Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs F5 BIG-IP Access Policy Manager (APM) comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
5.0
Many users find CyberArk Identity valuable for saving time, enhancing security, fostering efficiency, and yielding beneficial returns.
Sentiment score
6.8
F5 BIG-IP Access Policy Manager offers cost savings, quick ROI, and enhances security by ensuring crucial access and reducing costs.
I have seen over 30% return on investment due to the improvement in operational efficiencies through automation, which enhances productivity.
Private Wealth Advisor at Arima Fund Limited
 

Customer Service

Sentiment score
6.4
CyberArk Identity's customer service is generally effective but faces criticism for response delays and expertise inconsistencies.
Sentiment score
6.8
F5 BIG-IP APM customer service receives mixed reviews, with some praising responsiveness and others citing delays and communication issues.
They resolved the problem immediately after I reported it, on the same day, within one hour.
Access Management Analyst at Telefónica
They respond immediately when requests are raised, and they are always available for priority one tickets.
Lead Identity Engineer at a tech vendor with 501-1,000 employees
I received prompt responses and support, which I would rate as very good.
Cybersecurity Delivery Analyst at Accenture
Even if they respond, they don't update me with the process or what's going on.
Professional Services Specialist at a security firm with 51-200 employees
Most of the technical support is managed in-house due to our extensive experience with F5 products.
Business Development Manager at Pylones
F5 technical support is responsive and helpful.
Solutions Manager at Macroview Telecom Limited
 

Scalability Issues

Sentiment score
7.4
CyberArk Identity is praised for its scalability, accommodating diverse company sizes and ease of license expansion.
Sentiment score
7.3
F5 BIG-IP APM scales for diverse deployments, offering flexibility and effective tools, though hardware limitations might challenge scalability.
We can use it on different phones and computers, demonstrating its scalability.
Program associate at IMAGINE HER
When delving deep into the concepts, there is a lot to address and learn, especially when facing real-time scenarios.
Cybersecurity Delivery Analyst at Accenture
You can scale it out pretty easily, and you can implement it very small.
Cloud Specialist at Perini Beheer
The product's flexibility and company culture contribute to resolving these challenges.
Business Development Manager at Pylones
I would rate the scalability of F5 BIG-IP Access Policy Manager (APM) between seven and eight.
Solutions Manager at Macroview Telecom Limited
 

Stability Issues

Sentiment score
8.0
CyberArk Identity is highly praised for its reliable stability, quick issue resolution, and effective performance, despite network connectivity challenges.
Sentiment score
7.9
F5 BIG-IP APM is praised for reliability, performance, and minimal bugs, with minor suggestions for log clarity improvement.
We no longer have our data infiltrated by unauthorized persons, and tracking actions within the system has become very easy.
Private Wealth Advisor at Arima Fund Limited
When you have it in the cloud, you have CyberArk every time you need it.
Access Management Analyst at Telefónica
With a stable network, due to the redundant data centers across the globe, it is a lot easier to use as a SaaS solution.
Senior Cyber Security Specialist Architect at a tech consulting company with 11-50 employees
On a scale from one to ten for stability, I would rate F5 BIG-IP Access Policy Manager (APM) a ten.
Solutions Manager at Macroview Telecom Limited
Sometimes, the logs are not quite informational or easy to understand.
Professional Services Specialist at a security firm with 51-200 employees
 

Room For Improvement

CyberArk Identity requires user interface improvements, better integration, enhanced documentation, and easier deployment for improved adoption and operations.
F5 BIG-IP APM requires improvements in pricing, cloud integration, user interface, documentation, support, and additional features for enhanced performance.
It would be helpful if they released a generalized document for processes such as migration.
Cybersecurity Delivery Analyst at Accenture
Integration or deployment is extremely difficult for CyberArk Identity.
Head of IT at Skutin Solutions
There's a need to enhance network performance.
Senior Technology Manager at a outsourcing company with 501-1,000 employees
If I could copy and paste objects instead of picking and configuring them from scratch each time, it would be great.
Professional Services Specialist at a security firm with 51-200 employees
The main improvement needed for F5 BIG-IP Access Policy Manager (APM) is to integrate into the cloud-delivered services from F5.
Business Development Manager at Pylones
The ability to run the Anycast feature would be valuable, as the current solution only operates on-premises.
Senior Cyber Security Consultant at KoçSistem
 

Setup Cost

CyberArk Identity pricing is high but justified for enterprises with discounts and flexible licensing to balance costs.
F5 BIG-IP APM is costly but valued for high performance, with unpredictable cloud pricing and additional fees for features.
Regarding pricing, it can be quite a lot for small companies.
Access Management Analyst at Telefónica
The pricing is acceptable.
Program associate at IMAGINE HER
If I am not going fully cloud, there are additional resources I will need to purchase, such as spinning more VMs or acquiring an HSM device to encrypt the vault.
Head of IT at Skutin Solutions
F5 products are more expensive than other solutions but are valued for their quality and reliability.
Business Development Manager at Pylones
 

Valuable Features

CyberArk Identity enhances security and efficiency through integrations, password management, user monitoring, and comprehensive compliance and risk analysis tools.
F5 BIG-IP APM offers secure remote access with SSL VPN, multi-factor authentication, and comprehensive integration and security features.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
Head of IT at Skutin Solutions
The two-factor authentication is very important, but the fact that every account is being regenerated every time we use it is the most important security feature for us.
Cloud Specialist at Perini Beheer
It is the most powerful access management system.
Access Management Analyst at Telefónica
APM is quite flexible for customers to use, providing secure remote access through various host-checking conditions for both machines and users.
Solutions Manager at Macroview Telecom Limited
It provides robust security and offers integration with multi-factor authentication systems, which is crucial for an organization's security policy.
Business Development Manager at Pylones
A lot of features are useful to me, including mostly the authentication, SAML, or SSO, with no sign-on.
Professional Services Specialist at a security firm with 51-200 employees
 

Categories and Ranking

CyberArk Identity
Ranking in Access Management
7th
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
29
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (9th), Authorization Software (3rd), Enterprise Password Managers (7th), User Entity Behavior Analytics (UEBA) (9th), Active Directory Management (6th), Cloud Resource Access Management (2nd), Customer Identity and Access Management (CIAM) (6th)
F5 BIG-IP Access Policy Man...
Ranking in Access Management
9th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
18
Ranking in other categories
Secure Web Gateways (SWG) (15th), Network Access Control (NAC) (7th), SSL VPN (5th), Remote Access (10th)
 

Mindshare comparison

As of January 2026, in the Access Management category, the mindshare of CyberArk Identity is 3.5%, up from 2.5% compared to the previous year. The mindshare of F5 BIG-IP Access Policy Manager (APM) is 2.0%, up from 1.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Access Management Market Share Distribution
ProductMarket Share (%)
CyberArk Identity3.5%
F5 BIG-IP Access Policy Manager (APM)2.0%
Other94.5%
Access Management
 

Featured Reviews

Hariharan Thangasamy - PeerSpot reviewer
Cybersecurity Delivery Analyst at Accenture
Has strengthened privileged access control and improved audit visibility through session monitoring and password rotation
On the identity product side, it is awesome. However, they can improve in the documentation parts. For example, if there is a migration process, I can see the maximum customers are moving from self-hosted to on-premises or from on-premises to the cloud. It would be helpful if they released a generalized document for processes such as migration. A clear overview document would assist us in understanding more about the tool, configurations, and automations to enhance our security. Regarding the initial setup of CyberArk Identity, I faced some challenges. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components. I could not find the proper documentation in the community portal.
Senior Cyber Security Consultant at KoçSistem
Has provided reliable policy controls and secure web access for large enterprises
I consider Cloudflare when evaluating centralized access control features; Cloudflare utilizes multi-factor authentication and full API support, while F5 BIG-IP Access Policy Manager (APM) needs to enhance its API support. I recommend F5 BIG-IP Access Policy Manager (APM) for large companies such as Tüpraş and Ford. Tüpraş is one of the biggest companies in Turkey, along with other customers such as Tofaş, Euroko, Koç Holding, and more. For on-premises deployment, I would rate it a 10. For cloud deployment, I would rate it a seven. I primarily use it on-premises. I rate F5 BIG-IP Access Policy Manager (APM) eight out of ten.
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
11%
Manufacturing Company
11%
Healthcare Company
6%
Financial Services Firm
14%
Manufacturing Company
12%
Government
9%
Computer Software Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business20
Midsize Enterprise4
Large Enterprise10
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise1
Large Enterprise9
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I am not certain about CyberArk Identity's exact pricing model. For comparison, Okta was around five dollars per user. CyberArk Identity offers good discounts to some clients, which influences thei...
What needs improvement with CyberArk Identity?
We do not specifically use the password vaulting feature of CyberArk Identity. The centralized user dashboard of CyberArk Identity has not been that important for us. If it would be possible to sha...
What do you like most about F5 BIG-IP Access Policy Manager (APM)?
In my opinion, the GUI is perfect with the configuration options provided. F5 BIG-IP has given customization options and policy configuration tools in the GUI. It's good and good enough to work.
What is your experience regarding pricing and costs for F5 BIG-IP Access Policy Manager (APM)?
F5 products are more expensive than other solutions but are valued for their quality and reliability, akin to purchasing a Bentley as opposed to an Audi.
What needs improvement with F5 BIG-IP Access Policy Manager (APM)?
F5 BIG-IP Access Policy Manager (APM) is not user-friendly and operates slowly. Additional features for architecture such as Anycast would be beneficial. The ability to run the Anycast feature woul...
 

Also Known As

Idaptive
F5 Access Policy Manager
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
City Bank, Ricacorp Properties, Miele, American Systems, Bangladesh Post Office
Find out what your peers are saying about CyberArk Identity vs. F5 BIG-IP Access Policy Manager (APM) and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.