One of the best Access Management solutions
October 27, 2022

One of the best Access Management solutions

Hernan Arredondo | TrustRadius Reviewer
Score 9 out of 10
Vetted Review

Software Version

IBM Security Access Manager (ISAM), legacy product

Overall Satisfaction with IBM Security Verify

We have been using IBM Security Verify for several years in our systems and those of our clients, adding a layer of authentication and authorization in critical applications. In addition, we use Verify to implement our own custom, multi-factor authentication methods to validate the identity of users.
  • Web Authentication
  • MMFA
  • Risk Based Access Control (RBAC)
  • Reverse Proxy
  • Support for more apps
  • Customizable authentication options
  • Single Sign On and integration with other apps
  • Make the company more reliable for our customers
In all the time we have been working with IBM Security Verify we have had no availability or outage problems, even in the Verify Access solution Implemented in our on-premises systems
It is very configurable, it has a fairly extensive SDK to be able to carry out developments in personalized authentication systems.The only bad thing about this, is that it's not easy for someone who doesn't develop.
Security Verify is a great solution backed by IBM and has evolved over time to become one of the best access management applications on the market.

Do you think IBM Security Verify delivers good value for the price?

Yes

Are you happy with IBM Security Verify's feature set?

Yes

Did IBM Security Verify live up to sales and marketing promises?

Yes

Did implementation of IBM Security Verify go as expected?

Yes

Would you buy IBM Security Verify again?

Yes

IBM Security QRadar, IBM Security Guardium, IBM Security Identity Governance & Intelligence (IGI)
It works very well to secure web applications and integrate applications using protocols like SAML, OpenID, OAuth. It also provides excellent application support using a reverse proxy.Not recommended for use with client-server applications. Some integrations have been developed to accomplish this, but it's tedious to do and not as easy as with web applications.

IBM Security Verify Feature Ratings

ID-Management Access Control
10
ID Management Single-Sign On (SSO)
10
Multi-Factor Authentication
10
Password Management
7
Account Provisioning and De-provisioning
6
ID Management Workflow Automation
5
ID Risk Management
9