IBM Security Verify Access v10
IBM Security | IBM Security Verify Access v10.0.8.0Linux/Unix, Other IBM - 64-bit Amazon Machine Image (AMI)
Reviews from AWS Marketplace
0 AWS reviews
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
External reviews are not included in the AWS star rating for the product.
Work Programs
What do you like best about the product?
The ease of access and simplicity of tool are the top two qualities. Everything is very detailed, but easy to understand and in simple language. Does not slow down any equipment and provides confidence in personal info security along with that of the clients.
What do you dislike about the product?
I think they could lessen the cost in order to make affordable for everyone to use.
What problems is the product solving and how is that benefiting you?
Protection of internal information and the personal information of clients. It also helps with managing any potential threats, both internal and external.
Recommendations to others considering the product:
I would suggest this over any of the competitive products.
- Leave a Comment |
- Mark review as helpful
Great for your data user accountability
What do you like best about the product?
Ease of use. Scalability and agile data to new data analysis and use.
What do you dislike about the product?
Users can beat a loss with others data tools and analytics due to streamlined processes. Very unique in this way.
What problems is the product solving and how is that benefiting you?
Single sign on superior to competitors like Centrify!
Breathtaking stability and security features
What do you like best about the product?
IBM really worked with us to ensure the product was configured to our specific needs. They sent in a consultant to assess our needs before deployment started. This helped greatly.
What do you dislike about the product?
The sophistication of the product requires a learning curve from our team, and it wasn’t cheap.
What problems is the product solving and how is that benefiting you?
Provide our employees with access to their data across devices, platforms and systems.
great, easy to use app
What do you like best about the product?
Aside from the inexpensive price point, this product makes identity verification simple and easy to use.
What do you dislike about the product?
Authorization questions are pretty vague
What problems is the product solving and how is that benefiting you?
Avoiding security breaches
IBM CLOUD SECURITY IS A BUST!
What do you like best about the product?
If I had to say one positive is the price point. It’s cheap because it’s not the best program out there for what you need it to do.
What do you dislike about the product?
I’m really not a fan of IBM Cloud. I’ve used it in the past and quickly upgraded. It’s not easy to use and is not as secure with information as other competition programs.
What problems is the product solving and how is that benefiting you?
I was able to create secure information and store it somewhat securely but quickly transferred over to better software.
IBM Review
What do you like best about the product?
I think having IBM as such a trusted brand really helps us with credibility internally.
What do you dislike about the product?
It sometimes feels a little archaic in terms of tech
What problems is the product solving and how is that benefiting you?
Security is so huge for online biz
Recommendations to others considering the product:
It's worth it mainly just because of the brand but it also does what it needs to do- don't see a need to move around.
IBM S&AM Review
What do you like best about the product?
Probably one of the best access/secure management systems I've ever used. We implement this system on the back end for one of the portals we work with at my current company. This system integrates a way to verify and provide acces to clients for using one of our health portals. In accordance with HIPAA and releasing health records the portal utilizes IBM's Security and Identity assurance to validate a users true identity. It asks the user a set of Knowledge Based Authentication questions which is pulled from a public record sector and presents the user with the best possible choices to choose from very carefully. Once the system authorizes and grants permission to the user it grants full authority to that user. If the user changes any personal information it starts the process over treating that user as a new identity to confirm authorization for again.
What do you dislike about the product?
Sometimes certain authorization questions are a bit broad. Would be better to simplify this with more current inquiries.
What problems is the product solving and how is that benefiting you?
The business problems we are solving are avoiding any potential breaches and preventing our clients from recieving information that belongs to them only.
Recommendations to others considering the product:
Highly recommended
Un logiciel de sécurité fiable et inovant.
What do you like best about the product?
IBM Security Identity and Access Assurance centralise et automatise la gestion des profils utilisateur, l'authentification, les privilèges d’accès et les règles d'audit. Il complète le tout avec des fonctions de surveillance des utilisateurs et de rapports d'activités afin de détecter les situations non conformes à la politique de sécurité. Il vous permet d'améliorer l'assurance de l'identité, de réduire les risques de sécurité et de protéger vos ressources informatiques.
What do you dislike about the product?
Le trublion du logiciel à la demande tape d’abord sur IBM. "Je pense que la façon de comprendre l'avenir est de regarder le passé. Regardons ce que fait IBM dans les Mainframes. Nous savons tous qu’IBM vend encore beaucoup de ces gros ordinateurs centraux. Cela signifie simplement qu'il leur vend toujours une vieille technologie juste mise à niveau.
What problems is the product solving and how is that benefiting you?
Lors de mon utilisation, le software a pu inclure quatre progiciels IBM Security : IBM Security Access Manager (Advanced Access Control Module and Federation Module), IBM Security Access Manager for Enterprise Single Sign-On, IBM Security QRadar Log Manager et IBM Security Identity Governance Lifecycle.
Offre une solution de gestion des identités et des accès automatisée et basée sur des stratégies, qui permet de gérer efficacement les comptes utilisateur et les autorisations.
Fournit une connexion unique pratique et protégée qui renforce la sécurité des utilisateurs dans les environnements Web, Cloud et d'entreprise.
Aide à gérer la sécurité et la conformité, en veillant au respect de la stratégie de sécurité.
Offre une solution de gestion des identités et des accès automatisée et basée sur des stratégies, qui permet de gérer efficacement les comptes utilisateur et les autorisations.
Fournit une connexion unique pratique et protégée qui renforce la sécurité des utilisateurs dans les environnements Web, Cloud et d'entreprise.
Aide à gérer la sécurité et la conformité, en veillant au respect de la stratégie de sécurité.
Recommendations to others considering the product:
Un logiciel fiable mais trop couteux.
Indispensable pour assuré vos données informatiques
What do you like best about the product?
IBM Security Identity and Access Assurance est une solution intégrée de gestion des identités et des accès qui offre une gestion automatisée des identités et des accès pour divers environnements : entreprise, Web et Cloud. Cette solution peut aider à administrer, protéger et contrôler l'accès des utilisateurs aux ressources en ligne dans l'entreprise pour une sécurité et une conformité améliorées.
IBM Security Identity and Access Assurance centralise et automatise la gestion des profils utilisateur, l'authentification, les privilèges d’accès et les règles d'audit. Il complète le tout avec des fonctions de surveillance des utilisateurs et de rapports d'activités afin de détecter les situations non conformes à la politique de sécurité. Il vous permet d'améliorer l'assurance de l'identité, de réduire les risques de sécurité et de protéger vos ressources informatiques.
IBM Security Identity and Access Assurance centralise et automatise la gestion des profils utilisateur, l'authentification, les privilèges d’accès et les règles d'audit. Il complète le tout avec des fonctions de surveillance des utilisateurs et de rapports d'activités afin de détecter les situations non conformes à la politique de sécurité. Il vous permet d'améliorer l'assurance de l'identité, de réduire les risques de sécurité et de protéger vos ressources informatiques.
What do you dislike about the product?
Parmis les offres proposes par IBM je n'ai pas pu verifier toutes leur offres, parmis lesquelles :
Offre une solution de gestion des identités et des accès automatisée et basée sur des stratégies, qui permet de gérer efficacement les comptes utilisateur et les autorisations.
Fournit une connexion unique pratique et protégée qui renforce la sécurité des utilisateurs dans les environnements Web, Cloud et d'entreprise.
Aide à gérer la sécurité et la conformité, en veillant au respect de la stratégie de sécurité.
Offre une solution de gestion des identités et des accès automatisée et basée sur des stratégies, qui permet de gérer efficacement les comptes utilisateur et les autorisations.
Fournit une connexion unique pratique et protégée qui renforce la sécurité des utilisateurs dans les environnements Web, Cloud et d'entreprise.
Aide à gérer la sécurité et la conformité, en veillant au respect de la stratégie de sécurité.
What problems is the product solving and how is that benefiting you?
J'ai pu essayer ces logiciels ci et pu trouver des solutions a mes problèmes :
IBM Security Access Manager (Advanced Access Control Module and Federation Module), IBM Security Access Manager for Enterprise Single Sign-On, IBM Security QRadar Log Manager et IBM Security Identity Governance Lifecycle.
IBM Security Access Manager (Advanced Access Control Module and Federation Module), IBM Security Access Manager for Enterprise Single Sign-On, IBM Security QRadar Log Manager et IBM Security Identity Governance Lifecycle.
Recommendations to others considering the product:
Continuer a metre a jour les boucliers.
One of the best, not as much as a single software
What do you like best about the product?
The best part of ITAM (now ISAM) is undoubtfully the fact that it can integrate in a big IBM security infrastructure. Of course it gets the job done and allows a pretty good control over accesses, the SDI software capabilites that come along also are a plus since they allow for good control over your whole LDAP environment.
The last features implementations in the version 9.0.0.1 are simple but quite important making life easier for IT deliverers (especially the network implementations).
The last features implementations in the version 9.0.0.1 are simple but quite important making life easier for IT deliverers (especially the network implementations).
What do you dislike about the product?
The appliance version to where it is headed gives very little control over the system, this also means that the integration is of course easier. But one of the big upsides of ISAM is it's elasticity so not being able to fully control the system is often a big problem.
Also on a point-to-point comparison, ISAM could fall short if compared to other products, it's plus is really in integration with a more wide IBM security suite.
Also on a point-to-point comparison, ISAM could fall short if compared to other products, it's plus is really in integration with a more wide IBM security suite.
What problems is the product solving and how is that benefiting you?
Control over accesses, if correctly integrated we also managed to have full visibility over identities and user id syncronization and management (thanks to ISAM-ISIM/IGI integration)
Recommendations to others considering the product:
Think about the full picture, consider a wider IBM security solution to have full advantage.
showing 91 - 100