Compare IBM Security Access Manager vs. Safe-T Secure Application Access

IBM Security Access Manager is ranked 17th in Access Management with 1 review while Safe-T Secure Application Access is ranked 7th in Access Management with 8 reviews. IBM Security Access Manager is rated 8.0, while Safe-T Secure Application Access is rated 7.8. The top reviewer of IBM Security Access Manager writes "Stable with a straightforward setup and good mobile features". On the other hand, the top reviewer of Safe-T Secure Application Access writes "The architecture is open to integration and development, making the product very flexible". IBM Security Access Manager is most compared with Okta, Microsoft Azure Active Directory Premium and ForgeRock, whereas Safe-T Secure Application Access is most compared with Zscaler Internet Access, F5 BIG-IP and Palo Alto Networks Prisma Access.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Use IBM Security Access Manager? Share your opinion.
Find out what your peers are saying about CyberArk, Okta, Microsoft and others in Access Management. Updated: November 2019.
378,570 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
The solution has powerful authentification and authorization. It offers a good way to increase security.

Read more »

the security level is very high. After we tested it and checked all the security aspects of the product, we found that it's highly secure.If you want a very flexible system that you can easily integrate, and develop interfaces for it or plug-ins to other application environments, it's probably the most flexibleSafe-T is very good for users because it has plug-in for Outlook.It's easy to use over the web. A user who is not in the office can use it and securely insert files.

Read more »

Cons
Configuration could be simplified for the end-user.

Read more »

One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents.The Outlook agent is not working well for installing it in the entire office.

Read more »

report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
378,570 professionals have used our research since 2012.
Ranking
17th
out of 26 in Access Management
Views
162
Comparisons
142
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
7th
out of 26 in Access Management
Views
1,080
Comparisons
255
Reviews
7
Average Words per Review
549
Avg. Rating
7.9
Top Comparisons
Compared 34% of the time.
Also Known As
ISAMSafe-T SDA, Safe-T, Safe-T Software-Defined Access
Learn
IBM
Safe-T
Overview

IBM Security Access Manager helps you simplify your users' access while more securely adopting web, mobile, IoT and cloud technologies. It can be deployed on-premises, in a virtual or hardware appliance or containerized with Docker. ISAM helps you strike a balance between usability and security through the use of risk-based access, single sign-on, integrated access management control, identity federation and mobile multi-factor authentication. Take back control of your access management with IBM Security Access Manager.



Safe-T is a provider of Zero Trust Access solutions which mitigate attacks on enterprises’ business-critical services and sensitive data, while ensuring uninterrupted business continuity. 

Safe-T’s cloud and on-premises solutions ensure that an organization’s access use cases, whether into the organization or from the organization out to the internet, are secured according to the “validate first, access later” philosophy of Zero Trust. 

This means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network or in the cloud. 

Safe-T’s wide range of access solutions reduce organizations’ attack surface and improve their ability to defend against modern cyberthreats. As an additional layer of security, our integrated business-grade global proxy solution cloud service enables smooth and efficient traffic flow, interruption-free service, unlimited concurrent connections, instant scaling and simple integration with our services. 

With Safe-T’s patented reverse-access technology and proprietary routing technology, organizations of all size and type can secure their data, services and networks against internal and external threats. 

At Safe-T, we empower enterprises to safely migrate to the cloud and enable digital transformation.

Offer
Learn more about IBM Security Access Manager
Learn About Safe-T's Software-Defined Perimeter Solution

Safe-T’s Software-Defined Access Suite takes SDP to the next level, revolutionizing Zero Trust network design. Download this eBook to find out how Safe-T helps you keep your data in the right hands.

Sample Customers
POST LuxembourgGovernment of Israel, eviCore Healthcore, Glen Imaging, Sarin, LBG, Rollomatic, Boegli-Gravures SA, Banque Heritage, Groupe Minoteries, Temenos, ZEK, RLM Finsbury, Harel Insurance, Meitav Dash
Find out what your peers are saying about CyberArk, Okta, Microsoft and others in Access Management. Updated: November 2019.
378,570 professionals have used our research since 2012.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Sign Up with Email