UserLock and F5 BIG-IP Access Policy Manager (APM) are both used for providing secure access management. User reviews indicate UserLock excels in its pricing and support, whereas F5 BIG-IP APM is superior in features, seen as worth its higher price.
Features: UserLock is praised for its comprehensive multi-factor authentication and session management. F5 BIG-IP APM stands out with its advanced application access policies and integration capabilities. Users appreciate its versatility in handling diverse security requirements. While UserLock is user-friendly, F5 BIG-IP APM provides more robust features that are critical for complex environments.
Room for Improvement:UserLock users wish for more integration options with third-party applications and enhanced reporting features. For F5 BIG-IP APM, users call for a more streamlined setup process and better documentation. Both products have specific areas to grow, but UserLock needs to increase integration capabilities, and F5 BIG-IP APM should focus on simplifying deployment.
Ease of Deployment and Customer Service:UserLock boasts an easy deployment process and stellar customer service, with users highlighting quick, hassle-free implementation and responsive support. In contrast, F5 BIG-IP APM offers a complex deployment scenario that may require expert assistance, though their customer service is well-rated once setup hurdles are addressed. UserLock's straightforward deployment gives it an edge in this area, despite F5 BIG-IP APM's commendable support.
Pricing and ROI:UserLock is considered cost-effective, with users noting satisfactory ROI due to reasonable setup costs and efficient functionality. F5 BIG-IP APM, although pricier, justifies its cost with extensive features and integration capabilities, delivering substantial ROI for users needing advanced access control solutions. While UserLock offers better initial affordability, F5 BIG-IP APM provides long-term value for complex needs.
F5 BIG-IP Access Policy Manager (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access.
BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.
BIG-IP APM Benefits:
BIG-IP APM Features:
Reviews from Real Users
Below are some reviews and helpful feedback written by BIG-IP APM users.
Mahmmoud Rabie, Senior Site Reliability Engineer, writes that BIG-IP APM is "A highly stable solution for load balancing, but the initial setup is complex."
Clyde Livingston, Senior Process Specialist at Telstra, says that BIG-IP APM is "Easy to use, useful access remotely, but lacking stability."
Chris Lam, Senior Solution Consultant at Macroview Telecom Limited, states that BIG-IP APM is "Useful for remote access VPN and VPI integration with VMware.
Two Factor Authentication & Access Management for Windows Active Directory.
UserLock helps administrators to manage and secure access for every user, without obstructing employees or frustrating IT.
Two Factor Authentication on Windows logon, RDP, IIS and VPN connections. UserLock supports 2FA using authenticator applications which include Google Authenticator, Microsoft Authenticator and LastPass Authenticator, or programmable hardware tokens such as YubiKey and Token2.
Single Sign-On: Secure and frictionless access to Microsoft 365 and other Cloud Applications, using on-premise Active Directory credentials.
Access Restrictions: Using the contextual information around a user’s logon, UserLock will authorize, deny or limit how a user can access the network, once authenticated.
Access Monitoring: Track and alert on all users’ logon and logoff activity in real-time. Interact remotely with any session and respond to login behavior.
Access Auditing: Record and report on all user connection events to provide a central audit across the whole network.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.