Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

IBM Security Verify SaaS

IBM Security | 1

Reviews from AWS Marketplace

0 AWS reviews
  • 5 star
    0
  • 4 star
    0
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

104 reviews
from G2

External reviews are not included in the AWS star rating for the product.


    Brent H.

Very easy to install and use, even as a first-time user.

  • October 13, 2022
  • Review verified by G2

What do you like best about the product?
Having a secure 2 factor app that is easy to use
What do you dislike about the product?
Nothing so far seems to work and is easy to use
What problems is the product solving and how is that benefiting you?
A easy to use 2 MFA soultion


    Islam S.

my experience with IBM Security is excellent

  • October 12, 2022
  • Review provided by G2

What do you like best about the product?
I liked the dashboard and apps I could attach.
What do you dislike about the product?
Switched smoothly between tabs and no thing else.
What problems is the product solving and how is that benefiting you?
Protect the company network environment from cyber attacks.


    Antonio José G.

security solutions tool

  • October 07, 2022
  • Review provided by G2

What do you like best about the product?
I like this tool for its simple, effective and practical way of using it, it promotes business growth among its clients in a way that allows them to focus with great peace of mind on their existing businesses, showing visible cyber security solutions in the same way that they are not detected.
What do you dislike about the product?
I do not dislike this tool at all because it is very useful and effective when using it, allowing existing service solutions to be more practical, such as services, and focus resources on monitoring internal threats and attacks.
What problems is the product solving and how is that benefiting you?
This tool is of good use for any organization that needs to successfully organize and promote a greater growth of its company among its clients, thus having a successful result and showing visible and non-visible security solutions.


    Alejandra G.

Safer management due to access control processes

  • October 04, 2022
  • Review provided by G2

What do you like best about the product?
This security system works in a way capable of creating authentication solutions that increase security and control access to business security systems, such as data management, development or elimination of special applications for the organization, this tool differs from Others even allow the authentication parameters to be displayed, giving even more opportunities and business access controls. For those who deploy this tool, they understand and know that IBM tools tend to be quickly adaptable and flexible.
What do you dislike about the product?
It is not a difficult tool to use; its capabilities are oriented to safer jobs in less time due to the speed of response of the processes and the reliability of the processes
What problems is the product solving and how is that benefiting you?
There are many functions that can be used automatically; many of these functions, such as access control, are performed even without a human user constantly on the lookout, becoming a constant security solution for large or medium-sized companies that are constantly expanding their operations.Systems and augmentation of personnel capable of deliberately accessing the system


    Information Technology and Services

Participating in the Identity Zero Trust Hands On Labs with IBM Spain

  • October 04, 2022
  • Review verified by G2

What do you like best about the product?
Comprehensive Identity Management solution, with flexible deployment options. Any use case that you can think of is already covered.
What do you dislike about the product?
Some times the old names (IGI, etc.) need to be refered to map to the new "Security Verify" brand.
What problems is the product solving and how is that benefiting you?
As a partner, every customer need is solved


    Nelson F.

Accessibility management that reinforces the security and continuity of the system

  • October 04, 2022
  • Review provided by G2

What do you like best about the product?
It is part of the improvements in cybersecurity of the IBM company. This, accompanied by a complete and understandable visualization, supposes a system that is easy to implement and that also performs its functions in an understandable way, this system allows verifying and managing access to business systems, You can even establish the distinctive access parameters of the organization. In addition, the system is quite functional from various devices, also benefiting those who are in constant mobilization.
What do you dislike about the product?
It requires prior knowledge with robotic automation systems. I personally recommend understanding the tool to manage it correctly if you want to have the confidence that your access to business systems will be as secure as possible.
What problems is the product solving and how is that benefiting you?
It is quite good for verifying IPs and even for confirmations of geographically established sites, creating a barrier against intrusion or damage to data or business systems, the IBM solution has been growing and updating more to the requirements of the new positions companies and systems of work something that makes it one of the most profitable and reliable security tools of its kind


    Samanta P.

An excellent protection and authentication product

  • September 30, 2022
  • Review provided by G2

What do you like best about the product?
We have very good experience with the product. During that time, the product was expanded with all the state-of-the-art features we needed to address today's requirements. In addition to that we can say that what we like the most about this tool are its very powerful reverse proxy functionalities and very good implementation of user authentication methods and there are also many more features that make us feel that it is one of the best tools that we have. we have.
What do you dislike about the product?
In my personal opinion we have not found any fault with this product since its objective is to facilitate and simplify user access. Integration with other IBM products went smoothly. So we are very comfortable and we have not found any fault.
What problems is the product solving and how is that benefiting you?
This tool helped us a lot as this tool helped us meet regularity and security requirements regarding granular access and authorization. In addition to that we also use IBM Security Verify to manage our company's security infrastructure/framework. We run a hybrid cloud model with employees working both on-premises and remotely.


    Albert R.

A very reliable and safe tool for the user

  • September 28, 2022
  • Review provided by G2

What do you like best about the product?
What I like the most about this tool is that it is one of the best tools when it comes to implementing data security. The general database to ensure the smooth operation of the processes and the database makes it more reliable. In addition to that it has allowed me to maintain access control and improve experiences with audits.
What do you dislike about the product?
In my personal opinion, I have not found fault with this IBM product since the software is very flexible and robust when it is executed, and I can also say that it provides the best security in the administration solution, it provides complete authorization and security of network to our data resources by maintaining end-to-end encryption.
What problems is the product solving and how is that benefiting you?
In our particular case, this tool helped us a lot in our work because we use it to protect incoming and outgoing traffic throughout the organization. It allows us to use the advantages of risk-based analysis.


    Aya K.

Access controlled and managed by an intelligent and reliable system

  • September 21, 2022
  • Review provided by G2

What do you like best about the product?
IBM has served as one of the technology solutions that adapt plans and services that are functional in organizations. In general, this system works as an access and maintenance manager, allowing access to be intelligently restricted only to qualified and authorized personnel. to the processes of the organization, it also has a centralized system so that it has unique access and gives more additional time for other functions
What do you dislike about the product?
There are no complicated configurations and difficult adaptation processes, the tool offers more advantages for large organizations due to its capabilities, but it is not a limitation for medium-sized organizations that wish to have this level of security.
What problems is the product solving and how is that benefiting you?
Although the technology of this tool is quite safe, it is not complicated or implemented or managed, the tool has cloud-based technologies that provide protection for both clients and partners in a precise way and without installations or management additional for its complete operation


    Saeko O.

Access system that is safe and easy to implement

  • September 09, 2022
  • Review provided by G2

What do you like best about the product?
I like this tool because it facilitates identity verification processes to access business data, in itself it is one of the security options that IBM guarantees will unify the processes so that there are no complexities when configuring and implementing it in the organization, allows a single login to improve access speeds but without neglecting security, it is a tool that is not difficult to understand or that other systems are necessary for its correct use
What do you dislike about the product?
I have no problems because it is a tool from a well-known software company and quite reliable worldwide, always serving to provide services with professional and accessible appearances
What problems is the product solving and how is that benefiting you?
It reduces computer fraud or access not given to people or even to malware, in addition, in many cases the tool works in an automated way to guarantee that security is always of a high standard, it allows to protect both the applications and the partners or employees of the organization all completely in the cloud for higher levels of security