IBM Tivoli Access Manager vs UserLock

IBM Tivoli Access Manager is ranked 5th in Identity and Access Management (IAM) with 16 reviews vs UserLock which is ranked 42nd in Identity and Access Management (IAM) with 1 review. The top reviewer of IBM Tivoli Access Manager writes " I can integrate with in-house provisioning systems. The profiling element is complex. ". The top reviewer of UserLock writes "Detecting and responding to security threats by blocking the user is a valuable feature". IBM Tivoli Access Manager is most compared with Oracle Identity Manager (Oracle IAM), CyberArk Privileged Access Security and Okta. UserLock is most compared with CA Identity Manager (CA IAM), SailPoint IdentityIQ and Araxid.
Cancel
You must select at least 2 products to compare!
+Add products to compare
Most Helpful Review
Find out what your peers are saying about CyberArk, Oracle, SailPoint and others in Identity and Access Management (IAM).
288,321 professionals have used our research since 2012.

Quotes From Members Comparing IBM Tivoli Access Manager vs UserLock

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Pros
The integration effort with the end application is quite straightforward and easy.Single Sign-On functionality is valuable because the core purpose of the product is to allow universal (or bespoke) SSO for application suites.SAML 2.0.OAuth 2 is now the de facto standard for API protection and scoped authorized delegation. IBM TAM now supports OAuth 2 and can act as fully compliant OAuth 2 authorization server.The Verify feature: A push method which customers are going for.

Read more »

Detecting and responding to security threats by blocking the user is a valuable feature.

Read more »

Cons
Multi-factor authentication with social integration needs to improve.The profiling element is incredibly robust, but also equally as complex, it requires an off-site course to be able to understand the context or the plethora of options available.The self-service portal needs improvement.An Amazon Machine Image (AMI) for the newer appliance versions for hosting the virtual appliances on AWS will help.Looking at their roadmap, they have a broad grasp of the security features which the industry needs.

Read more »

Productivity monitoring could be improved.

Read more »

Pricing and Cost Advice
The IBM prices are, as ever, extortionate, even with a business partnership, and high levels of discounts.

Read more »

Information Not Available
report
Use our free recommendation engine to learn which Identity and Access Management (IAM) solutions are best for your needs.
288,321 professionals have used our research since 2012.
Ranking
RANKING
Views
9,285
Comparisons
3,317
Reviews
16
Followers
769
Avg. Rating
8.0
Views
903
Comparisons
405
Reviews
0
Followers
429
Avg. Rating
N/A
Top Comparisons
Top Comparisons
Compared 11% of the time.
See more IBM Tivoli Access Manager competitors »
Compared 12% of the time.
Compared 10% of the time.
See more UserLock competitors »
Also Known As
Also Known AsTivoli Access Manager, IBM Security Access Manager
Website/Video
Website/VideoIBM
IS Decisions
Overview
OverviewIBM Tivoli Access Manager is a robust and secure centralized policy management solution for e-business and distributed applications. IBM Tivoli Access Manager WebSEAL is a high performance, multi-threaded Web server that applies fine-grained security policy to the Tivoli Access Manager protected Web object space. WebSEAL can provide single sign-on solutions and incorporate back-end Web application server resources into its security policy.Protect, detect and react to all user's access to Microsoft Windows Server-based Networks. UserLock offers stronger security for Windows user logins, without impeding end users or frustrating IT teams. Harden your defense against unauthorized network access and compromised credentials. Access Control & Protection: Set and enforce non-intrusive, context-aware access controls that define network access conditions for all users. Detection & Response: Real-time monitoring and risk detection Tools immediately alert you to suspicious logon activity so you can take action quickly - crucially before that activity becomes a serious problem. Auditing & Reporting: Record, centralize and audit all network logon events, across the whole network for comprehensive reports and detailed insights.
OFFER
Learn more about IBM Tivoli Access Manager
Learn more about UserLock
Sample Customers
Sample CustomersEssex Technology Group Inc.Barclays, US Department of Justice, National Bank of Kuwait, Turkish Aerospace, New York Albany School District, Regtransfers, University of Kent, Camden City School District, Oklahoma City Public Schools, Bank of Cyprus, Detran-PE: Pernambuco State Traffic Department
Top Industries
Top Industries
REVIEWERS
Insurance Company
33%
Government
22%
Financial Services Firm
22%
Energy/Utilities Company
11%
VISITORS READING REVIEWS
Financial Services Firm
19%
Government
18%
Comms Service Provider
12%
Marketing Services Firm
8%
No Data Available
Company Size
Company Size
REVIEWERS
Small Business
30%
Midsize Enterprise
11%
Large Enterprise
59%
VISITORS READING REVIEWS
Small Business
27%
Midsize Enterprise
18%
Large Enterprise
55%
No Data Available
Find out what your peers are saying about CyberArk, Oracle, SailPoint and others in Identity and Access Management (IAM).
Download now
288,321 professionals have used our research since 2012.
We monitor all Identity and Access Management (IAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email