ISAM Appliances are a great Infrastructure Investment
June 28, 2019
ISAM Appliances are a great Infrastructure Investment
Score 9 out of 10
Vetted Review
Verified User
Software Version
IBM Security Access Manager (ISAM), legacy product
Overall Satisfaction with IBM Security Verify
We use ISAM to secure inbound and outbound traffic (proxy/reverse proxy), across the entire organization. We have also started to use it to implement SSO. We further plan to implement the Advanced Access Control module.
Pros
- Reverse Proxy
- SSO
- Load Balancing
Cons
- True load balancing (such as that done with F5's appliances)
- Better Command Line Access - it only allows a single admin user via ssh
- By reducing effort needed to code encryption and session management within the application, it has returned significant ROI
IBM Verify Feature Ratings
Using IBM Security Verify
Evaluating IBM Security Verify and Competitors
We actually use the F5 load balancer instead of the ISAM for those functions. We did evaluate some similar Microsoft Azure offerings but did not select.
Comments
Please log in to join the conversation