BeyondTrust Remote Support and F5 BIG-IP Access Policy Manager (APM) are two notable remote support and access management solutions. Users seem happier with the pricing and support of BeyondTrust Remote Support, while F5 BIG-IP APM is favored for its robust features, even if it comes at a higher price.
Features: BeyondTrust Remote Support is praised for its comprehensive set of remote support tools, including session management and secure access. F5 BIG-IP APM stands out for its extensive security features and policy management capabilities. Users value F5's superior security features more highly.
Room for Improvement: BeyondTrust Remote Support users suggest enhancements in reporting and analytics capabilities. F5 BIG-IP APM users indicate the need for a more intuitive configuration process and better integration with third-party tools. Both products have distinct but specific areas for potential improvement.
Ease of Deployment and Customer Service: BeyondTrust Remote Support is noted for its straightforward deployment and responsive customer support. F5 BIG-IP APM, while offering complex configuration options that may be challenging, provides robust customer service to assist users in overcoming these challenges. Despite the complexity, F5's customer service is effective in guiding users through deployment issues.
Pricing and ROI: BeyondTrust Remote Support users appreciate the reasonable setup costs and good return on investment. F5 BIG-IP APM involves higher initial expenses, but users believe the advanced security features justify the cost and provide long-term benefits. While BeyondTrust is seen as more cost-effective, F5 APM is perceived as offering greater overall value.
Microsoft Intune provides centralized management of mobile devices and applications, ensuring security, compliance, and productivity through integration with Microsoft services like Microsoft 365 and Azure Active Directory.
Organizations use Intune for managing mobile devices and applications, enhancing security and compliance across platforms. With features like single sign-on, conditional access, and zero-touch deployment via Autopilot, it facilitates efficient operations. Intune's scalability, easy enrollment, and capabilities such as remote wipe support diverse device management, offering robust data protection and efficient operation. Despite its features, improvement areas include reporting, compatibility with non-Microsoft devices, and better support for macOS and Linux devices.
What are the key features of Microsoft Intune?In industries such as finance, healthcare, and education, Microsoft Intune is implemented to ensure secure and compliant device management. Companies leverage its capabilities to deploy security policies and manage both corporate-owned and BYOD environments, facilitating a unified approach to data protection and compliance.
BeyondTrust Remote Support is software built to help organizations gain access to and support nearly any remote computer or mobile device with a single solution. BeyondTrust Remote Support works across Windows, Mac, and Linux and gives you access and control whether a device is on or off the network.
BeyondTrust Remote Support Features
BeyondTrust Remote Support has many valuable key features. Some of the most useful ones include:
BeyondTrust Remote Support Benefits
Some of the benefits of using BeyondTrust Remote Support include:
Reviews from Real Users
Below are some reviews and helpful feedback written by BeyondTrust Remote Support users.
A Cybersecurity Architect at a tech vendor says, “The most valuable features are the ease of deployment, performance, pre and post-sales support, the vast majority of the localization they have done and the solution provider that they support. You can't compete with TeamViewer or any other similar products. It's completely in a class of its own.”
An Enterprise Service Desk Systems Manager at a manufacturing company comments, "Screen sharing, in general, is pretty important for a service desk. Another thing that I have found to be very helpful is that you can also do screen sharing on a cell phone. When people have an issue with their cell phone, it is ordinarily very difficult to troubleshoot the issue. With BeyondTrust Remote Support, you can share the cell phone screen, and somebody can take a look at it remotely. I am not sure if other competing solutions offer this feature. It is pretty user-friendly. It is also good performance-wise."
PeerSpot user Mark B., Sr VP of Business Operations at Networking Technologies and Support, Inc., explains that he thinks the solution is “Great for delivering end-user support, good at recording sessions, and very stable.
F5 BIG-IP Access Policy Manager (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access.
BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.
BIG-IP APM Benefits:
BIG-IP APM Features:
Reviews from Real Users
Below are some reviews and helpful feedback written by BIG-IP APM users.
Mahmmoud Rabie, Senior Site Reliability Engineer, writes that BIG-IP APM is "A highly stable solution for load balancing, but the initial setup is complex."
Clyde Livingston, Senior Process Specialist at Telstra, says that BIG-IP APM is "Easy to use, useful access remotely, but lacking stability."
Chris Lam, Senior Solution Consultant at Macroview Telecom Limited, states that BIG-IP APM is "Useful for remote access VPN and VPI integration with VMware.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.