IBM Security Verify Access v10
IBM Security | IBM Security Verify Access v10.0.8.0Linux/Unix, Other IBM - 64-bit Amazon Machine Image (AMI)
Reviews from AWS Marketplace
0 AWS reviews
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
External reviews are not included in the AWS star rating for the product.
An access security for companies that want to increase security
What do you like best about the product?
A communication system that allows connections and processes to be more secure, in my professional experience has made data accessibility more secure, guaranteeing that the information of clients and partners is protected and they can only access the certain qualified personnel
What do you dislike about the product?
There are no capabilities in this tool that I consider to be improvements or have not worked for me, on the contrary, it has increased the confidence and security of team members and users in general
What problems is the product solving and how is that benefiting you?
In our organization it has been a fairly complete tool mainly due to the usability of the tool on various devices, it has a single start system allowing access to be limited to any user, and it is also quite functional from mobile devices, guaranteeing that without problems can access data and complete security systems
- Leave a Comment |
- Mark review as helpful
A tool for verification and storage of information
What do you like best about the product?
This tool is quite complete and easy to deploy in companies. I like it because, beyond being a security tool, it is a system that generates up-to-date reports on access and in turn protects business data without inconvenience. It even has the option to test it in an accessible way so that those who do not know or have implemented it before having the option to test it and apply it to their organization
What do you dislike about the product?
Within our system it is essential to authenticate access, something essential when the company has several departments and workers who can constantly have access to the company's private data, account consists of two steps, or even a multifactor authentication system, something that generates even more confidence in its functionalities
What problems is the product solving and how is that benefiting you?
I do not have negative criticism towards this system, those who have used IBM tools know that one of its characteristics is its security, it is very good and it can be deployed in any
Is the type of access solution for large organizations
What do you like best about the product?
it is the type of tool that has an understandable structure as well as is secure, which is one of its characteristics, it is the type of tool that improves the experience in terms of security and identity control that is usually had on this type of system, it is also part of the functionalities that such a well-known brand provides as services, something that also undoubtedly influences a lot in the decisions that are required as a supplier
What do you dislike about the product?
I have no problems, it is a practically necessary system in any company, mainly with the single access system, since it reduces the time in which professionals can start their functions without access limitations
What problems is the product solving and how is that benefiting you?
In our organization it has provided a high-security value, something that undoubtedly guarantees labor efficiencies and access management in less time without losing the security system that is required, it is implemented because it allows unique access, reducing the time in that we have the information and have security systems that can be customized to what we require as an organization
Protection tool and business security service
What do you like best about the product?
I like this tool because it allows us in a very comfortable way to have protection and an excellent security service for any company, allowing it to prosper in the face of any type of uncertainty. It allows us a modern approach with its security strategies, offering confidence from the beginning to always continue. forward with success for any company
What do you dislike about the product?
I like this tool because of all the protection it offers us in order to have a good security service. I like everything it offers. I don't like anything about this tool because it is very good when used
What problems is the product solving and how is that benefiting you?
By using this tool in the company, the security strategy is very comfortably aligned, it gives us the option of integrating several solutions designed mainly to protect each active digital user, and implement defenses when any threat is suspected that is constantly increasing and thus help to manage risk more effectively and responsively
Access control in general, in a safe way
What do you like best about the product?
This is a necessary system for any organization, in general I can say that I like it mainly because despite being a system with a high level of seriousness it is not presented as a complicated system, this particular tool manages access through a system of secure authentication to facilitate even faster income but without losing security
What do you dislike about the product?
I have no problems mainly because it has worked for me to comply with the security that had been a concern for our organization, plus it is easy to implement, a practically necessary tool in all companies of these times, allowing processes to be carried out without failures or leaks of information
What problems is the product solving and how is that benefiting you?
Within the organization it has been of great help because it does not imitate, it has high mobility capabilities, which means that even through smartphones it is possible to access data and authorized cybernetic places in the organization, access can be recovered through secure shipments and code and more methods to control that the information or business applications are protected
Identity protection in a reliable way
What do you like best about the product?
What I like about this tool is that it allows online management to be secure, this is because many systems currently work with online connections or save information directly in the cloud, so it is necessary to have a tool that protects each access to that information in a reliable way as is a brand as well known as this
What do you dislike about the product?
I have no criticism with this tool, I consider that it goes one step further to professional requests, it is quite good and functional, I trust the services and the updates in its functions
What problems is the product solving and how is that benefiting you?
A feature in which this tool has been one of the best is in centralizing access, giving even more control over the opportunities to access critical information of the organization, it is quite easy to implement and quickly regardless of the organization or the industry where you work
Recommendations to others considering the product:
I like this tool because it is quite professional, it is known and considered by many to be one of the best, it is easy to deploy and, above all, safe.
Overall experience is good, I'd recommend my friend.
What do you like best about the product?
The best thing is the ease of use by also maintaining the security of the system. We use embedded different tools to provide the solution needed as per the business requirement.
What do you dislike about the product?
To don't personally feel any downside as concerned on the security side. As long as the system is safe and sound. I believe the current approach is working more that expected.
What problems is the product solving and how is that benefiting you?
This approach help is building a safe environment to work and keep the data. This benefits me by uploading the sensitive information without any second thoughts of the security.
IBM Security veriffy is deep AI powered context for IAM
What do you like best about the product?
Identity as a Service solution that deli
What do you dislike about the product?
r workforce modernization and consumer digital transformation
What problems is the product solving and how is that benefiting you?
It help enable effective implementation and maintenance of IAM solutions to optimize implementation of security verify solution
TAM | Worth the Premium
What do you like best about the product?
Using RSA, Citrix and several other platforms in a mix of solutions, i find Tivoli to be the most granular from a admin point of view and most simple, secure, at the customer/end-user level.
What do you dislike about the product?
I only dislike the pricing schematics and how we renew our subs and support every year. The unit structure I find complicated and expensive. It is quite possible not utilizing all the MFA, SSO feature sets to their fullest but I understand that could be a conversation to have at the partner level.
What problems is the product solving and how is that benefiting you?
We originally were using OKTA for dashboards and a sandbox for our users to VPN to. Interface alone did not take to our end users 'likability'. Not to mention apps, folders, files would be constantly shared between local and cloud storage and data disparity in/externally was imminent.
Recommendations to others considering the product:
Leverage partner and manufacturer pre-sales, implementation and knowledge transfer resources as much as you can upfront and budget 10-15% if you feel you require more for professional services.
Great platform with an amazing interface
What do you like best about the product?
Swift and easy integration for a fully functional access management solution both internally and externally.
What do you dislike about the product?
I wish there were a centralized option for WebSEAL management. This is handled on an individual appliance basis. It is quite easy to manually deploy a standard configuration but if had the option to be included as a sub-function of the cluster, that would be nice.
What problems is the product solving and how is that benefiting you?
The log management and the lack of any centralized management at all. In our environment with many interfaces, the manual consolidation of the log data for session tracking or other investigations can become messy.
showing 71 - 80