Excellent Identity, Access and Acknowledgment Tool
September 10, 2024
Excellent Identity, Access and Acknowledgment Tool

Score 9 out of 10
Vetted Review
Verified User
Software Version
IBM Security Access Manager (ISAM), legacy product
Modules Used
- IBM Verify Credentials
- IBM Verify Identity Protection
- IBM Verify Directory
- IBM Verify Trust
Overall Satisfaction with IBM Security Verify
It is used primarily for identification, authentication and authorisation services. Our setup includes single sign-on which is managed with multi-factor authentication (normally passcodes on mobiles and in some instances emails). We previously had this implemented on-premises, but it is now based in the Cloud (AWS). In terms of business problems addressed, users don't have to remember passwords and it means that time is saved in terms of passwords not having to be reset or accounts being unlocked. Additionally, the application integrates and interfaces easily with other applications. This includes scaling up. We use the system to access some of our critical systems.
Pros
- Excellent identification, access and authorisation application
- Great user interface
- Excellent new AI functionality and feature enrichment
Cons
- Some prior knowledge of identity and access sytems are required
- Improved user interaction
- Low total cost of ownership
- Low licenses fees
- Clearer Key Performance Indicators and Key Risk Indicators
During our proof of concept and demonstrations, we were clearly able to see how much better the identity, access and authorisation features were compared to the competition. We were compelled to make a decision, not only on this, but also on the ease and simplicity of installation and implementation.
Do you think IBM Verify delivers good value for the price?
Yes
Are you happy with IBM Verify's feature set?
Yes
Did IBM Verify live up to sales and marketing promises?
Yes
Did implementation of IBM Verify go as expected?
Yes
Would you buy IBM Verify again?
Yes
Comments
Please log in to join the conversation