No more typing reviews! Try our Samantha, our new voice AI agent.

IBM Security Verify Access vs One Identity Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

IBM Security Verify Access
Ranking in Identity Management (IM)
17th
Average Rating
7.8
Reviews Sentiment
6.4
Number of Reviews
8
Ranking in other categories
Single Sign-On (SSO) (15th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (16th), Access Management (13th)
One Identity Manager
Ranking in Identity Management (IM)
1st
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
168
Ranking in other categories
User Provisioning Software (1st), Identity Governance Administration (IGA) (2nd)
 

Mindshare comparison

As of May 2026, in the Identity Management (IM) category, the mindshare of IBM Security Verify Access is 1.5%, up from 1.3% compared to the previous year. The mindshare of One Identity Manager is 4.5%, down from 7.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Management (IM) Mindshare Distribution
ProductMindshare (%)
One Identity Manager4.5%
IBM Security Verify Access1.5%
Other94.0%
Identity Management (IM)
 

Featured Reviews

Ateeq Rehman - PeerSpot reviewer
Unit Head System Implementor at Allied Bank Limited
Has improved secure user access while managing development through multiple technologies
I have already explained this in my previous call; I don't handle financial terms and commercials. Pricing is generally managed by functional teams and management looking after licensing matters. In Pakistan, vendors such as Oracle and IBM manage account relationships with clients and have tailored pricing models, so I do not have sufficient insights into that aspect.IBM Security Verify Access installation process is not straightforward; it requires underlying specialized knowledge upon which the IBM products are based. The complexity and scalability of the architecture necessitate in-depth technical knowledge and understanding of the system. Thus, installation is not as simple as clicking through; it requires extensive configuration of the underlying application servers, such as IBM WebSphere, where these products are deployed and configured.
Neha Chhangani - PeerSpot reviewer
Business Analyst at a startup based organization
Centralized identity governance has automated lifecycle management and simplifies compliance
One Identity Manager could be improved by making the initial setup and configuration simpler, especially for complex workflows and integrations. The user interface and reporting dashboards could also be more modern and intuitive with better out-of-the-box analytics. Additionally, clearer documentation and faster implementation guidance would help organizations get value more quickly. One specific challenge my team encountered was the complexity during initial configuration, especially when setting up custom workflows and role models which required more time and expertise. We also felt that out-of-the-box reports and dashboards are limited, and more customizable real-time analytics would be helpful. Better documentation and guided setup wizards would make adoption easier, particularly for teams new to identity governance tools. One improvement I think One Identity Manager needs is the enhanced self-service experience. The end-user self-service portal could be more intuitive with clearer guidance for access requests and password resets. Additionally, while integrations are solid, deeper cloud-native connectors and API-driven automation would help in hybrid and multi-cloud environments. A more responsive mobile interface or dedicated app for approvals and tasks would help managers who are often on the go. One more improvement is the built-in predictive insights or trend dashboards around access patterns and risk could improve proactive governance. More descriptive error messages and in-tool troubleshooting tips during setup configuration would reduce dependency on external documentation or support.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"From the integration point of view, it supports SAML, OIDC, and OAuth. For legacy applications that don't have support for SAML and other new protocols, it provides single sign-on access to end-users. From the integration compatibility point of view, it is highly capable."
"It's a good solution for identification and access management."
"It's a good solution for identification and access management."
"From the integration point of view, it supports SAML, OIDC, and OAuth; for legacy applications that don't have support for SAML and other new protocols, it provides single sign-on access to end-users, and from the integration compatibility point of view, it is highly capable."
"The tool provides a password vault, single sign-on, and multifactor authentication. It offers various authentication methods like fingerprint integration, one-time passwords, or tokens sent via email or SMS. This ensures secure access to your accounts by providing multiple authentication options."
"The solution has powerful authentification and authorization and offers a good way to increase security."
"The most valuable feature of IBM Security Access Manager, at least for my company, is multi-factor authentication. That's the only feature my company is using. The solution works well and has no glitches. IBM Security Access Manager is a very good solution, so my company is still using it."
"IBM Security Verify Access is providing a secure way of handling the user login journey, and secure user authentication is fully managed by ISAM or ISVA."
"It's very flexible."
"One Identity is one of the most feature-rich platforms on the market. It covers every use case. The user interface has been improved, making it easier to make it look like what customers want. It's easier to customize than a lot of competition solutions. There are nearly a thousand built-in processes that you can edit and customize according to your needs."
"Mapping roles to users is a seamless experience that offers a lot of leverage in terms of speed and compliance, making it a very useful feature."
"The most valuable features are that it has a lot of capabilities, can integrate with a lot of systems, including automated onboarding like CyberArk, and allows you to integrate different entities."
"We have reduced about 60% of our help desk calls, especially for onboarding and simple tasks that do One Identity automation."
"In One Identity Manager, I appreciate the Synchronization Editor for onboarding different target system applications."
"In terms of what I found most valuable in One Identity Manager, it's the only product where the workflow and the catalog can be configured on roles or by business people."
"Overall, the product works well and is very good tool, which functions well."
 

Cons

"There are a lot of areas that can be improved, but the main area is the lack of customization. You cannot easily customize anything in the product. It is not easy to tweak the functionality. It is challenging to change the out-of-the-box functionality."
"For small or medium-sized businesses they cannot afford this solution."
"They can improve the single sign-on configuration for OIDC and OAuth. That is not very mature in this product, and they can improve it in this particular area."
"The user interface needs to be simplified, it's complex and not user-friendly."
"The user interface needs to be simplified, it's complex and not user-friendly."
"The user interface for users and administrators could be improved to make it easier. Automating some functions could also be beneficial."
"They can improve the single sign-on configuration for OIDC and OAuth. That is not very mature in this product, and they can improve it in this particular area. OIDC is a third-party integration that we do with the cloud platforms, and OAuth is an authorization mechanism for allowing a user having an account with Google or any other provider to access an application. Organizations these days are looking for just-in-time provisioning use cases, but IBM Security Access Manager is not very mature for such use cases. There are only a few applications that can be integrated, and this is where this product is lagging. However, in terms of configuration and single sign-on mechanisms, it is a great product."
"Configuration could be simplified for the end-user."
"Support often lacks experienced technical personnel, resulting in long wait times and unhelpful solutions."
"More integration with SAP and with the internet of things would be good."
"The current version we have is stable but there are bugs, of course. There are many bugs."
"In regards to the front end, the portal that is offered to our users needs improvement. There is room for improvement on that side, particularly in user experience."
"The user experience is good, but it can be improved. There are a lot of features in the administration part, and they need better documentation. For example, they need to explain the main reason for a feature, and what the tables are in the database. It needs better documentation about all the features that are in the solution."
"One Identity Manager could incorporate dynamic dashboarding to predict attack vectors and compromises."
"There are several smaller parts of the tool that have room for improvement."
"The One Identity Manager web portal needs simplification."
 

Pricing and Cost Advice

"The product is not expensive. It depends on the number of users."
"It costs about 300K AED for a year. Its pricing is a bit on the higher end, but in comparison to other products in the market, its price is still better. There are lots of other products that are very costly."
"The license and costs depend on the amount range of users you have. For just approximately 2,000 users, the price is practical and fair. However, when you have 20,000 users, it starts to become really expensive, and the discount per user is not attractive enough to go ahead and purchase."
"Start with an operations team that is motivated to learn a lot in a short period of time. The longer you wait, the more expensive it will be to get the right level of expertise in this area."
"The solution is flexible, in general. You can define the parts of the solution that you want to use, and it won't affect the price."
"There is a one-time licensing cost, and there is also a yearly subscription fee."
"It helps us save on licenses for applications because we are following the account lifecycle, as well as account reactivation."
"I rate One Identity seven out of 10 for affordability. It's reasonably priced."
"The price of One Identity Manager is cheaper than SailPoint."
"It's not cheap, but the pricing is okay. Other applications cost about the same."
"One Identity Manager is priced in the middle range but offers good value due to lower implementation time compared to competitors. Total cost of ownership is crucial where the main expense is in implementation, not licensing."
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
893,164 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
9%
Government
9%
Insurance Company
8%
Financial Services Firm
11%
Outsourcing Company
11%
Manufacturing Company
8%
Comms Service Provider
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business3
Midsize Enterprise2
Large Enterprise4
By reviewers
Company SizeCount
Small Business80
Midsize Enterprise30
Large Enterprise109
 

Questions from the Community

What needs improvement with IBM Security Access Manager?
I have already explained this in my previous call; I don't handle financial terms and commercials. Pricing is generally managed by functional teams and management looking after licensing matters. I...
What is your primary use case for IBM Security Access Manager?
We are still using the IBM BPM platform to automate the processes for our organization.I generally use Microsoft Project for project planning and schedule management, especially in relation to Orac...
What advice do you have for others considering IBM Security Access Manager?
My current domain is leading project development, overseeing both technical and functional areas in process automation and orchestration, along with the hands-on implementation of process automatio...
What do you like most about One Identity Manager?
The One Identity birthright process has helped generate user accounts more accurately and quickly.
What is your experience regarding pricing and costs for One Identity Manager?
The pricing and licensing of One Identity Manager are reasonable considering the features and capabilities it offers for enterprise use.
What needs improvement with One Identity Manager?
One Identity Manager would benefit from enhancements in flow customization and faster performance in large environments to make it more efficient. Overall, it is a strong solution with great potent...
 

Also Known As

IBM Security Verify Access (SVA), IBM Security Access Manager, ISAM
Quest One Identity Manager
 

Overview

 

Sample Customers

POST Luxembourg
Texas A&M, Sky Media, BHF Bank, Swiss Post, Union Investment, Wayne State University. More at OneIdentity.com/casestudies
Find out what your peers are saying about IBM Security Verify Access vs. One Identity Manager and other solutions. Updated: April 2026.
893,164 professionals have used our research since 2012.