IBM Security Verify Access v10
IBM Security | IBM Security Verify Access v10.0.8.0Linux/Unix, Other IBM - 64-bit Amazon Machine Image (AMI)
Reviews from AWS Marketplace
0 AWS reviews
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
External reviews are not included in the AWS star rating for the product.
IBM S&AM Review
What do you like best about the product?
Probably one of the best access/secure management systems I've ever used. We implement this system on the back end for one of the portals we work with at my current company. This system integrates a way to verify and provide acces to clients for using one of our health portals. In accordance with HIPAA and releasing health records the portal utilizes IBM's Security and Identity assurance to validate a users true identity. It asks the user a set of Knowledge Based Authentication questions which is pulled from a public record sector and presents the user with the best possible choices to choose from very carefully. Once the system authorizes and grants permission to the user it grants full authority to that user. If the user changes any personal information it starts the process over treating that user as a new identity to confirm authorization for again.
What do you dislike about the product?
Sometimes certain authorization questions are a bit broad. Would be better to simplify this with more current inquiries.
What problems is the product solving and how is that benefiting you?
The business problems we are solving are avoiding any potential breaches and preventing our clients from recieving information that belongs to them only.
Recommendations to others considering the product:
Highly recommended
- Leave a Comment |
- Mark review as helpful
A reliable and innovative security software.
What do you like best about the product?
IBM Security Identity and Access Assurance centralizes and automates the management of user profiles, authentication, access privileges, and audit rules. It complements everything with user monitoring functions and activity reports to detect situations that do not comply with the security policy. It allows you to improve identity assurance, reduce security risks, and protect your IT resources.
What do you dislike about the product?
The troublemaker of on-demand software first targets IBM. "I think the way to understand the future is to look at the past. Let's look at what IBM does in Mainframes. We all know that IBM still sells a lot of these large central computers. This simply means that it is still selling them old technology just upgraded.
What problems is the product solving and how is that benefiting you?
During my use, the software was able to include four IBM Security packages: IBM Security Access Manager (Advanced Access Control Module and Federation Module), IBM Security Access Manager for Enterprise Single Sign-On, IBM Security QRadar Log Manager, and IBM Security Identity Governance Lifecycle.
Offers an automated and policy-based identity and access management solution that allows for effective management of user accounts and permissions.
Provides a convenient and protected single sign-on that enhances user security in Web, Cloud, and enterprise environments.
Helps manage security and compliance, ensuring adherence to the security policy.
Offers an automated and policy-based identity and access management solution that allows for effective management of user accounts and permissions.
Provides a convenient and protected single sign-on that enhances user security in Web, Cloud, and enterprise environments.
Helps manage security and compliance, ensuring adherence to the security policy.
Recommendations to others considering the product:
A reliable software but too expensive.
Indispensable for ensuring your computer data
What do you like best about the product?
IBM Security Identity and Access Assurance is an integrated identity and access management solution that offers automated identity and access management for various environments: enterprise, Web, and Cloud. This solution can help administer, protect, and control user access to online resources within the enterprise for improved security and compliance.
IBM Security Identity and Access Assurance centralizes and automates the management of user profiles, authentication, access privileges, and audit rules. It complements this with user monitoring functions and activity reports to detect situations that do not comply with the security policy. It allows you to improve identity assurance, reduce security risks, and protect your IT resources.
IBM Security Identity and Access Assurance centralizes and automates the management of user profiles, authentication, access privileges, and audit rules. It complements this with user monitoring functions and activity reports to detect situations that do not comply with the security policy. It allows you to improve identity assurance, reduce security risks, and protect your IT resources.
What do you dislike about the product?
Among the offerings proposed by IBM, I was not able to verify all their offerings, including:
Offers an automated, policy-based identity and access management solution that efficiently manages user accounts and permissions.
Provides a convenient and protected single sign-on that enhances user security in web, cloud, and enterprise environments.
Helps manage security and compliance, ensuring adherence to the security policy.
Offers an automated, policy-based identity and access management solution that efficiently manages user accounts and permissions.
Provides a convenient and protected single sign-on that enhances user security in web, cloud, and enterprise environments.
Helps manage security and compliance, ensuring adherence to the security policy.
What problems is the product solving and how is that benefiting you?
I was able to try these software programs and find solutions to my problems:
IBM Security Access Manager (Advanced Access Control Module and Federation Module), IBM Security Access Manager for Enterprise Single Sign-On, IBM Security QRadar Log Manager, and IBM Security Identity Governance Lifecycle.
IBM Security Access Manager (Advanced Access Control Module and Federation Module), IBM Security Access Manager for Enterprise Single Sign-On, IBM Security QRadar Log Manager, and IBM Security Identity Governance Lifecycle.
Recommendations to others considering the product:
Continue to update the shields.
One of the best, not as much as a single software
What do you like best about the product?
The best part of ITAM (now ISAM) is undoubtfully the fact that it can integrate in a big IBM security infrastructure. Of course it gets the job done and allows a pretty good control over accesses, the SDI software capabilites that come along also are a plus since they allow for good control over your whole LDAP environment.
The last features implementations in the version 9.0.0.1 are simple but quite important making life easier for IT deliverers (especially the network implementations).
The last features implementations in the version 9.0.0.1 are simple but quite important making life easier for IT deliverers (especially the network implementations).
What do you dislike about the product?
The appliance version to where it is headed gives very little control over the system, this also means that the integration is of course easier. But one of the big upsides of ISAM is it's elasticity so not being able to fully control the system is often a big problem.
Also on a point-to-point comparison, ISAM could fall short if compared to other products, it's plus is really in integration with a more wide IBM security suite.
Also on a point-to-point comparison, ISAM could fall short if compared to other products, it's plus is really in integration with a more wide IBM security suite.
What problems is the product solving and how is that benefiting you?
Control over accesses, if correctly integrated we also managed to have full visibility over identities and user id syncronization and management (thanks to ISAM-ISIM/IGI integration)
Recommendations to others considering the product:
Think about the full picture, consider a wider IBM security solution to have full advantage.
Reasonable tool
What do you like best about the product?
It looks like it is a secure tool. You really trust on it when you see it's look and feel and the way messages are shown to the user. It is a very useful tool when you have many many users and passwords that change frequently and maybe have different lenghts or complexity requirements.
What do you dislike about the product?
This is something I don't like from this kind of tools, I completely forget my passwords, so when I don't have access via the tool, I forget it and need to change it. Never figured out how to improve this part of my process.
What problems is the product solving and how is that benefiting you?
Reduced number of Password Resets / Account Lockouts in more than 25%. Amazing value if you consider the efforts required to document and track all these requests.
Recommendations to others considering the product:
I cannot think of any recommendations to others. The only important thing is that you need to work closely with end users until they become familiar to the tool. Once that happens, you are done!
showing 121 - 125