Try our new research platform with insights from 80,000+ expert users

IBM Security Verify Access vs One Identity Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

IBM Security Verify Access
Ranking in Identity Management (IM)
17th
Average Rating
7.8
Reviews Sentiment
6.4
Number of Reviews
8
Ranking in other categories
Single Sign-On (SSO) (15th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (17th), Access Management (15th)
One Identity Manager
Ranking in Identity Management (IM)
3rd
Average Rating
8.2
Reviews Sentiment
6.6
Number of Reviews
151
Ranking in other categories
User Provisioning Software (2nd), Identity Governance Administration (IGA) (2nd)
 

Mindshare comparison

As of March 2026, in the Identity Management (IM) category, the mindshare of IBM Security Verify Access is 1.5%, up from 1.2% compared to the previous year. The mindshare of One Identity Manager is 5.4%, down from 8.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Management (IM) Mindshare Distribution
ProductMindshare (%)
One Identity Manager5.4%
IBM Security Verify Access1.5%
Other93.1%
Identity Management (IM)
 

Featured Reviews

Ateeq Rehman - PeerSpot reviewer
Unit Head System Implementor at Allied Bank Limited
Has improved secure user access while managing development through multiple technologies
I have already explained this in my previous call; I don't handle financial terms and commercials. Pricing is generally managed by functional teams and management looking after licensing matters. In Pakistan, vendors such as Oracle and IBM manage account relationships with clients and have tailored pricing models, so I do not have sufficient insights into that aspect.IBM Security Verify Access installation process is not straightforward; it requires underlying specialized knowledge upon which the IBM products are based. The complexity and scalability of the architecture necessitate in-depth technical knowledge and understanding of the system. Thus, installation is not as simple as clicking through; it requires extensive configuration of the underlying application servers, such as IBM WebSphere, where these products are deployed and configured.
Neha Chhangani - PeerSpot reviewer
Business Analyst at a tech vendor with 10,001+ employees
Centralized identity governance has automated lifecycle management and simplifies compliance
One Identity Manager could be improved by making the initial setup and configuration simpler, especially for complex workflows and integrations. The user interface and reporting dashboards could also be more modern and intuitive with better out-of-the-box analytics. Additionally, clearer documentation and faster implementation guidance would help organizations get value more quickly. One specific challenge my team encountered was the complexity during initial configuration, especially when setting up custom workflows and role models which required more time and expertise. We also felt that out-of-the-box reports and dashboards are limited, and more customizable real-time analytics would be helpful. Better documentation and guided setup wizards would make adoption easier, particularly for teams new to identity governance tools. One improvement I think One Identity Manager needs is the enhanced self-service experience. The end-user self-service portal could be more intuitive with clearer guidance for access requests and password resets. Additionally, while integrations are solid, deeper cloud-native connectors and API-driven automation would help in hybrid and multi-cloud environments. A more responsive mobile interface or dedicated app for approvals and tasks would help managers who are often on the go. One more improvement is the built-in predictive insights or trend dashboards around access patterns and risk could improve proactive governance. More descriptive error messages and in-tool troubleshooting tips during setup configuration would reduce dependency on external documentation or support.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"From the integration point of view, it supports SAML, OIDC, and OAuth. For legacy applications that don't have support for SAML and other new protocols, it provides single sign-on access to end-users. From the integration compatibility point of view, it is highly capable."
"It's a good solution for identification and access management."
"IBM Security Verify Access is providing a secure way of handling the user login journey, and secure user authentication is fully managed by ISAM or ISVA."
"The solution has powerful authentification and authorization. It offers a good way to increase security."
"I have found this solution to be really practical and when a user wants to log in, it is effortless and runs smooth."
"The most valuable feature of IBM Security Access Manager, at least for my company, is multi-factor authentication. That's the only feature my company is using. The solution works well and has no glitches. IBM Security Access Manager is a very good solution, so my company is still using it."
"IBM Security Verify Access, formerly known as ISAM, IBM Security Access Manager, now renamed to ISVA, integrates with central directory services for our organization and provides user management functionality."
"The tool provides a password vault, single sign-on, and multifactor authentication. It offers various authentication methods like fingerprint integration, one-time passwords, or tokens sent via email or SMS. This ensures secure access to your accounts by providing multiple authentication options."
"The SAP integration is One Identity Manager's most valuable feature."
"This solution is better on the IT personnel, because now they spend less (or almost no time) managing user rights."
"I consider their support to be very standard, relying on an email-based system."
"Quest One IDM allows for large customization."
"For multinational companies or those with various locations managing their identities and applications, it is very easy and very robust in nature."
"One of the most valuable features is the ability for business people to input their knowledge about business processes directly into the product. It's a good tool for anyone familiar with business or technical administration. The shopping cart capability for requests and the catalog features were also initially valuable."
"We chose this product for being able to accommodate our requirements. It's very flexible, and it's open to being developed to our requirements."
"What I like the most is the flexibility or configurability. It is not like you are writing huge lines of code. It allows us to handle our very complex enterprise use cases, and we have many of those."
 

Cons

"There are a lot of areas that can be improved, but the main area is the lack of customization. You cannot easily customize anything in the product. It is not easy to tweak the functionality. It is challenging to change the out-of-the-box functionality."
"IBM Security Verify Access installation process is not straightforward; it requires underlying specialized knowledge upon which the IBM products are based."
"The user interface needs to be simplified, it's complex and not user-friendly."
"The solution could be classified as a hilt system. There are a lot of resources being used and it is suitable for very large enterprises or the public sector."
"IBM Security Verify Access installation process is not straightforward; it requires underlying specialized knowledge upon which the IBM products are based."
"Configuration could be simplified for the end-user."
"What we'd like improved in IBM Security Access Manager is its onboarding process as it's complex, particularly when onboarding new applications. We need to be very, very careful during the onboarding. We have no issues with IBM Security Access Manager because the solution works fine, apart from the onboarding process and IBM's involvement in onboarding issues. If we need support related to the onboarding, we've noticed a pattern where support isn't available, or they don't have much experience, or we're not getting a response from them. We're facing the same issue with IBM Guardium. As we're just focusing on the multi-factor authentication feature of IBM Security Access Manager and we didn't explore any other features, we don't have additional features to suggest for the next release of the solution, but we're in discussion about exploring ID management and access management features, but those are just possibilities because right now, we're focused on exploring our domain."
"The user interface for users and administrators could be improved to make it easier. Automating some functions could also be beneficial."
"One specific challenge my team encountered was the complexity during initial configuration, especially when setting up custom workflows and role models which required more time and expertise."
"Some features aren't supported by the technical support. It is based on your own risk, which I can accept, but I would be happier if they would provide me some additional information about them anyway, e.g., deleting tables or columns."
"The downside of the product is it is complex and you need an implementation partner to help you develop it. You can't do it on your own."
"The documentation is poor. For example, the synchronization editor has a lot of things happening, but there's just a description. If you want to do something specific with that like create custom views, they just say go to the extension and select the UUID. However, if we don't have a UUID for this view, it will not work. That isn't in the documentation."
"The UI and user experience side of things needs improvement."
"I would like them to enhance the search functionality to enable faster processing when looking for objects."
"Perhaps support could be improved. The knowledge base articles and wiki resources we currently use may not be applicable in every situation, as they often depend on the specific inputs or problems presented by users."
"I have noticed a slow performance dynamic group integration with AWS Cloud that could be improved with One Identity Manager."
 

Pricing and Cost Advice

"The license and costs depend on the amount range of users you have. For just approximately 2,000 users, the price is practical and fair. However, when you have 20,000 users, it starts to become really expensive, and the discount per user is not attractive enough to go ahead and purchase."
"It costs about 300K AED for a year. Its pricing is a bit on the higher end, but in comparison to other products in the market, its price is still better. There are lots of other products that are very costly."
"The product is not expensive. It depends on the number of users."
"It helps us save on licenses for applications because we are following the account lifecycle, as well as account reactivation."
"One Identity Manager is expensive."
"One Identity Manager is cost-efficient."
"It is cost-effective. I do not know about the other regions, but here in the Middle East, the competitors are almost double the price."
"One Identity isn't cheap for small or medium-sized businesses, but I don't think it's necessary for a small company to use. The price is fair for large enterprises with thousands of employees that want to adopt a zero-trust model."
"We pay yearly and per active user. One of the reasons that we chose One Identity Manager is because of the pricing. It is reasonable and affordable compared to other products which we considered before choosing this solution for the company."
"Start with an operations team that is motivated to learn a lot in a short period of time. The longer you wait, the more expensive it will be to get the right level of expertise in this area."
"We are using a self-built solution. It would cost too much to get that up to the standard of what we need. In the long-term, it is cheaper to buy a solution that has what we need. Though, we are still running the previous solution, as we are still in the implementation phase."
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
884,797 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Insurance Company
12%
Government
10%
Computer Software Company
9%
Financial Services Firm
11%
Manufacturing Company
10%
Computer Software Company
6%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business3
Midsize Enterprise2
Large Enterprise4
By reviewers
Company SizeCount
Small Business47
Midsize Enterprise24
Large Enterprise103
 

Questions from the Community

What do you like most about IBM Security Access Manager?
The tool provides a password vault, single sign-on, and multifactor authentication. It offers various authentication methods like fingerprint integration, one-time passwords, or tokens sent via ema...
What needs improvement with IBM Security Access Manager?
I have already explained this in my previous call; I don't handle financial terms and commercials. Pricing is generally managed by functional teams and management looking after licensing matters. I...
What is your primary use case for IBM Security Access Manager?
We are still using the IBM BPM platform to automate the processes for our organization.I generally use Microsoft Project for project planning and schedule management, especially in relation to Orac...
What do you like most about One Identity Manager?
The One Identity birthright process has helped generate user accounts more accurately and quickly.
What is your experience regarding pricing and costs for One Identity Manager?
My experience with pricing, setup cost, and licensing regarding One Identity Manager is that it does not have public list prices. Costs are usually customized based on our organization size, deploy...
What needs improvement with One Identity Manager?
One Identity Manager could be improved by making the initial setup and configuration simpler, especially for complex workflows and integrations. The user interface and reporting dashboards could al...
 

Also Known As

IBM Security Verify Access (SVA), IBM Security Access Manager, ISAM
Quest One Identity Manager
 

Overview

 

Sample Customers

POST Luxembourg
Texas A&M, Sky Media, BHF Bank, Swiss Post, Union Investment, Wayne State University. More at OneIdentity.com/casestudies
Find out what your peers are saying about IBM Security Verify Access vs. One Identity Manager and other solutions. Updated: March 2026.
884,797 professionals have used our research since 2012.