APM easily secures your applications and authenticate your users
Updated July 26, 2022

APM easily secures your applications and authenticate your users

Mohammed Younus Siddiqui | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with F5 BIG-IP Access Policy Manager (APM)

We use F5 BIG-IP APM to secure our applications. We also use to implement two-factor authentication for our VPN and allow RDP/SSH access to our users. It is the one-stop portal for all our users who are outside the university. We also deploy app tunnels and any specific user IP port access.
  • Remote Access to the local computer.
  • Application Security.
  • Authentication.
  • Two Factor Authentication Implementation.
  • UI/UX can be quick and modern.
  • The application hosting is not one-click.
  • You cannot observer the changes done for external users internally.
  • VPN Portal.
  • Application Tunnels.
  • Remote Desktop.
  • Protecting simple web applications behind the VPN Portal.
  • Authentication the users using AD and a 2FA for better security.
  • Easy Remote Desktop access to the user's local computer.

Do you think F5 BIG-IP Access Policy Manager (APM) delivers good value for the price?

Yes

Are you happy with F5 BIG-IP Access Policy Manager (APM)'s feature set?

Yes

Did F5 BIG-IP Access Policy Manager (APM) live up to sales and marketing promises?

Yes

Did implementation of F5 BIG-IP Access Policy Manager (APM) go as expected?

Yes

Would you buy F5 BIG-IP Access Policy Manager (APM) again?

Yes

If you already have an F5 implementation or use the LTM for load balancing. Then APM is the most obvious choice for you. It is just an add-on subscription/license to your existing appliance. In this day and age, where remote work is considered the norm then APM is a good solution to ensure your users have the required access wherever they are.