We performed a comparison between BeyondTrust Privileged Remote Access and F5 BIG-IP Access Policy Manager (APM) based on real PeerSpot user reviews.
Find out in this report how the two Remote Access solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."PRA stands on its own as a full solution. This is important because it reduces the need to maintain a lot of different services. Also, the integration between those services are sometimes not easy to maintain. So, having a solution like BeyondTrust Privileged Remote Access reducing our workload gives us enough time to work on our other issues. The system just runs and does what it is supposed to do."
"The visibility of the solution's Vault works as it is supposed to: out-of-the-box for domain accounts, endpoints, and local accounts associated with discovery jobs."
"It's a stable product. Based on the demos and interaction with it, it was stable."
"The security provided by PRA when it comes to access for remote and privileged users has been outstanding. It has met all of our objectives, everything from password rotation to securing and allowing us to clamp down access to the auditing and monitoring features."
"I like the enterprise credential manager. It's a connector that sits in PRA and tests the credentials for the end user with a process that will clean the password. This is one of PRA's primary features and simplifies user onboarding. There aren't many restrictions or complications. We can add the user while only opening one port, which is more than enough to access the PRA server. Every organization requires only four critical servers out of a hundred and some 50 production servers."
"This product is very stable and scalable. This is an excellent platform."
"The most valuable feature is that this solution can be implemented regardless of the operating system."
"The project goal was to allow staff to run applications with admin privileges without being admins, which was the product's most important feature."
"Stickiness is the most valuable feature of the product."
"Our customers have never complained about the stability"
"The tool is reliable and easy to configure."
"The load balancing features are valuable."
"The solution is stable and reliable."
"The portal access was very good."
"The performance of the solution is valuable."
"F5 BIG-IP APM is relatively easy to use."
"When doing protocol panel jumps, the tool does not restrict what is recorded on the user's computer."
"Some of the capabilities in the solution were not as available or not as outstanding as CyberArk. We had to manage whatever little was available for us, especially its recording capabilities, logs, and a number of things."
"The solution is very flexible, which is a plus, but I would say the implementation requires someone with knowledge and experience, as it can be easy to get lost in all the details. The implementation process could be streamlined and simplified. Though the complexity of the solution provides greater flexibility, it requires a lot of time to understand it fully."
"One of our gaps or pain points is having multi-factor authentication at the endpoint and using the PRA password injection from BeyondTrust, which does not work in our environment. We can only have MFA at the login of BeyondTrust to check out the password. Therefore, we can't meet our security requirements of having it on the endpoint."
"The price is pretty expensive."
"They could probably integrate a wizard or something like that to add a new use case. It could be something that makes it easier to add a new use case."
"In terms of the ability to automate the creation of new accounts within it, it's still a bit laborious."
"Changing your password should be simplified, and there should not be a charge for it."
"F5 BIG-IP Access Policy Manager has room for improvement in integration with other products."
"I'd suggest improved documentation integration directly within the GUI. Right now, finding comprehensive documentation often requires going to external websites like the community portal."
"Integrating identity providers and single sign-on solutions can simplify user authentication and access control."
"The operational deployment is not great."
"The initial setup was complex."
"F5 BIG-IP APM disconnects when you leave it for long enough, but that is natural for IT solutions to do. That's a little bit frustrating."
"The technical support’s response time must be improved."
"The price of this product can be improved."
More BeyondTrust Privileged Remote Access Pricing and Cost Advice →
More F5 BIG-IP Access Policy Manager (APM) Pricing and Cost Advice →
BeyondTrust Privileged Remote Access is ranked 6th in Remote Access with 21 reviews while F5 BIG-IP Access Policy Manager (APM) is ranked 10th in Remote Access with 13 reviews. BeyondTrust Privileged Remote Access is rated 8.6, while F5 BIG-IP Access Policy Manager (APM) is rated 8.2. The top reviewer of BeyondTrust Privileged Remote Access writes "Our support team can do so much more without having to actively engage our customers, which saves us time and money". On the other hand, the top reviewer of F5 BIG-IP Access Policy Manager (APM) writes " Facilitates packet inspection, modification, and offloading and offers visibility and troubleshooting capabilities, allowing for pre-production server testing". BeyondTrust Privileged Remote Access is most compared with CyberArk Privileged Access Manager, WALLIX Bastion, Citrix DaaS (formerly Citrix Virtual Apps and Desktops service), BeyondTrust Remote Support and Appgate SDP, whereas F5 BIG-IP Access Policy Manager (APM) is most compared with Citrix Gateway, CyberArk Privileged Access Manager, Cisco ISE (Identity Services Engine), Ivanti Connect Secure and Microsoft Remote Desktop Services. See our BeyondTrust Privileged Remote Access vs. F5 BIG-IP Access Policy Manager (APM) report.
See our list of best Remote Access vendors.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.