We performed a comparison between Cloudflare Access and F5 BIG-IP Access Policy Manager (APM) based on real PeerSpot user reviews.
Find out in this report how the two Access Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."For Cloudflare Access, I am using the free plan...The most valuable feature is their protection."
"It's the endpoint exposition. We don't need to expose our VPN server to the internet and need a zero-test solution. I can apply some conditional access to the endpoint that's connecting to our network to check their security policies or the security condition of their workstation. Once the workstation is trying to connect to my internal network, then I would like to check the discrete condition of these endpoints that are trying to access my internal network. We created some conditional access. We have CrowdStrike, to check if the CrowdStrike is installed, to check if it's updated, and to check for Windows updates. We created some conditional policies to check it."
"Enables me to work from two locations."
"The tool also offers good scalability, and the dashboard, along with real-time analytics, is very good."
"Cloudflare, in my opinion, was easy to implement."
"In my opinion, the GUI is perfect with the configuration options provided. F5 BIG-IP has given customization options and policy configuration tools in the GUI. It's good and good enough to work."
"The product allows us to create customized portals for your users."
"The most valuable feature is the virtual IP creation. It's our most frequently used feature."
"The solution is stable and reliable."
"The load balancing features are valuable."
"This is a product that is easy to install and integrate, and it is simple to use."
"Our customers have never complained about the stability"
"F5 BIG-IP APM is relatively easy to use."
"They don't have a person to provide support for customers using the solution under their free plan."
"For the topic of improvement, providing some training material is one of my suggestions."
"The pricing is an area that can be improved. Pricing, as far as I recall, was the source of our problems."
"When there are any dynamic changes in complex applications, the tool takes a lot of time, making its analytics-related area a major matter of concern where improvements are needed."
"We do not have knowledgeable support teams locally."
"The technical support’s response time must be improved."
"Integrating identity providers and single sign-on solutions can simplify user authentication and access control."
"Cloud services are something that F5 Access Policy Manager could do better"
"The solution is quite costly."
"The operational deployment is not great."
"F5 BIG-IP APM disconnects when you leave it for long enough, but that is natural for IT solutions to do. That's a little bit frustrating."
"The price of this product can be improved."
More F5 BIG-IP Access Policy Manager (APM) Pricing and Cost Advice →
Cloudflare Access is ranked 9th in Access Management with 5 reviews while F5 BIG-IP Access Policy Manager (APM) is ranked 5th in Access Management with 13 reviews. Cloudflare Access is rated 8.8, while F5 BIG-IP Access Policy Manager (APM) is rated 8.2. The top reviewer of Cloudflare Access writes "Replaces traditional VPN and enables endpoint exposition ". On the other hand, the top reviewer of F5 BIG-IP Access Policy Manager (APM) writes " Facilitates packet inspection, modification, and offloading and offers visibility and troubleshooting capabilities, allowing for pre-production server testing". Cloudflare Access is most compared with Twingate, Prisma Access by Palo Alto Networks, Zscaler Zero Trust Exchange, Auth0 and Google Cloud Platform Cloud Identity-Aware Proxy, whereas F5 BIG-IP Access Policy Manager (APM) is most compared with Citrix Gateway, CyberArk Privileged Access Manager, Ivanti Connect Secure, Cisco ISE (Identity Services Engine) and Microsoft Remote Desktop Services. See our Cloudflare Access vs. F5 BIG-IP Access Policy Manager (APM) report.
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.