F5 BIG-IP Access Policy Manager (APM)

F5 BIG-IP Access Policy Manager (APM)

About TrustRadius Scoring
Score 7.8 out of 100
F5 BIG-IP Access Policy Manager (APM)

Overview

Recent Reviews

Reviewer Pros & Cons

View all pros & cons

Video Reviews

Leaving a video review helps other professionals like you evaluate products. Be the first one in your network to record a review of F5 BIG-IP Access Policy Manager (APM), and make your voice heard!

Pricing

View all pricing
N/A
Unavailable

What is F5 BIG-IP Access Policy Manager (APM)?

F5 Networks provides BIG-IP Access Policy Manager as an identity and access solution which can be deployed as a standalone solution or as an add-on to F5 Networks' flagship BIG-IP TLM or F5 Advanced WAF applications.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting / Integration Services

Would you like us to let the vendor know that you want pricing?

5 people want pricing too

Alternatives Pricing

What is CyberArk Workforce Identity?

Cyberark Workforce Identity (formerly Idaptive Next-Gen Access Services, acquired by CyberArk in 2020) secures enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. Cyberark Workforce Identity helps protect against the leading point of…

What is IBM Security Verify?

IBM Security Verify, formerly known as IBM Cloud Identity, is an identity-as-a-service (IDaaS) offering that aggregates dynamic user, device and environmental context to automate risk protection and continuously authenticate any user to any resource.

Features Scorecard

No scorecards have been submitted for this product yet..

Product Details

What is F5 BIG-IP Access Policy Manager (APM)?

F5® BIG-IP® Access Policy Manager® (APM) is an access management proxy solution managing global access to the user's network, the cloud, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access. BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.

Identity Aware Proxy is key to both a Zero Trust security architecture and to F5 BIG-IP APM. BIG-IP APM and F5 Access Guard deliver Identity Aware Proxy using a Zero Trust validation model on every application access request. Providing authenticated and authorized users secure access to specific applications, it leverages F5 best-in-class access proxy. BIG-IP APM centralizes user identity and authorization. Authorization is based on the principles of least privileged access.

F5 BIG-IP Access Policy Manager (APM) Features

  • Supported: Support for Identity Aware Proxy (IAP) enabling Zero Trust application access
  • Supported: Context-based authorization with dynamic L4/L7 ACLs
  • Supported: Seamless integration with third-party MFA solutions
  • Supported: DTLS 2.0 mode for delivering and securing applications
  • Supported: SAML 2.0 identity federation support
  • Supported: Support for OAuth 2.0 authorization protocol
  • Supported: SSO support for classic authentication (Kerberos, header- based, etc.), credential caching, OAuth 2.0, SAML 2.0, and FIDO2 (U2F)
  • Supported: Granular access policy enforcement
  • Supported: AAA server authentication and high-availability
  • Supported: Integration with leading IAM vendor products (Microsoft, Okta, Ping Identity)
  • Supported: BIG IP Edge Client and F5 Access integrate with VMware Horizon ONE (AirWatch), Microsoft Intune and IBM MaaS360
  • Supported: Risk-based access leveraging third-party UEBA and risk engines (HTTP Connector)
  • Supported: Scales up to 2 million concurrent access sessions

F5 BIG-IP Access Policy Manager (APM) Downloadables

F5 BIG-IP Access Policy Manager (APM) Integrations

F5 BIG-IP Access Policy Manager (APM) Competitors

F5 BIG-IP Access Policy Manager (APM) Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Comparisons

View all alternatives

Frequently Asked Questions

What is F5 BIG-IP Access Policy Manager (APM)?

F5 Networks provides BIG-IP Access Policy Manager as an identity and access solution which can be deployed as a standalone solution or as an add-on to F5 Networks' flagship BIG-IP TLM or F5 Advanced WAF applications.

Who uses F5 BIG-IP Access Policy Manager (APM)?

The most common users of F5 BIG-IP Access Policy Manager (APM) are from Mid-sized Companies (51-1,000 employees) and the Education Management industry.

Reviews and Ratings

 (4)

Reviews

(1-2 of 2)
Companies can't remove reviews or game the system. Here's why
Mubeen Akhtar | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User
Review Source
F5 BIG-IP Access Policy Manager (APM) is a standard solution to manage access across the network. It has novel features that enable organizations like us control access for applications and all this with high performance. Of course, the cost is something that is worth arguing about otherwise, F5 Big-IP is an excellent access control solution.
  • Application access management
  • Ease of administration for the administrator
  • Wide variety of scope coverage including on-premises, cloud, data center etc.
  • Cloud service management and control can certainly get better
  • Solution is expensive
  • While the customer support is good, there is room for forum discussions that have a good turn-around time for queries.
F5 BIG-IP Access Policy Manager (APM) is excellent access and network control solution, especially when you have the ASM and LTM components since it becomes a part of the larger eco-system. This proves beneficial from skill-set procurement, maintaining the infrastructure and administration as well. The down-sides would be extending these capabilities for in-cloud services and also the fact that the solution is slightly expensive.
Mohammed Younus Siddiqui | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User
Review Source
We use F5 BIG-IP APM to secure our applications. We also use to implement two-factor authentication for our VPN and allow RDP/SSH access to our users. It is the one-stop portal for all our users who are outside the university. We also deploy app tunnels and any specific user IP port access.
  • Remote Access to the local computer.
  • Application Security.
  • Authentication.
  • Two Factor Authentication Implementation.
  • UI/UX can be quick and modern.
  • The application hosting is not one-click.
  • You cannot observer the changes done for external users internally.
If you already have an F5 implementation or use the LTM for load balancing. Then APM is the most obvious choice for you. It is just an add-on subscription/license to your existing appliance. In this day and age, where remote work is considered the norm then APM is a good solution to ensure your users have the required access wherever they are.