F5 Networks provides BIG-IP Access Policy Manager as an identity and access solution which can be deployed as a standalone solution or as an add-on to F5 Networks' flagship BIG-IP TLM or F5 Advanced WAF applications.
N/A
Microsoft Defender for Cloud Apps
Score 7.1 out of 10
N/A
Microsoft Defender for Cloud Apps (formerly Microsoft Cloud App Security) is a multimode cloud access security broker.
N/A
Pricing
F5 BIG-IP Access Policy Manager (APM)
Microsoft Defender for Cloud Apps
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
F5 BIG-IP Access Policy Manager (APM)
Microsoft Defender for Cloud Apps
Free Trial
No
No
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
—
—
More Pricing Information
Community Pulse
F5 BIG-IP Access Policy Manager (APM)
Microsoft Defender for Cloud Apps
Features
F5 BIG-IP Access Policy Manager (APM)
Microsoft Defender for Cloud Apps
Virtual Private Network
Comparison of Virtual Private Network features of Product A and Product B
I think that the platform is well suited to many Remote Access VPN solutions, but I also think there is a lot of room for improvement on the backend. If you are hoping to deploy your APM solution across many different datacenters or colos, it may not be the best choice for the final solution.
It is well suited if your team is working with Microsoft tools and Azure services. but if you are using other cloud service providers and don't want to spend efforts in learning integration with third-party software then this is not a great fit for you. overall we are very satisfied with the product. If your corporation with Microsoft tools then I would recommend it.
There's some more advanced configurations within OAuth that I think could be fleshed out and easier to approach.
There's a lot of things in F5 BIG-IP Access Policy Manager policies that I find myself recreating every policy. An easier way to copy objects from one to policy to another.
If F5 BIG-IP Access Policy Manager usability is fine it's not hard to use if you read the documentation but it does feel dated and could use a responsive design update to modernize user interface to current standards.
The interface is pretty simple and easy to use; however, you will need to do a lot of investigative research on your own to get comfortable with it. Originally, many of the Microsoft security tools had their own seperate consoles. Overtime, they have blended into one interface which is the ideal state. In some cases it is clear Microsoft had to pick which console a certain feature or setting was going to reside in and this leads to some confusion. For example, DLP is managed through Defender for Cloud Apps but you will also need to jump into Purview. For things like reverse proxy on your M365 tenant, you will need to go into Azure and setup conditional access rules. Not a big problem and I can understand why the settings are located where they are but for someone just starting out with Defender for Cloud Apps, it will take some time to figure out.
I have not utilized actual support but the Sales and Product teams have been super helpful in moving our implementation forward and showing us the best practices.
It is open platform so support is not good and than F5 and features visibility as not good as F5. F5 Set up and easy to use to admin console. Also have more feature visibility for load balancing, web server accelerator, application server ddos protection and WAF. F5 more efficient to handle concurrent request.
Microsoft Defender for Cloud Apps was chosen primarily due to its ability to work perfectly within our mostly M365 environment. Given that this was an added feature of our E5 license, we chose to dive into it and use it due to it's good visibility into user actions and the ability to tie all M365 actions together into one place. We did not see similar visibility with other tools that we vetted
Cloud App Security saves us thousands of dollars finding and rectifying apps security issues
Identity Security Posture helps the organization identity stay in shape, saving thousands of dollars on security consultations
The cost of suffering a breach cannot be quantified, CAS helps minimize the chances of the attackers succeeding, with excellent historical logging for most operations