


Skyhigh Security and F5 BIG-IP Access Policy Manager compete in secure IT management, with Skyhigh favored for pricing and cloud service oversight, while F5 is chosen for advanced policy management. Skyhigh has an advantage in cloud oversight, whereas F5 offers superior policy integration.
Features: Skyhigh Security offers effective shadow IT identification through proxy log analysis and provides comprehensive cloud service risk assessments. It includes a cloud registry and data loss prevention (DLP) integration, ensuring strong risk management and data protection. F5 BIG-IP APM delivers robust access control with advanced policy management, integrates smoothly with network load balancing, and provides reliable SSL VPN capabilities for secure access.
Room for Improvement: Skyhigh Security can benefit from improvements in UI responsiveness and custom attribute management. Performance lags are reported in its reporting functionalities. F5 BIG-IP APM could enhance integration capabilities and improve GUI usability, with login management and customization streamlining needing attention.
Ease of Deployment and Customer Service: Skyhigh Security provides flexible deployment across hybrid and public clouds, with mixed customer service feedback; some users report helpful support, while others note inconsistencies. F5 BIG-IP APM is mainly on-premises and hybrid, achieving generally higher customer satisfaction scores with more consistent support, albeit at a higher cost.
Pricing and ROI: Skyhigh Security is cost-effective, with clear licensing models, and is praised for affordability compared to alternatives. F5 BIG-IP APM is more expensive but offers extensive features and proven ROI, particularly beneficial in large-scale environments.
| Product | Market Share (%) |
|---|---|
| iboss | 2.4% |
| F5 BIG-IP Access Policy Manager (APM) | 1.4% |
| Skyhigh Security | 2.7% |
| Other | 93.5% |
| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 6 |
| Large Enterprise | 5 |
| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 1 |
| Large Enterprise | 9 |
| Company Size | Count |
|---|---|
| Small Business | 30 |
| Midsize Enterprise | 4 |
| Large Enterprise | 37 |
Iboss offers a comprehensive cloud-based security platform valued for its scalability and autonomous features, ensuring robust security with easy deployment and management capabilities.
Renowned for its robust security architecture, Iboss integrates seamlessly within diverse networks, delivering efficient granular filtering and advanced content categorization. Its single pane of glass console provides ease of management, allowing rapid scalability suitable for rapidly deploying environments. Operates in BYOD setups due to inline filtering without device installation. Integration with cloud-based applications enhances user control, and features like SASE, SSL inspection, and ChatGPT risk protection stand as highlights. Despite its strengths, users have pointed out areas for enhancement like direct navigation in reports, SSL decryption, and better cloud integration while having room to improve data loss prevention.
What are the most important features of Iboss?The usage of Iboss spans educational institutions, specifically K-12, to enforce internet policies, protect data, and support remote work environments. It provides web filtering and security frameworks to ensure safe browsing. Its platform-as-a-service model offers flexibility for both cloud-based and on-premises requirements, integrating seamlessly to deliver enhanced security features suitable for various deployment needs including zero trust, CASB, and network security for work-from-home setups.
F5 BIG-IP Access Policy Manager (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access.
BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.
BIG-IP APM Benefits:
BIG-IP APM Features:
Reviews from Real Users
Below are some reviews and helpful feedback written by BIG-IP APM users.
Mahmmoud Rabie, Senior Site Reliability Engineer, writes that BIG-IP APM is "A highly stable solution for load balancing, but the initial setup is complex."
Clyde Livingston, Senior Process Specialist at Telstra, says that BIG-IP APM is "Easy to use, useful access remotely, but lacking stability."
Chris Lam, Senior Solution Consultant at Macroview Telecom Limited, states that BIG-IP APM is "Useful for remote access VPN and VPI integration with VMware.
Skyhigh Security protects organizations with cloud-based Zero Trust security solutions that are both data-aware and simple to use. Skyhigh’s Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while providing the visibility and control required to monitor and mitigate security risks.
The Skyhigh Security Service Edge portfolio includes Skyhigh Secure Web Gateway, Skyhigh Cloud Access Security Broker, Skyhigh Private Access, and Skyhigh Cloud Native Application Protection Platform. All solutions form a fully converged, consolidated platform, and are managed from the same single console.
Skyhigh Security Benefits
Skyhigh Security Features
We monitor all Secure Web Gateways (SWG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.