

CyberArk Identity and IBM Security Verify Access compete in the security domain. IBM Security Verify Access stands out due to its extensive features, making it a preferred choice for many.
Features: CyberArk Identity users appreciate its identity management, secure authentication, and advanced user monitoring. IBM Security Verify Access is valued for its access control mechanisms, integration options, and detailed auditing capabilities. Users find IBM's features more comprehensive and nuanced, particularly for complex environments.
Room for Improvement: Users of CyberArk Identity suggest enhancements in reporting capabilities, mobile interface, and user training materials. IBM Security Verify Access users highlight the need for a more intuitive setup process, improved documentation, and better customer support channels.
Ease of Deployment and Customer Service: CyberArk Identity is generally praised for its straightforward deployment process and responsive customer service. IBM Security Verify Access, while rich in features, has more complex deployment requirements that can lead to longer implementation times. Users of IBM also report mixed experiences with customer service, pointing to a need for more consistent support quality.
Pricing and ROI: CyberArk Identity users feel they receive good value for their investment with lower initial setup costs and satisfactory ROI. IBM Security Verify Access, despite higher setup costs, is deemed worth the price due to its advanced functionalities and long-term benefits in large-scale deployments.
| Product | Mindshare (%) |
|---|---|
| CyberArk Identity | 2.1% |
| IBM Security Verify Access | 1.5% |
| Other | 96.4% |


| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 4 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 2 |
| Large Enterprise | 4 |
CyberArk Identity is a versatile identity management solution suitable for a wide range of enterprises. It is designed to enhance enterprise security and improve user experience. Its focus on security, compliance, and operational efficiency, combined with positive user feedback, makes it a strong contender in the identity management space.
CyberArk Identity offers a robust suite of features to manage user identities and access privileges. It focuses on securing access to resources across various environments, including cloud and on-premises applications. Its capabilities include single sign-on (SSO), multi-factor authentication (MFA), lifecycle management, and privileged access management. These features are engineered to streamline access control, enhance security, and ensure compliance with regulatory standards.
According to our user interviews, CyberArk Identity is praised for its reliability and user-friendly interface. IT professionals highlight the ease of integration with existing systems, while business executives appreciate the visibility it provides into access and identity management across the organization. Users also commend the responsive customer support, which is crucial for enterprise-level solutions.
IT Professionals found that CyberArk Identity's focus on multi-layered security significantly reduced the risk of data breaches and unauthorized access. With a centralized dashboard and automation features, you can streamline identity and access management tasks, saving time and reducing complexity. Finally, it helps meet various compliance requirements.
IBM Security Verify Access offers adaptable access management with multi-factor authentication, seamless protocol integration, and strong user management, suitable for cloud and on-premises environments.
IBM Security Verify Access provides multi-factor authentication, seamless integration with protocols like SAML and OAuth, and features including password vaults and single sign-on. Its adaptable nature allows for deployment both in cloud and on-premises settings. Users appreciate its quick setup, reliable authorization, and efficient user management, especially when integrated with Active Directory. The intuitive interface enhances security with mobile features like QR code enrollment, making it suitable for diverse environments. However, cloud deployment could be simpler, and the interface could use enhancements for better ease. Onboarding applications and support availability need improvements, and configuration for OIDC and OAuth should mature. More comprehensive documentation and simplified installation are also needed, along with automation to reduce resource consumption.
What are the key features of IBM Security Verify Access?IBM Security Verify Access is widely used in the banking and educational sectors for access management, supporting activities like single sign-on and control across different user groups. Many in these industries utilize it for customer authentication and integrate it with mobile systems to enhance security. Its adaptability allows it to serve complex needs, particularly useful in environments such as universities and financial institutions.
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.