Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

IBM Security Verify Access v10 (Legacy)

IBM Security | IBM Security Verify Access v10.0.4.0

Linux/Unix, Other IBM - 64-bit Amazon Machine Image (AMI)

Reviews from AWS Marketplace

0 AWS reviews
  • 5 star
    0
  • 4 star
    0
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

92 reviews
from G2

External reviews are not included in the AWS star rating for the product.


    Eduardo L.

Great platform with an amazing interface

  • November 22, 2019
  • Review provided by G2

What do you like best about the product?
Swift and easy integration for a fully functional access management solution both internally and externally.
What do you dislike about the product?
I wish there were a centralized option for WebSEAL management. This is handled on an individual appliance basis. It is quite easy to manually deploy a standard configuration but if had the option to be included as a sub-function of the cluster, that would be nice.
What problems is the product solving and how is that benefiting you?
The log management and the lack of any centralized management at all. In our environment with many interfaces, the manual consolidation of the log data for session tracking or other investigations can become messy.


    Telecommunications

Excellent choice

  • October 30, 2019
  • Review provided by G2

What do you like best about the product?
The power to leverage all identity components into one is very powerfull. You gain enormous power over handling and administration of many many things with ease, dream of any person involved.
What do you dislike about the product?
It can be very time consuming to setup, of it depends on project and scope but even implementing it in the middle of something is doable with deep involvement of anyone who knows what they are doing. Of course the best way is from scratch.
What problems is the product solving and how is that benefiting you?
With more than 1000 users on more than 100 systems you can imagine. Nuff said :-)
Of course those numbers are small compared to some but still, when not in order the chaos reigns.
Recommendations to others considering the product:
It's tough cookie but worth it.


    Hashim M.

Access management made simple

  • October 29, 2019
  • Review provided by G2

What do you like best about the product?
Now it is appliance based and more of a turn key solution. They also provide a rest api to programmatically manage the configuration of the environment. I also like the snapshot feature for collecting logs for pmr
What do you dislike about the product?
There is not much to dislike however there is a small.greivance in that the appliance admin console only viewable with firefox and not ie
What problems is the product solving and how is that benefiting you?
I am solving access management problems


    Computer Hardware

Wonderful product requiring more Devops

  • October 02, 2019
  • Review provided by G2

What do you like best about the product?
The rich capabilities in terms of Saml, oauth , open id connect. ISAM is so flexible that it can be hold the federation but not the identities.
What do you dislike about the product?
Lack of better networking for appliances, docker image limitations , require more fine tuned devops capabilities
What problems is the product solving and how is that benefiting you?
We use ISAM for single sign on capabilities like saml and oauth for our mobile applications ..
Recommendations to others considering the product:
Analyze the networking capabilities and devops capabilities well before investing in this product


    Per .

A great access management software

  • September 17, 2019
  • Review verified by G2

What do you like best about the product?
Capabilities to modify end user experience
What do you dislike about the product?
I can't say any thing that I dislike at the moment
What problems is the product solving and how is that benefiting you?
MFA, protecting web services with OIDC


    Information Technology and Services

Securely Manage Users Access

  • May 30, 2019
  • Review provided by G2

What do you like best about the product?
Image file for installation, Quick installation, Rich user interface where we can manage all the servers
What do you dislike about the product?
Everything is automated, no scope for running the commands, so there will be no learning and satisfaction
What problems is the product solving and how is that benefiting you?
Protecting backend applications, enabling single sign on and federated single sign on to the users for internal and external enterprise applications, managing and restricting user access
Recommendations to others considering the product:
Protect your blackened applications, manage user access levels


    Information Technology and Services

Access Management

  • May 28, 2019
  • Review provided by G2

What do you like best about the product?
Protecting backend applications, managing users in the enterprise by applying policies like ACL, POP and Authorization rules. Restricting the access levels
What do you dislike about the product?
Installation and configuration takes a lot of time, needs to install lot many components
What problems is the product solving and how is that benefiting you?
Enabling single sign on to the enterprise and federated application, providing access to the users, managing access and access levela
Recommendations to others considering the product:
Use IBM TAM to manage login to multi applications, managing access to the users in organisation, to protect backend applications


    Andy R.

A mature and stable "must-have" security-layer enterprise component

  • April 07, 2019
  • Review provided by G2

What do you like best about the product?
The ISAM appliance has grown from the Tivoli days into a key component of our security posture. Providing inbound, outbound reverse proxying functions as well as SSO functionality with great stability.
What do you dislike about the product?
Lack of user-level command line tools is sometimes cumbersome - scripting must all be done via REST API. CLI is only available for the single admin user account.
What problems is the product solving and how is that benefiting you?
Securing via proxy our inbound and outbound traffic. We're also implementing SSO and AAC functions.
Recommendations to others considering the product:
I would consider this product line to be "best in class". Based on WebSphere Liberty "under the covers" it is stable, scalable, and secure.


    Information Technology and Services

My honest review for IBM Cloud Identity Service

  • December 23, 2018
  • Review provided by G2

What do you like best about the product?
IBM Security Identity and access Assurance centralizes and automates user profile management, authentication. It complements it with user monitoring and activity reporting to detect situations that do not comply with the security policy. It's helps you improve identity assurance, reduces security risks, and protect your IT resources and its quite easy to use and probably one of the best systems I had used.
What do you dislike about the product?
I don't find any issue in IBM Cloud Identity Service for now.
What problems is the product solving and how is that benefiting you?
Its pretty great for storing information safely because it provides us automated and access management solution that manages user accounts and permission.


    Utilities

Optimization and Flexibility of cloud service

  • December 20, 2018
  • Review verified by G2

What do you like best about the product?
Secure file and folders storage in cloud service
What do you dislike about the product?
low Flexible and not optimized for sort and accessing files and folders
What problems is the product solving and how is that benefiting you?
need an API Strong with AI-based technology
Recommendations to others considering the product:
Ability to keep files and folders securely.