CyberArk Identity vs F5 BIG-IP Access Policy Manager (APM) comparison

You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between CyberArk Identity and F5 BIG-IP Access Policy Manager (APM) based on real PeerSpot user reviews.

Find out in this report how the two Access Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed CyberArk Identity vs. F5 BIG-IP Access Policy Manager (APM) Report (Updated: November 2022).
656,474 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
"I found the solution to be stable.""The setup, via cloud, is simple.""The initial setup is straightforward. It takes me up to an hour and a half.""If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity.""The most valuable features of CyberArk Identity are its ability to control access to administrative staff."

More CyberArk Identity Pros →

"The portal access was very good.""F5 BIG-IP APM is relatively easy to use.""The solution is stable and reliable.""The performance of the solution is valuable.""We have seen a return on investment from F5 BIG-IP Access Policy Manager. It provided access at a time when we didn't have it."

More F5 BIG-IP Access Policy Manager (APM) Pros →

"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area.""More integrations would be better.""The solution could be easier to use and I found it to be very complex involving many steps.""They could improve their UI and make everything more user-friendly.""The user interface could be improved."

More CyberArk Identity Cons →

"The solution is quite costly.""F5 BIG-IP APM disconnects when you leave it for long enough, but that is natural for IT solutions to do. That's a little bit frustrating.""The initial setup was complex.""F5 BIG-IP Access Policy Manager has room for improvement in integration with other products.""The operational deployment is not great."

More F5 BIG-IP Access Policy Manager (APM) Cons →

Pricing and Cost Advice
  • "There is an initial license and then there is a subscription needed."
  • More CyberArk Identity Pricing and Cost Advice →

    Information Not Available
    Use our free recommendation engine to learn which Access Management solutions are best for your needs.
    656,474 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security.
    Top Answer:They can include the Mobile Device Management (MDM) feature.
    Top Answer:We sell as well as use this solution for our IT operations. We are using it for single sign-on. We are a small company, and we have a few users of this solution.
    Top Answer:This is a product that is easy to install and integrate, and it is simple to use.
    Top Answer:Recently, they have simplified their licensing. Two years ago it was much more complex. It's very simple for our customers to understand; however, the cloud is not simple because it's per consumption… more »
    Top Answer:The price of this product can be improved.
    out of 30 in Access Management
    Average Words per Review
    out of 30 in Access Management
    Average Words per Review
    Also Known As
    F5 Access Policy Manager
    Learn More

    Your users need quick access to a variety of business resources. You need confidence it’s them knocking – not an attacker. With CyberArk Workforce Identity, you can empower your workforce while keeping threats out.

    Frictionless Sign On
    Keep workers working, not logging in and out.

    Adaptive Authentication
    Make intelligent access decisions based on AI-powered analytics.

    Secure Everywhere
    Enable access across any device, anywhere at just the right time.

    F5® BIG-IP® Access Policy Manager® (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access. BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.

    Key features of BIG-IP APM are (but not limited to):

    • Support for Identity Aware Proxy (IAP) enabling Zero Trust application access
    • Context-based authorization with dynamic L4/L7 ACLs
    • Integration with third-party MFA solutions
    • DTLS 2.0 mode for delivering and securing applications
    • SAML 2.0 identity federation support
    • Support for OAuth 2.0 authorization protocol
    • SSO support for classic authentication (Kerberos, header- based, etc.), credential caching, OAuth 2.0, SAML 2.0, and FIDO2 (U2F)
    • AAA server authentication and high-availability
    • Integration with leading IAM vendor products (Microsoft, Okta, Ping Identity)
    • BIG IP Edge Client and F5 Access integrate with VMware Horizon ONE (AirWatch), Microsoft Intune and IBM MaaS360
    • Risk-based access leveraging third-party UEBA and risk engines (HTTP Connector)

    Learn more about CyberArk Identity
    Learn more about F5 BIG-IP Access Policy Manager (APM)
    Sample Customers
    MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
    City Bank, Ricacorp Properties, Miele, American Systems, Bangladesh Post Office
    Top Industries
    Computer Software Company21%
    Financial Services Firm12%
    Energy/Utilities Company7%
    Media Company29%
    Comms Service Provider29%
    Non Profit14%
    Marketing Services Firm14%
    Computer Software Company17%
    Financial Services Firm11%
    Comms Service Provider10%
    Company Size
    Small Business38%
    Midsize Enterprise13%
    Large Enterprise50%
    Small Business19%
    Midsize Enterprise14%
    Large Enterprise68%
    Small Business38%
    Large Enterprise63%
    Small Business16%
    Midsize Enterprise13%
    Large Enterprise71%
    Buyer's Guide
    CyberArk Identity vs. F5 BIG-IP Access Policy Manager (APM)
    November 2022
    Find out what your peers are saying about CyberArk Identity vs. F5 BIG-IP Access Policy Manager (APM) and other solutions. Updated: November 2022.
    656,474 professionals have used our research since 2012.

    CyberArk Identity is ranked 5th in Access Management with 6 reviews while F5 BIG-IP Access Policy Manager (APM) is ranked 11th in Access Management with 5 reviews. CyberArk Identity is rated 9.0, while F5 BIG-IP Access Policy Manager (APM) is rated 8.2. The top reviewer of CyberArk Identity writes "Easy to set up with powerful features and good reliability". On the other hand, the top reviewer of F5 BIG-IP Access Policy Manager (APM) writes "Great tech support and a straightforward initial setup". CyberArk Identity is most compared with Microsoft Intune, Azure Active Directory (Azure AD), Okta Workforce Identity, SailPoint IdentityIQ and VMware Workspace ONE, whereas F5 BIG-IP Access Policy Manager (APM) is most compared with CyberArk Privileged Access Manager, Azure Active Directory (Azure AD), Citrix Gateway, Microsoft Remote Desktop Services and Appgate SDP. See our CyberArk Identity vs. F5 BIG-IP Access Policy Manager (APM) report.

    See our list of best Access Management vendors.

    We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.