Latest Research


This content is currently locked.

Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
1-888-670-8889 (US/CAN) or
+1-519-432-3550 (International)
IBM Security Verify Logo
IBM Security Verify Logo
IBM

IBM Security Verify

Composite Score
7.7 /10
CX Score
7.8 /10
Category
IBM Security Verify
7.7 /10

What is IBM Security Verify?

Empower your security and intelligence in user access decisions with visibility across all environments.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

IBM Security Verify Ratings

Real user data aggregated to summarize the product performance and customer experience.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

90 Likeliness to Recommend

100 Plan to Renew

87 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+92 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love IBM Security Verify?

0% Negative
17% Neutral
83% Positive

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Enables Productivity

Cons

  • Vendor Friendly Policies

Feature Ratings

Average 85

Email Authentication

91

Role-Based Multi-Factor Authentication

87

Biometrics Authentication

87

Role and User Management

87

Integration APIs

85

Dashboards, Analytics and Reporting

85

Multi-Device Protection

84

OTP Authentication

84

Hard Token Authentication

83

Browser Push Notifications

79

Vendor Capability Ratings

Average 83

Quality of Features

91

Usability and Intuitiveness

87

Availability and Quality of Training

85

Ease of IT Administration

84

Breadth of Features

84

Product Strategy and Rate of Improvement

84

Ease of Customization

83

Ease of Implementation

83

Business Value Created

78

Ease of Data Integration

78

Vendor Support

75

IBM Security Verify Reviews

Paulo d.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted May 2024

Overall Satisfaction with IBM Security Verify

Likeliness to Recommend

8 /10

What differentiates IBM Security Verify from other similar products?

Binding with API and providing adequate federation.

What is your favorite aspect of this product?

IBM Security Verify role in my organization is to support the Identity and governance of user access rights, as well as permissions assigned to the users. As we strive to achieve implementation of certain zero trust principles, we find this solution very useful, especially if you already have other products from the same vendor.

What do you dislike most about this product?

The Knowledge based documentation is big and unorganized. Supporting documentation can be modular, as at the moment if a customer tries to search for a certain solution, you will get many unnecessary results not connected as well.

What recommendations would you give to someone considering this product?

Likelihood to Recommend Although it integrates with many other vendors, it is more suitable for the client to implement it natively with other IBM solutions, however when integrated with others, it doesn't work so well. For example, integration with IBM SIEM solution is smooth and effortless, however when integrating with other SIEM platforms like LogRhythm, may sometimes lead to challenges.

Pros

  • Reliable
  • Performance Enhancing
  • Unique Features
  • Fair

Aryan S.

  • Role: Information Technology
  • Industry: Other
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Dec 2023

Best Security and Network Management Product!

Likeliness to Recommend

10 /10

What differentiates IBM Security Verify from other similar products?

Using IBM Security Verify one can easily get access using Multi-Factor Authentication and mobile application makes it more easier as its on fingertips thus reducing time consumption and increasing security more.

What is your favorite aspect of this product?

It comes with a simple, clear and easy to access user-friendly user interface and great thing is that mobile application for the same is available which makes it more easily accessible.

What do you dislike most about this product?

Analytics interface and reporting can ve improved more and even customer service provided as of now is time consuming.

What recommendations would you give to someone considering this product?

If you're looking for most trusted and wide variety of features provider, easy to access UI, and mobile platform then you should opt for IBM Security Verify it will work best for you.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Esteban M.

  • Role: Sales Marketing
  • Industry: Telecommunications
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Mar 2023

High level protection solution

Likeliness to Recommend

10 /10

What differentiates IBM Security Verify from other similar products?

Unlike other products, this tool is of excellent quality because it allows you to adjust the risk settings in the identity of the analyzed cloud. It's productive because we have the ability to apply a specific policy to every login attempt from an untrusted IP address.

What is your favorite aspect of this product?

What intrigues me most about this tool is that IBM has secure ways and reliable stability that help control user input and examine threat-based authentication of visitors before allowing them to connect to the system or applications.

What do you dislike most about this product?

From my point of view, I can mention that this tool is flawless because it is quite good and it preserves the stability of our own information and keeps us safe.

What recommendations would you give to someone considering this product?

One of the reasons why we can recommend this tool is that this stability system is capable of generating authentication resolutions that increase stability and control access to enterprise stability systems such as: B. Data operations, application development or removal special for the organization

Pros

  • Continually Improving Product
  • Performance Enhancing
  • Enables Productivity
  • Efficient Service
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019