

Okta Platform and IBM Security Verify Access compete in the identity management category. Okta Platform appears to have an advantage with its user satisfaction in pricing and support, while IBM Security Verify Access is noted for its strong security features and integration capabilities.
Features: Okta Platform includes single sign-on (SSO), universal directory, and multifactor authentication (MFA), which improve authentication speed and ease. Its integration capabilities, profile mapping, and adaptive MFA streamline operations, supported by a robust integration network for faster deployments. IBM Security Verify Access offers strong integration with directory services and comprehensive user management, essential for enterprises with complex authentication needs.
Room for Improvement: Okta Platform users have reported occasional downtime and the need for better system logs and analytics. Improvements in certificate rotation processes and user experience are also needed. IBM Security Verify Access could enhance its onboarding process and simplify configurations for OIDC and OAuth integrations. Users seek better support responsiveness and enhanced cloud deployment reliability.
Ease of Deployment and Customer Service: Okta Platform supports flexible deployments across public, hybrid, and private clouds, generally receiving positive feedback on customer support, though experiences vary with support tiers. IBM Security Verify Access's on-premises focus suits organizations with existing infrastructure but may restrict flexibility. Customer support is reliable, but some users desire quicker response times and easier configurations.
Pricing and ROI: Okta Platform is seen as moderately priced, delivering substantial ROI by boosting productivity and reducing costs. Its cloud-first approach offers financial benefits for expanding identity needs. IBM Security Verify Access is cost-effective for small user bases but becomes costly at larger scales, impacting affordability for broad implementations. Both platforms improve ROI through efficient identity management.
| Product | Mindshare (%) |
|---|---|
| Okta Platform | 9.0% |
| IBM Security Verify Access | 2.1% |
| Other | 88.9% |

| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 2 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 44 |
| Midsize Enterprise | 23 |
| Large Enterprise | 50 |
IBM Security Verify Access is a complete authorization and network security policy management solution. It provides end-to-end protection of resources over geographically dispersed intranets and extranets.Provides a wide range of built-in authenticators and supports external authenticators.Provides permit and deny decisions for protected resources requests in the secure domain through the authorization API.Manages secure access to private internal network-based resources by using the public Internet's broad connectivity and ease of use with a corporate firewall system.
Okta Platform provides comprehensive identity and access management, featuring Active Directory Sync, user management, and app auto-provisioning. It ensures security through single sign-on and adaptive multi-factor authentication.
Okta Platform offers advanced integration capabilities, allowing seamless connection with in-house and cloud applications. Security features are robust, incorporating multi-factor authentication and SSO to prevent unauthorized access. Users benefit from its ease of use and the ability to integrate and manage numerous applications effectively. While generally praised, users note areas for improvement, such as high costs and complex setups. Better integrations with on-premises systems and third-party tools are desired along with enhanced error logging and reporting features.
What are Okta's key features?Companies across industries implement Okta to secure user authentication and streamline onboarding processes. It supports access management for both on-premises and cloud applications, synchronizing directories and facilitating SaaS services. Organizations benefit from reduced credential management complexity and improved IT infrastructure compliance.
We monitor all Identity and Access Management as a Service (IDaaS) (IAMaaS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.