No more typing reviews! Try our Samantha, our new voice AI agent.

IBM Security Verify Access vs Omada Identity comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

IBM Security Verify Access
Ranking in Identity Management (IM)
17th
Ranking in Identity and Access Management as a Service (IDaaS) (IAMaaS)
16th
Average Rating
7.8
Reviews Sentiment
6.4
Number of Reviews
8
Ranking in other categories
Single Sign-On (SSO) (15th), Access Management (13th)
Omada Identity
Ranking in Identity Management (IM)
5th
Ranking in Identity and Access Management as a Service (IDaaS) (IAMaaS)
6th
Average Rating
8.0
Reviews Sentiment
6.7
Number of Reviews
55
Ranking in other categories
User Provisioning Software (5th), Customer Identity and Access Management (CIAM) (6th), Identity Governance Administration (IGA) (3rd)
 

Mindshare comparison

As of May 2026, in the Identity Management (IM) category, the mindshare of IBM Security Verify Access is 1.5%, up from 1.3% compared to the previous year. The mindshare of Omada Identity is 3.2%, down from 3.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Management (IM) Mindshare Distribution
ProductMindshare (%)
Omada Identity3.2%
IBM Security Verify Access1.5%
Other95.3%
Identity Management (IM)
 

Featured Reviews

Ateeq Rehman - PeerSpot reviewer
Unit Head System Implementor at Allied Bank Limited
Has improved secure user access while managing development through multiple technologies
I have already explained this in my previous call; I don't handle financial terms and commercials. Pricing is generally managed by functional teams and management looking after licensing matters. In Pakistan, vendors such as Oracle and IBM manage account relationships with clients and have tailored pricing models, so I do not have sufficient insights into that aspect.IBM Security Verify Access installation process is not straightforward; it requires underlying specialized knowledge upon which the IBM products are based. The complexity and scalability of the architecture necessitate in-depth technical knowledge and understanding of the system. Thus, installation is not as simple as clicking through; it requires extensive configuration of the underlying application servers, such as IBM WebSphere, where these products are deployed and configured.
Carsten Eiberg - PeerSpot reviewer
Iam Security Specialist at a insurance company with 1,001-5,000 employees
Identity analytics have strengthened security and automated role-based access for our workforce
Omada Identity provides 80% of functionality out of the box with standard features without requiring any special configuration. There are many templates available, so you can get up and running pretty fast. Omada Identity's identity analytics helped reduce the cost of my IGA program. This has affected my organization's security since I am also in the same department as the security team, so we are very focused on that. Especially if someone is having a case with fraud or supposed fraud, we can click the log out feature and then all accounts will be disabled immediately or at least within a few minutes. I am sure that has helped the security level.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"From the integration point of view, it supports SAML, OIDC, and OAuth; for legacy applications that don't have support for SAML and other new protocols, it provides single sign-on access to end-users, and from the integration compatibility point of view, it is highly capable."
"The most valuable feature of IBM Security Access Manager, at least for my company, is multi-factor authentication. That's the only feature my company is using. The solution works well and has no glitches. IBM Security Access Manager is a very good solution, so my company is still using it."
"The solution has powerful authentification and authorization. It offers a good way to increase security."
"The solution has powerful authentification and authorization and offers a good way to increase security."
"It can do a lot of different functions, and different types of teams can use this product for a variety of use cases, such as RSA, OTP, and single sign-on functionalities."
"I have found this solution to be really practical and when a user wants to log in, it is effortless and runs smooth."
"The tool provides a password vault, single sign-on, and multifactor authentication. It offers various authentication methods like fingerprint integration, one-time passwords, or tokens sent via email or SMS. This ensures secure access to your accounts by providing multiple authentication options."
"IBM Security Verify Access is providing a secure way of handling the user login journey, and secure user authentication is fully managed by ISAM or ISVA."
"For me, the best feature of Omada Identity is its web interface because it's really easy for users to understand."
"The Governance and self-service that can be set up so you can use them yourself to work in the system are the most valuable features. End users can be enabled to help themselves."
"The best features of Omada Identity include its cloud version, which is really fast, and I appreciate the main menu and overall look of the features; it is really user-friendly and easy for the users to understand what they want."
"The most valuable feature of this product is that it gives you a dashboard on which applications the user has access."
"The most valuable functionality of the solution for us is that when employees stop working for the municipality, they are automatically disabled in Active Directory. Omada controls that 100 percent. They are disabled for 30 days, and after that time Omada deletes the Active Directory account. The same type of thing happens when we employ a new person. Their information is automatically imported to Omada and they are equipped with the roles and rights so they can do their jobs."
"We don't have to go in and do a lot of the work that we did before. It may have saved us somewhere in the range of 10 to 30 percent of the time we spent on provisioning access."
"I appreciate all the support we receive from Omada."
"Two valuable features of Omada Identity are the ability to discover accounts and link them to identities, and the automatic disabling of inactive accounts or identities."
 

Cons

"They can improve the single sign-on configuration for OIDC and OAuth. That is not very mature in this product, and they can improve it in this particular area. OIDC is a third-party integration that we do with the cloud platforms, and OAuth is an authorization mechanism for allowing a user having an account with Google or any other provider to access an application. Organizations these days are looking for just-in-time provisioning use cases, but IBM Security Access Manager is not very mature for such use cases. There are only a few applications that can be integrated, and this is where this product is lagging. However, in terms of configuration and single sign-on mechanisms, it is a great product."
"IBM Security Verify Access installation process is not straightforward; it requires underlying specialized knowledge upon which the IBM products are based."
"For small or medium-sized businesses they cannot afford this solution."
"What we'd like improved in IBM Security Access Manager is its onboarding process as it's complex, particularly when onboarding new applications. We need to be very, very careful during the onboarding. We have no issues with IBM Security Access Manager because the solution works fine, apart from the onboarding process and IBM's involvement in onboarding issues. If we need support related to the onboarding, we've noticed a pattern where support isn't available, or they don't have much experience, or we're not getting a response from them. We're facing the same issue with IBM Guardium. As we're just focusing on the multi-factor authentication feature of IBM Security Access Manager and we didn't explore any other features, we don't have additional features to suggest for the next release of the solution, but we're in discussion about exploring ID management and access management features, but those are just possibilities because right now, we're focused on exploring our domain."
"The user interface for users and administrators could be improved to make it easier. Automating some functions could also be beneficial."
"The user interface needs to be simplified, it's complex and not user-friendly."
"Configuration could be simplified for the end-user."
"Configuration could be simplified for the end-user."
"The backend is pretty good but the self-service request access screen, the GUI, needs improvement. It's an old-fashioned screen. Also, Omada has reports, but I wouldn't dare show them to the business because they look like they're from 1995. I know they are working on these things and that’s good, because they’re really needed."
"If you're running Omada on a cloud service, you may have some issues deploying the newest release. Sometimes, the latest release doesn't adapt to the processes we have already installed. Identity Access Management is a critical system for our organization, and we need to ensure that everyone has the same access as they did before the release."
"Omada Identity has a steep learning curve."
"Documentation can be improved. I have already filed a few suggestions to make documentation more clear and more representative of reality."
"The account management integration isn't bad, but it isn't plug-and-play like Microsoft Azure. You need some deep development knowledge to set up the connectors."
"Omada Identity has two main issues that need to be solved or improved the most. One is its setup or installation process because it's complex and cumbersome. I'm talking about the process for on-premises deployment because I've never tried the cloud version of Omada Identity. Setting up the cloud version should be much easier. The second area for improvement in Omada Identity is that it's piggybacking on Microsoft's complex way of having all kinds of add-ons, extensions, or setups, whether small or large, such as the new SQL Server, and it's cumbersome to make sure that everything works. Omada Identity is a complex solution and could still be improved."
"We are still on Omada on-prem, but I understand that when Omada is in the cloud, you cannot send an attachment via email. We have some emails with attachments for new employees because we have to explain to them how to register and do their multi-factor authentication. All that information is in the attachment. People have to do that before they are in our system. We cannot give them a link to our Intranet and SharePoint because they do not yet have access. They have to register before that, so I need to send the attachments, but this functionality is not there in the cloud."
"The biggest issue, which is the reason why we are transitioning from their product to SailPoint, is the overall user experience."
 

Pricing and Cost Advice

"The product is not expensive. It depends on the number of users."
"It costs about 300K AED for a year. Its pricing is a bit on the higher end, but in comparison to other products in the market, its price is still better. There are lots of other products that are very costly."
"The license and costs depend on the amount range of users you have. For just approximately 2,000 users, the price is practical and fair. However, when you have 20,000 users, it starts to become really expensive, and the discount per user is not attractive enough to go ahead and purchase."
"It is licensed per managed user per year."
"The initial total cost of ownership to implement Omada Identity is not small. The TCO for the implementation is as high as any other solution. However, the cost of maintaining the solution is at par or lower than competitors, including adding more features or maintaining the system after the initial deployment or installation to make sure that they are available for users to use or extending the functionalities of those activities. Those maintenance costs are lower than other vendors, but the initial cost of getting the system installed is still high."
"My client deals directly with the Omada Identity team in terms of licensing. I never look at pricing, so I'm not aware of how much the solution costs, but it's worth the money. Often, when you begin to use Omada Identity and it takes a while to set up, it'll be irreversible, and you'd depend on and focus more on the functionality of the solution, rather than its price tag."
"The pricing for Omada Identity is fair."
"Being Dutch, I can only say that it is extremely expensive, but all software products are expensive. If you have 38,000 users, then even one dollar or one euro per person would amount to a significant amount of money. Because of the high number of users, anything gets expensive very fast here."
"There were a lot of administrator, partner, and supplier accounts for people who were no longer working for us but still in the system. So, we reduced the number of users no longer with the company, which saved us some money on licensing."
"It is not cheap. It is expensive, but compared to what we did almost three years ago, it is value for money. It is worth it."
"The pricing is too high for SMBs."
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
893,221 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
9%
Insurance Company
8%
Government
8%
Financial Services Firm
14%
Manufacturing Company
11%
Computer Software Company
8%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business3
Midsize Enterprise2
Large Enterprise4
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise4
Large Enterprise45
 

Questions from the Community

What needs improvement with IBM Security Access Manager?
I have already explained this in my previous call; I don't handle financial terms and commercials. Pricing is generally managed by functional teams and management looking after licensing matters. I...
What is your primary use case for IBM Security Access Manager?
We are still using the IBM BPM platform to automate the processes for our organization.I generally use Microsoft Project for project planning and schedule management, especially in relation to Orac...
What advice do you have for others considering IBM Security Access Manager?
My current domain is leading project development, overseeing both technical and functional areas in process automation and orchestration, along with the hands-on implementation of process automatio...
What do you like most about Omada Identity Cloud?
As an administrator, we benefit from a lot of functionality that is available out of the box, but it is also configurable to meet our specific needs.
What is your experience regarding pricing and costs for Omada Identity Cloud?
My experience with pricing, setup cost, and licensing is that I think they are the same as all the competitors. It would be great if they gave more insight into the real costs because that is typic...
What needs improvement with Omada Identity Cloud?
Omada Identity can always be improved. It has an ideas portal for customers and partners. Since we are a partner, we have been providing them with positive insights on improvements. I would love to...
 

Also Known As

IBM Security Verify Access (SVA), IBM Security Access Manager, ISAM
Omada Identity Suite, Omada Identity Cloud
 

Overview

 

Sample Customers

POST Luxembourg
Bayer, ECCO Shoes, Vattenfall, NuStar Energy, Unicredit, Schiphol Group, BMW Group, Deutsche Leasing
Find out what your peers are saying about IBM Security Verify Access vs. Omada Identity and other solutions. Updated: April 2026.
893,221 professionals have used our research since 2012.