

ForgeRock and IBM Security Verify Access are two leading products in identity and access management. ForgeRock has the upper hand in pricing and support, while IBM Security Verify Access stands out due to its extensive features, making it a preferred choice for users willing to invest for advanced capabilities.
Features: Users praise ForgeRock for its scalability, integration capabilities, and ease of deployment. IBM Security Verify Access receives high marks for its robust security features, flexibility, and comprehensive security solution.
Room for Improvement: ForgeRock users suggest improvements in documentation, customization options, and support. IBM Security Verify Access users point out the need for a simpler configuration process, better mobile support, and usability enhancements.
Ease of Deployment and Customer Service: ForgeRock users appreciate its straightforward deployment model but seek better customer support. IBM Security Verify Access is considered more complex to deploy but benefits from strong customer service, making it favorable for larger enterprises.
Pricing and ROI: ForgeRock is generally viewed as more cost-effective initially, offering a quicker ROI. IBM Security Verify Access, while perceived as expensive, promises substantial long-term benefits, justifying the initial investment given its comprehensive feature set and reliability.
| Product | Mindshare (%) |
|---|---|
| ForgeRock | 3.1% |
| IBM Security Verify Access | 1.5% |
| Other | 95.4% |

| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 5 |
| Large Enterprise | 18 |
| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 2 |
| Large Enterprise | 4 |
ForgeRock offers robust integration, customization, and identity management with support for SAML, OAuth 2.0, and DevOps readiness, ensuring enhanced security and scalability.
ForgeRock stands out in identity and access management featuring flexible authentication flows, risk-based authentication, centralized policy management, and comprehensive data protection. Its open-source foundation and cloud capabilities allow versatility and ease of use. While it provides excellent user path orchestration through the Journey feature, challenges exist in integration support and user-friendly customization. Improved documentation and streamlined interfaces are necessary to overcome deployment complexities. Additionally, the cost and support model may be burdensome for smaller organizations.
What are the key features?ForgeRock is widely utilized in industries like telecommunications, insurance, and open banking for secure user authentication and access management. It supports microservice authentications, customer identity management, single sign-on, and multi-factor authentication, integrating effectively with existing infrastructures to enhance security and user experience.
IBM Security Verify Access offers adaptable access management with multi-factor authentication, seamless protocol integration, and strong user management, suitable for cloud and on-premises environments.
IBM Security Verify Access provides multi-factor authentication, seamless integration with protocols like SAML and OAuth, and features including password vaults and single sign-on. Its adaptable nature allows for deployment both in cloud and on-premises settings. Users appreciate its quick setup, reliable authorization, and efficient user management, especially when integrated with Active Directory. The intuitive interface enhances security with mobile features like QR code enrollment, making it suitable for diverse environments. However, cloud deployment could be simpler, and the interface could use enhancements for better ease. Onboarding applications and support availability need improvements, and configuration for OIDC and OAuth should mature. More comprehensive documentation and simplified installation are also needed, along with automation to reduce resource consumption.
What are the key features of IBM Security Verify Access?IBM Security Verify Access is widely used in the banking and educational sectors for access management, supporting activities like single sign-on and control across different user groups. Many in these industries utilize it for customer authentication and integrate it with mobile systems to enhance security. Its adaptability allows it to serve complex needs, particularly useful in environments such as universities and financial institutions.
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.