Try our new research platform with insights from 80,000+ expert users
2020-01-26T09:26:00Z

What is your primary use case for IBM Security Access Manager?

Julia Miller - PeerSpot reviewer
  • 0
  • 2
PeerSpot user
5

5 Answers

Ateeq Rehman - PeerSpot reviewer
Real User
Top 5
2025-09-25T06:21:07Z
Sep 25, 2025
Search for a product comparison
AsifIqbal - PeerSpot reviewer
Real User
Top 20
2022-07-24T07:26:48Z
Jul 24, 2022
reviewer1784646 - PeerSpot reviewer
Real User
2022-03-25T21:39:28Z
Mar 25, 2022
Pakorn Leesakul - PeerSpot reviewer
Real User
Top 10
2021-05-18T14:04:48Z
May 18, 2021
NS
Real User
2020-01-26T09:26:00Z
Jan 26, 2020
Learn what your peers think about IBM Security Verify Access. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
870,697 professionals have used our research since 2012.
IBM Security Verify Access is a complete authorization and network security policy management solution. It provides end-to-end protection of resources over geographically dispersed intranets and extranets.Provides a wide range of built-in authenticators and supports external authenticators.Provides permit and deny decisions for protected resources requests in the secure domain through the authorization API.Manages secure access to private internal network-based resources by using the public...
Download IBM Security Verify Access ReportRead more