F5 BIG-IP Access Policy Manager APM and Forcepoint ONE are key competitors in access management and security solutions. F5 BIG-IP APM has an advantage with flexible deployment and comprehensive security policies, while Forcepoint ONE leads with integration capabilities and advanced threat protection.
Features: F5 BIG-IP APM enhances security with SSL VPN, robust access control, and customizable policy configurations, making it ideal for network access control depth. Forcepoint ONE strengthens security through data protection, seamless cloud integration, and behavioral analytics.
Room for Improvement: F5 BIG-IP APM could improve in reducing setup complexity, enhancing integration with third-party services, and providing more intuitive management tools. Forcepoint ONE might benefit from improving user interface complexity, refining the depth of threat analytics, and expanding API support for better customization.
Ease of Deployment and Customer Service: F5 BIG-IP APM offers flexible deployment options on virtual and hardware platforms and relies on extensive documentation and community resources. Forcepoint ONE simplifies deployment with a cloud-based model and provides proactive customer support options.
Pricing and ROI: F5 BIG-IP APM involves higher initial costs due to hardware or extensive licensing yet offers high ROI for large organizations with complex needs. Forcepoint ONE provides a subscription model with lower upfront costs, delivering quicker ROI for businesses emphasizing simplicity and integration.
Most of the technical support is managed in-house due to our extensive experience with F5 products.
Even if they respond, they don't update me with the process or what's going on.
F5 technical support is responsive and helpful.
They are responsive and assist me with creating cases for any complex issues.
The product's flexibility and company culture contribute to resolving these challenges.
I would rate the scalability of F5 BIG-IP Access Policy Manager (APM) between seven and eight.
On a scale from one to ten for stability, I would rate F5 BIG-IP Access Policy Manager (APM) a ten.
Sometimes, the logs are not quite informational or easy to understand.
If I could copy and paste objects instead of picking and configuring them from scratch each time, it would be great.
The main improvement needed for F5 BIG-IP Access Policy Manager (APM) is to integrate into the cloud-delivered services from F5.
F5 BIG-IP Access Policy Manager (APM) does not have a direction for SaaS.
I need to control specific functionalities within certain applications, like preventing the transfer of certain file types.
There is room for improvement in making the reporting closer to real-time, ideally around five or ten minutes instead of half an hour.
F5 products are more expensive than other solutions but are valued for their quality and reliability.
The pricing is very good and cheaper than other solutions like Netskope and Forcepoint.
The licensing and pricing were fine with no issues.
APM is quite flexible for customers to use, providing secure remote access through various host-checking conditions for both machines and users.
It provides robust security and offers integration with multi-factor authentication systems, which is crucial for an organization's security policy.
A lot of features are useful to me, including mostly the authentication, SAML, or SSO, with no sign-on.
The most valuable feature was the website blocking capability, which allowed me to quickly block any dodgy websites.
I can access social networks but block specific platforms like Instagram and Facebook while allowing access to LinkedIn, a professional network.
F5 BIG-IP Access Policy Manager (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access.
BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.
BIG-IP APM Benefits:
BIG-IP APM Features:
Reviews from Real Users
Below are some reviews and helpful feedback written by BIG-IP APM users.
Mahmmoud Rabie, Senior Site Reliability Engineer, writes that BIG-IP APM is "A highly stable solution for load balancing, but the initial setup is complex."
Clyde Livingston, Senior Process Specialist at Telstra, says that BIG-IP APM is "Easy to use, useful access remotely, but lacking stability."
Chris Lam, Senior Solution Consultant at Macroview Telecom Limited, states that BIG-IP APM is "Useful for remote access VPN and VPI integration with VMware.
Forcepoint ONE is a comprehensive cybersecurity platform that provides organizations with a unified approach to protecting their critical data and assets. It offers a range of solutions that cover everything from network security and cloud security to data protection and insider threat prevention.
With Forcepoint ONE, organizations can gain complete visibility into their security posture, identify potential threats, and take proactive measures to mitigate risks.
One of the key features of Forcepoint ONE is its ability to provide real-time visibility into user behavior across all endpoints, networks, and cloud environments. This allows organizations to quickly identify and respond to potential threats, such as insider threats or malicious activity from external actors. Additionally, Forcepoint ONE offers advanced threat intelligence capabilities that leverage machine learning and AI to detect and respond to emerging threats. Another important aspect of Forcepoint ONE is its data protection capabilities.
The platform offers a range of solutions for protecting sensitive data, including data loss prevention (DLP), encryption, and secure web gateways. These solutions help organizations ensure that their critical data is protected both at rest and in transit, regardless of where it is stored or accessed.
Forcepoint ONE is a powerful cybersecurity platform that offers a comprehensive set of solutions for protecting organizations against a wide range of threats. With its advanced threat intelligence capabilities, real-time visibility into user behavior, and robust data protection features, Forcepoint ONE is an ideal choice for organizations looking to take a proactive approach to cybersecurity.
We monitor all Secure Web Gateways (SWG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.