F5 BIG-IP Access Policy Manager (APM) vs VNC Connect comparison

Cancel
You must select at least 2 products to compare!
F5 Logo
1,065 views|883 comparisons
85% willing to recommend
RealVNC Logo
2,792 views|2,569 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between F5 BIG-IP Access Policy Manager (APM) and VNC Connect based on real PeerSpot user reviews.

Find out what your peers are saying about TeamViewer, Microsoft, Citrix and others in Remote Access.
To learn more, read our detailed Remote Access Report (Updated: March 2024).
767,847 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The most valuable feature is the virtual IP creation. It's our most frequently used feature.""The performance of the solution is valuable.""F5 BIG-IP APM is relatively easy to use.""In my opinion, the GUI is perfect with the configuration options provided. F5 BIG-IP has given customization options and policy configuration tools in the GUI. It's good and good enough to work.""This is a product that is easy to install and integrate, and it is simple to use.""Stickiness is the most valuable feature of the product.""The product allows us to create customized portals for your users.""The load balancing features are valuable."

More F5 BIG-IP Access Policy Manager (APM) Pros →

"The most valuable features are that it is consistently low profile and consistently works without hiccups or headaches."

More VNC Connect Pros →

Cons
"The initial setup was complex.""Cloud services are something that F5 Access Policy Manager could do better""I'd suggest improved documentation integration directly within the GUI. Right now, finding comprehensive documentation often requires going to external websites like the community portal.""F5 BIG-IP APM disconnects when you leave it for long enough, but that is natural for IT solutions to do. That's a little bit frustrating.""We do not have knowledgeable support teams locally.""The solution is quite costly.""Integrating identity providers and single sign-on solutions can simplify user authentication and access control.""The price of this product can be improved."

More F5 BIG-IP Access Policy Manager (APM) Cons →

"We occasionally have issues with the graphic software of the interface."

More VNC Connect Cons →

Pricing and Cost Advice
  • "Recently, they have simplified the licensing"
  • "The product is very expensive."
  • "The tool is a little bit expensive."
  • More F5 BIG-IP Access Policy Manager (APM) Pricing and Cost Advice →

    Information Not Available
    report
    Use our free recommendation engine to learn which Remote Access solutions are best for your needs.
    767,847 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable feature is the virtual IP creation. It's our most frequently used feature.
    Top Answer:The tool is a little bit expensive. I rate the pricing a six out of ten.
    Top Answer:In my opinion, the GUI side needs some improvement based on my usage. Sometimes, it doesn't work as efficiently as the CLI side. Feature-wise, sometimes when I log in to the GUI and want to see the… more »
    Ask a question

    Earn 20 points

    Ranking
    12th
    out of 44 in Remote Access
    Views
    1,065
    Comparisons
    883
    Reviews
    9
    Average Words per Review
    348
    Rating
    8.1
    16th
    out of 44 in Remote Access
    Views
    2,792
    Comparisons
    2,569
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Comparisons
    Also Known As
    F5 Access Policy Manager
    Learn More
    Overview

    F5 BIG-IP Access Policy Manager (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access. 

    BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.

    BIG-IP APM Benefits:

    • Ease of use
    • Flexibility
    • Ability to integrate with other systems
    • Security features
    • Granular access control
    • Responsive and helpful support team

    BIG-IP APM Features:

    • Support for Identity Aware Proxy (IAP) enabling Zero Trust application access
    • Context-based authorization with dynamic L4/L7 ACLs
    • Integration with third-party MFA solutions
    • DTLS 2.0 mode for delivering and securing applications
    • SAML 2.0 identity federation support
    • Support for OAuth 2.0 authorization protocol
    • SSO support for classic authentication (Kerberos, header- based, etc.), credential caching, OAuth 2.0, SAML 2.0, and FIDO2 (U2F)
    • AAA server authentication and high-availability
    • Integration with leading IAM vendor products (Microsoft, Okta, Ping Identity)
    • BIG IP Edge Client and F5 Access integrate with VMware Horizon ONE (AirWatch), Microsoft Intune and IBM MaaS360
    • Risk-based access leveraging third-party UEBA and risk engines (HTTP Connector)

    Reviews from Real Users

    Below are some reviews and helpful feedback written by BIG-IP APM users.

    Mahmmoud Rabie, Senior Site Reliability Engineer, writes that BIG-IP APM is "A highly stable solution for load balancing, but the initial setup is complex."

    Clyde LivingstonSenior Process Specialist at Telstra, says that BIG-IP APM is "Easy to use, useful access remotely, but lacking stability."

    Chris LamSenior Solution Consultant at Macroview Telecom Limited, states that BIG-IP APM is "Useful for remote access VPN and VPI integration with VMware.

    Intuitive remote control
    Use the mouse and keyboard (or touchscreen) in front of you as though they belong to the remote computer.

    Send special keys and combinations such as Ctrl-Alt-Del, and copy and paste text in either direction. Type in confidence that characters will be interpreted correctly, whatever your platform, keyboard or input language.

    Tried and tested performance
    As the original inventors of VNC® technology, we know how to create a responsive screen sharing experience that's as good as being there.

    Our patent-protected technology automatically optimizes to the speed of your network, and is especially effective in low-bandwidth and high-latency environments.

    Cross-platform support
    PC to PC and mobile to PC across Windows, Mac, Linux, Raspberry Pi, iOS and Android.

    With an Enterprise subscription, you also get a key to install our VNC® 5.x software on a wide range of older and UNIX operating systems too, so your legacy hardware remains accessible.

    Attended and unattended access
    Connect whether remote computer owners are present or not.

    Remotely access your own computers, monitor or patch equipment in the field, support customers or colleagues, and much more. Learn about the many ways our customers use VNC® Connect.

    Direct and cloud connectivity
    Our cloud service automatically brokers cloud connections between devices wherever they are.

    So you don’t need to rely on a VPN, or conduct complex and insecure port-forwarding and firewall configuration.

    With an Enterprise subscription, you can establish direct connections as well (or instead), perfect for locked down or offline network environments. For more information, start with our document cloud versus direct.

    Pre-install or connect on demand
    Add device access to your subscription, install VNC® Connect on every device you own or manage, and enable access by anyone at any time.

    Alternatively, add instant support to your subscription and connect in seconds on demand, leaving no footprint. Or add both capabilities, and cover every remote access use case.

    File transfer, printing and chat
    During a session, you're not restricted to just interacting with the remote screen.

    You can transfer files in either direction, print files directly to a printer where you are (rather than to a printer attached to the remote computer), and securely chat with other users connected at the same time as you.

    Secure by design
    VNC® Connect is built from the ground up with security in mind, to balance the control you need with the privacy that compliance requires.

    Sessions are encrypted end-to-end using up to 256-bit AES encryption. Authentication is mandatory at the point of connection and never delegated to the cloud. Protect your computers with multi-factor authentication, single-sign on (SSO), granular access control and rich session permissions.

    Multilingual support
    VNC® Connect is available in French, German, Spanish and Brazilian Portuguese as well as English, with more translations on the way.

    Connect-Features-TeamManagement.png
    Online team management
    Manage remote computers, the people you invite into your team to share remote access with, and their roles and permissions from one central location.

    Remote deployment
    With an Enterprise subscription, you can deploy VNC® Connect in bulk, offline or remotely using your standard enterprise tooling.

    In addition, you can configure VNC® Connect remotely using policy, and lock it down to prevent change.

    Virtual desktops under Linux
    With an Enterprise subscription, you can create virtual desktops on Linux computers.

    This might be useful to enable visual remote access to headless Linux systems, or provide separate workspaces for simultaneous users of a shared resource.

    Sample Customers
    City Bank, Ricacorp Properties, Miele, American Systems, Bangladesh Post Office
    Telesat Canada, St. Anthony's School, Pratt and Whitney, City of Sacramento
    Top Industries
    REVIEWERS
    Comms Service Provider27%
    Media Company18%
    Computer Software Company18%
    Financial Services Firm18%
    VISITORS READING REVIEWS
    Financial Services Firm13%
    Computer Software Company12%
    Government11%
    Manufacturing Company8%
    VISITORS READING REVIEWS
    Manufacturing Company30%
    Computer Software Company12%
    Government7%
    Comms Service Provider5%
    Company Size
    REVIEWERS
    Small Business46%
    Large Enterprise54%
    VISITORS READING REVIEWS
    Small Business17%
    Midsize Enterprise14%
    Large Enterprise69%
    VISITORS READING REVIEWS
    Small Business19%
    Midsize Enterprise10%
    Large Enterprise71%
    Buyer's Guide
    Remote Access
    March 2024
    Find out what your peers are saying about TeamViewer, Microsoft, Citrix and others in Remote Access. Updated: March 2024.
    767,847 professionals have used our research since 2012.

    F5 BIG-IP Access Policy Manager (APM) is ranked 12th in Remote Access with 13 reviews while VNC Connect is ranked 16th in Remote Access. F5 BIG-IP Access Policy Manager (APM) is rated 8.2, while VNC Connect is rated 9.0. The top reviewer of F5 BIG-IP Access Policy Manager (APM) writes " Facilitates packet inspection, modification, and offloading and offers visibility and troubleshooting capabilities, allowing for pre-production server testing". On the other hand, the top reviewer of VNC Connect writes "Reliable and trustworthy remote access software, with responsive technical support ". F5 BIG-IP Access Policy Manager (APM) is most compared with Citrix Gateway, CyberArk Privileged Access Manager, Cisco ISE (Identity Services Engine), Microsoft Remote Desktop Services and Ivanti Connect Secure, whereas VNC Connect is most compared with OpenText Exceed TurboX, Apache Guacamole, Citrix DaaS (formerly Citrix Virtual Apps and Desktops service), Dameware Remote Support and Check Point Remote Access VPN.

    See our list of best Remote Access vendors.

    We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.