A Robust IBM Protection Tool
September 26, 2023

A Robust IBM Protection Tool

Sarthak Chopra | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Software Version

IBM Security Access Manager (ISAM), legacy product

Overall Satisfaction with IBM Security Verify

It is a very fast cybersecurity implementation tool that provides safe access to my systems. It allows me more control over privileged accounts. The tool is not complicated to use. In my work, it is like a system that allows access to main data (data of different types) stringently confidential.
  • Security Control - which is super important because of the confidentiality of the data.
  • Enhanced Cybersecurity - in this regard, the tools delivers absolutely amazing service.
  • Robust Defense Mechanism - can rely on it completely!
  • The cost is expensive for small or medium-scaled companies.
  • Enhanced Cybersecurity
  • Strong Data Security
Pretty amazing support received from the team whenever contacted. They were patient enough to listen and even took all our feedback seriously.

Do you think IBM Security Verify delivers good value for the price?

Yes

Are you happy with IBM Security Verify's feature set?

Yes

Did IBM Security Verify live up to sales and marketing promises?

Yes

Did implementation of IBM Security Verify go as expected?

Yes

Would you buy IBM Security Verify again?

Yes

Overall, it is fairly easy to use and does not require a lot of time and effort in terms of learning. Intuitive in nature and once you get acquainted with it, then it is not a challenge to manage or operate anymore. No major issues have been observed with IBM Security Verify.
It safeguards our systems from unwanted access (both within and outside the organization) and I don't have to remember all the passwords separately - only one master password shall suffice. It is best suited for large-scale businesses, like ours, where data is highly crucial and its implementation is effective and efficient.

IBM Security Verify Feature Ratings

ID-Management Access Control
7
ID Management Single-Sign On (SSO)
10
Multi-Factor Authentication
8
Password Management
10
Account Provisioning and De-provisioning
Not Rated
ID Management Workflow Automation
5
ID Risk Management
8