Try our new research platform with insights from 80,000+ expert users

What needs improvement with IBM Security Access Manager?

Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot
  • 0
  • 10
PeerSpot user

7 Answers

Last answered Sep 25, 2025
Ateeq Rehman - PeerSpot reviewer
Unit Head System Implementor at Allied Bank Limited
Real User
Top 5Leaderboard
Sep 25, 2025
Search for a product comparison
Jared Ochieng - PeerSpot reviewer
Information Technology Security Specialist at infoark
Real User
Top 5Leaderboard
Mar 13, 2024
AsifIqbal - PeerSpot reviewer
Chief Information Security Officer at a financial services firm with 1,001-5,000 employees
Real User
Top 20
Jul 24, 2022
reviewer1784646 - PeerSpot reviewer
Assitant Vice President at a financial services firm with 10,001+ employees
Real User
Mar 25, 2022
Pakorn Leesakul - PeerSpot reviewer
CEO, Founder at Finema
Real User
Top 10
May 18, 2021
NS
Senior Network Engineer at IIS
Real User
Jan 26, 2020
Learn what your peers think about IBM Security Verify Access. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,259 professionals have used our research since 2012.
reviewer1225032 - PeerSpot reviewer
Manager in Digital Identity at a financial services firm with 10,001+ employees
Real User
Nov 17, 2019
IBM Security Verify Access is a complete authorization and network security policy management solution. It provides end-to-end protection of resources over geographically dispersed intranets and extranets.Provides a wide range of built-in authenticators and supports external authenticators.Provides permit and deny decisions for protected resources requests in the secure domain through the authorization API.Manages secure access to private internal network-based resources by using the public...
Download IBM Security Verify Access ReportRead more