Safe-T Secure Application Access and F5 BIG-IP Access Policy Manager (APM) are compared based on features, areas for improvement, ease of deployment and customer service, and pricing and ROI. F5 BIG-IP APM is considered superior in terms of advanced features and user satisfaction, while Safe-T is commended for competitive pricing and support.
Features: Safe-T Secure Application Access is praised for strong secure access capabilities, ease of integration, and competitive pricing. F5 BIG-IP APM stands out with comprehensive policy enforcement, flexibility, and extensive functionalities.
Room for Improvement: Users suggest Safe-T Secure Application Access could benefit from better scalability options, enhanced performance, and additional features. F5 BIG-IP APM receives feedback for complexity, a high level of expertise required for efficient use, and a steep learning curve.
Ease of Deployment and Customer Service: Safe-T Secure Application Access is noted for its straightforward deployment process and responsive customer service. F5 BIG-IP APM offers robust customer support but is seen as more complex to deploy.
Pricing and ROI: Safe-T Secure Application Access is recognized for its cost-effective setup and potential for high ROI. F5 BIG-IP APM is viewed as more expensive but justified by its feature set, with users finding the investment worthwhile due to its rich performance benefits.
F5 BIG-IP Access Policy Manager (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access.
BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.
BIG-IP APM Benefits:
BIG-IP APM Features:
Reviews from Real Users
Below are some reviews and helpful feedback written by BIG-IP APM users.
Mahmmoud Rabie, Senior Site Reliability Engineer, writes that BIG-IP APM is "A highly stable solution for load balancing, but the initial setup is complex."
Clyde Livingston, Senior Process Specialist at Telstra, says that BIG-IP APM is "Easy to use, useful access remotely, but lacking stability."
Chris Lam, Senior Solution Consultant at Macroview Telecom Limited, states that BIG-IP APM is "Useful for remote access VPN and VPI integration with VMware.
Safe-T is a provider of Zero Trust Access solutions which mitigate attacks on enterprises’ business-critical services and sensitive data, while ensuring uninterrupted business continuity.
Safe-T’s cloud and on-premises solutions ensure that an organization’s access use cases, whether into the organization or from the organization out to the internet, are secured according to the “validate first, access later” philosophy of Zero Trust.
This means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network or in the cloud.
Safe-T’s wide range of access solutions reduce organizations’ attack surface and improve their ability to defend against modern cyberthreats. As an additional layer of security, our integrated business-grade global proxy solution cloud service enables smooth and efficient traffic flow, interruption-free service, unlimited concurrent connections, instant scaling and simple integration with our services.
With Safe-T’s patented reverse-access technology and proprietary routing technology, organizations of all size and type can secure their data, services and networks against internal and external threats.
At Safe-T, we empower enterprises to safely migrate to the cloud and enable digital transformation.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.