BeyondTrust Remote Support vs F5 BIG-IP Access Policy Manager (APM) comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between BeyondTrust Remote Support and F5 BIG-IP Access Policy Manager (APM) based on real PeerSpot user reviews.

Find out in this report how the two Remote Access solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed BeyondTrust Remote Support vs. F5 BIG-IP Access Policy Manager (APM) Report (Updated: May 2024).
771,212 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"You can't compete with TeamViewer or any other similar products. It's completely in a class of its own.""One of the largest values that we get from Bomgar Remote Support tool is the ability to assist our drivers with their mobile devices. We were unable to do this previously.""We like that it records the remote sessions. If a technician is logged into a user remotely to fix any problem, it records the decision.""The solution is stable.""I personally like the ability to share files with other machines.""We have the ability to securely assist users remotely with a stable product, which allows for reporting capabilities, SAML authentication, and ServiceNow integration.""This product "just works" (without fail) and is dead-easy for clients to connect with.""The most valuable feature of the solution concerns our company's main use case, which is for connection to our remote clients."

More BeyondTrust Remote Support Pros →

"The most valuable feature is the virtual IP creation. It's our most frequently used feature.""In my opinion, the GUI is perfect with the configuration options provided. F5 BIG-IP has given customization options and policy configuration tools in the GUI. It's good and good enough to work.""The load balancing features are valuable.""The performance of the solution is valuable.""Our customers have never complained about the stability""The product allows us to create customized portals for your users.""The tool is reliable and easy to configure.""This is a product that is easy to install and integrate, and it is simple to use."

More F5 BIG-IP Access Policy Manager (APM) Pros →

Cons
"It lacks voice integration like the other products because they need the compression to support that large amount of concurrent sessions. We've had to sacrifice voice.""It is expensive. Its initial setup was also a little bit involved, but it was nothing that we couldn't eventually handle. Currently, it has the ability to share screens. Somebody having an issue with their phone can share their screen with a technician sitting at a computer. It would be nice to also be able to control phones remotely, but this could be a limitation of a phone's operating system.""In the next release, I would like remote access to Chrome included.""They need to ensure that the remote support is compatible with the other cloud solution providers, like Huawei. Currently it is only compatible with Azure, AWS and KVM.""Technical support for this region can be improved.""I would like more insight into completed sessions. This would be nice, such as a historical log into the technician client application.""I would also like to see better support of Apple devices while using a Windows remote support console.""Although the learning curve is steep, the product is well-documented.​"

More BeyondTrust Remote Support Cons →

"We do not have knowledgeable support teams locally.""The operational deployment is not great.""The technical support’s response time must be improved.""I'd suggest improved documentation integration directly within the GUI. Right now, finding comprehensive documentation often requires going to external websites like the community portal.""The solution’s GUI looks very old.""Integrating identity providers and single sign-on solutions can simplify user authentication and access control.""F5 BIG-IP Access Policy Manager has room for improvement in integration with other products.""Cloud services are something that F5 Access Policy Manager could do better"

More F5 BIG-IP Access Policy Manager (APM) Cons →

Pricing and Cost Advice
  • "This product provides value for money."
  • "​The product maintenance and licensing costs are on the higher end, so I would carefully review how many licenses you need. The concurrent license model is helpful in this manner.​"
  • "Pricing is reasonable for what the service is offering. If it is looked at from a purely remote control perspective then it might appear expensive, but it is the wider functionality that should be considered too."
  • "Bomgar has a very fair pricing structure."
  • "Although the upfront cost is a bit overwhelming, the appliance will pay for itself in less than two years."
  • "The setup is complex. Purchase the remote implementation service and make them slow down and work with you."
  • "I would like to order more licenses. This would allow us to support more end users concurrently."
  • "I highly recommend using the tech team properly trained by Bomgar. This will help the tool be more useful."
  • More BeyondTrust Remote Support Pricing and Cost Advice →

  • "Recently, they have simplified the licensing"
  • "The product is very expensive."
  • "The tool is a little bit expensive."
  • More F5 BIG-IP Access Policy Manager (APM) Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Remote Access solutions are best for your needs.
    771,212 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable feature of the solution concerns our company's main use case, which is for connection to our remote clients.
    Top Answer:The local partners for BeyondTrust Remote Support are not enough in numbers. There are not enough product partners in Turkey, making it difficult for me to get assistance. The aforementioned area can… more »
    Top Answer:I can recommend the product, but it is important to note that it is expensive. Though I am not a very good expert with BeyondTrust Remote Support, I think one can get and use another product very… more »
    Top Answer:In my opinion, the GUI is perfect with the configuration options provided. F5 BIG-IP has given customization options and policy configuration tools in the GUI. It's good and good enough to work.
    Top Answer:The tool is a little bit expensive. I rate the pricing a six out of ten.
    Top Answer:I'd suggest improved documentation integration directly within the GUI. Right now, finding comprehensive documentation often requires going to external websites like the community portal. In the APM… more »
    Ranking
    7th
    out of 59 in Remote Access
    Views
    3,039
    Comparisons
    1,737
    Reviews
    6
    Average Words per Review
    554
    Rating
    8.5
    10th
    out of 59 in Remote Access
    Views
    1,053
    Comparisons
    884
    Reviews
    10
    Average Words per Review
    372
    Rating
    8.1
    Comparisons
    Also Known As
    Bomgar Remote Support
    F5 Access Policy Manager
    Learn More
    Overview

    BeyondTrust Remote Support is software built to help organizations gain access to and support nearly any remote computer or mobile device with a single solution. BeyondTrust Remote Support works across Windows, Mac, and Linux and gives you access and control whether a device is on or off the network.

    BeyondTrust Remote Support Features

    BeyondTrust Remote Support has many valuable key features. Some of the most useful ones include:

    • Remote access and control: IT administrators have the ability to resolve issues at light speed, improving productivity and also end-user satisfaction.
    • Efficiency and scale: With BeyondTrust Remote Support, you can manage unattended access to any system and you can also create mass installer packages.
    • Compliance: BeyondTrust Remote Support allows you to automatically monitor activity in real time, record all session activity, and produce a detailed audit log without interfering with service desk processes.
    • Team and permissions administration: By using BeyondTrust Remote Support, you can Implement security across your service desk with granular role and permissions settings.
    • Native 2FA: BeyondTrust Verify is a TOTP native 2FA capability. It can be enabled for any user and verifies the identity of users before a BeyondTrust Remote Support session is actually launched.
    • Credential injection: If users integrate with the BeyondTrust Vault or BeyondTrust Password Safe, they can directly inject credentials into systems and end servers with just one click.

    BeyondTrust Remote Support Benefits

    Some of the benefits of using BeyondTrust Remote Support include:

    • Security and privacy: BeyondTrust Remote Support gives support teams quick access to desktops and IT systems without revealing their credentials and passwords. In addition, integrating BeyondTrust Privileged Access complements and controls access to privileged user accounts to protect mission-critical IT systems.
    • Mobile support: BeyondTrust Remote Support allows IT teams to provide instant remote support to mobile device users. The solution also supports Android smartphones and tablets as well as iOS devices (iPhone, iPad, iPod Touch).
    • ServiceNow integration: BeyondTrust Remote Support offers integrated remote support and secure chat.
    • Support across multiple systems and devices: The BeyondTrust Remote Support solution can help your organization achieve reliable remote support for end users and customers using Windows, Mac, Android, iOS, or any other operating system.

    Reviews from Real Users

    Below are some reviews and helpful feedback written by BeyondTrust Remote Support users.

    A Cybersecurity Architect at a tech vendor says, “The most valuable features are the ease of deployment, performance, pre and post-sales support, the vast majority of the localization they have done and the solution provider that they support. You can't compete with TeamViewer or any other similar products. It's completely in a class of its own.”

    An Enterprise Service Desk Systems Manager at a manufacturing company comments, "Screen sharing, in general, is pretty important for a service desk. Another thing that I have found to be very helpful is that you can also do screen sharing on a cell phone. When people have an issue with their cell phone, it is ordinarily very difficult to troubleshoot the issue. With BeyondTrust Remote Support, you can share the cell phone screen, and somebody can take a look at it remotely. I am not sure if other competing solutions offer this feature. It is pretty user-friendly. It is also good performance-wise."

    PeerSpot user Mark B., Sr VP of Business Operations at Networking Technologies and Support, Inc., explains that he thinks the solution is “Great for delivering end-user support, good at recording sessions, and very stable.


    F5 BIG-IP Access Policy Manager (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access. 

    BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.

    BIG-IP APM Benefits:

    • Ease of use
    • Flexibility
    • Ability to integrate with other systems
    • Security features
    • Granular access control
    • Responsive and helpful support team

    BIG-IP APM Features:

    • Support for Identity Aware Proxy (IAP) enabling Zero Trust application access
    • Context-based authorization with dynamic L4/L7 ACLs
    • Integration with third-party MFA solutions
    • DTLS 2.0 mode for delivering and securing applications
    • SAML 2.0 identity federation support
    • Support for OAuth 2.0 authorization protocol
    • SSO support for classic authentication (Kerberos, header- based, etc.), credential caching, OAuth 2.0, SAML 2.0, and FIDO2 (U2F)
    • AAA server authentication and high-availability
    • Integration with leading IAM vendor products (Microsoft, Okta, Ping Identity)
    • BIG IP Edge Client and F5 Access integrate with VMware Horizon ONE (AirWatch), Microsoft Intune and IBM MaaS360
    • Risk-based access leveraging third-party UEBA and risk engines (HTTP Connector)

    Reviews from Real Users

    Below are some reviews and helpful feedback written by BIG-IP APM users.

    Mahmmoud Rabie, Senior Site Reliability Engineer, writes that BIG-IP APM is "A highly stable solution for load balancing, but the initial setup is complex."

    Clyde LivingstonSenior Process Specialist at Telstra, says that BIG-IP APM is "Easy to use, useful access remotely, but lacking stability."

    Chris LamSenior Solution Consultant at Macroview Telecom Limited, states that BIG-IP APM is "Useful for remote access VPN and VPI integration with VMware.

    Sample Customers
    InterContinental Hotels Group, Williams-Sonoma Inc., eBay, Carbonite, Computer Sciences Corporation
    City Bank, Ricacorp Properties, Miele, American Systems, Bangladesh Post Office
    Top Industries
    REVIEWERS
    Manufacturing Company16%
    Financial Services Firm12%
    University12%
    Consumer Goods Company12%
    VISITORS READING REVIEWS
    Computer Software Company16%
    Government10%
    Financial Services Firm10%
    Manufacturing Company6%
    REVIEWERS
    Comms Service Provider27%
    Media Company18%
    Computer Software Company18%
    Financial Services Firm18%
    VISITORS READING REVIEWS
    Financial Services Firm12%
    Computer Software Company11%
    Government11%
    Manufacturing Company8%
    Company Size
    REVIEWERS
    Small Business37%
    Midsize Enterprise22%
    Large Enterprise41%
    VISITORS READING REVIEWS
    Small Business19%
    Midsize Enterprise13%
    Large Enterprise68%
    REVIEWERS
    Small Business50%
    Large Enterprise50%
    VISITORS READING REVIEWS
    Small Business17%
    Midsize Enterprise14%
    Large Enterprise69%
    Buyer's Guide
    BeyondTrust Remote Support vs. F5 BIG-IP Access Policy Manager (APM)
    May 2024
    Find out what your peers are saying about BeyondTrust Remote Support vs. F5 BIG-IP Access Policy Manager (APM) and other solutions. Updated: May 2024.
    771,212 professionals have used our research since 2012.

    BeyondTrust Remote Support is ranked 7th in Remote Access with 32 reviews while F5 BIG-IP Access Policy Manager (APM) is ranked 10th in Remote Access with 13 reviews. BeyondTrust Remote Support is rated 9.0, while F5 BIG-IP Access Policy Manager (APM) is rated 8.2. The top reviewer of BeyondTrust Remote Support writes "A robust, secure, and complete solution for quickly providing support and monitoring what's going on". On the other hand, the top reviewer of F5 BIG-IP Access Policy Manager (APM) writes " Facilitates packet inspection, modification, and offloading and offers visibility and troubleshooting capabilities, allowing for pre-production server testing". BeyondTrust Remote Support is most compared with Microsoft Remote Desktop Services, TeamViewer, BeyondTrust Privileged Remote Access, LogMeIn Pro and TeamViewer Tensor, whereas F5 BIG-IP Access Policy Manager (APM) is most compared with Citrix Gateway, CyberArk Privileged Access Manager, Cisco ISE (Identity Services Engine), Ivanti Connect Secure and Fortinet FortiNAC. See our BeyondTrust Remote Support vs. F5 BIG-IP Access Policy Manager (APM) report.

    See our list of best Remote Access vendors.

    We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.