IBM Tivoli Access Manager vs. LastPass Enterprise

IBM Tivoli Access Manager is ranked 4th in Single Sign-On (SSO) with 13 reviews vs LastPass Enterprise which is ranked 8th in Single Sign-On (SSO) with 5 reviews. The top reviewer of IBM Tivoli Access Manager writes " I can integrate with in-house provisioning systems. The profiling element is complex. ". The top reviewer of LastPass Enterprise writes "Dashboard with a security score, along with the Security Challenge, are great features". IBM Tivoli Access Manager is most compared with Okta, Oracle Identity Manager (Oracle IAM) and CA SSO. LastPass Enterprise is most compared with Dashlane, Keeper and 1Password. See our IBM Tivoli Access Manager vs. LastPass Enterprise report.
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about IBM Tivoli Access Manager vs. LastPass Enterprise and other solutions.
310,623 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

The integration effort with the end application is quite straightforward and easy.Single Sign-On functionality is valuable because the core purpose of the product is to allow universal (or bespoke) SSO for application suites.SAML 2.0.OAuth 2 is now the de facto standard for API protection and scoped authorized delegation. IBM TAM now supports OAuth 2 and can act as fully compliant OAuth 2 authorization server.The Verify feature: A push method which customers are going for.

Read more »

Until now, I haven't found anything like the dashboard. It gives you a security score. I find that to be really great. The Sharing Center is really great as well. And the Security Challenge is really great too.The stability has been rock solid. A couple of years ago, they were breached. However, if you had two-factor authentication enabled, it didn't affect you. We did, so it has been good.This product helps keep us secure.Tech support has been good. We haven't needed it much, because it is not a complex application. There is not that much you have to do with it.The shared folders is an important feature. It's the primary feature we use. Also, the ability for LastPass to autofill and hide the passwords, so we don't have to keep changing passwords every time a person leaves, is valuable.Scalability is fine, no issues with that, especially now that they have added different user-level permissions. That has made it a lot easier to delegate out certain features to have other people do.Reduction in number of sensitive passwords stored insecurely on local systems.Increased security around password management for teams and collaborative efforts with external vendors.

Read more »

Multi-factor authentication with social integration needs to improve.The profiling element is incredibly robust, but also equally as complex, it requires an off-site course to be able to understand the context or the plethora of options available.The self-service portal needs improvement.An Amazon Machine Image (AMI) for the newer appliance versions for hosting the virtual appliances on AWS will help.Looking at their roadmap, they have a broad grasp of the security features which the industry needs.

Read more »

One thing I wish LastPass had is an integration with Active Directory, not for synchronizing users but to actually manage, in some way, privileged accounts by replacing the password of LastPass itself.It is not super feature laden. It does not stand out versus the competition.The biggest thing is there is no good way to have LastPass rotate passwords without human intervention. Right now, we have to go into each folder, then rotate and manually update each password. It can be done it by loading a bunch of passwords into a spreadsheet, but this makes the whole process insecure because then the passwords have been noted into a spreadsheet which have to be upload. We have to go into 40 to 50 applications and manually update passwords, because we don't view their solution of writing a bunch of passwords on a spreadsheet, then uploading them as a secure solution. This should be done internally within LastPass.We have issues from time to time where, for some reason, it just keeps auto logging-out the user and then, the next day, they'll come in and it will work just fine.The ability to set up an account expiration limit/date would be very useful.Our biggest issue over the years was around the stability of the LDAP sync to AD.The management through the plugin is poor. It consumes tons of client resources especially as an administrator.

Read more »

Pricing and Cost Advice
The IBM prices are, as ever, extortionate, even with a business partnership, and high levels of discounts.

Read more »

I have been involved with many password managers. Passportal, Secret Server, CyberArk, and BeyondTrust. I chose LastPass for our organization because of the pricing. The organization didn't want to implement something really expensive. LastPass, for what it's offering, for the price that it's offering the service, is unbeatable.It would be nice to do a quarterly true-up process with them versus having to buy 50 licenses at a time when we realize we're out, then we have to buy more. So far, they have been nice about letting us exceed our allotment and just letting us true-up on our own, but a more robust quarterly true-up process would be good.The pricing and licensing are okay. Basically, at the last contract negotiation, they attempted to jack the rate up and we just said, "No." We still did negotiations with them, but they bumped everything up quite a bit.The previous pricing was of good value. I don't really know, as of now, whether the new pricing is. The Enterprise license is $48 per license per year now. That is a steep increase of $24, which is what it was when we first signed up.You do not have to purchase licenses for your entire organization. You can scale as adoption grows.If you import from sources like XML, keepass, CSV files be sure to clean the import files, this reduces the adjustments in the slow tool itself.

Read more »

Use our free recommendation engine to learn which Single Sign-On (SSO) solutions are best for your needs.
310,623 professionals have used our research since 2012.
Avg. Rating
Avg. Rating
Top Comparisons
Compared 17% of the time.
Compared 16% of the time.
Compared 19% of the time.
Compared 18% of the time.
Compared 10% of the time.
Also Known As
Tivoli Access Manager, IBM Security Access Manager
IBM Tivoli Access Manager is a robust and secure centralized policy management solution for e-business and distributed applications. IBM Tivoli Access Manager WebSEAL is a high performance, multi-threaded Web server that applies fine-grained security policy to the Tivoli Access Manager protected Web object space. WebSEAL can provide single sign-on solutions and incorporate back-end Web application server resources into its security policy.

LastPass Enterprise is a complete login solution, designed for security. It secures your business and centralizes control of employee passwords and applications with Single Sign-On, a one-click access to every site and tool. LastPass Enterprise provides password management, directory integration which synchronizes users with Active Directory, LDAP and custom APIs. It also provides access to shared accounts, for users inside and outside the organization without losing accountability.

Learn more about IBM Tivoli Access Manager
Free Trial

Start your free 14-day Enterprise trial.

Sample Customers
Essex Technology Group Inc.Hootsuite, Truenorthlogic, Zirtual, CashStar, GoodData, Mainstream Technologies
Top Industries
Insurance Company33%
Financial Services Firm22%
Energy/Utilities Company11%
Financial Services Firm19%
Comms Service Provider14%
Marketing Services Firm8%
No Data Available
Company Size
Small Business30%
Midsize Enterprise11%
Large Enterprise59%
Small Business27%
Midsize Enterprise18%
Large Enterprise55%
No Data Available
Find out what your peers are saying about IBM Tivoli Access Manager vs. LastPass Enterprise and other solutions.
310,623 professionals have used our research since 2012.
We monitor all Single Sign-On (SSO) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email