APM easily secures your applications and authenticate your users
Overall Satisfaction with F5 BIG-IP Access Policy Manager (APM)
We use F5 BIG-IP APM to secure our applications. We also use to implement two-factor authentication for our VPN and allow RDP/SSH access to our users. It is the one-stop portal for all our users who are outside the university. We also deploy app tunnels and any specific user IP port access.
Pros
- Remote Access to the local computer.
- Application Security.
- Authentication.
- Two Factor Authentication Implementation.
Cons
- UI/UX can be quick and modern.
- The application hosting is not one-click.
- You cannot observer the changes done for external users internally.
- VPN Portal.
- Application Tunnels.
- Remote Desktop.
- Protecting simple web applications behind the VPN Portal.
- Authentication the users using AD and a 2FA for better security.
- Easy Remote Desktop access to the user's local computer.
Do you think F5 BIG-IP Access Policy Manager (APM) delivers good value for the price?
Yes
Are you happy with F5 BIG-IP Access Policy Manager (APM)'s feature set?
Yes
Did F5 BIG-IP Access Policy Manager (APM) live up to sales and marketing promises?
Yes
Did implementation of F5 BIG-IP Access Policy Manager (APM) go as expected?
Yes
Would you buy F5 BIG-IP Access Policy Manager (APM) again?
Yes
Comments
Please log in to join the conversation