F5 BIG-IP Access Policy Manager (APM) and Norton Small Business are both leaders in digital security solutions, each catering to specific market segments. F5 APM stands out for its robust enterprise-level capabilities, making it advantageous for larger institutions. Norton Small Business excels in delivering comprehensive yet user-friendly security for smaller enterprises.
Features: F5 BIG-IP APM offers features such as performing complex issue handling, stable performance, and offering advanced SSL VPN and virtual IP creation. Norton's strength lies in its comprehensive security package including antivirus, firewall, VPN, and efficient threat scanning.
Room for Improvement: F5 APM requires better cloud service integration, a more streamlined setup process, and optimized pricing strategies. Norton could improve by enhancing cloud backup speed, reducing upsell interruptions, and refining mobile device integration.
Ease of Deployment and Customer Service: F5 APM provides flexible deployment models ideal for enterprises, though its support could be faster. Norton offers reliable support with simpler deployment options, tailored to meet the needs of smaller businesses.
Pricing and ROI: F5 APM, though expensive, offers significant ROI through robust features for enterprises. Norton provides cost-effective solutions for small businesses, with a focus on affordability but occasional concerns over extra costs.
Most of the technical support is managed in-house due to our extensive experience with F5 products.
If there is a solution, they don't always communicate it.
F5 technical support is responsive and helpful.
The product's flexibility and company culture contribute to resolving these challenges.
I would rate the scalability of F5 BIG-IP Access Policy Manager (APM) between seven and eight.
On a scale from one to ten for stability, I would rate F5 BIG-IP Access Policy Manager (APM) a ten.
Sometimes, the logs are not quite informational or easy to understand.
If I could copy and paste objects instead of picking and configuring them from scratch each time, it would be great.
The main improvement needed for F5 BIG-IP Access Policy Manager (APM) is to integrate into the cloud-delivered services from F5.
F5 BIG-IP Access Policy Manager (APM) does not have a direction for SaaS.
F5 products are more expensive than other solutions but are valued for their quality and reliability.
APM is quite flexible for customers to use, providing secure remote access through various host-checking conditions for both machines and users.
It provides robust security and offers integration with multi-factor authentication systems, which is crucial for an organization's security policy.
A lot of features are useful to me, including mostly the authentication, SAML, or SSO, with no sign-on.
F5 BIG-IP Access Policy Manager (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access.
BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.
BIG-IP APM Benefits:
BIG-IP APM Features:
Reviews from Real Users
Below are some reviews and helpful feedback written by BIG-IP APM users.
Mahmmoud Rabie, Senior Site Reliability Engineer, writes that BIG-IP APM is "A highly stable solution for load balancing, but the initial setup is complex."
Clyde Livingston, Senior Process Specialist at Telstra, says that BIG-IP APM is "Easy to use, useful access remotely, but lacking stability."
Chris Lam, Senior Solution Consultant at Macroview Telecom Limited, states that BIG-IP APM is "Useful for remote access VPN and VPI integration with VMware.
We monitor all SSL VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.