IBM Verify, BI Initiative: Enterprise Security Made Simple
Overall Satisfaction with IBM Verify
The use of IBM Verify had made distribution of my organization's digital content more efficient. Sensitive to the importance of security, the platform needed to accommodate access hierarchies while at the same time being very protective of the various levels of access. While there was an issue at the initial configuration of the system, it has been rather consistent and reliable in managing the user authentication across the different platforms.
Pros
- Identity, which allows users to be authenticated for their identity rather than application
- Its connection to current enterprise identity management systems through industry standard interfaces
- Integrated multifunctional analytics application
Cons
- Initial Configuration is the area with most complexities
- Working on a mobile application interface is not pleasant for an end user.
- Few multiline options for generated templates
- Reduced incidence of unauthorized access
- Increased efficiency of the content distribution process
- Better comparisons to applicable data protection regulations
Owing to the general findings formulated in this paper, comparing Okta and Microsoft Entra ID to IBM Verify, the latter appears to be the only tool that delivers a number of features for integrating with legacy systems. However, since IBM Verify has the upper hand in terms of security policy configuration.
Do you think IBM Verify delivers good value for the price?
Yes
Are you happy with IBM Verify's feature set?
Yes
Did IBM Verify live up to sales and marketing promises?
Yes
Did implementation of IBM Verify go as expected?
Yes
Would you buy IBM Verify again?
Yes

Comments
Please log in to join the conversation