IBM Security Verify Access Valuable Features

Gaurav Gaurav - PeerSpot reviewer
Architect at a tech services company with 10,001+ employees

It is easy to use. It can be adopted very quickly.

It is a virtual appliance, and it supports on-cloud and on-prem deployments. It can be very quickly installed on the cloud as well as on-prem, which is the beauty of this solution.

From the integration point of view, it supports SAML, OIDC, and OAuth. For legacy applications that don't have support for SAML and other new protocols, it provides single sign-on access to end-users. From the integration compatibility point of view, it is highly capable.

View full review »
DM
Assitant Vice President at a financial services firm with 10,001+ employees

Its stability and UI are most valuable.

View full review »
Jared Ochieng - PeerSpot reviewer
Information Technology Security Specialist at infoark

The authentication process with IBM Security Verify Access is good and is considered one of the best identity and access management solutions. It helps with multi-factor authentication. 

It offers multiple authentication methods like tokens and one-time passwords, enhancing security. It also includes features like password vaults and single sign-on, streamlining the access process for remote and local users across different solutions.

The tool provides a password vault, single sign-on, and multifactor authentication. It offers various authentication methods like fingerprint integration, one-time passwords, or tokens sent via email or SMS. This ensures secure access to your accounts by providing multiple authentication options.

The policy control feature allows you to set authentication measures and policies for your organization's identity governance. This feature helps create standardized policies and organize them into groups based on departments or specific needs. It simplifies access management for both administrators and users. 

IBM Security Verify Access can be integrated with almost any solution using APIs. The time required for integration depends on whether the solution is out of the box or custom. Out-of-the-box solutions can be integrated quickly, typically within a few days or hours, while custom solutions may require additional steps and take longer to integrate.

View full review »
Buyer's Guide
Access Management
March 2024
Find out what your peers are saying about IBM, Microsoft, Okta and others in Access Management. Updated: March 2024.
765,234 professionals have used our research since 2012.
AsifIqbal - PeerSpot reviewer
Chief Information Security Officer at a financial services firm with 1,001-5,000 employees

The most valuable feature of IBM Security Access Manager, at least for my company, is multi-factor authentication. That's the only feature my company is using. The solution works well and has no glitches. IBM Security Access Manager is a very good solution, so my company is still using it.

View full review »
PL
CEO, Founder at Finema

I have found this solution to be really practical and when a user wants to log in, it is effortless and runs smooth. 

View full review »
MR
Manager in Digital Identity at a financial services firm with 10,001+ employees

The mobile features of the solution are very good. Users can enroll via QR code. The product also has a very small firewall application. 

The solution has powerful authentification and authorization. It offers a good way to increase security.

View full review »
NS
Senior Network Engineer at IIS

The most valuable feature is the authorization.

View full review »
Buyer's Guide
Access Management
March 2024
Find out what your peers are saying about IBM, Microsoft, Okta and others in Access Management. Updated: March 2024.
765,234 professionals have used our research since 2012.