TechValidate Research on IBM Security

These pages present data that TechValidate has sourced via direct research with verified customers and users of IBM Security. TechValidate stands behind the authenticity of all published data. Learn more »

1 Published TechFact

4 Published Charts

Selected Research Highlights

IBM Security Customer Statistic

83% of IT organizations agreed with the following statement:

“Centralizing access management and authentication in ISAM has empowered my organization to embrace new technologies and ways of working.”

IBM Security Customer Research

Is your organization currently utilizing risk-based authentication, wherein authentication attempts are evaluated based on the risk score of the user?

Yes, we’re using Risk Based Authentication today.
No, but we plan to use Risk Based Autentication in the future.
No, we do not plan to implement Risk Based Authentication in the future.

IBM Security Customer Research

How likely would you be to recommend ISAM to a peer?

Somewhat likely
Extremely likely

More to Explore

About IBM Security

Savvy companies know that in today’s data-driven, highly distributed world, there are serious threats that must be addressed head-on. IBM® Security delivers an integrated system of analytics, real-time defenses and proven experts, so you can make strategic decisions about how to safeguard your business.

IBM Security Website   IBM Website