IBM Security Verify is an excellent identity and access management software
March 18, 2024

IBM Security Verify is an excellent identity and access management software

Lenora Blick | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Software Version

IBM Security Access Manager (ISAM), legacy product

Overall Satisfaction with IBM Security Verify

IBM Security Verify has a very simple and yet practical design which saves us a lot of time while navigating though it. And it's overall security and the ability to easily setup single sign-on and multi-factor authentication is one of my favourite feature. Also integrating it in our system was really easy as the support was quick to reply and solve all our problems without any delay.
  • Easy to setup single sign-on and multi-factor authentication.
  • Simple and yet practical design.
  • Superb support. And always solves your problems without any delay.
  • The price could be lowered as it is very expensive.
  • Can sometimes be resource heavy.
  • Easy to navigate though it which saves our time and very easy to setup single sign-on and multi-factor authentication.
  • Very expensive.
  • Great support so any problem is instantly solved.
We had only one outage since we implemented it and that also due to a misconfiguration on our side. But it was easily solved as we contacted the support. And since then we had no such problem.
It is very customizable but can easily become very complex as you start to add more devices.

Do you think IBM Security Verify delivers good value for the price?

No

Are you happy with IBM Security Verify's feature set?

Yes

Did IBM Security Verify live up to sales and marketing promises?

Yes

Did implementation of IBM Security Verify go as expected?

Yes

Would you buy IBM Security Verify again?

Yes

Personally I recommend it very much just because how simple and easy it is to use and setup. Along with the practical design that helps to easily navigate and use it without any issues.

IBM Security Verify Feature Ratings

ID-Management Access Control
8
ID Management Single-Sign On (SSO)
10
Multi-Factor Authentication
9
Password Management
9
Account Provisioning and De-provisioning
8
ID Management Workflow Automation
8
ID Risk Management
9