Fortra's Powertech Identity & Access Manager vs IBM Tivoli Access Manager [EOL] comparison

Cancel
You must select at least 2 products to compare!
Executive Summary

We performed a comparison between Fortra's Powertech Identity & Access Manager and IBM Tivoli Access Manager [EOL] based on real PeerSpot user reviews.

Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM).
To learn more, read our detailed Privileged Access Management (PAM) Report (Updated: March 2024).
768,740 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"HelpSystems Powertech's feature that I have found most valuable is its flexibility. It is able to be extended. A lot of the products these days, especially the ones on the cloud, are limited and can't handle all the use cases. Often there is not even a way to customize the application to meet uncommon use cases and HelpSystems provides an infrastructure that lends itself to the ability to be customized."

More Fortra's Powertech Identity & Access Manager Pros →

"The Verify feature: A push method which customers are going for.""The integration effort with the end application is quite straightforward and easy.""SAML 2.0.""Single Sign-On functionality is valuable because the core purpose of the product is to allow universal (or bespoke) SSO for application suites.""OAuth 2 is now the de facto standard for API protection and scoped authorized delegation. IBM TAM now supports OAuth 2 and can act as fully compliant OAuth 2 authorization server."

More IBM Tivoli Access Manager [EOL] Pros →

Cons
"In terms of what could be improved, I would say the support of the product. It's hard to get support for it. I think this is emblematic of the fact that they don't have a lot of employees who have long-term experience with it."

More Fortra's Powertech Identity & Access Manager Cons →

"An Amazon Machine Image (AMI) for the newer appliance versions for hosting the virtual appliances on AWS will help.""The self-service portal needs improvement.""The profiling element is incredibly robust, but also equally as complex, it requires an off-site course to be able to understand the context or the plethora of options available.""Multi-factor authentication with social integration needs to improve.""Looking at their roadmap, they have a broad grasp of the security features which the industry needs."

More IBM Tivoli Access Manager [EOL] Cons →

Pricing and Cost Advice
Information Not Available
  • "The IBM prices are, as ever, extortionate, even with a business partnership, and high levels of discounts."
  • More IBM Tivoli Access Manager [EOL] Pricing and Cost Advice →

    Ranking
    Views
    73
    Comparisons
    61
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Unranked
    In Privileged Access Management (PAM)
    Buyer's Guide
    Privileged Access Management (PAM)
    March 2024
    Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: March 2024.
    768,740 professionals have used our research since 2012.
    Comparisons
    Also Known As
    HelpSystems Powertech Identity & Access Manager, Powertech Identity & Access Manager, BoKS, BoKS ServerControl, Fox Technologies ApplicationControl, ApplicationControl
    Tivoli Access Manager, IBM Security Access Manager
    Learn More
    Fortra
    Video Not Available
    Overview

    Powertech Identity & Access Manager (BoKS) transforms your multi-vendor Linux and UNIX server environment into one centrally managed security domain. It simplifies your organization’s ability to enforce security policies, and control access to critical systems and information. With full control over accounts, access and privilege, IT and security teams can proactively prevent internal and external attacks on critical systems before they start.

    IBM Tivoli Access Manager is a robust and secure centralized policy management solution for e-business and distributed applications. IBM Tivoli Access Manager WebSEAL is a high performance, multi-threaded Web server that applies fine-grained security policy to the Tivoli Access Manager protected Web object space. WebSEAL can provide single sign-on solutions and incorporate back-end Web application server resources into its security policy.
    Sample Customers
    Integris Health
    Essex Technology Group Inc.
    Top Industries
    No Data Available
    REVIEWERS
    Government25%
    Financial Services Firm25%
    Insurance Company25%
    Energy/Utilities Company13%
    Company Size
    No Data Available
    REVIEWERS
    Small Business31%
    Midsize Enterprise7%
    Large Enterprise62%
    Buyer's Guide
    Privileged Access Management (PAM)
    March 2024
    Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: March 2024.
    768,740 professionals have used our research since 2012.

    Fortra's Powertech Identity & Access Manager is ranked 39th in Privileged Access Management (PAM) while IBM Tivoli Access Manager [EOL] doesn't meet the minimum requirements to be ranked in Privileged Access Management (PAM). Fortra's Powertech Identity & Access Manager is rated 5.0, while IBM Tivoli Access Manager [EOL] is rated 8.0. The top reviewer of Fortra's Powertech Identity & Access Manager writes "Inexperienced support for old product, but good flexibility for use case customization". On the other hand, the top reviewer of IBM Tivoli Access Manager [EOL] writes "Reverse proxy means applications need only minimal changes to support SSO with ISAM". Fortra's Powertech Identity & Access Manager is most compared with , whereas IBM Tivoli Access Manager [EOL] is most compared with .

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.