Compare IBM Security Access Manager vs. Safe-T Secure Application Access

IBM Security Access Manager is ranked 15th in Access Management with 2 reviews while Safe-T Secure Application Access is ranked 16th in Access Management. IBM Security Access Manager is rated 7.6, while Safe-T Secure Application Access is rated 0. The top reviewer of IBM Security Access Manager writes "Secure access with authentication and good technical support, but needs a more simplified user interface". On the other hand, IBM Security Access Manager is most compared with Okta Workforce Identity, Microsoft Azure Active Directory Premium and ForgeRock, whereas Safe-T Secure Application Access is most compared with Prisma Access by Palo Alto Networks , Zscaler Internet Access and OpenVPN.
Cancel
You must select at least 2 products to compare!
Find out what your peers are saying about CyberArk, Okta, Microsoft and others in Access Management. Updated: March 2020.
407,538 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
407,538 professionals have used our research since 2012.
Ranking
15th
out of 31 in Access Management
Views
424
Comparisons
350
Reviews
2
Average Words per Review
227
Avg. Rating
7.5
16th
out of 31 in Access Management
Views
1,051
Comparisons
334
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
Top Comparisons
Also Known As
ISAMSafe-T SDA, Safe-T, Safe-T Software-Defined Access
Learn
IBM
Safe-T
Overview

IBM Security Access Manager helps you simplify your users' access while more securely adopting web, mobile, IoT and cloud technologies. It can be deployed on-premises, in a virtual or hardware appliance or containerized with Docker. ISAM helps you strike a balance between usability and security through the use of risk-based access, single sign-on, integrated access management control, identity federation and mobile multi-factor authentication. Take back control of your access management with IBM Security Access Manager.



Safe-T is a provider of Zero Trust Access solutions which mitigate attacks on enterprises’ business-critical services and sensitive data, while ensuring uninterrupted business continuity. 

Safe-T’s cloud and on-premises solutions ensure that an organization’s access use cases, whether into the organization or from the organization out to the internet, are secured according to the “validate first, access later” philosophy of Zero Trust. 

This means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network or in the cloud. 

Safe-T’s wide range of access solutions reduce organizations’ attack surface and improve their ability to defend against modern cyberthreats. As an additional layer of security, our integrated business-grade global proxy solution cloud service enables smooth and efficient traffic flow, interruption-free service, unlimited concurrent connections, instant scaling and simple integration with our services. 

With Safe-T’s patented reverse-access technology and proprietary routing technology, organizations of all size and type can secure their data, services and networks against internal and external threats. 

At Safe-T, we empower enterprises to safely migrate to the cloud and enable digital transformation.

Offer
Learn more about IBM Security Access Manager
Learn About Safe-T's Software-Defined Perimeter Solution

Safe-T’s Software-Defined Access Suite takes SDP to the next level, revolutionizing Zero Trust network design. Download this eBook to find out how Safe-T helps you keep your data in the right hands.

Sample Customers
POST LuxembourgGovernment of Israel, eviCore Healthcore, Glen Imaging, Sarin, LBG, Rollomatic, Boegli-Gravures SA, Banque Heritage, Groupe Minoteries, Temenos, ZEK, RLM Finsbury, Harel Insurance, Meitav Dash
Find out what your peers are saying about CyberArk, Okta, Microsoft and others in Access Management. Updated: March 2020.
407,538 professionals have used our research since 2012.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.