F5 BIG-IP Access Policy Manager (APM) and Fortinet FortiProxy compete in the network access control and security markets. Fortinet FortiProxy may have the upper hand due to its integration with security providers and granular access control, appealing to security-focused environments.
Features: F5 BIG-IP APM handles complex issues with features like SSL VPN, load balancing, and robust customization options. It integrates with numerous authentication vendors, offering reliable performance and configuration ease. Fortinet FortiProxy emphasizes performance and security integration, offering granular application control and DNS filtering. Its user-friendliness and detailed access control make it ideal for managing web access and optimizing bandwidth.
Room for Improvement: F5 BIG-IP APM should enhance cloud services, simplify initial setup, and refine pricing. Improvements in reporting and management aspects are needed. Fortinet FortiProxy should improve documentation, web filtering, and integration with AI/ML technologies. Addressing bugs and refining policy management would enhance usability, along with better web categorization accuracy and language support.
Ease of Deployment and Customer Service: F5 BIG-IP APM supports diverse deployment options, including on-premises and cloud, with technical support that can suffer slower response times. Fortinet FortiProxy is generally deployed in hybrid and on-premises setups, providing consistent and satisfactory customer support.
Pricing and ROI: F5 BIG-IP APM is seen as expensive but offers strong ROI due to simplified licensing setups. Fortinet FortiProxy is cost-effective and more affordable than many competitors, offering good value that appeals to cost-sensitive buyers. Its mid-range pricing maintains attractiveness in competitive markets.
iboss offers a comprehensive security platform designed for diverse use cases such as web filtering, data loss protection, corporate proxy services, and URL filtering.
iboss integrates advanced features to address dynamic security needs, leveraging its strength in SASE, ZTNA, AI initiatives, and cloud integration, while ensuring seamless operations for remote work. It excels in historical forensics, malware protection, and flexible cloud deployments. Users benefit from comprehensive traffic scanning, robust malware detection, and PaaS capabilities that reduce hardware management. An intuitive admin console ensures efficient management with content filtering and low false positives. SSL decryption enhances security, while DLP protects data in AI conversations. Deployment is rapid and scalable, allowing effortless integration with emerging technologies.
What features does iboss offer?
What benefits and ROI should users consider?
iboss finds significant application in sectors such as education, where web filtering for K-12 is crucial, and in corporate environments requiring robust proxy services and URL filtering for network security. Its adaptability is essential in scenarios demanding flexible, decentralized security frameworks, particularly for remote work setups.
F5 BIG-IP Access Policy Manager (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access.
BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.
BIG-IP APM Benefits:
BIG-IP APM Features:
Reviews from Real Users
Below are some reviews and helpful feedback written by BIG-IP APM users.
Mahmmoud Rabie, Senior Site Reliability Engineer, writes that BIG-IP APM is "A highly stable solution for load balancing, but the initial setup is complex."
Clyde Livingston, Senior Process Specialist at Telstra, says that BIG-IP APM is "Easy to use, useful access remotely, but lacking stability."
Chris Lam, Senior Solution Consultant at Macroview Telecom Limited, states that BIG-IP APM is "Useful for remote access VPN and VPI integration with VMware.
Fortinet FortiProxy is a secure web gateway that provides advanced web filtering, malware protection, and SSL inspection capabilities. It is designed to protect organizations from web-based threats and prevent data loss by enforcing granular policies for web access. FortiProxy is available as a physical or virtual appliance and can be deployed on-premises or in the cloud. FortiProxy uses a combination of signature-based and behavior-based detection techniques to identify and block known and unknown threats. It also includes advanced features such as sandboxing and machine learning to detect and prevent zero-day attacks. FortiProxy can inspect SSL traffic to detect and block threats hidden in encrypted traffic. FortiProxy provides granular control over web access by allowing administrators to create policies based on user identity, device type, time of day, and other factors. It also includes pre-defined categories for web filtering, such as social media, gambling, and adult content. FortiProxy can also enforce compliance with regulatory requirements such as GDPR and HIPAA. FortiProxy integrates with Fortinet's Security Fabric, allowing it to share threat intelligence with other Fortinet products and provide a coordinated response to threats. It also includes a web-based management console that provides real-time visibility into web traffic and allows administrators to quickly respond to security incidents.
Fortinet FortiProxy is a comprehensive web security solution that provides advanced protection against web-based threats and allows organizations to enforce granular policies for web access.
We monitor all Secure Web Gateways (SWG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.