IBM Security Verify Usability
April 08, 2024

IBM Security Verify Usability

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Software Version

IBM Security Access Manager (ISAM), legacy product

Overall Satisfaction with IBM Security Verify

IBM Security Verify role in my organization is to support the Identity and governance of user access rights, as well as permissions assigned to the users. As we strive to achieve implementation of certain zero trust principles, we find this solution very useful, especially if you already have other products from the same vendor.
  • Binding with API and providing adequate federation
  • Adaptability in policy enforcement
  • user management
  • More user friendly GUI
  • The Knowledge based documentation is big and unorganized. Supporting documentation can be modular, as at the moment if a customer tries to search for a certain solution, you will get many unnecessary results not connected as well.
  • Definitely it is recommended if you want to move away from traditional security approaches
  • improvement of the security in the organization, less number of orphan accounts
  • scallability as well,
I would rather say that there are still a lot of challenges when we speak about availability in certain scenarios, however bottom line is that planning for high availability requirements from the very beginning of the implementation planning, is a prerequisite for a successful deployment and resource utilization.
Solution configuration is very much customizable, however whenever we have to change something, we find it difficult to perform. You have to get used to the product for some time, before you understand the organizational logic behind it.
IBM Security Verify was chosen because there were already implemented security solutions from IBM.

Do you think IBM Security Verify delivers good value for the price?

Yes

Are you happy with IBM Security Verify's feature set?

No

Did IBM Security Verify live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of IBM Security Verify go as expected?

Yes

Would you buy IBM Security Verify again?

Yes

Although it integrates with many other vendors, it is more suitable for the client to implement it natively with other IBM solutions, however when integrated with others, it doesn't work so well. For example, integration with IBM SIEM solution is smooth and effortless, however when integrating with other SIEM platforms like LogRhythm, may sometimes lead to challenges.

IBM Security Verify Feature Ratings

ID-Management Access Control
8
ID Management Single-Sign On (SSO)
10
Multi-Factor Authentication
9
Password Management
7
Account Provisioning and De-provisioning
8
ID Management Workflow Automation
7
ID Risk Management
7