IBM Verify, BI Initiative: Enterprise Security Made Simple
Overall Satisfaction with IBM Verify
The use of IBM Verify had made distribution of my organization's digital content more efficient. Sensitive to the importance of security, the platform needed to accommodate access hierarchies while at the same time being very protective of the various levels of access. While there was an issue at the initial configuration of the system, it has been rather consistent and reliable in managing the user authentication across the different platforms.
Pros
- Identity, which allows users to be authenticated for their identity rather than application
- Its connection to current enterprise identity management systems through industry standard interfaces
- Integrated multifunctional analytics application
Cons
- Initial Configuration is the area with most complexities
- Working on a mobile application interface is not pleasant for an end user.
- Few multiline options for generated templates
- Reduced incidence of unauthorized access
- Increased efficiency of the content distribution process
- Better comparisons to applicable data protection regulations
I rate it 8, With the configurable work flows that IBM Verify brings, complex identity management procedures across the organization have been automated to cater for different users and access permissions required.
The system effectively manages comprehensive approval chains; the approval flows are flexibly transferred to proper authorities, while all actions are recorded in detailed audit tracks.
8 It has also cut the amount of time it takes to process identity management while achieving the correct policy or procedure for all user accounts.
It is just right, giving instant insights into the usage of objects and roles and emerging security risks.
Owing to the general findings formulated in this paper, comparing Okta and Microsoft Entra ID to IBM Verify, the latter appears to be the only tool that delivers a number of features for integrating with legacy systems. However, since IBM Verify has the upper hand in terms of security policy configuration.
Do you think IBM Verify delivers good value for the price?
Yes
Are you happy with IBM Verify's feature set?
Yes
Did IBM Verify live up to sales and marketing promises?
Yes
Did implementation of IBM Verify go as expected?
Yes
Would you buy IBM Verify again?
Yes

Comments
Please log in to join the conversation