scanning, robust malware detection, and PaaS capabilities that reduce hardware management. An intuitive admin console ensures efficient management with content filtering and low false positives. SSL decryption enhances security, while DLP protects data in AI conversations. Deployment is rapid and scalable, allowing effortless integration with emerging technologies.
What features does iboss offer?
What benefits and ROI should users consider?
iboss finds significant application in sectors such as education, where web filtering for K-12 is crucial, and in corporate environments requiring robust proxy services and URL filtering for network security. Its adaptability is essential in scenarios demanding flexible, decentralized security frameworks, particularly for remote work setups.
Cisco Umbrella delivers rapid DNS security with over 30,000 customers, providing outstanding threat protection and handling more than 600 billion requests daily. It's recognized for high threat efficacy in the SSE domain and integrates elements like SWG, ZTNA, CASB, and more.
Cisco Umbrella is renowned for its effective DNS-layer security against ransomware and phishing. It offers flexible content filtering and integrates seamlessly with existing networks while providing single-pane-of-glass management for centralized monitoring. Its robust threat intelligence and customizable policies are central to its appeal. Users highlight room for improvement in areas like WHOIS data inclusion, malware enhancement, and reporting analytics. Integration with other threat feeds and better client support are requested for more comprehensive coverage.
What are the key features of Cisco Umbrella?Industries implement Cisco Umbrella primarily for DNS-level security, web filtering, and protecting remote employees. It strengthens cybersecurity frameworks by blocking malware and avoiding access to harmful sites. The tool is widely integrated with Active Directory and Cisco Meraki, providing consistent internet security for employees.
F5 BIG-IP Access Policy Manager (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access.
BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.
BIG-IP APM Benefits:
BIG-IP APM Features:
Reviews from Real Users
Below are some reviews and helpful feedback written by BIG-IP APM users.
Mahmmoud Rabie, Senior Site Reliability Engineer, writes that BIG-IP APM is "A highly stable solution for load balancing, but the initial setup is complex."
Clyde Livingston, Senior Process Specialist at Telstra, says that BIG-IP APM is "Easy to use, useful access remotely, but lacking stability."
Chris Lam, Senior Solution Consultant at Macroview Telecom Limited, states that BIG-IP APM is "Useful for remote access VPN and VPI integration with VMware.
We monitor all Secure Web Gateways (SWG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.