| Unit Head System Implementor at Allied Bank Limited | 4.0 | I use IBM BPM and Security Verify Access for secure process automation, while Azure DevOps supports CI/CD and source control. The tools are reliable, though installation complexity and limited integration are challenges we carefully manage with expert support. |
| Information Technology Security Specialist at infoark | 4.0 | I found IBM Security Verify Access to be a strong identity and access management solution, excelling in multi-factor authentication with various methods like tokens and one-time passwords. However, the user interface could be more intuitive, and automation would be beneficial. |
| Architect at a tech services company with 10,001+ employees | 4.0 | I use IBM Security Verify Access for access management, finding it excellent for legacy applications due to easy SSO integration. While stable, scalable, and offering broad protocol support, its OIDC/OAuth SSO and just-in-time provisioning features need improvement. |
| Chief Information Security Officer at a insurance company with 501-1,000 employees | 4.0 | I find IBM Security Access Manager excellent for multi-factor authentication, stable, and scalable, especially within an IBM environment. However, its onboarding process is complex, and support for these issues is consistently poor. |
| Assitant Vice President at a financial services firm with 10,001+ employees | 3.5 | I use this product for access management, valuing its stability and UI. Setup is straightforward and scalability is good, but I find its lack of customization a major drawback. It should support Zero Trust. I rate it 7/10. |
| CEO, Founder at Finema | 4.0 | As a provider, I find IBM Security Access Manager practical, reliable, and scalable. However, it's a resource-heavy system, initially difficult to learn, and becomes very expensive for large user counts, making it unsuitable for SMBs. |
| Senior Network Engineer at IIS | 3.5 | I use IBM Security Access Manager for bank and university authentication, valuing its authorization. While stable and scalable with good support, I find the UI complex and wish for simplification. Overall, it's a good IAM solution. |
| Manager in Digital Identity at a financial services firm with 10,001+ employees | 4.0 | I find this solution offers powerful authentication and authorization, significantly increasing security. It's very stable, with good mobile features. However, configuration could be simplified, and I rate it 8/10 after eight years of use. |