

Find out in this report how the two Access Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
The end users have the authority to reconcile the password or verify it before using session isolation, which is one of the unique features that can be enabled through Privileged Session Manager, preventing any attacks from happening within the organization when connected with sessions through CyberArk Privileged Access Manager.
CyberArk Privileged Access Manager has helped customers save on costs primarily by reducing the number of engineering and information security personnel.
CyberArk has been exceptional in coming back to us with immediate responses.
It could be forever until you talk to someone who knows what they are doing.
Based on the issue resolution and support quality, I rate the support 10 out of 10.
Even if they respond, they don't update me with the process or what's going on.
Most of the technical support is managed in-house due to our extensive experience with F5 products.
F5 technical support is responsive and helpful.
The CPM can reportedly handle up to 50,000 accounts independently without issue.
I would rate it a ten out of ten for scalability.
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
The product's flexibility and company culture contribute to resolving these challenges.
I would rate the scalability of F5 BIG-IP Access Policy Manager (APM) between seven and eight.
Proper fine-tuning and expertise ensure the product performs well.
Overall, the stability of the solution is high.
It has a large customer base and positive feedback within my network.
On a scale from one to ten for stability, I would rate F5 BIG-IP Access Policy Manager (APM) a ten.
Sometimes, the logs are not quite informational or easy to understand.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
We cannot generate a plug-in for web-based applications.
If they want clients to move to the cloud, they need to support them in real-time.
If I could copy and paste objects instead of picking and configuring them from scratch each time, it would be great.
The main improvement needed for F5 BIG-IP Access Policy Manager (APM) is to integrate into the cloud-delivered services from F5.
The ability to run the Anycast feature would be valuable, as the current solution only operates on-premises.
CyberArk is expensive compared to other products I know.
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
CyberArk's SaaS solution is particularly expensive.
F5 products are more expensive than other solutions but are valued for their quality and reliability.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
It can integrate with Splunk, SNMP, and other solutions and technologies.
APM is quite flexible for customers to use, providing secure remote access through various host-checking conditions for both machines and users.
It provides robust security and offers integration with multi-factor authentication systems, which is crucial for an organization's security policy.
A lot of features are useful to me, including mostly the authentication, SAML, or SSO, with no sign-on.

| Company Size | Count |
|---|---|
| Small Business | 59 |
| Midsize Enterprise | 42 |
| Large Enterprise | 174 |
| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 2 |
| Large Enterprise | 9 |
CyberArk Privileged Access Manager safeguards privileged accounts through password management, credential rotation, and session recording. With seamless integration and real-time monitoring, it ensures robust security across platforms.
CyberArk Privileged Access Manager is recognized for its extensive capabilities in managing and securing privileged accounts. It offers vital functionalities such as automatic password rotation, real-time session monitoring, and cross-platform integration through APIs and custom connectors. Users find the flexibility in workflows and granular access controls beneficial, particularly in protecting access across cloud and on-prem infrastructures. However, improvements in its interface, installation process, plugin support, and integration with third-party tools are often suggested. Pricing is a concern for many, along with the need for better dashboard reporting, user provisioning, and enhanced documentation. Organizations leverage this tool for encrypting and monitoring critical account activities and automating password management to bolster security.
What are the key features of CyberArk Privileged Access Manager?CyberArk Privileged Access Manager finds substantial use in industries such as finance, healthcare, and technology, where the protection of privileged accounts is critical. These sectors rely on its capabilities to manage application credentials securely and provide safe access for developers, administrators, and vendors across various infrastructures.
F5 BIG-IP Access Policy Manager (APM) enhances access management by offering remote application access through SSL VPN, secure access verification, and login capabilities. Its user-friendly interface and robust security ensure efficient scalability and performance.
F5 BIG-IP APM serves enterprises by integrating multiple authentication protocols and supporting remote access via SSL VPN for secure application and network connections. Known for its strong performance and reliable scalability, APM allows custom policy management, facilitating load balancing and enhanced server management through virtual IP creation. It offers a secure bridge for users to connect to private networks while managing access through portals and enforcing compliance checks. Despite its efficient and user-friendly interface, APM has areas needing improvements such as updates for MacOS access, comprehensive reporting features, and simplifying the initial setup process. Better documentation and improved cloud integration are also areas for potential enhancement, alongside more efficient management and automation capabilities. Pricing and integration with other systems could be more competitive, and improvements in support response times would benefit users significantly.
What are the key features of F5 BIG-IP APM?In sectors like finance and healthcare, F5 BIG-IP APM ensures secure access management for sensitive data networks. Retailers utilize it to manage seasonal traffic efficiently with its load balancing and scalability, while educational institutions leverage its robust security and remote access features for faculty and students accessing campus networks remotely. These industries benefit from tailored policy management and comprehensive authentication integration to meet specific security and access needs.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.