Go with a Trusted Leader... IBM
February 20, 2019

Go with a Trusted Leader... IBM

Anonymous | TrustRadius Reviewer
Score 6 out of 10
Vetted Review
Verified User

Software Version

IBM Security Access Manager (ISAM), legacy product

Overall Satisfaction with IBM Security Verify

We use IBM Security Identity and Access Manager to increase ease of access while upgrading the security on mobile, cloud, Internet-of-things, and web methodologies. We have experimented with using it with both virtual and hardware appliances, as well as deployed in-house. It allows us to utilize the strengths of risk-based analysis, password protection, and multi-factor authentication.
  • IBM Security Identity and Access Manager integrate well with other IBM software products.
  • It allowed us to have secure yet convenient access to resources via mobile devices.
  • It allowed us to securely log in to Office365 without passwords.
  • It was a bit overwhelming to implement and was neither obvious nor user-friendly.
  • While the product is quite powerful, the documentation left something to be desired if one wants to fully appreciate its capabilities.
  • The cost was almost prohibitive, but it was the only product we could find that addressed all the needs of our organization in one place.
  • It has allowed us to securely store and access data which is hard to put a price on, but is of tremendous value.
  • It has performed well and we did not have to upgrade any of the current equipment that we had.
  • It has allowed us to branch out slightly and offer more mobile solutions both internally and externally.
IBM Security Identity and Access Manager is well-suited for larger organizations who can take advantage of the powerful features without being overwhelmed by the initial investments of both time and resources. It is advantageous for any company that wants to provide secure protection of both internal and external (client) information. The added bonus of threat management mitigation was an unforeseen bonus.

IBM Security Verify Feature Ratings

ID-Management Access Control
5
ID Management Single-Sign On (SSO)
8
Multi-Factor Authentication
8
Password Management
7
Account Provisioning and De-provisioning
6
ID Management Workflow Automation
6
ID Risk Management
6

Evaluating IBM Security Verify and Competitors

We evaluated Oracle Identity Manager and were ready to move ahead with the purchase plan, but then found that IBM addressed the needs of our company in a more robust fashion. The price was significantly higher, yet in the grand scheme of things, the safety of both our data and the data of our clients was the most important criteria.