F5 Networks provides BIG-IP Access Policy Manager as an identity and access solution which can be deployed as a standalone solution or as an add-on to F5 Networks' flagship BIG-IP TLM or F5 Advanced WAF applications.
N/A
Oracle Identity Governance
Score 6.0 out of 10
N/A
Oracle Identity Governance (OIG) -formerly Oracle Identity Manager or OIM- is an enterprise identity management system that automatically manages users' access privileges within enterprise IT resources.
$3,600
SAP NW Identity Management
Score 8.5 out of 10
N/A
SAP NetWeaver Identity Management is the software acquired by SAP from MaXware for identity management (IdM).
N/A
Pricing
F5 BIG-IP Access Policy Manager (APM)
Oracle Identity Governance
SAP Identity Management
Editions & Modules
No answers on this topic
Processor - Minimum
$1
Named User Plus - Software Update License & Support
$792
Named User Plus - Price
$3,600
Processor - Software Update License & Support
39,600.00
Processor - Price
180,000
Named User Plus - Minimum
N/A
No answers on this topic
Offerings
Pricing Offerings
F5 BIG-IP Access Policy Manager (APM)
Oracle Identity Governance
SAP NW Identity Management
Free Trial
No
Yes
No
Free/Freemium Version
No
Yes
No
Premium Consulting/Integration Services
No
No
No
Entry-level Setup Fee
No setup fee
No setup fee
No setup fee
Additional Details
—
—
—
More Pricing Information
Community Pulse
F5 BIG-IP Access Policy Manager (APM)
Oracle Identity Governance
SAP Identity Management
Features
F5 BIG-IP Access Policy Manager (APM)
Oracle Identity Governance
SAP Identity Management
Virtual Private Network
Comparison of Virtual Private Network features of Product A and Product B
F5 BIG-IP Access Policy Manager (APM)
7.7
11 Ratings
14% below category average
Oracle Identity Governance
-
Ratings
SAP Identity Management
-
Ratings
AES 256-bit Encryption
8.77 Ratings
00 Ratings
00 Ratings
Kill Switch
7.36 Ratings
00 Ratings
00 Ratings
Multi-Platform Support
7.97 Ratings
00 Ratings
00 Ratings
Split Tunneling
8.24 Ratings
00 Ratings
00 Ratings
IP Address Masking
7.46 Ratings
00 Ratings
00 Ratings
No-Logs Policy
6.26 Ratings
00 Ratings
00 Ratings
Multiple Server Locations
6.97 Ratings
00 Ratings
00 Ratings
Automatic Wi-Fi Protection
9.11 Ratings
00 Ratings
00 Ratings
Simultaneous Connections
7.39 Ratings
00 Ratings
00 Ratings
Customer Support Services
7.78 Ratings
00 Ratings
00 Ratings
Identity Management
Comparison of Identity Management features of Product A and Product B
I think that the platform is well suited to many Remote Access VPN solutions, but I also think there is a lot of room for improvement on the backend. If you are hoping to deploy your APM solution across many different datacenters or colos, it may not be the best choice for the final solution.
Well suited for: 1. Large and medium organisations who have the capacity to invest in IAM roadmap for long term. 2. Organisations with and existing oracle and partner applications ecosystem. 3. Scenario where the user base is on the higher side and organisations looking to scale up in near future. 4. Organisation with complex workflow need in identity management process. Not well suited for 1. Small organisations or even medium ones which have a lesser number of applications 2. Scenarios where custom connectors need to be developed but at the same time turnaround should be quick. 3. Scenarios when features you are looking for are missing, getting them added could take a lot of effort. 4. UI is not very user-friendly and needs to be customised. 5. Takes time to stablise post going live
SAP Identity Management manages organization identities centrally with a great amount of flexibility and efficiency. Compared to the conventional SAP solution of central user administration (CUA), SAP IDM (version 7.2/8.0) delivers a great number of benefits like: 1. Availability of connectors for non-SAP application identity management,
2. Modular/granular access management in the form of context-based business role definition.
3. It can be integrated with the SAP HR system for making entire user identity management automatic.
In my previous organization, to achieve the granularity of access based on organization restrictions, we implemented enabler role-based security roles. Provisioning the enabler roles through the SAP GRC was a great challenge (realistically improbable). Here came the SAP IDM to our rescue. It has a peculiar feature of context-based business role provisioning feature.
Customized context & its association with security roles & user HR attributes, give us unique ability to achieve granularity of access provisioning.
SAP IDM integrates with the SAP HR system and identity management becomes automatic.
There's some more advanced configurations within OAuth that I think could be fleshed out and easier to approach.
There's a lot of things in F5 BIG-IP Access Policy Manager policies that I find myself recreating every policy. An easier way to copy objects from one to policy to another.
SAP Identity management should come up with connectors for almost all not SAP applications, which will enable the use of SAP IDM as a one-stop solution for organizations' identity management.
Once things are set up, it is nice and easy to get the Edge Client running on user's PCs. However, that setup process can be a bit daunting at first using the Policy Manager, and reviewing session logs can be difficult at first if you aren't 100% sure of what you're looking for.
Overall good product and somewhat reliable when used in a specific manner. However, there are cons like unending bugs and no well-defined upgrade path. The product could have been more flexible and lite in terms of organisational infra needs. OIM is a robust product but other vendors are almost on-par now.
It is open platform so support is not good and than F5 and features visibility as not good as F5. F5 Set up and easy to use to admin console. Also have more feature visibility for load balancing, web server accelerator, application server ddos protection and WAF. F5 more efficient to handle concurrent request.
SAP IDM has the huge potential to minimize risks arising out of disorganized identity management within an organization. As all identities are managed centrally, there is very little room for manipulation of an identity.
As this solution has the ability to integrate with SAP GRC, risk analysis becomes mandatory before any access provisioning takes place.
As the solution is automatic, hiring to employee exits is managed with a minimal margin of error.