IBM Security Verify Logo
IBM Security Verify Logo
IBM

IBM Security Verify

Composite Score
7.7 /10
CX Score
7.8 /10
Category
IBM Security Verify
7.7 /10

What is IBM Security Verify?

Empower your security and intelligence in user access decisions with visibility across all environments.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

IBM Security Verify Ratings

Real user data aggregated to summarize the product performance and customer experience.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

90 Likeliness to Recommend

100 Plan to Renew

87 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+92 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love IBM Security Verify?

0% Negative
17% Neutral
83% Positive

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Enables Productivity

Cons

  • Vendor Friendly Policies

Feature Ratings

Average 85

Email Authentication

91

Role-Based Multi-Factor Authentication

87

Biometrics Authentication

87

Role and User Management

87

Integration APIs

85

Dashboards, Analytics and Reporting

85

Multi-Device Protection

84

OTP Authentication

84

Hard Token Authentication

83

Browser Push Notifications

79

Vendor Capability Ratings

Average 83

Quality of Features

91

Usability and Intuitiveness

87

Availability and Quality of Training

85

Ease of IT Administration

84

Breadth of Features

84

Product Strategy and Rate of Improvement

84

Ease of Customization

83

Ease of Implementation

83

Business Value Created

78

Ease of Data Integration

78

Vendor Support

75

IBM Security Verify Reviews

Piyush S.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted May 2024

Helping to improve security and access

Likeliness to Recommend

9 /10

What differentiates IBM Security Verify from other similar products?

Addresses business issues related to protecting confidential data and controlling access to sensitive information. It stands out from other systems because it has identity management functionality, in addition to the ability to integrate with multiple systems and a focus on more adaptive security. These features set this software apart from other similar programs on the market as it offers a complete solution for all our security and access needs.

What is your favorite aspect of this product?

I like it because it has a good user authentication system, as well as password management and prevention of unauthorized access to important systems. IBM Security Verify Access stands out for its wide range of functionalities, its high level of security and its ability to adapt to specific needs

What do you dislike most about this product?

The initial configuration may take some time, it may be because the tool, despite being quite complete, may be somewhat robust for those who have not worked with this system

What recommendations would you give to someone considering this product?

I recommend the use of IBM Security Verify Access in corporate environments with a high level of information sensitivity, as well as in organizations that need to comply with strict security regulations.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Enables Productivity
  • Efficient Service

Nakul S.

  • Role: Information Technology
  • Industry: Banking
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted May 2024

Fabulous product for access Management

Likeliness to Recommend

8 /10

What differentiates IBM Security Verify from other similar products?

Configuration

What is your favorite aspect of this product?

Webseal and federation

What do you dislike most about this product?

Nothing ISVA application is good software for access management

What recommendations would you give to someone considering this product?

Improve the interface

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Seifallah K.

  • Role: Information Technology
  • Industry: Consulting
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted May 2024

Easy to use, but a bit pricey.

Likeliness to Recommend

10 /10

What differentiates IBM Security Verify from other similar products?

IBM Security Verify Access offers a unique combination of features, including: Seamless integration and scalability Adaptive access control for dynamic security adjustments User-centric design with single sign-on and diverse authentication methods Comprehensive security features beyond multi-factor authentication Assistance in regulatory compliance like GDPR, HIPAA, and PCI DSS Hybrid deployment options for flexibility and control

What is your favorite aspect of this product?

One aspect that stands out is its adaptive access control feature. This capability allows organizations to dynamically adjust authentication requirements based on user behavior and contextual factors, enhancing security while minimizing user friction. It's an innovative approach that strikes a balance between security and usability, which is crucial in today's rapidly evolving threat landscape.

What do you dislike most about this product?

one potential drawback that users might encounter with IBM Security Verify Access, like with any complex software, could be the learning curve associated with its advanced features. Implementing and configuring adaptive access control, integrating various authentication methods, and optimizing security policies may require some expertise and time investment. Additionally, the cost of acquiring and maintaining the solution could be a consideration for some organizations. However, these challenges can often be mitigated with proper training, support, and a clear understanding of the organization's security needs.

What recommendations would you give to someone considering this product?

Assess needs: Define requirements. Evaluate integration: Ensure seamless integration. Understand adaptive access: Align with security needs. Prioritize user experience: Ensure ease of use. Plan deployment: Choose deployment model. Invest in training: Ensure staff readiness. Stay informed: Keep updated on trends. Following these steps will facilitate a successful adoption of IBM Security Verify Access.

Pros

  • Efficient Service
  • Effective Service
  • Inspires Innovation
  • Client's Interest First

Cons

  • Less Performance Enhancing
  • Vendor Friendly Policies
  • Under Delivered