Powerful but hard to master
April 13, 2022

Powerful but hard to master

Anonymous | TrustRadius Reviewer
Score 6 out of 10
Vetted Review
Verified User

Software Version

IBM Security Access Manager (ISAM), legacy product

Overall Satisfaction with IBM Security Verify

We use IBM Security Verify A to centralize our authentication for our knowledge workers. Making use of SAML/OIDC we provide an authentication framework for our in-house developed applications and cloud applications. We also use the Webseal Reverse Proxy as a pre-authentication enforcement point. The flexibility of IBM Security Verify also allows us to provide 2FA for RDS flows.
  • Customization of all components
  • SSO
  • Documentation and training for newer users is lacking
  • Support can be slow
  • High operational costs
  • Extensive training for employees
  • Performant environment when it works
We experienced a lot of issues during the upgrades we performed. Newer versions are likely to contain issues and we recommend waiting for the fix packs. Our production environment has been stable and received 0 on calls so far.
There is a lot of configuration you can do. If a feature is not available in ISAM you are able to develop it yourself. The framework it provides is extensive and there are lots of possibilities. This does bring more complexity and less user-friendliness.

Do you think IBM Security Verify delivers good value for the price?

Not sure

Are you happy with IBM Security Verify's feature set?


Did IBM Security Verify live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of IBM Security Verify go as expected?

I wasn't involved with the implementation phase

Would you buy IBM Security Verify again?


IBM Security Verify is well suited in an environment where you need full control. The flexibility does come at the cost of user-friendliness and has a steep learning curve to start working with it. It is a powerful product but hard to master.

IBM Security Verify Feature Ratings

ID-Management Access Control
Not Rated
ID Management Single-Sign On (SSO)
Multi-Factor Authentication
Password Management
Not Rated
ID Risk Management
Not Rated