


F5 BIG-IP Access Policy Manager (APM) and Rocket Exceed TurboX are leading solutions for secure remote access and application delivery. F5 BIG-IP APM holds the upper hand for its customizable access policies, while Rocket Exceed TurboX is preferred for its high-performance remote desktop capabilities.
Features: F5 BIG-IP APM stands out for its customizable access policies, comprehensive access controls, and integration capabilities. Rocket Exceed TurboX is highlighted for its high-performance remote desktop capabilities, advanced graphics rendering, and seamless remote desktop experience.
Room for Improvement: Users suggest that F5 BIG-IP APM could benefit from a more intuitive setup process, improved documentation, and ease of use improvements. Rocket Exceed TurboX users recommend enhancements in scalability, more flexible licensing options, and better adaptability to varying usage needs.
Ease of Deployment and Customer Service: F5 BIG-IP APM users report a steep learning curve but commend the robust customer support. Rocket Exceed TurboX users find the deployment straightforward and appreciate the responsive support team.
Pricing and ROI: F5 BIG-IP APM users feel that the high initial setup costs are justified by the feature set and ROI in the long run. Rocket Exceed TurboX users find the pricing competitive and appreciate the quick ROI due to enhanced productivity.
| Product | Mindshare (%) |
|---|---|
| Microsoft Intune | 9.2% |
| F5 BIG-IP Access Policy Manager (APM) | 1.4% |
| Rocket Exceed TurboX | 3.1% |
| Other | 86.3% |


| Company Size | Count |
|---|---|
| Small Business | 124 |
| Midsize Enterprise | 53 |
| Large Enterprise | 167 |
| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 1 |
| Large Enterprise | 9 |
Microsoft Intune is a cloud-based service designed for device management, security, and compliance. It supports automation and facilitates endpoint management for Windows, iOS, and Android devices, ensuring data protection and efficient policy enforcement.
Microsoft Intune offers seamless integration with tools like Windows Autopilot to automate device setup and deployment. Integrated with Azure Active Directory, it enhances policy management while providing robust reporting and analytics tools for compliance tracking. Despite its intuitive interface aimed at simplifying navigation and device security management, there are challenges such as compatibility issues with Linux and Mac, limited policy support for Android, and demands for better third-party integration. It's widely used for both corporate-owned devices and BYOD scenarios in dynamic IT environments.
What are the key features of Microsoft Intune?In industries such as finance and healthcare, Microsoft Intune is implemented to ensure data protection and compliance with regulatory standards. Manufacturing sectors utilize Intune for managing a distributed workforce across global locations, while educational institutions employ it to secure and manage devices in learning environments supporting both students and faculty.
F5 BIG-IP Access Policy Manager (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access.
BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.
BIG-IP APM Benefits:
BIG-IP APM Features:
Reviews from Real Users
Below are some reviews and helpful feedback written by BIG-IP APM users.
Mahmmoud Rabie, Senior Site Reliability Engineer, writes that BIG-IP APM is "A highly stable solution for load balancing, but the initial setup is complex."
Clyde Livingston, Senior Process Specialist at Telstra, says that BIG-IP APM is "Easy to use, useful access remotely, but lacking stability."
Chris Lam, Senior Solution Consultant at Macroview Telecom Limited, states that BIG-IP APM is "Useful for remote access VPN and VPI integration with VMware.
Rocket Exceed TurboX is secure virtual desktop software that enables modern hybrid work. Leveraging the Exceed TurboX hybrid cloud VDI (virtual desktop infrastructure), organizations can allow employees to work from anywhere and any device. Exceed TurboX includes support for demanding, high-performance graphical software used in engineering product design, semiconductor design and other graphic-intense fields.
Exceed TurboX features:
Fast desktop virtualization software - Uses
ThinX and Windows Direct protocols to offer reliable virtual access for
high performance and excellent user experiences, with fast and safe
protocols built directly into the remote access software.
Centralized virtual infrastructure administration - Offers a central web portal for IT staff to monitor and manage user access to applications and includes central license management and IT-definable thresholds for system status notifications.
Suspend-and-resume virtual sessions - Allows users to resume sessions on any computer, auto-adjusting to the new monitor resolution, whether reconnecting after connection interruptions or through a manual session suspension.
Pixel-perfect virtual session display - Displays graphically demanding virtual desktops, including support for UHD displays and multiple monitors as part of the powerful OpenText VDI solution.
Virtual GPU support - Supports NVIDIA vGPU, enabling a single graphics card to be split across up to 16 virtual machines for hardware-based rendering, H.264 compression and direct framebuffer access to open 3D applications faster.
Browser and native clients - Offers access through any device to virtual applications and desktops using the native clients for Windows, MacOS and Linux.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.