Users expect easy access to the applications and data they need from any device and any location—whether those resources are in a data center, the cloud, SaaS-based, or a hybrid environment. Access isn't negotiable.
The challenge is, to keep applications and data safe, you need to know where users are connecting from, what device they’re using, and what they’re trying to connect to.
Access Manager contextually secures, simplifies, and protects user access to apps and data, while delivering the most scalable access gateway on the market.
Save time and money by combining your access infrastructure with Access Manager. Its scalability lets you consolidate your access gateways onto a single device or virtual edition, powered by a single policy engine.
Access Manager integrates with the enterprise mobility management (EMM) products you already use for enhanced security and ease of use.
Access Manager also has native VDI proxy support for Citrix, Microsoft, and VMware on both desktop and mobile devices. This reduces the complexity of your network design via infrastructure consolidation.
If your users have to create a password for every app they use, chances are they aren't going to create a unique password every time. That makes it easier for attackers to break into your apps and steal your company's data.
Access Manager lets you federate user identity and enables single sign-on (SSO), simultaneously enhancing and securing access. And that’s true wherever your apps are located—data center, cloud, or hybrid environment. Using the Security Assertion Markup Language (SAML) standard, Access Manager—serving as both a SAML identity provider (IdP) and service provider—allows user credentials to remain safe and secure in one place, while a trusted token is passed to applications when a user signs in.
Access Manager can also handle authentication to all your apps. It supports multiple authentication methods, including multi-factor authentication (MFA), so users sign in once and can securely access the apps they need to do their jobs—apps like Office or Office 365, Microsoft Exchange, SharePoint, Salesforce, and more—over all networks and from all devices.
F5’s access security solution, together with VMware Horizon View, gives users at Overlake Hospital unified global access to applications—and gives IT centralized control of policies.
Read the customer story
Access Manager includes the Visual Policy Editor (VPE), a graphical user interface that makes it easy to create, edit, and manage identity-aware, context-based policies—just click, pick, and move.
The VPE saves you time and hassle, as well as giving you a holistic view of your policies and how they're connected across your network. You won't find anything quite like it from any other access vendor.
F5 products, technologies, and solutions work together to make sure your applications are always protected and work the way they should. Extend the effectiveness of Access Manager by combining it with the following products.
Paired with Access Manager, lets you create and administer policies to manage web access, as well as spot and block web-borne threats.
Gives you the flexibility to deploy web application firewall (WAF) services close to apps, so they’re protected wherever they reside.
Helps you manage security policies and centralize reports and alerts across BIG-IP AFM and Advanced WAF.
The family of F5 devices and the VIPRION chassis are purpose-built, powerful hardware that F5 software runs on.
Learn more >
Virtual editions have the same features as those that run on F5 purpose-built hardware—and you can deploy them on any leading hypervisor or select cloud providers.
F5 application services work exactly the same way in the public and private cloud as they do in the data center.
Federates user identity, drives adaptive MFA, and supports SSO to applications on-premises, in the cloud, SaaS-based, and more. Access Manager minimizes the time users spend logging into applications that each require separate credentials.Federates user identity, drives adaptive MFA, and supports SSO to applications on-premises, in the cloud, SaaS-based, and more. Access Manager minimizes the time users spend logging into applications that each require separate credentials.
Unifies identity- and context-aware, differentiated, anytime/anywhere remote access via SSL VPN. Its secure, adaptive per-app VPN capabilities ensure focused application access from mobile devices based on provisioning, endpoint posture, and more via seamless integration with EMM applications already deployed in your network.
Enables secure access and authentication to web and web-based applications. Access Manager proxies web applications, providing authentication, authorization, and endpoint inspection. It enhances secure access to web-based applications via step-up authentication.
Enables simplified, seamless access to virtual apps through a single, consolidated gateway along with its native VDI support and a customizable, user-friendly webtop.Enables simplified, seamless access to virtual apps through a single, consolidated gateway along with its native VDI support and a customizable, user-friendly webtop.
Delivers web-based malware protection and comprehensive URL filtering through Secure Web Gateway Services, a subscription- and time-based add-on. It’s the only web gateway that provides security against both inbound and outbound threats.
Integrates with the access component of BIG-IQ Centralized Management, so you can centrally deploy policies, centralize graphical reports and dashboards, and compile logs for analysis.
The most scalable access gateway available, Access Manager supports up to 1,000,000 access sessions on a single device and up to 2,000,000 access sessions on a single VIPRION chassis.
F5's event-driven scripting language, iRules, gives you the flexibility to customize Access Manager, while iApps—highly-configurable, administrator-defined application services templates—helps speed deployment and streamline operations.
F5 partners with other leading security companies to foster an ecosystem that strengthens security, increases scale and availability, and lowers operational costs. Explore use cases, recommended deployment practices, and other details about our integrated solutions.
Get integration resources >
Recommended deployment practices for high-security SSO >
Recommended deployment practices for web access management >
Recommended deployment practices for web access management with multifactor authentication >
Deployment guide for secure access management >
Best practices guide for NSX for vSphere and F5 BIG-IP >