By leveraging APM and iRules were were able to address complicated requests
February 13, 2024

By leveraging APM and iRules were were able to address complicated requests

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with F5 BIG-IP Access Policy Manager (APM)

Pre-authenticated access to critical applications on premise. It provide secure access to our critical services we publish to our internet community.
  • SSO authenticated access
  • Complex decision making access permission
  • Easy to use interface
  • Easy to interpret policies
  • It has addressed many of our complex business needs where there was authentication requirements surrounding the solution
  • It is a relatively easy interface to address the complex requirements
Ease of management and reduction in complexity of solution designs

Do you think F5 BIG-IP Access Policy Manager (APM) delivers good value for the price?

Yes

Are you happy with F5 BIG-IP Access Policy Manager (APM)'s feature set?

Yes

Did F5 BIG-IP Access Policy Manager (APM) live up to sales and marketing promises?

Yes

Did implementation of F5 BIG-IP Access Policy Manager (APM) go as expected?

Yes

Would you buy F5 BIG-IP Access Policy Manager (APM) again?

Yes

We had an access requirement would leveraged APM and the BIG-IP Edge client. We needed to restrict access depending on the origin of the public IP address. By leveraging APM and iRules were were able to address this complicated request.