Try our new research platform with insights from 80,000+ expert users

What do you like most about IBM Security Access Manager?

Julia Miller - PeerSpot reviewer
Community Director at PeerSpot
  • 0
  • 3
PeerSpot user

6 Answers

Last answered Mar 13, 2024
Jared Ochieng - PeerSpot reviewer
Information Technology Security Specialist at infoark
Real User
Top 5Leaderboard
Mar 13, 2024
Search for a product comparison
AsifIqbal - PeerSpot reviewer
Chief Information Security Officer at a financial services firm with 1,001-5,000 employees
Real User
Top 20
Jul 24, 2022
reviewer1784646 - PeerSpot reviewer
Assitant Vice President at a financial services firm with 10,001+ employees
Real User
Mar 25, 2022
Pakorn Leesakul - PeerSpot reviewer
CEO, Founder at Finema
Real User
Top 10
May 18, 2021
NS
Senior Network Engineer at IIS
Real User
Jan 26, 2020
reviewer1225032 - PeerSpot reviewer
Manager in Digital Identity at a financial services firm with 10,001+ employees
Real User
Nov 17, 2019
Learn what your peers think about IBM Security Verify Access. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,259 professionals have used our research since 2012.
IBM Security Verify Access is a complete authorization and network security policy management solution. It provides end-to-end protection of resources over geographically dispersed intranets and extranets.Provides a wide range of built-in authenticators and supports external authenticators.Provides permit and deny decisions for protected resources requests in the secure domain through the authorization API.Manages secure access to private internal network-based resources by using the public...
Download IBM Security Verify Access ReportRead more