IBM Security Verify Pluses and Minuses
March 13, 2024

IBM Security Verify Pluses and Minuses

Anonymous | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User

Software Version

IBM Security Access Manager (ISAM), legacy product

Overall Satisfaction with IBM Security Verify

My organization used IBM Security Verify primarily as a IAM solution that addressed various identity and access management challenges. Some of the problems that were addressed with the application related to Identity-related threats and anomalies in real-time. Helping my organization proactively mitigate security risks faster.
  • Unified Identity Management
  • Adaptive Authentication
  • Security Intelligence
  • Integration Capabilities
  • Dependency on Cloud Infrastructure
  • Customization Limitations
  • Adoption Challenges
  • Decreased identity threats
  • Unified Identity Management
  • Reduced maintenance overhead
IBM Security Verify was always available when needed. Outages and errors were not an issue.
Definitely requires some expertise and resources, particularly for organizations with complex IAM requirements or existing IAM systems. Also, organizations with highly specialized IAM requirements may encounter limitations in tailoring the platform to their specific needs.
IBM Security Verify stacks up with Microsoft Entra ID better than SecurID due to categories in common such as, Self Service password resets, Multi-Factor Authentication, User Provision and Governance Tools, SSO, and IAM. SecurID not so much because it doesn't have that full range of capabilities.

Do you think IBM Security Verify delivers good value for the price?

No

Are you happy with IBM Security Verify's feature set?

Yes

Did IBM Security Verify live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of IBM Security Verify go as expected?

Yes

Would you buy IBM Security Verify again?

No

I would recommend it. Overall, IBM Security Verify provides robust IAM solution that addresses various identity and access management challenges. However, users should carefully evaluate the platform's pros and cons in the context of their specific requirements, resources, and risk tolerance before adoption because of its complexity of implementation and dependency on cloud infrastructure.

IBM Security Verify Feature Ratings

ID-Management Access Control
7
ID Management Single-Sign On (SSO)
7
Multi-Factor Authentication
7
Password Management
7
Account Provisioning and De-provisioning
7
ID Management Workflow Automation
7
ID Risk Management
7