BeyondTrust Privileged Remote Access and F5 BIG-IP Access Policy Manager (APM) are significant players in the remote access and policy management market. BeyondTrust, noted for its cost-effectiveness and robust support system, seems to have the upper hand in ease of deployment and customer service, whereas F5 BIG-IP APM stands out with its feature richness and advanced access control.
Features: BeyondTrust is valued for its secure remote access capabilities, integration flexibility, and comprehensive auditing features. F5 BIG-IP APM is praised for its advanced access control, powerful policy management, and ability to handle complex network environments.
Room for Improvement: BeyondTrust could enhance its session recording, reporting features, and scalability. F5 BIG-IP APM needs improvement in setup complexity, interface updating, and simplifying the configuration process.
Ease of Deployment and Customer Service: BeyondTrust is praised for its straightforward deployment and exceptional customer support. F5 BIG-IP APM is considered more complex to deploy, and its customer service is less accessible compared to BeyondTrust.
Pricing and ROI: BeyondTrust is seen as more affordable with quicker ROI due to lower setup costs, offering a competitive pricing model. F5 BIG-IP APM has higher initial setup costs; however, its extensive features justify the investment for many users.
When a support ticket is submitted, it directly reaches someone with Intune support expertise.
We don't rely on Microsoft for support because, as their top partner, our team possesses extensive Microsoft expertise.
Given our premium support, expert-level service from Microsoft could be enhanced.
There are communication issues, so you might start working with a feature without knowing if it will be deprecated six months from now.
Workspace ONE operates in real-time, whereas Intune has a noticeable delay when deploying policies or apps.
It would be better to manage Mac, Android, and other non-Microsoft operating system devices within the same Intune interface.
The scalability of Microsoft Intune is ten out of ten.
Ideally, we want to automatically segregate devices based on user properties like primary use, but currently, dynamic groups seem limited to device properties.
It supports organizations with 200 endpoints and those with more than 15,000 endpoints.
Microsoft Intune's pricing is competitive with non-Microsoft technology, and the price is good compared to other market competitors.
We did not incur additional setup costs for Intune, as it was already included in our E5 license.
We have a limited budget for security investments, so Microsoft should consider reducing pricing in our region.
Microsoft Intune has been very stable.
We've encountered problems with other services like Exchange, Intune has remained unaffected.
If Intune is not available, the 365 environment might not be available, causing a major ordeal.
Dynamic groups allow us to set conditions for automatic membership, eliminating the need for user intervention or manual review and ensuring a seamless workflow.
Windows Autopatch is the most valuable because it removes the burden of patch management.
Intune has improved our asset management from a security standpoint and has consolidated vendors, enhancing our security posture.
Microsoft Intune is a comprehensive cloud-based service that allows you to remotely manage mobile devices and mobile applications without worrying about the security of your organization’s data. Device and app management can be used on company-owned devices as well as personal devices.
In an increasingly mobile workforce, Microsoft Intune keeps your sensitive data safe while on the move. Microsoft Intune makes it possible for your team members to work anywhere using their mobile devices. Microsoft Intune provides both the flexibility and the control needed for securing all your data on the cloud, no matter where the device with the data is located.
Microsoft Intune Device Management Key Features
With Microsoft Intune Device Management you can:
Mobile Application Management
Mobile application management in Intune is designed to protect your organization’s data at the application level.
With Microsoft Intune Application Management you can:
As part of Microsoft's Enterprise Mobility + Security (EMS) suite, Intune integrates with Microsoft Entra ID for access control and with Azure Information Protection for data protection. It also integrates with Microsoft 365 Applications.
Reviews from Real Users
Microsoft Intune stands out among its competitors for a number of reasons. Two major ones are its ability to secure all devices under its management and the flexibility that the solution offers its users.
A computing services manager notes, "Its security is most valuable. It gives us a way to secure devices, not only those that are steady. We do have a few tablets and other devices, and it is a way for us to secure these devices and manage them. We know they're out there and what's their status. We can manage their life cycle and verify that they're updated properly."
The head of IT engineering at a financial services company writes, "The one feature we find most useful is the Mobile Application Manager. There are two types: we have the complete MDM and the Mobile Application Manager (MAM). We don't give our users phones, it is their own personal phone, and we need to allow them to have access to the company details on their phone. We need to create a balance between their own personal data and the company data. We deploy the Mobile Application Manager for them so that we won't be able to interfere with their own personal data."
BeyondTrust Privileged Remote Access (formerly Bomgar Privileged Access) lets you secure, manage, and audit vendor and internal remote privileged access without a VPN.
Privileged Remote Access provides visibility and control over third-party vendor access, as well as internal remote access, enabling your organization to extend access to important assets, but without compromising security.
Features include:
- Privileged Access Control: Enforce least privilege by giving users the right level of access.
- Monitor Sessions: Control and monitor sessions using standard protocols for RDP, VNC, HTTP/S, and SSH connections.
- Reduce the Attack Surface: Reduce attacks by consolidating the tracking, approval, and auditing of privileged accounts in one place and by creating a single access pathway.
- Integrate with Password Management: Inject credentials directly into servers and systems with just one click, so users never need to know or see plain text credentials.
- Mobile & Web Consoles: Use mobile apps or web-based consoles anytime, anywhere.
- Audit & Compliance: Create audit trails, session forensics, and other reporting features by capturing detailed session data in real-time or post- session review, and provide attestation reports to prove compliance.
F5 BIG-IP Access Policy Manager (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access.
BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.
BIG-IP APM Benefits:
BIG-IP APM Features:
Reviews from Real Users
Below are some reviews and helpful feedback written by BIG-IP APM users.
Mahmmoud Rabie, Senior Site Reliability Engineer, writes that BIG-IP APM is "A highly stable solution for load balancing, but the initial setup is complex."
Clyde Livingston, Senior Process Specialist at Telstra, says that BIG-IP APM is "Easy to use, useful access remotely, but lacking stability."
Chris Lam, Senior Solution Consultant at Macroview Telecom Limited, states that BIG-IP APM is "Useful for remote access VPN and VPI integration with VMware.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.