Excellent Identity, Access and Acknowledgment Tool
September 10, 2024

Excellent Identity, Access and Acknowledgment Tool

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Software Version

IBM Security Access Manager (ISAM), legacy product

Modules Used

  • IBM Verify Credentials
  • IBM Verify Identity Protection
  • IBM Verify Directory
  • IBM Verify Trust

Overall Satisfaction with IBM Security Verify

It is used primarily for identification, authentication and authorisation services. Our setup includes single sign-on which is managed with multi-factor authentication (normally passcodes on mobiles and in some instances emails). We previously had this implemented on-premises, but it is now based in the Cloud (AWS). In terms of business problems addressed, users don't have to remember passwords and it means that time is saved in terms of passwords not having to be reset or accounts being unlocked. Additionally, the application integrates and interfaces easily with other applications. This includes scaling up. We use the system to access some of our critical systems.

Pros

  • Excellent identification, access and authorisation application
  • Great user interface
  • Excellent new AI functionality and feature enrichment

Cons

  • Some prior knowledge of identity and access sytems are required
  • Improved user interaction
  • Low total cost of ownership
  • Low licenses fees
  • Clearer Key Performance Indicators and Key Risk Indicators
It has never let us down since its inception and installation. User credentials and secure access have always been guaranteed. Ironclad security (through single sign-on, MFA, etc.) has ensured that our user credential details are safe as is our information/data. The correct access is given to users, based on role-based access with segregation of duty and the principle of least privilege being deployed. The IBM support has also been first class and they have proactively resolved any minor issues we have encountered.
No, it is completely fit for our purposes and meets all our requirements when it comes to identity, access, and authorisation management. It has proven to be a simple tool to implement and operate while being efficient and not resource-hungry (unlike some competitors offerings). With no outages, failures and other bottlenecks, availability has generally been around 99.99% of the times, with all SLAs and associated agreements being complied with.
During our proof of concept and demonstrations, we were clearly able to see how much better the identity, access and authorisation features were compared to the competition. We were compelled to make a decision, not only on this, but also on the ease and simplicity of installation and implementation.

Do you think IBM Verify delivers good value for the price?

Yes

Are you happy with IBM Verify's feature set?

Yes

Did IBM Verify live up to sales and marketing promises?

Yes

Did implementation of IBM Verify go as expected?

Yes

Would you buy IBM Verify again?

Yes

It is brilliant for use as an identity and access management tool and ensures the safeguarding of our systems and upholds data integrity as a consequence. It was very easy to set up and apart from a straightforward installation, we have found customisation and configuration easy. It was easy to deploy in the cloud after using it previously on premises.

IBM Verify Feature Ratings

ID-Management Access Control
10
ID Management Single-Sign On (SSO)
10
Multi-Factor Authentication
10
Password Management
9
Account Provisioning and De-provisioning
10
ID Management Workflow Automation
9
ID Risk Management
10

Comments

More Reviews of IBM Verify