IBM Security Verify Identity Logo
IBM Security Verify Identity Logo
IBM

IBM Security Verify Identity

Composite Score
7.2 /10
CX Score
7.4 /10
Category
IBM Security Verify Identity
7.2 /10

What is IBM Security Verify Identity?

The modernized, modular IBM Security Verify solution provides deep, AI-powered context for both consumer and workforce identity and access management (IAM). Protect your users and apps, inside and outside the enterprise, with a low-friction, cloud-native, software-as-a-service (SaaS) approach that leverages the cloud. For legacy, on-premises apps, the Verify Access version provides a smooth path to cloud, so you can transition at your own pace.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

IBM Security Verify Identity Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on IBM Security Verify Identity.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

81 Likeliness to Recommend

96 Plan to Renew

76 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+85 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love IBM Security Verify Identity?

3% Negative
11% Neutral
86% Positive

Pros

  • Acts with Integrity
  • Client Friendly Policies
  • Altruistic
  • Reliable

Feature Ratings

Average 79

Provisioning Deprovisioning

83

Web Cloud Single Sign on (SSO)

83

Multi-Factor Authentication (MFA)

79

Access Request Management

79

Mobility Support

79

Activity Monitoring Alerts

79

Password Management

78

Reporting

78

Advanced Provisioning

76

Identity Governance

76

Privileged Access Management

74

Vendor Capability Ratings

Average 74

Ease of Data Integration

80

Quality of Features

79

Vendor Support

79

Usability and Intuitiveness

77

Ease of IT Administration

76

Breadth of Features

75

Business Value Created

72

Ease of Customization

72

Ease of Implementation

71

Product Strategy and Rate of Improvement

68

Availability and Quality of Training

65

IBM Security Verify Identity Reviews

Qamar Z.

  • Role: Consultant
  • Industry: Telecommunications
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Dec 2024

Powerful, stable and feature rich IAM solution.

Likeliness to Recommend

9 /10

What differentiates IBM Security Verify Identity from other similar products?

The main strength of IBM's identity management solution is the resilience and the magnitude of load it can sustain. It's one of the most stable IDM solutions out there in the market.

What is your favorite aspect of this product?

Ability to customise and operarional stability.

What do you dislike most about this product?

Somewhat difficult to implement and takes time to learn. Not enough learning resources available.

What recommendations would you give to someone considering this product?

I would highly recommend this product if you have a large user base and would like to protect that from Identity Security perspective.

Pros

  • Security Protects
  • Helps Innovate
  • Effective Service
  • Inspires Innovation

Nakul S.

  • Role: Information Technology
  • Industry: Banking
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted May 2024

Easy to use as IDM tool

Likeliness to Recommend

8 /10

What differentiates IBM Security Verify Identity from other similar products?

Scalability

What is your favorite aspect of this product?

Easy to use

What do you dislike most about this product?

Process are too lengthy

What recommendations would you give to someone considering this product?

Move to cloud for better explore

Pros

  • Helps Innovate
  • Reliable
  • Performance Enhancing
  • Trustworthy

Yurie Katri P.

  • Role: Information Technology
  • Industry: Telecommunications
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Feb 2023

The security is more important than ever

Likeliness to Recommend

9 /10

What differentiates IBM Security Verify Identity from other similar products?

Strong authentication is the process of using a combination of things like passwords, pins, and fingerprints to verify who you are. You can sell services in the form of subscriptions to help your clients stay safe on the go. IBM Security Identity Manager is a powerful multifactor authentication solution that provides unprecedented simplicity for users and administrators. It provides a simple interface, centralized policy, and a single access point to integrate your web, mobile, IoT, and cloud applications. You can quickly deliver strong authentication with enterprise-grade security with IBM Security Identity Manager.

What is your favorite aspect of this product?

Strong authentication is one of the many features it offers. However, to access certain sensitive or risky parts of your account, a user must enter a one-time password generated by the mobile app or email verification, which makes our product secure and user-friendly. Mobile security is a complex issue. It would help if you balanced convenience, security, and reliability. It's a secure multi-factor authentication solution that lets you establish a risk-based decision process for granting or denying mobile requests automatically. The best way to manage your mobile risk is by verifying who they are and where they're from.

What recommendations would you give to someone considering this product?

The multi-factor authentication service allows you to adjust permissions based on risk factors in your application, such as data, location, and IP reputation. Adopt risk-based access controls to secure your enterprise better. Utilize the Verify Access risk scoring engine to reduce the likelihood of a cyber breach with context-aware authorization. Automated risk-based access controls.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Most Popular IBM Security Verify Identity Comparisons