Go with a Trusted Leader... IBM
February 20, 2019
Go with a Trusted Leader... IBM
Score 6 out of 10
Vetted Review
Verified User
Software Version
IBM Security Access Manager (ISAM), legacy product
Overall Satisfaction with IBM Security Verify
We use IBM Security Identity and Access Manager to increase ease of access while upgrading the security on mobile, cloud, Internet-of-things, and web methodologies. We have experimented with using it with both virtual and hardware appliances, as well as deployed in-house. It allows us to utilize the strengths of risk-based analysis, password protection, and multi-factor authentication.
- IBM Security Identity and Access Manager integrate well with other IBM software products.
- It allowed us to have secure yet convenient access to resources via mobile devices.
- It allowed us to securely log in to Office365 without passwords.
- It was a bit overwhelming to implement and was neither obvious nor user-friendly.
- While the product is quite powerful, the documentation left something to be desired if one wants to fully appreciate its capabilities.
- The cost was almost prohibitive, but it was the only product we could find that addressed all the needs of our organization in one place.
- It has allowed us to securely store and access data which is hard to put a price on, but is of tremendous value.
- It has performed well and we did not have to upgrade any of the current equipment that we had.
- It has allowed us to branch out slightly and offer more mobile solutions both internally and externally.
IBM Security Verify Feature Ratings
Evaluating IBM Security Verify and Competitors
We evaluated Oracle Identity Manager and were ready to move ahead with the purchase plan, but then found that IBM addressed the needs of our company in a more robust fashion. The price was significantly higher, yet in the grand scheme of things, the safety of both our data and the data of our clients was the most important criteria.