What is IBM Security Verify Identity?
The modernized, modular IBM Security Verify solution provides deep, AI-powered context for both consumer and workforce identity and access management (IAM). Protect your users and apps, inside and outside the enterprise, with a low-friction, cloud-native, software-as-a-service (SaaS) approach that leverages the cloud. For legacy, on-premises apps, the Verify Access version provides a smooth path to cloud, so you can transition at your own pace.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceIBM Security Verify Identity Ratings
Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard
to access more information on IBM Security Verify Identity.
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
81 Likeliness to Recommend
96 Plan to Renew
76 Satisfaction of Cost Relative to Value
Emotional Footprint Overview
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
+85 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love IBM Security Verify Identity?
Pros
- Acts with Integrity
- Client Friendly Policies
- Altruistic
- Reliable
How to read the Emotional Footprint
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Negative
Neutral
Positive
Feature Ratings
Provisioning Deprovisioning
Web Cloud Single Sign on (SSO)
Multi-Factor Authentication (MFA)
Access Request Management
Mobility Support
Activity Monitoring Alerts
Password Management
Reporting
Advanced Provisioning
Identity Governance
Privileged Access Management
Vendor Capability Ratings
Ease of Data Integration
Quality of Features
Vendor Support
Usability and Intuitiveness
Ease of IT Administration
Breadth of Features
Business Value Created
Ease of Customization
Ease of Implementation
Product Strategy and Rate of Improvement
Availability and Quality of Training
IBM Security Verify Identity Reviews
Qamar Z.
- Role: Consultant
- Industry: Telecommunications
- Involvement: IT Leader or Manager
Submitted Dec 2024
Powerful, stable and feature rich IAM solution.
Likeliness to Recommend
What differentiates IBM Security Verify Identity from other similar products?
The main strength of IBM's identity management solution is the resilience and the magnitude of load it can sustain. It's one of the most stable IDM solutions out there in the market.
What is your favorite aspect of this product?
Ability to customise and operarional stability.
What do you dislike most about this product?
Somewhat difficult to implement and takes time to learn. Not enough learning resources available.
What recommendations would you give to someone considering this product?
I would highly recommend this product if you have a large user base and would like to protect that from Identity Security perspective.
Pros
- Security Protects
- Helps Innovate
- Effective Service
- Inspires Innovation
Nakul S.
- Role: Information Technology
- Industry: Banking
- Involvement: IT Development, Integration, and Administration
Submitted May 2024
Easy to use as IDM tool
Likeliness to Recommend
What differentiates IBM Security Verify Identity from other similar products?
Scalability
What is your favorite aspect of this product?
Easy to use
What do you dislike most about this product?
Process are too lengthy
What recommendations would you give to someone considering this product?
Move to cloud for better explore
Pros
- Helps Innovate
- Reliable
- Performance Enhancing
- Trustworthy
Yurie Katri P.
- Role: Information Technology
- Industry: Telecommunications
- Involvement: End User of Application
Submitted Feb 2023
The security is more important than ever
Likeliness to Recommend
What differentiates IBM Security Verify Identity from other similar products?
Strong authentication is the process of using a combination of things like passwords, pins, and fingerprints to verify who you are. You can sell services in the form of subscriptions to help your clients stay safe on the go. IBM Security Identity Manager is a powerful multifactor authentication solution that provides unprecedented simplicity for users and administrators. It provides a simple interface, centralized policy, and a single access point to integrate your web, mobile, IoT, and cloud applications. You can quickly deliver strong authentication with enterprise-grade security with IBM Security Identity Manager.
What is your favorite aspect of this product?
Strong authentication is one of the many features it offers. However, to access certain sensitive or risky parts of your account, a user must enter a one-time password generated by the mobile app or email verification, which makes our product secure and user-friendly. Mobile security is a complex issue. It would help if you balanced convenience, security, and reliability. It's a secure multi-factor authentication solution that lets you establish a risk-based decision process for granting or denying mobile requests automatically. The best way to manage your mobile risk is by verifying who they are and where they're from.
What recommendations would you give to someone considering this product?
The multi-factor authentication service allows you to adjust permissions based on risk factors in your application, such as data, location, and IP reputation. Adopt risk-based access controls to secure your enterprise better. Utilize the Verify Access risk scoring engine to reduce the likelihood of a cyber breach with context-aware authorization. Automated risk-based access controls.
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Performance Enhancing