F5 BIG-IP Access Policy Manager

Sale price


Zero trust app access

Deploy zero-trust model validation based on granular context, securing every app access request.

Simple graphic representing Zero Trust App Access

  • Identity-Aware Proxy - Secure access to apps with a fine-grained approach to user authentication and authorization that enables only per-request context- and identity-aware access.
  • Single Sign-On (SSO) and Access Federation - Integrating with existing SSO and identity federation solutions, users can access all their business apps via a single login, regardless of if the app is SAML enabled or not.
  • OAuth 2.0 and OIDC Support - Enable social login to simplify access authorization from trusted third-party identity providers like Google, LinkedIn, Okta, Azure AD, and others.

Robust endpoint security

Perform device security and integrity checks and deliver per-app VPN access without user intervention.

Simple graphic representing Robust Endpoint Security

  • F5 Access Guard - A browser-based extension coordinates with APM to deliver continuous, ongoing device posture checks.
  • Step-up Authentication - Request additional forms of authentication—e.g., multi-factor authentication (MFA)—if the user’s device location or sensitive nature of app data warrant further analysis.
  • Mobile Device Management Integration - Integrate with leading MDM and enterprise mobility management (EMM) solutions, including VMware Horizon ONE (AirWatch), Microsoft Intune, and IBM MaaS360

Secure remote access

Gain end-to-end data encryption with highly customized authentication and access control to individual apps, networks, and resources.

Simple graphic representing Robust Endpoint Security

  • Per-App VPN - Enable granular control over corporate network access by ensuring data transmitted by managed apps travels only through a separate VPN tunnel.
  • Visual Policy Editor (VPE) - The advanced graphical interface makes designing and managing granular access control policies on an individual or group basis fast and simple.
  • Access Guided Configuration - Leverage a single and easy-to-use interface to onboard your legacy apps, as well as deploy Azure AD Conditional Access policies.

Hybrid app access

Integrating with IDaaS providers like Azure AD, you can centralize authentication to all your apps—cloud-native, SaaS apps and those on-prem.

Simple graphic representing Secure Remote Access

  • Identity-Aware Proxy - Secure access to apps with a fine-grained approach to user authentication and authorization. IAP enables only per-request context-and identity-aware access.
  • Azure AD Conditional Access Integration - Easily deploy Conditional Access policies leveraging BIG-IP APM’s Access Guided Configuration (AGC).
  • Integration with Third-Party Risk Assessment Engines - Leverage third-party UEBA and risk engines via REST APIs to inform policy-based access controls using the API Connector for more layered security

You may also like

Recently viewed