What users are saying about
7 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener noreferrer'>trScore algorithm: Learn more.</a>Score 8.1 out of 100
Based on 7 reviews and ratings
9 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener noreferrer'>trScore algorithm: Learn more.</a>Score 8.7 out of 100
Based on 9 reviews and ratings
Likelihood to Recommend
IBM Security Verify Access, formerly IBM Security Access Manager (ISAM)
IBM Security Identity and Access Manager is well-suited for larger organizations who can take advantage of the powerful features without being overwhelmed by the initial investments of both time and resources. It is advantageous for any company that wants to provide secure protection of both internal and external (client) information. The added bonus of threat management mitigation was an unforeseen bonus.

Verified User
Consultant in Information Technology
Information Technology and Services Company, 51-200 employeesPing Identity Platform
Really like [this] solution, it fits our requirements 100%. There are unlimited possibilities to extend the product, either by creating additional adapters or selectors. We really like the policy management level in PingFederate. It's extremely helpful when we can specify customer journey per many different requirements like user location, application type etc. As well, both StepUp and TopDown authentication flows were implemented [easily].

Verified User
Professional in Information Technology
Banking Company, 201-500 employeesFeature Rating Comparison
Identity Management
IBM Security Verify Access, formerly IBM Security Access Manager (ISAM)
7.3
Ping Identity Platform
8.1
ID-Management Access Control
IBM Security Verify Access, formerly IBM Security Access Manager (ISAM)
7.2
Ping Identity Platform
7.7
ID Management Single-Sign On (SSO)
IBM Security Verify Access, formerly IBM Security Access Manager (ISAM)
9.5
Ping Identity Platform
9.0
Multi-Factor Authentication
IBM Security Verify Access, formerly IBM Security Access Manager (ISAM)
8.0
Ping Identity Platform
8.6
Password Management
IBM Security Verify Access, formerly IBM Security Access Manager (ISAM)
7.0
Ping Identity Platform
7.9
Account Provisioning and De-provisioning
IBM Security Verify Access, formerly IBM Security Access Manager (ISAM)
6.0
Ping Identity Platform
7.8
ID Management Workflow Automation
IBM Security Verify Access, formerly IBM Security Access Manager (ISAM)
6.0
Ping Identity Platform
8.1
ID Risk Management
IBM Security Verify Access, formerly IBM Security Access Manager (ISAM)
7.5
Ping Identity Platform
7.5
Pros
IBM Security Verify Access, formerly IBM Security Access Manager (ISAM)
- Reverse Proxy
- SSO
- Load Balancing

Verified User
Team Lead in Information Technology
Financial Services Company, 1001-5000 employeesPing Identity Platform
- Based on open standards, we can use as much or as little of the Ping suite as we like, depending on which other technologies we've already implemented.
- Continuous innovation and product enhancements have ensured their products continue to meet our rapidly evolving needs.
- Ping Identity has been an outstanding partner, starting with the RFP process and continuing to this day, years after the sale. They are focused on our success at every level of the company and are highly responsive to our needs, issues, and product suggestions.

Verified User
Director in Information Technology
Pharmaceuticals Company, 10,001+ employeesCons
IBM Security Verify Access, formerly IBM Security Access Manager (ISAM)
- Not particularly user friendly
- Performance is not good for administration
Senior Web & Application Support Engineer
ResMedHealth, Wellness and Fitness, 5001-10,000 employees
Ping Identity Platform
- PingID has some limitations when used as the MFA for some LDAP implementations. You need to use it as a RADIUS password credential validator to solve for some of those limitations, which in turn causes challenges with our ephemeral cloud deployment model of PingFederate.
- The basic logon services within PingFederate are adequate and well-documented, but simple features like disabling user input after entering credentials would help with some of the additional customization required to support real world failure modes.
- PingCentral authorization models and configuration remain unpolished compared to other products, and now the features seem to be shifting toward onboarding PingAccess and PingDirectory over improving baseline administrative functionality/operations.

Verified User
Director in Engineering
Information Technology & Services Company, 10,001+ employeesUsability
IBM Security Verify Access, formerly IBM Security Access Manager (ISAM)
No score
No answers yet
No answers on this topic
Ping Identity Platform
Ping Identity Platform 9.0
Based on 1 answer
Easy to use; all UI's are user friendly and easy to learn.[The] possibility to use API is [a] big value as well. We really like integration with CyberArk; with it we can manage privileged accounts according to company standards without breaking any rules, and we can be 100% sure that only approved persons will have administrative access.

Verified User
Professional in Information Technology
Banking Company, 201-500 employeesSupport Rating
IBM Security Verify Access, formerly IBM Security Access Manager (ISAM)
No score
No answers yet
No answers on this topic
Ping Identity Platform
Ping Identity Platform 8.4
Based on 4 answers
The Ping Identity Platform is very easy to use. It is highly secured and reliable. The customer support is superb as well. I would highly recommend it.
Director
Tekvista, IncComputer Software, 11-50 employees
Alternatives Considered
IBM Security Verify Access, formerly IBM Security Access Manager (ISAM)
We evaluated Oracle Identity Manager and were ready to move ahead with the purchase plan, but then found that IBM addressed the needs of our company in a more robust fashion. The price was significantly higher, yet in the grand scheme of things, the safety of both our data and the data of our clients was the most important criteria.

Verified User
Consultant in Information Technology
Information Technology and Services Company, 51-200 employeesPing Identity Platform
All contenders were capable, but we had scale concerns with NetIQ's architecture. In the end, what set Ping apart from the others was their level of engagement in understanding our use cases up front during the RFP stage and how they were focused on what we needed more than what they could sell to us. Additionally, they came in at a better price than the competition, which earned them first crack at a POC, making it their deal to lose; and of course they hit it out of the park.

Verified User
Director in Information Technology
Pharmaceuticals Company, 10,001+ employeesReturn on Investment
IBM Security Verify Access, formerly IBM Security Access Manager (ISAM)
- By reducing effort needed to code encryption and session management within the application, it has returned significant ROI

Verified User
Team Lead in Information Technology
Financial Services Company, 1001-5000 employeesPing Identity Platform
- Avoid information theft by ensuring the user truly has legit access to it.
Global Account Manager
CiscoInterconexión en red, 10,001+ employees
Pricing Details
IBM Security Verify Access, formerly IBM Security Access Manager (ISAM)
General
Free Trial
—Free/Freemium Version
—Premium Consulting/Integration Services
—Entry-level set up fee?
No
Ping Identity Platform
General
Free Trial
—Free/Freemium Version
—Premium Consulting/Integration Services
—Entry-level set up fee?
No