Accurate authentication product for quick data access
August 21, 2023

Accurate authentication product for quick data access

Susan Davone | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Software Version

IBM Security Access Manager (ISAM), legacy product

Overall Satisfaction with IBM Security Verify

This product is powerful security authentication tool that gives our customers access to company data. It provides data analytics on customer engagements with our websites. It prevents confidential data from cyber threats and unauthorized parties. The current malware attacks could be more threatening without this platform. Customer verification process has been efficient with reliable insights from interactive applications.
  • Verification of customers before engaging enterprise websites.
  • Blocking automated requests from bots.
  • Prevention of confidential data from ransomware attacks.
  • The security models have solved our challenges
  • The system has performed beyond our expectations.
  • We have gained reliable security insights from this platform.
  • There is positive ROI.
  • Prevention of security breaches has saved the company from costly risks.
The support team has always been the primary consultation base when we are faced by performance problems. From the deployment stage the team has managed to monitor the operation lifecycle and give best insights based on their observation. It works 24/7 to enhance productive service delivery to clients. The IBM Security Verify Support team has been the main player in the successful performance of this software.

Do you think IBM Security Verify delivers good value for the price?

Yes

Are you happy with IBM Security Verify's feature set?

Yes

Did IBM Security Verify live up to sales and marketing promises?

Yes

Did implementation of IBM Security Verify go as expected?

Yes

Would you buy IBM Security Verify again?

Yes

IBM Security Verify is a must product every company with great vision should have. It has powerful security stabilization mechanism for data protection. It keeps the company and customers under one unified monitoring system that enables organization to strike better deals. It saves time for entering passwords every time to access prioritized information from regular customers.
The licensing terms were favourable due to their flexibility based on the size and purpose of implementation. The billing frequency is done on quarterly basis. The vendor team has enacted best user policies that gives the company the full control of this platform. It is cost-effective as compared to most security verification tools in the market.
It provides AI-powered context that enhances effective security assessment process of workforce. It has prevented data breaches from clients and saved the company a lot of funds. The reports generated from data engagement lifecycle gives us room for setting successful data handling policies. It has protected applications from external cyber attacks that could cost the company heavily. I have administered most projects with IBM Security Verify and the end results have reflected the company goals.

IBM Security Verify Feature Ratings

ID-Management Access Control
10
ID Management Single-Sign On (SSO)
9
Multi-Factor Authentication
9
Password Management
10
Account Provisioning and De-provisioning
10
ID Management Workflow Automation
9
ID Risk Management
10