IBM Security Verify Access, formerly IBM Security Access Manager (ISAM) Reviews

7 Ratings
<a href='' target='_blank' rel='nofollow noopener noreferrer'>trScore algorithm: Learn more.</a>
Score 7.9 out of 100

Do you work for this company? Manage this listing

Overall Rating

Reviewer's Company Size

Last Updated

By Topic




Job Type


Reviews (1-3 of 3)

Companies can't remove reviews or game the system. Here's why.
Anonymous | TrustRadius Reviewer
June 28, 2019

ISAM Appliances are a great Infrastructure Investment

Score 9 out of 10
Vetted Review
Verified User
Review Source
We use ISAM to secure inbound and outbound traffic (proxy/reverse proxy), across the entire organization. We have also started to use it to implement SSO. We further plan to implement the Advanced Access Control module.
  • Reverse Proxy
  • SSO
  • Load Balancing
  • True load balancing (such as that done with F5's appliances)
  • Better Command Line Access - it only allows a single admin user via ssh
The ISAM appliances handle session management quite well, targeting multiple platforms and technologies (eg: Windows, *Nix, .Net, Java, etc). It integrates well with existing environments without significant (or sometimes no) code changes to existing applications. It also manages OATH and other SSO strategies effectively. It doesn't perform pure load balancing pool management as well as some other products.
Read this authenticated review
Anonymous | TrustRadius Reviewer
February 20, 2019

Go with a Trusted Leader... IBM

Score 6 out of 10
Vetted Review
Verified User
Review Source
We use IBM Security Identity and Access Manager to increase ease of access while upgrading the security on mobile, cloud, Internet-of-things, and web methodologies. We have experimented with using it with both virtual and hardware appliances, as well as deployed in-house. It allows us to utilize the strengths of risk-based analysis, password protection, and multi-factor authentication.
  • IBM Security Identity and Access Manager integrate well with other IBM software products.
  • It allowed us to have secure yet convenient access to resources via mobile devices.
  • It allowed us to securely log in to Office365 without passwords.
  • It was a bit overwhelming to implement and was neither obvious nor user-friendly.
  • While the product is quite powerful, the documentation left something to be desired if one wants to fully appreciate its capabilities.
  • The cost was almost prohibitive, but it was the only product we could find that addressed all the needs of our organization in one place.
IBM Security Identity and Access Manager is well-suited for larger organizations who can take advantage of the powerful features without being overwhelmed by the initial investments of both time and resources. It is advantageous for any company that wants to provide secure protection of both internal and external (client) information. The added bonus of threat management mitigation was an unforeseen bonus.
Read this authenticated review
Wai Mun Leong | TrustRadius Reviewer
March 02, 2018

Powerful but expensive Identity Management Solution

Score 5 out of 10
Vetted Review
Verified User
Review Source
We are using IBM Security Identity and Access Manager as part of the Identity Management solution stack for our external customers and internal websites. We utilize Security Access Manager as a reverse proxy to the backend application, and to secure certain parts of our site using junctions.
  • Powerful, lots of features
  • Integrates well with other IBM products
  • Not particularly user friendly
  • Performance is not good for administration
IBM Security Identity and Access Manager is useful for managing large scale identity management. It integrates well with other IBM products if your company is using them. The cost is high when installing and maintaining the whole Identity Management stack which includes IBM Security Identity Manager, Security Access Manager, LDAP, DB2.
Read Wai Mun Leong's full review

IBM Security Verify Access, formerly IBM Security Access Manager (ISAM) Scorecard Summary

Feature Scorecard Summary

ID-Management Access Control (2)
ID Management Single-Sign On (SSO) (2)
Multi-Factor Authentication (2)
Password Management (1)
Account Provisioning and De-provisioning (1)
ID Management Workflow Automation (1)
ID Risk Management (2)

About IBM Security Verify Access, formerly IBM Security Access Manager (ISAM)

IBM Security Verify Access, formerly IBM Security Access Manager or ISAM, aims to help simplify user access while more securely adopting web, mobile, IoT and cloud technologies. It can be deployed on-premises, in a virtual or hardware appliance or containerized with Docker.

This was formerly Tivoli Access Manager from Tivoli Systems, Inc, a company acquired by IBM in 1996 to leverage that company's systems management capabilities. IBM has also acquired Lighthouse Security Group and CrossIdeas, two companies whose technologies were recognized for access management and security, to expand their offerings.
Categories:  Identity Management

IBM Security Verify Access, formerly IBM Security Access Manager (ISAM) Technical Details

Operating Systems: Unspecified
Mobile Application:No