Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs F5 BIG-IP Access Policy Manager (APM) comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
6.6
Organizations gain enhanced security, compliance, and cost savings with CyberArk, improving efficiency, user adoption, and risk reduction.
Sentiment score
6.8
F5 BIG-IP Access Policy Manager offers cost savings, quick ROI, and enhances security by ensuring crucial access and reducing costs.
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
Cyber Security Engineer at Isolutions Associates Ltd (ISOLS)
The end users have the authority to reconcile the password or verify it before using session isolation, which is one of the unique features that can be enabled through Privileged Session Manager, preventing any attacks from happening within the organization when connected with sessions through CyberArk Privileged Access Manager.
Senior Engineer at a tech vendor with 1,001-5,000 employees
CyberArk Privileged Access Manager has helped customers save on costs primarily by reducing the number of engineering and information security personnel.
Head of Sales Services Department at a comms service provider with 51-200 employees
 

Customer Service

Sentiment score
6.5
CyberArk's support receives mixed reviews, praised for expertise but criticized for delays, especially at Tier One, yet committed to improvement.
Sentiment score
6.8
F5 BIG-IP APM customer service receives mixed reviews, with some praising responsiveness and others citing delays and communication issues.
CyberArk has been exceptional in coming back to us with immediate responses.
IT Cyber Security Lead at a mining and metals company with 1,001-5,000 employees
It could be forever until you talk to someone who knows what they are doing.
Senior PAM Consultant at iC Consult GmbH
Based on the issue resolution and support quality, I rate the support 10 out of 10.
Operation Specialists at a tech vendor with 10,001+ employees
Even if they respond, they don't update me with the process or what's going on.
Professional Services Specialist at a security firm with 51-200 employees
Most of the technical support is managed in-house due to our extensive experience with F5 products.
Business Development Manager at Pylones
F5 technical support is responsive and helpful.
Solutions Manager at Macroview Telecom Limited
 

Scalability Issues

Sentiment score
7.6
CyberArk Privileged Access Manager scales efficiently for diverse needs, with flexible deployment options and positive user feedback on growth adaptability.
Sentiment score
7.3
F5 BIG-IP APM scales for diverse deployments, offering flexibility and effective tools, though hardware limitations might challenge scalability.
The CPM can reportedly handle up to 50,000 accounts independently without issue.
Privileged Access Management Engineer at a hospitality company with 10,001+ employees
I would rate it a ten out of ten for scalability.
IT Cyber Security Lead at a mining and metals company with 1,001-5,000 employees
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
Senior PAM Consultant at iC Consult GmbH
The product's flexibility and company culture contribute to resolving these challenges.
Business Development Manager at Pylones
I would rate the scalability of F5 BIG-IP Access Policy Manager (APM) between seven and eight.
Solutions Manager at Macroview Telecom Limited
 

Stability Issues

Sentiment score
7.7
CyberArk Privileged Access Manager is praised for its robust stability and high availability, with minor issues noted under heavy load.
Sentiment score
7.9
F5 BIG-IP APM is praised for reliability, performance, and minimal bugs, with minor suggestions for log clarity improvement.
Proper fine-tuning and expertise ensure the product performs well.
Cybersecurity Specialist at a comms service provider with 5,001-10,000 employees
Overall, the stability of the solution is high.
Senior Cybersecurity Manager at a financial services firm with 10,001+ employees
It has a large customer base and positive feedback within my network.
Senior Manager at a energy/utilities company with 1,001-5,000 employees
On a scale from one to ten for stability, I would rate F5 BIG-IP Access Policy Manager (APM) a ten.
Solutions Manager at Macroview Telecom Limited
Sometimes, the logs are not quite informational or easy to understand.
Professional Services Specialist at a security firm with 51-200 employees
 

Room For Improvement

CyberArk Privileged Access Manager needs UI, integration, documentation, performance, complexity improvements, better plugins, licensing, reporting, and support.
F5 BIG-IP APM requires improvements in pricing, cloud integration, user interface, documentation, support, and additional features for enhanced performance.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
Presales Engineer at a computer software company with 201-500 employees
We cannot generate a plug-in for web-based applications.
Contractor at a pharma/biotech company with 5,001-10,000 employees
If they want clients to move to the cloud, they need to support them in real-time.
Senior Manager at a consultancy with 11-50 employees
If I could copy and paste objects instead of picking and configuring them from scratch each time, it would be great.
Professional Services Specialist at a security firm with 51-200 employees
The main improvement needed for F5 BIG-IP Access Policy Manager (APM) is to integrate into the cloud-delivered services from F5.
Business Development Manager at Pylones
The ability to run the Anycast feature would be valuable, as the current solution only operates on-premises.
Senior Cyber Security Consultant at KoçSistem
 

Setup Cost

CyberArk Privileged Access Manager is costly but offers robust features and security, providing value despite higher pricing.
F5 BIG-IP APM is costly but valued for high performance, with unpredictable cloud pricing and additional fees for features.
CyberArk is expensive compared to other products I know.
Cybersecurity Specialist at a comms service provider with 5,001-10,000 employees
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
Presales Engineer at a computer software company with 201-500 employees
CyberArk's SaaS solution is particularly expensive.
Senior Manager at a energy/utilities company with 1,001-5,000 employees
F5 products are more expensive than other solutions but are valued for their quality and reliability.
Business Development Manager at Pylones
 

Valuable Features

CyberArk Privileged Access Manager offers password management, session monitoring, and threat analytics to enhance security and compliance.
F5 BIG-IP APM offers secure remote access with SSL VPN, multi-factor authentication, and comprehensive integration and security features.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
Senior Cybersecurity Manager at a financial services firm with 10,001+ employees
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
Senior Manager at a consultancy with 11-50 employees
It can integrate with Splunk, SNMP, and other solutions and technologies.
Technical Support Analyst at Capgemini
APM is quite flexible for customers to use, providing secure remote access through various host-checking conditions for both machines and users.
Solutions Manager at Macroview Telecom Limited
It provides robust security and offers integration with multi-factor authentication systems, which is crucial for an organization's security policy.
Business Development Manager at Pylones
A lot of features are useful to me, including mostly the authentication, SAML, or SSO, with no sign-on.
Professional Services Specialist at a security firm with 51-200 employees
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
F5 BIG-IP Access Policy Man...
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
18
Ranking in other categories
Secure Web Gateways (SWG) (16th), Network Access Control (NAC) (7th), SSL VPN (5th), Remote Access (10th), Access Management (9th)
 

Featured Reviews

SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.
Senior Cyber Security Consultant at KoçSistem
Has provided reliable policy controls and secure web access for large enterprises
I consider Cloudflare when evaluating centralized access control features; Cloudflare utilizes multi-factor authentication and full API support, while F5 BIG-IP Access Policy Manager (APM) needs to enhance its API support. I recommend F5 BIG-IP Access Policy Manager (APM) for large companies such as Tüpraş and Ford. Tüpraş is one of the biggest companies in Turkey, along with other customers such as Tofaş, Euroko, Koç Holding, and more. For on-premises deployment, I would rate it a 10. For cloud deployment, I would rate it a seven. I primarily use it on-premises. I rate F5 BIG-IP Access Policy Manager (APM) eight out of ten.
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
879,259 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
11%
Manufacturing Company
10%
Government
6%
Financial Services Firm
14%
Manufacturing Company
12%
Government
10%
Computer Software Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise1
Large Enterprise9
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
What do you like most about F5 BIG-IP Access Policy Manager (APM)?
In my opinion, the GUI is perfect with the configuration options provided. F5 BIG-IP has given customization options and policy configuration tools in the GUI. It's good and good enough to work.
What is your experience regarding pricing and costs for F5 BIG-IP Access Policy Manager (APM)?
F5 products are more expensive than other solutions but are valued for their quality and reliability, akin to purchasing a Bentley as opposed to an Audi.
What needs improvement with F5 BIG-IP Access Policy Manager (APM)?
F5 BIG-IP Access Policy Manager (APM) is not user-friendly and operates slowly. Additional features for architecture such as Anycast would be beneficial. The ability to run the Anycast feature woul...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
F5 Access Policy Manager
 

Overview

 

Sample Customers

Rockwell Automation
City Bank, Ricacorp Properties, Miele, American Systems, Bangladesh Post Office
Find out what your peers are saying about CyberArk Privileged Access Manager vs. F5 BIG-IP Access Policy Manager (APM) and other solutions. Updated: December 2025.
879,259 professionals have used our research since 2012.