Great product
September 21, 2023

Great product

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Software Version

IBM Security Access Manager (ISAM), legacy product

Overall Satisfaction with IBM Security Verify

I’m not using it currently but as I already have worked and supported the product, it has good capabilities and main advantage is it can be deployed in all complex and critical scenarios. Webseal Junctions, advanced authentication helps most.
  • Adaptive access
  • Access management
  • Access control policies
  • It can be little lightweight in terms of features provided. Some solutions might not need those many features and that will help customer in terms of cost as well.
  • A little complex to implement
  • Very much secured to the business as it provides granular level of configuration as far as authentication and authorization is concerned.
  • Works as a reverse Proxy so totally hides the backend application from anonymous access
  • It needs professional to install and manage it. It takes time to implement right set of policies but once setup as per requirement it will do its job
I have worked as IBM security L2 technical Support Engineer in the past so I’m very well aware about the process being followed at IBM support. For Sev1 PMRs the response time is very quick and support engineer will definitely provide the recommendations and or info on how to collect the logs for further troubleshooting.

Do you think IBM Security Verify delivers good value for the price?

Not sure

Are you happy with IBM Security Verify's feature set?

Yes

Did IBM Security Verify live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of IBM Security Verify go as expected?

I wasn't involved with the implementation phase

Would you buy IBM Security Verify again?

Yes

As mentioned earlier IBM security Verify provides lot of features like Single sign on, advanced authentication, etc so it is a great product if most/all the features are used effectively which will provide a overall great security to the businesses.
Well suited- Access management Risk based authentication scenarios and MFA.

Less suited - Light or small scale applications or companies where they just need simple authentication framework to be maintained to run their business.

IBM Security Verify Feature Ratings

ID-Management Access Control
Not Rated
ID Management Single-Sign On (SSO)
10
Multi-Factor Authentication
Not Rated
Password Management
8
Account Provisioning and De-provisioning
Not Rated
ID Management Workflow Automation
Not Rated
ID Risk Management
Not Rated