ISAM Appliances are a great Infrastructure Investment
June 28, 2019

ISAM Appliances are a great Infrastructure Investment

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Software Version

IBM Security Access Manager (ISAM), legacy product

Overall Satisfaction with IBM Security Verify

We use ISAM to secure inbound and outbound traffic (proxy/reverse proxy), across the entire organization. We have also started to use it to implement SSO. We further plan to implement the Advanced Access Control module.

Pros

  • Reverse Proxy
  • SSO
  • Load Balancing

Cons

  • True load balancing (such as that done with F5's appliances)
  • Better Command Line Access - it only allows a single admin user via ssh
  • By reducing effort needed to code encryption and session management within the application, it has returned significant ROI
The ISAM appliances handle session management quite well, targeting multiple platforms and technologies (eg: Windows, *Nix, .Net, Java, etc). It integrates well with existing environments without significant (or sometimes no) code changes to existing applications. It also manages OATH and other SSO strategies effectively. It doesn't perform pure load balancing pool management as well as some other products.

IBM Verify Feature Ratings

ID-Management Access Control
8
ID Management Single-Sign On (SSO)
10
Multi-Factor Authentication
8
Password Management
Not Rated
Account Provisioning and De-provisioning
Not Rated
ID Management Workflow Automation
Not Rated
ID Risk Management
8

Using IBM Security Verify

Evaluating IBM Security Verify and Competitors

We actually use the F5 load balancer instead of the ISAM for those functions. We did evaluate some similar Microsoft Azure offerings but did not select.

Comments

More Reviews of IBM Verify