We performed a comparison between ExtremeControl and F5 BIG-IP Access Policy Manager (APM) based on real PeerSpot user reviews.Find out in this report how the two Network Access Control (NAC) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
"The solution is easy to use."
"The company also uses Cisco ISE in other places. I have been told that ExtremeControl is easier to use than ISE. The other reason we prefer ExtremeControl is stability. That's why they chose it for this big hospital in Oslo."
"The performance of the solution is valuable."
"The solution is stable and reliable."
"We have seen a return on investment from F5 BIG-IP Access Policy Manager. It provided access at a time when we didn't have it."
"The portal access was very good."
"F5 BIG-IP APM is relatively easy to use."
"The installation is easy, it can take between five minutes to four hours depending on the complexity of the environment. The speed of the installation could improve for more complex environments."
"F5 BIG-IP Access Policy Manager has room for improvement in integration with other products."
"The operational deployment is not great."
"The solution is quite costly."
"The initial setup was complex."
"F5 BIG-IP APM disconnects when you leave it for long enough, but that is natural for IT solutions to do. That's a little bit frustrating."
F5® BIG-IP® Access Policy Manager® (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access. BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.
Key features of BIG-IP APM are (but not limited to):
• Support for Identity Aware Proxy (IAP) enabling Zero Trust application access
• Context-based authorization with dynamic L4/L7 ACLs
• Integration with third-party MFA solutions
• DTLS 2.0 mode for delivering and securing applications
• SAML 2.0 identity federation support
• Support for OAuth 2.0 authorization protocol
• SSO support for classic authentication (Kerberos, header- based, etc.), credential caching, OAuth 2.0, SAML 2.0, and FIDO2 (U2F)
• AAA server authentication and high-availability
• Integration with leading IAM vendor products (Microsoft, Okta, Ping Identity)
• BIG IP Edge Client and F5 Access integrate with VMware Horizon ONE (AirWatch), Microsoft Intune and IBM MaaS360
• Risk-based access leveraging third-party UEBA and risk engines (HTTP Connector)
ExtremeControl is ranked 11th in Network Access Control (NAC) with 2 reviews while F5 BIG-IP Access Policy Manager (APM) is ranked 7th in Network Access Control (NAC) with 5 reviews. ExtremeControl is rated 8.0, while F5 BIG-IP Access Policy Manager (APM) is rated 8.2. The top reviewer of ExtremeControl writes "It costs less than comparable solutions, and it's highly stable". On the other hand, the top reviewer of F5 BIG-IP Access Policy Manager (APM) writes "Great tech support and a straightforward initial setup". ExtremeControl is most compared with Cisco ISE (Identity Services Engine), Aruba ClearPass, Fortinet FortiNAC, Sophos Network Access Control and Forescout Platform, whereas F5 BIG-IP Access Policy Manager (APM) is most compared with CyberArk Privileged Access Manager, Azure Active Directory (Azure AD), Citrix Gateway, Microsoft Remote Desktop Services and Cisco IOS SSL VPN. See our ExtremeControl vs. F5 BIG-IP Access Policy Manager (APM) report.
See our list of best Network Access Control (NAC) vendors.
We monitor all Network Access Control (NAC) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.