N-able Take Control and F5 BIG-IP Access Policy Manager (APM) are both strong contenders in remote support and access management. Users prefer the affordability and customer support of N-able Take Control, but the advanced features of F5 BIG-IP APM make it a more robust choice for many businesses.
Features: N-able Take Control is known for efficient remote access, session recording, and support for a wide range of devices. F5 BIG-IP APM offers comprehensive access control, multi-factor authentication, and detailed security policies.
Room for Improvement: Users recommend enhancing the scalability and integration capabilities of N-able Take Control. For F5 BIG-IP APM, the complexity in configuration and a steep learning curve are noted areas that need improvement.
Ease of Deployment and Customer Service: N-able Take Control is highlighted for its quick and simple deployment process along with responsive customer service. F5 BIG-IP APM, while more complicated to deploy due to its advanced configuration, also offers reliable customer service.
Pricing and ROI: N-able Take Control is often seen as cost-effective with favorable return on investment due to its lower setup cost. F5 BIG-IP APM has higher initial costs but is considered worth the investment by users due to its extensive features and long-term benefits.
Microsoft Intune provides centralized management of mobile devices and applications, ensuring security, compliance, and productivity through integration with Microsoft services like Microsoft 365 and Azure Active Directory.
Organizations use Intune for managing mobile devices and applications, enhancing security and compliance across platforms. With features like single sign-on, conditional access, and zero-touch deployment via Autopilot, it facilitates efficient operations. Intune's scalability, easy enrollment, and capabilities such as remote wipe support diverse device management, offering robust data protection and efficient operation. Despite its features, improvement areas include reporting, compatibility with non-Microsoft devices, and better support for macOS and Linux devices.
What are the key features of Microsoft Intune?
What benefits should users look for in reviews?
In industries such as finance, healthcare, and education, Microsoft Intune is implemented to ensure secure and compliant device management. Companies leverage its capabilities to deploy security policies and manage both corporate-owned and BYOD environments, facilitating a unified approach to data protection and compliance.
F5 BIG-IP Access Policy Manager (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access.
BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.
BIG-IP APM Benefits:
BIG-IP APM Features:
Reviews from Real Users
Below are some reviews and helpful feedback written by BIG-IP APM users.
Mahmmoud Rabie, Senior Site Reliability Engineer, writes that BIG-IP APM is "A highly stable solution for load balancing, but the initial setup is complex."
Clyde Livingston, Senior Process Specialist at Telstra, says that BIG-IP APM is "Easy to use, useful access remotely, but lacking stability."
Chris Lam, Senior Solution Consultant at Macroview Telecom Limited, states that BIG-IP APM is "Useful for remote access VPN and VPI integration with VMware.
Whether your clients are working from home, in the office, or on the go—they need you. N‑able™ Take Control is a powerful remote support solution with troubleshooting tools designed to help you resolve issues quickly and effectively.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.