

ExtremeControl and F5 BIG-IP APM are competing in network management and security. ExtremeControl edges ahead in pricing and support, whereas F5 BIG-IP APM has an upper hand due to its feature richness.
Features: ExtremeControl offers robust policy management, third-party integration, and streamlined operations. F5 BIG-IP APM provides comprehensive access control, scalability, and extensive security options.
Ease of Deployment and Customer Service: ExtremeControl features a straightforward deployment process with dedicated support. F5 BIG-IP APM requires an intricate setup aided by detailed guidance and superior technical support.
Pricing and ROI: ExtremeControl has competitive pricing with promising ROI due to lower initial costs. F5 BIG-IP APM involves higher initial expenses but offers long-term value with its advanced features.
Having good connectivity through Wi-Fi is essential for the entire business.
For technical support of ExtremeControl, I have no doubts that they cope with problems effectively.
They do not offer straightforward support if there is an issue unless we upgrade.
Most of the technical support is managed in-house due to our extensive experience with F5 products.
Even if they respond, they don't update me with the process or what's going on.
F5 technical support is responsive and helpful.
For scalability in larger environments, it can be rated a maximum of 10.
The product's flexibility and company culture contribute to resolving these challenges.
I would rate the scalability of F5 BIG-IP Access Policy Manager (APM) between seven and eight.
On a scale from one to ten for stability, I would rate F5 BIG-IP Access Policy Manager (APM) a ten.
Sometimes, the logs are not quite informational or easy to understand.
We rely more on the cloud for analytics rather than on-premise, and some customers prefer relying on an on-premise solution rather than a cloud solution.
There is also another product called UZTNA, which is said to have NAC in this solution, but it is not as advanced as our regular ExtremeControl.
For their wired network, especially with third-party switching, this is where most of the features are lost.
The main improvement needed for F5 BIG-IP Access Policy Manager (APM) is to integrate into the cloud-delivered services from F5.
If I could copy and paste objects instead of picking and configuring them from scratch each time, it would be great.
The ability to run the Anycast feature would be valuable, as the current solution only operates on-premises.
Compared to other competitors, they have the best pricing.
The pricing of ExtremeControl is considerable; I would rate it at eight or nine.
Below this number, we are not competitive with other vendors.
F5 products are more expensive than other solutions but are valued for their quality and reliability.
The biggest benefits for my customers from ExtremeControl include the ability to integrate third-party devices, integration with user databases like Microsoft Active Directory or other directory software, and it is easy to maintain by customers.
Integrating ExtremeControl with ExtremeConnect provides an additional layer of security and control over what devices are onboarding to the network, granting full visibility.
The most effective feature of ExtremeControl is that whenever any user is connected through the network, I can really dig down and check exactly what applications they have been using.
APM is quite flexible for customers to use, providing secure remote access through various host-checking conditions for both machines and users.
It provides robust security and offers integration with multi-factor authentication systems, which is crucial for an organization's security policy.
F5 BIG-IP Access Policy Manager (APM) provides excellent WAF and bot defense solutions.
| Product | Mindshare (%) |
|---|---|
| ExtremeControl | 2.5% |
| F5 BIG-IP Access Policy Manager (APM) | 1.9% |
| Other | 95.6% |
| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 3 |
| Large Enterprise | 3 |
| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 2 |
| Large Enterprise | 9 |
ExtremeControl delivers efficient end-user activity recognition and traffic monitoring, valued for its user-friendliness, flexibility, and strong third-party integration. It secures mobile environments reliably and consistently, aiding in detailed application monitoring and troubleshooting.
ExtremeControl provides seamless security integration, recognized for its capacity to seamlessly incorporate user databases and third-party devices, ensuring enhanced and reliable security. The comprehensive features, backed by straightforward documentation and implementation processes, support the detailed monitoring of application traffic, which assists in troubleshooting. It is not without areas for development, particularly in on-premises controllers that could benefit from more features and options. Additional control over network traffic and improved product integration, especially with certificate management and cloud analytics, are desirable enhancements.
What are the key features of ExtremeControl?ExtremeControl is commonly implemented in educational institutions and enterprises, managing user identities and network security, integrating Active Directory, and supporting BYOD policies. It enables custom device authentication, setting policies for internal network access and quarantining unauthorized devices. Organizations benefit from seamless third-party integration, supporting secure network environments.
F5 BIG-IP Access Policy Manager (APM) enhances access management by offering remote application access through SSL VPN, secure access verification, and login capabilities. Its user-friendly interface and robust security ensure efficient scalability and performance.
F5 BIG-IP APM serves enterprises by integrating multiple authentication protocols and supporting remote access via SSL VPN for secure application and network connections. Known for its strong performance and reliable scalability, APM allows custom policy management, facilitating load balancing and enhanced server management through virtual IP creation. It offers a secure bridge for users to connect to private networks while managing access through portals and enforcing compliance checks. Despite its efficient and user-friendly interface, APM has areas needing improvements such as updates for MacOS access, comprehensive reporting features, and simplifying the initial setup process. Better documentation and improved cloud integration are also areas for potential enhancement, alongside more efficient management and automation capabilities. Pricing and integration with other systems could be more competitive, and improvements in support response times would benefit users significantly.
What are the key features of F5 BIG-IP APM?In sectors like finance and healthcare, F5 BIG-IP APM ensures secure access management for sensitive data networks. Retailers utilize it to manage seasonal traffic efficiently with its load balancing and scalability, while educational institutions leverage its robust security and remote access features for faculty and students accessing campus networks remotely. These industries benefit from tailored policy management and comprehensive authentication integration to meet specific security and access needs.
We monitor all Network Access Control (NAC) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.