Securing Tomorrow's Digital Future.
Updated February 14, 2025

Securing Tomorrow's Digital Future.

Nidia Marin | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User

Software Version

IBM Security Access Manager (ISAM), legacy product

Modules Used

  • IBM Verify Identity Protection

Overall Satisfaction with IBM Verify

Our security foundation has brought significant changes by implementing IBM Verify as a security platform. User access control management becomes easy through the platform dashboard, yet its advanced reporting capabilities reveal detailed security trends. The automated threat response mechanism has speeded up our incident response operational time, thus enabling our security team to deploy strategic measures instead of manual authentication work.

Pros

  • Users benefit from advanced biometric authentication, fingerprint identification, facial recognition, and voice authentication technology.
  • The system performs real-time threat detection, which adjusts security protocols through automated predictive adjustments.
  • A trustless security architecture verifies continuous user access attempts after implementation.

Cons

  • Mobile app users experience brief moments of delayed synchronization when performing system updates.
  • Limited customization options for security notification templates.
  • The backup authentication roster needs additional variety.
  • Reduction in unauthorized access attempts.
  • Streamlined compliance reporting process.
  • Enhanced customer trust through visible security measures.
I rate it 9.- What we consider most valuable is that the software allows constant monitoring of the platform should there be any security threats.
In a recent supply chain attack attempt, IBM Verify alerted us to anomalous activity patterns so we could quarantine those systems before there was a data breach. This has been very effective in preventing compromise of the supply chain, a good practice that has been very useful.
On a scale of 1-10, IBM Verify is 9; since the system can accommodate different access levels, collaboration has been made easy without necessarily allowing the wrong personnel to access certain projects, making project implementation more efficient and less tedious.
We can gain direct access to shared resources and ensure that security issues are addressed properly.
We conducted a comparison study between IBM Verify and Okta as well as Duo Security before making our selection. IBM Verify emerged as the perfect fit because its superior capability to integrate with our current system environment surpassed competitor security solutions. IBM Verify demonstrated superior reliability through its enterprise-class scalability and fully transparent auditing mechanisms.

Do you think IBM Verify delivers good value for the price?

Yes

Are you happy with IBM Verify's feature set?

Yes

Did IBM Verify live up to sales and marketing promises?

Yes

Did implementation of IBM Verify go as expected?

Yes

Would you buy IBM Verify again?

Yes

The IBM Verify system demonstrates exceptional operational reliability in highly sensitive scenarios, especially during peak moments. During peak times, when many users attempt authentication simultaneously, the system delivers fast response times. ​

IBM Verify Feature Ratings

ID-Management Access Control
8
ID Management Single-Sign On (SSO)
8
Multi-Factor Authentication
8
Password Management
8
Account Provisioning and De-provisioning
8
ID Management Workflow Automation
8
ID Risk Management
8

Comments

More Reviews of IBM Verify