Filter Ratings and Reviews
Filter 7 vetted IBM Security Verify Access, formerly IBM Security Access Manager (ISAM) reviews and ratings
Reviews (1-3 of 3)
Companies can't remove reviews or game the system. Here's why.
June 28, 2019

We use ISAM to secure inbound and outbound traffic (proxy/reverse proxy), across the entire organization. We have also started to use it to implement SSO. We further plan to implement the Advanced Access Control module.
- Reverse Proxy
- SSO
- Load Balancing
- True load balancing (such as that done with F5's appliances)
- Better Command Line Access - it only allows a single admin user via ssh
March 02, 2018
We are using IBM Security Identity and Access Manager as part of the Identity Management solution stack for our external customers and internal websites. We utilize Security Access Manager as a reverse proxy to the backend application, and to secure certain parts of our site using junctions.
- Powerful, lots of features
- Integrates well with other IBM products
- Not particularly user friendly
- Performance is not good for administration
February 20, 2019

We use IBM Security Identity and Access Manager to increase ease of access while upgrading the security on mobile, cloud, Internet-of-things, and web methodologies. We have experimented with using it with both virtual and hardware appliances, as well as deployed in-house. It allows us to utilize the strengths of risk-based analysis, password protection, and multi-factor authentication.
- IBM Security Identity and Access Manager integrate well with other IBM software products.
- It allowed us to have secure yet convenient access to resources via mobile devices.
- It allowed us to securely log in to Office365 without passwords.
- It was a bit overwhelming to implement and was neither obvious nor user-friendly.
- While the product is quite powerful, the documentation left something to be desired if one wants to fully appreciate its capabilities.
- The cost was almost prohibitive, but it was the only product we could find that addressed all the needs of our organization in one place.
IBM Security Verify Access, formerly IBM Security Access Manager (ISAM) Scorecard Summary
Feature Scorecard Summary
What is IBM Security Verify Access, formerly IBM Security Access Manager (ISAM)?
IBM Security Verify Access, formerly IBM Security Access Manager or ISAM, aims to help simplify user access while more securely adopting web, mobile, IoT and cloud technologies. It can be deployed on-premises, in a virtual or hardware appliance or containerized with Docker.
This was formerly Tivoli Access Manager from Tivoli Systems, Inc, a company acquired by IBM in 1996 to leverage that company's systems management capabilities. IBM has also acquired Lighthouse Security Group and CrossIdeas, two companies whose technologies were recognized for access management and security, to expand their offerings.
This was formerly Tivoli Access Manager from Tivoli Systems, Inc, a company acquired by IBM in 1996 to leverage that company's systems management capabilities. IBM has also acquired Lighthouse Security Group and CrossIdeas, two companies whose technologies were recognized for access management and security, to expand their offerings.
Categories: Identity Management
IBM Security Verify Access, formerly IBM Security Access Manager (ISAM) Technical Details
Operating Systems: | Unspecified |
---|---|
Mobile Application: | No |