IBM Security Verify as the best intergrated data protection solution
March 25, 2024

IBM Security Verify as the best intergrated data protection solution

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Software Version

IBM Security Access Manager (ISAM), legacy product

Overall Satisfaction with IBM Security Verify

Aside from the SSO our company is using, we also use IBM Security Verify which adds confidence in our clients information to be more secure. Single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access, lifecycle and consent management, and other features are all part of this centralized solution for managing customer and workforce identity and access.
  • single-sign-on
  • multifactor authentication
  • adaptive AI-based access
  • passwordless access
  • better reporting of data
  • requires outside security monitoring system
For many years, IBM Security Verify has been an essential component of our and our clients' infrastructures as it adds an extra layer of authentication and authorization to mission-critical software. This program to aid with identity management and prevents unauthorized logins. I like how it associates a specific IP address with a user and blocks access if the two do not match.
I think that IBM Security Verify’s configurabilityis just right for this type of product as it easily adapts to a variety of System Architectures. I can say that it is one of the markets best AM solutions so far as its compatible with a large variety of single sign-on protocols and provides access control options.

Do you think IBM Security Verify delivers good value for the price?

Yes

Are you happy with IBM Security Verify's feature set?

Yes

Did IBM Security Verify live up to sales and marketing promises?

Yes

Did implementation of IBM Security Verify go as expected?

Yes

Would you buy IBM Security Verify again?

Yes

IBM Security Verify Access is a unified access management platform that supports mobile devices, making it ideal for protecting your most valuable assets. It supports multiple applications that require a single sign-on, and it dynamically evaluates potential threats. As of now, I can not think of scenarios where it is less appropriate.

IBM Security Verify Feature Ratings

ID-Management Access Control
9
ID Management Single-Sign On (SSO)
10
Multi-Factor Authentication
9
Password Management
9
Account Provisioning and De-provisioning
9
ID Management Workflow Automation
10
ID Risk Management
10