Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs F5 BIG-IP Access Policy Manager (APM) comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024
 

Categories and Ranking

CyberArk Identity
Ranking in Access Management
9th
Average Rating
8.2
Number of Reviews
19
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (13th), Authorization Software (4th), Enterprise Password Managers (9th), User Entity Behavior Analytics (UEBA) (9th), Active Directory Management (11th), Cloud Resource Access Management (2nd), Customer Identity and Access Management (CIAM) (5th)
F5 BIG-IP Access Policy Man...
Ranking in Access Management
10th
Average Rating
8.2
Number of Reviews
14
Ranking in other categories
Secure Web Gateways (SWG) (20th), Network Access Control (NAC) (7th), SSL VPN (5th), Remote Access (13th)
 

Mindshare comparison

As of November 2024, in the Access Management category, the mindshare of CyberArk Identity is 2.7%, up from 1.7% compared to the previous year. The mindshare of F5 BIG-IP Access Policy Manager (APM) is 3.2%, down from 3.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Access Management
 

Featured Reviews

Avinash Gopu. - PeerSpot reviewer
Feb 29, 2024
Allows Linux and Unix administrators to login with single password
The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring. It is integrated with tools like Splunk and Dynatrace for the analysis of risk behavior and user activity. The pushing teams receive automated reports to assess factors such as login times and server activity in the last 60 days. The licensing for IAM and PAM tools is based on headcount and usage. Users who are not actively utilizing the resources may have their access revoked. This approach helps manage budgeting and reduces the risk impact on the organization by implementing protocols to mitigate threats.
Ashish Kumar Rai - PeerSpot reviewer
Mar 18, 2024
Offers remote access control, good GUI and easy to configure
The use case depends entirely on the client's specific requirements. We configure the APM accordingly. For instance, in some scenarios, we've used F5 for VPN purposes. In others, we've deployed F5 BIG-IP primarily as a load balancer. The choice depends on the enterprise's needs. They might want…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"CyberArk Identity is a mature product."
"The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients."
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"The user identification is simplified, and managing user privileges, whether adding or revoking them, is also quite straightforward when utilizing CyberArk SaaS."
"If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity."
"The most valuable feature of CyberArk Identity is the adaptive interface."
"The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security."
"The tool is a very strong and valuable enterprise solution, particularly in ensuring the continuity of service."
"The load balancing features are valuable."
"Stickiness is the most valuable feature of the product."
"We have seen a return on investment from F5 BIG-IP Access Policy Manager. It provided access at a time when we didn't have it."
"Our customers have never complained about the stability"
"Our organization is small - a college with about 3,500 students. We use F5 BIG-IP Access Policy Manager to protect our site, especially from the Iranian attacks we faced last year. We restrict access to only inside the country."
"The tool is reliable and easy to configure."
"This is a product that is easy to install and integrate, and it is simple to use."
"The portal access was very good."
 

Cons

"In terms of a governance platform, it's worth noting that CyberArk doesn't offer a particularly strong one."
"I'm not sure what needs improvement. It is a good platform."
"They can include the Mobile Device Management (MDM) feature."
"The tool has issues with the third-party SMS gateway. The solution has its own SMS gateway. Integration support is a challenge when we don’t use their SMS gateway. The tool also needs to improve its scalability."
"The OpenID features could improve in CyberArk Identity."
"At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster."
"They could improve their UI and make everything more user-friendly."
"In terms of general user feedback, the more security you put in front of a user, the more they complain. So usability and the user experience are always a challenge. So there's always room for improvement."
"The solution is quite costly."
"Regarding price, I'm not directly involved in purchasing, but our CIO thinks the product is very expensive. He's considering moving from the tool to Citrix NetScaler WAF because it's cheaper, and we already have Citrix for VDI. We got NetScaler almost free as part of our VDI deal. Three years ago, I convinced him to use the solution because it's better, but now, with budget constraints, he may want to switch."
"I'd suggest improved documentation integration directly within the GUI. Right now, finding comprehensive documentation often requires going to external websites like the community portal."
"We do not have knowledgeable support teams locally."
"F5 BIG-IP APM disconnects when you leave it for long enough, but that is natural for IT solutions to do. That's a little bit frustrating."
"Integrating identity providers and single sign-on solutions can simplify user authentication and access control."
"F5 BIG-IP Access Policy Manager has room for improvement in integration with other products."
"The initial setup was complex."
 

Pricing and Cost Advice

"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
"CyberArk Identity is an expensive solution."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"The pricing of CyberArk Identity is competitive."
"There is an initial license and then there is a subscription needed."
"The solution is cheap and I rate its pricing an eight out of ten."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"The tool is a little bit expensive."
"I rate the tool's pricing an eight out of ten."
"The product is very expensive."
"Recently, they have simplified the licensing"
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
815,854 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
11%
Insurance Company
7%
Financial Services Firm
14%
Computer Software Company
11%
Manufacturing Company
10%
Government
10%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap.
What needs improvement with CyberArk Identity?
At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster.
What do you like most about F5 BIG-IP Access Policy Manager (APM)?
In my opinion, the GUI is perfect with the configuration options provided. F5 BIG-IP has given customization options and policy configuration tools in the GUI. It's good and good enough to work.
What needs improvement with F5 BIG-IP Access Policy Manager (APM)?
Regarding price, I'm not directly involved in purchasing, but our CIO thinks the product is very expensive. He's considering moving from the tool to Citrix NetScaler WAF because it's cheaper, and w...
 

Also Known As

Idaptive
F5 Access Policy Manager
 

Learn More

 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
City Bank, Ricacorp Properties, Miele, American Systems, Bangladesh Post Office
Find out what your peers are saying about CyberArk Identity vs. F5 BIG-IP Access Policy Manager (APM) and other solutions. Updated: October 2024.
815,854 professionals have used our research since 2012.