TrustRadius
IBM Security Identity and Access Manager is a configurable IAM platform for identity assurance, mobile-login, enterprise-grade security of data and threat prevention, password protection and single sign-on, directory with auditing and privileges, partner gateway, and more. The "Tivoli" brand name retained by IBM for some of its IAM offerings and editions (e.g. Tivoli Federated Identity Manager) originates from Tivoli Systems, Inc, a company acquired by IBM in 1996 to leverage that company's systems management capabilities. IBM has also acquired Lighthouse Security Group and CrossIdeas, two companies whose technologies were recognized for access management and security, to expand their offerings.ISAM Appliances are a great Infrastructure InvestmentWe use ISAM to secure inbound and outbound traffic (proxy/reverse proxy), across the entire organization. We have also started to use it to implement SSO. We further plan to implement the Advanced Access Control module.,Reverse Proxy SSO Load Balancing,True load balancing (such as that done with F5's appliances) Better Command Line Access - it only allows a single admin user via ssh,9,By reducing effort needed to code encryption and session management within the application, it has returned significant ROI,F5 DNS Load Balancer Cloud Service and Microsoft Azure,WebSphere Application Server, WebSphere Portal, Octopus Deploy, Ansible, OpenShift, IBM AIX, Windows ServerGo with a Trusted Leader... IBMWe use IBM Security Identity and Access Manager to increase ease of access while upgrading the security on mobile, cloud, Internet-of-things, and web methodologies. We have experimented with using it with both virtual and hardware appliances, as well as deployed in-house. It allows us to utilize the strengths of risk-based analysis, password protection, and multi-factor authentication.,IBM Security Identity and Access Manager integrate well with other IBM software products. It allowed us to have secure yet convenient access to resources via mobile devices. It allowed us to securely log in to Office365 without passwords.,It was a bit overwhelming to implement and was neither obvious nor user-friendly. While the product is quite powerful, the documentation left something to be desired if one wants to fully appreciate its capabilities. The cost was almost prohibitive, but it was the only product we could find that addressed all the needs of our organization in one place.,6,It has allowed us to securely store and access data which is hard to put a price on, but is of tremendous value. It has performed well and we did not have to upgrade any of the current equipment that we had. It has allowed us to branch out slightly and offer more mobile solutions both internally and externally.,Oracle Identity ManagerPowerful but expensive Identity Management SolutionWe are using IBM Security Identity and Access Manager as part of the Identity Management solution stack for our external customers and internal websites. We utilize Security Access Manager as a reverse proxy to the backend application, and to secure certain parts of our site using junctions.,Powerful, lots of features Integrates well with other IBM products,Not particularly user friendly Performance is not good for administration,5,High implementation and license cost and lack of trained personnel has resulted in a high running cost for the company The system is very stable, so minimal support required for troubleshooting Lack of documentation - requires employees to undergo training,Okta, Red Hat JBoss Enterprise Application Platform, Apache Subversion, Jenkins
Unspecified
IBM Security Identity and Access Manager
7 Ratings
Score 7.0 out of 101
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>TRScore

IBM Security Identity and Access Manager Reviews

IBM Security Identity and Access Manager
7 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>
Score 7.0 out of 101
Show Filters 
Hide Filters 
Filter 7 vetted IBM Security Identity and Access Manager reviews and ratings
Clear all filters
Overall Rating
Reviewer's Company Size
Last Updated
By Topic
Industry
Department
Experience
Job Type
Role

Reviews (1-3 of 3)

  Vendors can't alter or remove reviews. Here's why.
No photo available
June 28, 2019

IBM Security Identity and Access Manager Review: "ISAM Appliances are a great Infrastructure Investment"

Score 9 out of 10
Vetted Review
Verified User
Review Source
We use ISAM to secure inbound and outbound traffic (proxy/reverse proxy), across the entire organization. We have also started to use it to implement SSO. We further plan to implement the Advanced Access Control module.
  • Reverse Proxy
  • SSO
  • Load Balancing
  • True load balancing (such as that done with F5's appliances)
  • Better Command Line Access - it only allows a single admin user via ssh
The ISAM appliances handle session management quite well, targeting multiple platforms and technologies (eg: Windows, *Nix, .Net, Java, etc). It integrates well with existing environments without significant (or sometimes no) code changes to existing applications. It also manages OATH and other SSO strategies effectively. It doesn't perform pure load balancing pool management as well as some other products.
Read this authenticated review
No photo available
February 20, 2019

IBM Security Identity and Access Manager Review: "Go with a Trusted Leader... IBM"

Score 6 out of 10
Vetted Review
Verified User
Review Source
We use IBM Security Identity and Access Manager to increase ease of access while upgrading the security on mobile, cloud, Internet-of-things, and web methodologies. We have experimented with using it with both virtual and hardware appliances, as well as deployed in-house. It allows us to utilize the strengths of risk-based analysis, password protection, and multi-factor authentication.
  • IBM Security Identity and Access Manager integrate well with other IBM software products.
  • It allowed us to have secure yet convenient access to resources via mobile devices.
  • It allowed us to securely log in to Office365 without passwords.
  • It was a bit overwhelming to implement and was neither obvious nor user-friendly.
  • While the product is quite powerful, the documentation left something to be desired if one wants to fully appreciate its capabilities.
  • The cost was almost prohibitive, but it was the only product we could find that addressed all the needs of our organization in one place.
IBM Security Identity and Access Manager is well-suited for larger organizations who can take advantage of the powerful features without being overwhelmed by the initial investments of both time and resources. It is advantageous for any company that wants to provide secure protection of both internal and external (client) information. The added bonus of threat management mitigation was an unforeseen bonus.
Read this authenticated review
Wai Mun Leong profile photo
March 02, 2018

IBM Security Identity and Access Manager Review: "Powerful but expensive Identity Management Solution"

Score 5 out of 10
Vetted Review
Verified User
Review Source
We are using IBM Security Identity and Access Manager as part of the Identity Management solution stack for our external customers and internal websites. We utilize Security Access Manager as a reverse proxy to the backend application, and to secure certain parts of our site using junctions.
  • Powerful, lots of features
  • Integrates well with other IBM products
  • Not particularly user friendly
  • Performance is not good for administration
IBM Security Identity and Access Manager is useful for managing large scale identity management. It integrates well with other IBM products if your company is using them. The cost is high when installing and maintaining the whole Identity Management stack which includes IBM Security Identity Manager, Security Access Manager, LDAP, DB2.
Read Wai Mun Leong's full review

IBM Security Identity and Access Manager Scorecard Summary

Feature Scorecard Summary

ID-Management Access Control (2)
6.5
ID Management Single-Sign On (SSO) (2)
9.0
Multi-Factor Authentication (2)
8.0
Password Management (1)
7
Account Provisioning and De-provisioning (1)
6
ID Management Workflow Automation (1)
6
ID Risk Management (2)
7.0

About IBM Security Identity and Access Manager

IBM Security Identity and Access Manager is a configurable IAM platform for identity assurance, mobile-login, enterprise-grade security of data and threat prevention, password protection and single sign-on, directory with auditing and privileges, partner gateway, and more. The "Tivoli" brand name retained by IBM for some of its IAM offerings and editions (e.g. Tivoli Federated Identity Manager) originates from Tivoli Systems, Inc, a company acquired by IBM in 1996 to leverage that company's systems management capabilities. IBM has also acquired Lighthouse Security Group and CrossIdeas, two companies whose technologies were recognized for access management and security, to expand their offerings.
Categories:  Identity Management

IBM Security Identity and Access Manager Technical Details

Operating Systems: Unspecified
Mobile Application:No