IBM Verify, BI Initiative: Enterprise Security Made Simple
Updated February 16, 2025

IBM Verify, BI Initiative: Enterprise Security Made Simple

Gisel Bustamante | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User

Software Version

IBM Security Access Manager (ISAM), legacy product

Modules Used

  • IBM Verify Identity Protection

Overall Satisfaction with IBM Verify

The use of IBM Verify had made distribution of my organization's digital content more efficient. Sensitive to the importance of security, the platform needed to accommodate access hierarchies while at the same time being very protective of the various levels of access. While there was an issue at the initial configuration of the system, it has been rather consistent and reliable in managing the user authentication across the different platforms.

Pros

  • Identity, which allows users to be authenticated for their identity rather than application
  • Its connection to current enterprise identity management systems through industry standard interfaces
  • Integrated multifunctional analytics application

Cons

  • Initial Configuration is the area with most complexities
  • Working on a mobile application interface is not pleasant for an end user.
  • Few multiline options for generated templates
  • Reduced incidence of unauthorized access
  • Increased efficiency of the content distribution process
  • Better comparisons to applicable data protection regulations
I rate it 8, With the configurable work flows that IBM Verify brings, complex identity management procedures across the organization have been automated to cater for different users and access permissions required.
The system effectively manages comprehensive approval chains; the approval flows are flexibly transferred to proper authorities, while all actions are recorded in detailed audit tracks.
8 It has also cut the amount of time it takes to process identity management while achieving the correct policy or procedure for all user accounts.
It is just right, giving instant insights into the usage of objects and roles and emerging security risks.
Owing to the general findings formulated in this paper, comparing Okta and Microsoft Entra ID to IBM Verify, the latter appears to be the only tool that delivers a number of features for integrating with legacy systems. However, since IBM Verify has the upper hand in terms of security policy configuration.

Do you think IBM Verify delivers good value for the price?

Yes

Are you happy with IBM Verify's feature set?

Yes

Did IBM Verify live up to sales and marketing promises?

Yes

Did implementation of IBM Verify go as expected?

Yes

Would you buy IBM Verify again?

Yes

In diversified settings and when there are multiple factors of authentication required, IBM Verify delivers optimum performance. It especially performs great in large traffic and retains stable work efficiency during the large amount of simultaneous authentication. But it may be slightly complex, especially for the small teams that do not need such tight security protocols.

IBM Verify Feature Ratings

ID-Management Access Control
8
ID Management Single-Sign On (SSO)
7
Multi-Factor Authentication
8
Password Management
8
Account Provisioning and De-provisioning
7
ID Management Workflow Automation
8
ID Risk Management
9

Comments

More Reviews of IBM Verify