

Iboss and F5 BIG-IP Access Policy Manager (APM) compete in network security and access management. F5 BIG-IP APM is considered superior due to its robust features and secure infrastructure.
Features: Iboss offers scalable cloud architecture, seamless integration, and efficient remote workforce management. F5 BIG-IP APM has advanced security policies, detailed insights, and comprehensive access controls for large enterprises.
Room for Improvement: Iboss could enhance its reporting capabilities, ease of use for complex configurations, and support offerings. F5 BIG-IP APM may improve deployment ease, simplify resource demands, and broaden integration capabilities.
Ease of Deployment and Customer Service: Iboss is praised for straightforward cloud deployment and intuitive customer service. F5 BIG-IP APM involves more complex deployment but provides extensive support options.
Pricing and ROI: Iboss has a cost-effective setup with a subscription model promising ROI. F5 BIG-IP APM has higher initial costs but offers high ROI with powerful features and top-tier security.
| Product | Market Share (%) |
|---|---|
| iboss | 2.4% |
| F5 BIG-IP Access Policy Manager (APM) | 1.4% |
| Other | 96.2% |
| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 1 |
| Large Enterprise | 9 |
| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 6 |
| Large Enterprise | 5 |
F5 BIG-IP Access Policy Manager (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access.
BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.
BIG-IP APM Benefits:
BIG-IP APM Features:
Reviews from Real Users
Below are some reviews and helpful feedback written by BIG-IP APM users.
Mahmmoud Rabie, Senior Site Reliability Engineer, writes that BIG-IP APM is "A highly stable solution for load balancing, but the initial setup is complex."
Clyde Livingston, Senior Process Specialist at Telstra, says that BIG-IP APM is "Easy to use, useful access remotely, but lacking stability."
Chris Lam, Senior Solution Consultant at Macroview Telecom Limited, states that BIG-IP APM is "Useful for remote access VPN and VPI integration with VMware.
Iboss offers a comprehensive cloud-based security platform valued for its scalability and autonomous features, ensuring robust security with easy deployment and management capabilities.
Renowned for its robust security architecture, Iboss integrates seamlessly within diverse networks, delivering efficient granular filtering and advanced content categorization. Its single pane of glass console provides ease of management, allowing rapid scalability suitable for rapidly deploying environments. Operates in BYOD setups due to inline filtering without device installation. Integration with cloud-based applications enhances user control, and features like SASE, SSL inspection, and ChatGPT risk protection stand as highlights. Despite its strengths, users have pointed out areas for enhancement like direct navigation in reports, SSL decryption, and better cloud integration while having room to improve data loss prevention.
What are the most important features of Iboss?The usage of Iboss spans educational institutions, specifically K-12, to enforce internet policies, protect data, and support remote work environments. It provides web filtering and security frameworks to ensure safe browsing. Its platform-as-a-service model offers flexibility for both cloud-based and on-premises requirements, integrating seamlessly to deliver enhanced security features suitable for various deployment needs including zero trust, CASB, and network security for work-from-home setups.
We monitor all Secure Web Gateways (SWG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.