Reviews (1-3 of 3)
Score 9 out of 10
We use ISAM to secure inbound and outbound traffic (proxy/reverse proxy), across the entire organization. We have also started to use it to implement SSO. We further plan to implement the Advanced Access Control module.
Read this authenticated review
The ISAM appliances handle session management quite well, targeting multiple platforms and technologies (eg: Windows, *Nix, .Net, Java, etc). It integrates well with existing environments without significant (or sometimes no) code changes to existing applications. It also manages OATH and other SSO strategies effectively. It doesn't perform pure load balancing pool management as well as some other products.
February 20, 2019
Score 6 out of 10
We use IBM Security Identity and Access Manager to increase ease of access while upgrading the security on mobile, cloud, Internet-of-things, and web methodologies. We have experimented with using it with both virtual and hardware appliances, as well as deployed in-house. It allows us to utilize the strengths of risk-based analysis, password protection, and multi-factor authentication.
- IBM Security Identity and Access Manager integrate well with other IBM software products.
- It allowed us to have secure yet convenient access to resources via mobile devices.
- It allowed us to securely log in to Office365 without passwords.
- It was a bit overwhelming to implement and was neither obvious nor user-friendly.
- While the product is quite powerful, the documentation left something to be desired if one wants to fully appreciate its capabilities.
- The cost was almost prohibitive, but it was the only product we could find that addressed all the needs of our organization in one place.
Read this authenticated review
IBM Security Identity and Access Manager is well-suited for larger organizations who can take advantage of the powerful features without being overwhelmed by the initial investments of both time and resources. It is advantageous for any company that wants to provide secure protection of both internal and external (client) information. The added bonus of threat management mitigation was an unforeseen bonus.
March 02, 2018
Score 5 out of 10
We are using IBM Security Identity and Access Manager as part of the Identity Management solution stack for our external customers and internal websites. We utilize Security Access Manager as a reverse proxy to the backend application, and to secure certain parts of our site using junctions.
Read Wai Mun Leong's full review
IBM Security Identity and Access Manager is useful for managing large scale identity management. It integrates well with other IBM products if your company is using them. The cost is high when installing and maintaining the whole Identity Management stack which includes IBM Security Identity Manager, Security Access Manager, LDAP, DB2.
IBM Security Identity and Access Manager Scorecard Summary
Feature Scorecard Summary
About IBM Security Identity and Access Manager
IBM Security Identity and Access Manager is a configurable IAM platform for identity assurance, mobile-login, enterprise-grade security of data and threat prevention, password protection and single sign-on, directory with auditing and privileges, partner gateway, and more. The "Tivoli" brand name retained by IBM for some of its IAM offerings and editions (e.g. Tivoli Federated Identity Manager) originates from Tivoli Systems, Inc, a company acquired by IBM in 1996 to leverage that company's systems management capabilities. IBM has also acquired Lighthouse Security Group and CrossIdeas, two companies whose technologies were recognized for access management and security, to expand their offerings.
Categories: Identity Management
IBM Security Identity and Access Manager Technical Details