IBM Security Verify Identity Logo
IBM Security Verify Identity Logo
IBM

IBM Security Verify Identity

6.9 /10
Category
IBM Security Verify Identity
6.9 /10

What is IBM Security Verify Identity?

The modernized, modular IBM Security Verify solution provides deep, AI-powered context for both consumer and workforce identity and access management (IAM). Protect your users and apps, inside and outside the enterprise, with a low-friction, cloud-native, software-as-a-service (SaaS) approach that leverages the cloud. For legacy, on-premises apps, the Verify Access version provides a smooth path to cloud, so you can transition at your own pace.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

IBM Security Verify Identity Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on IBM Security Verify Identity.

78 Likeliness to Recommend

95 Plan to Renew

72 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

+84 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love IBM Security Verify Identity?

4% Negative
14% Neutral
82% Positive

Pros

  • Acts with Integrity
  • Reliable
  • Client Friendly Policies
  • Altruistic

Feature Ratings

Average 77

Mobility Support

80

Provisioning Deprovisioning

80

Activity Monitoring Alerts

80

Web Cloud Single Sign on (SSO)

79

Reporting

78

Multi-Factor Authentication (MFA)

78

Access Request Management

77

Password Management

76

Identity Governance

76

Privileged Access Management

74

Advanced Provisioning

74

Vendor Capability Ratings

Average 76

Ease of Customization

79

Ease of Data Integration

79

Quality of Features

78

Usability and Intuitiveness

77

Ease of IT Administration

76

Breadth of Features

75

Ease of Implementation

75

Vendor Support

74

Business Value Created

74

Product Strategy and Rate of Improvement

72

Availability and Quality of Training

71

IBM Security Verify Identity Reviews

Nakul S.

  • Role: Information Technology
  • Industry: Banking
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted May 2024

Easy to use as IDM tool

Likeliness to Recommend

8 /10

What differentiates IBM Security Verify Identity from other similar products?

Scalability

What is your favorite aspect of this product?

Easy to use

What do you dislike most about this product?

Process are too lengthy

What recommendations would you give to someone considering this product?

Move to cloud for better explore

Pros

  • Helps Innovate
  • Reliable
  • Performance Enhancing
  • Trustworthy

Yurie Katri P.

  • Role: Information Technology
  • Industry: Telecommunications
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Feb 2023

The security is more important than ever

Likeliness to Recommend

9 /10

What differentiates IBM Security Verify Identity from other similar products?

Strong authentication is the process of using a combination of things like passwords, pins, and fingerprints to verify who you are. You can sell services in the form of subscriptions to help your clients stay safe on the go. IBM Security Identity Manager is a powerful multifactor authentication solution that provides unprecedented simplicity for users and administrators. It provides a simple interface, centralized policy, and a single access point to integrate your web, mobile, IoT, and cloud applications. You can quickly deliver strong authentication with enterprise-grade security with IBM Security Identity Manager.

What is your favorite aspect of this product?

Strong authentication is one of the many features it offers. However, to access certain sensitive or risky parts of your account, a user must enter a one-time password generated by the mobile app or email verification, which makes our product secure and user-friendly. Mobile security is a complex issue. It would help if you balanced convenience, security, and reliability. It's a secure multi-factor authentication solution that lets you establish a risk-based decision process for granting or denying mobile requests automatically. The best way to manage your mobile risk is by verifying who they are and where they're from.

What recommendations would you give to someone considering this product?

The multi-factor authentication service allows you to adjust permissions based on risk factors in your application, such as data, location, and IP reputation. Adopt risk-based access controls to secure your enterprise better. Utilize the Verify Access risk scoring engine to reduce the likelihood of a cyber breach with context-aware authorization. Automated risk-based access controls.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Leonardo M.

  • Role: Information Technology
  • Industry: Entertainment
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Nov 2022

IBM a very adjustable solution to your organizatio

Likeliness to Recommend

9 /10

What differentiates IBM Security Verify Identity from other similar products?

Unlike other tools, we think that it has no comparison since its level of protection is of a very good quality for us and our entire organization.

What is your favorite aspect of this product?

IBM Security Verify works very well with large enterprises, which is critical to protecting internal and external customer information. In addition, we can also say that what we like the most about this tool is that the multi-factor authentication is reliable, and also the QR code login is a step forward in the market.

What do you dislike most about this product?

In my very particular opinion I can say that I have not found any fault with this tool since for us it is very good to maintain the security of our equipment in a very effective and safe way, in addition to the integration with other IBM software It is excellent and enhances capabilities.

What recommendations would you give to someone considering this product?

In our opinion, this tool has helped us a lot as it is quite good because it has reverse proxy functionalities. product performance. easy to customize to meet business needs. Quality and availability of support teams. Therefore, we can always recommend this tool to any partner, or whoever asks us, as we have had great help with this tool, which makes all the work in the organization much easier.

Pros

  • Reliable
  • Efficient Service
  • Effective Service
  • Caring