No more typing reviews! Try our Samantha, our new voice AI agent.

IBM Security Verify Access vs Oracle Identity Cloud Service comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 2, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

IBM Security Verify Access
Ranking in Identity and Access Management as a Service (IDaaS) (IAMaaS)
16th
Average Rating
7.8
Reviews Sentiment
6.4
Number of Reviews
8
Ranking in other categories
Single Sign-On (SSO) (15th), Identity Management (IM) (17th), Access Management (13th)
Oracle Identity Cloud Service
Ranking in Identity and Access Management as a Service (IDaaS) (IAMaaS)
19th
Average Rating
7.6
Reviews Sentiment
7.1
Number of Reviews
8
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Identity and Access Management as a Service (IDaaS) (IAMaaS) category, the mindshare of IBM Security Verify Access is 2.1%, up from 1.8% compared to the previous year. The mindshare of Oracle Identity Cloud Service is 1.2%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity and Access Management as a Service (IDaaS) (IAMaaS) Mindshare Distribution
ProductMindshare (%)
IBM Security Verify Access2.1%
Oracle Identity Cloud Service1.2%
Other96.7%
Identity and Access Management as a Service (IDaaS) (IAMaaS)
 

Featured Reviews

Ateeq Rehman - PeerSpot reviewer
Unit Head System Implementor at Allied Bank Limited
Has improved secure user access while managing development through multiple technologies
I have already explained this in my previous call; I don't handle financial terms and commercials. Pricing is generally managed by functional teams and management looking after licensing matters. In Pakistan, vendors such as Oracle and IBM manage account relationships with clients and have tailored pricing models, so I do not have sufficient insights into that aspect.IBM Security Verify Access installation process is not straightforward; it requires underlying specialized knowledge upon which the IBM products are based. The complexity and scalability of the architecture necessitate in-depth technical knowledge and understanding of the system. Thus, installation is not as simple as clicking through; it requires extensive configuration of the underlying application servers, such as IBM WebSphere, where these products are deployed and configured.
Amimesh Anand - PeerSpot reviewer
Senior Architect at a consultancy with 10,001+ employees
Offers single sign-on capabilities to users
Suppose you are totally dependent and have requirements where you have a cloud application or several applications for integration with the cloud. In that case, I will suggest the use of Oracle Identity Cloud Service. Oracle Identity Cloud Service has much scope for customization. If you have a high customization level, then I would suggest IAM. The tool's multifactor authentication capabilities are easy to implement. If a client has a banking system, they need a strong authentication service, and only a password is not required; the user has to authenticate via fingerprint, face recognition, or go for or any RSA token. Double authentication is required where the banking department has access to very critical applications, or else they cannot go ahead and give the password. It is very difficult to hack once you have MFA in place. You have to either give the print fingerprint or any RSA token, making it not so easy to hack the system. We suggest MFA to clients who have the most critical application with them. I recommend the tool for every client we have, but it depends on how they want to have it because some customers don't want to go for the cloud application, and they might be thinking about changing the cloud vendors. Suppose a company has some costs in mind, and if they have a large number of employees, like 50,000 or 1,00,000 users, then it will be costlier for them than having an on-prem tool, like IAM. If a customer has 5,000, 10,000, or 20,00 employees, Oracle Identity Cloud Service can be a cheaper tool than the IAM product. I will suggest Oracle Identity Cloud Service only for smaller organizations. The tool does not have any AI capabilities. I would recommend the tool to everyone. I rate the tool an eight out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The tool provides a password vault, single sign-on, and multifactor authentication. It offers various authentication methods like fingerprint integration, one-time passwords, or tokens sent via email or SMS. This ensures secure access to your accounts by providing multiple authentication options."
"It's a good solution for identification and access management."
"From the integration point of view, it supports SAML, OIDC, and OAuth; for legacy applications that don't have support for SAML and other new protocols, it provides single sign-on access to end-users, and from the integration compatibility point of view, it is highly capable."
"IBM Security Verify Access, formerly known as ISAM, IBM Security Access Manager, now renamed to ISVA, integrates with central directory services for our organization and provides user management functionality."
"It's a good solution for identification and access management."
"IBM Security Verify Access is providing a secure way of handling the user login journey, and secure user authentication is fully managed by ISAM or ISVA."
"From the integration point of view, it supports SAML, OIDC, and OAuth. For legacy applications that don't have support for SAML and other new protocols, it provides single sign-on access to end-users. From the integration compatibility point of view, it is highly capable."
"Its stability and UI are most valuable."
"It's an excellent product and the integration adapts well with all things around the solution."
"The APIs are well documented, which has allowed us to access the IDCS security applications in our custom APIs."
"Onboarding of new employees, consultants, and partners has rapidly increased; we reduced the time to onboard them and the ease of onboarding has been improved, so we recognize there has been efficiency which has been brought into our organization."
"The most valuable features are the high stability and good performance."
"The most valuable feature is identity management."
"The most valuable feature is the reduced maintenance burden for the client."
"IDCS has enabled the users of the other cloud services and has allowed administrators to manage access to services, applications, and grant privileges via IDCS groups."
"Federation and Identity let us create users and send federation tools, giving the authentication and authorization to users. With the on-premise solution, I can do the installation, configuration, and integration of Identity Access Management. This gives us direct access. The integration with the single solution E-business suite is also very valuable."
 

Cons

"There are a lot of areas that can be improved, but the main area is the lack of customization. You cannot easily customize anything in the product."
"What we'd like improved in IBM Security Access Manager is its onboarding process as it's complex, particularly when onboarding new applications."
"The user interface needs to be simplified, it's complex and not user-friendly."
"Configuration could be simplified for the end-user."
"IBM Security Verify Access installation process is not straightforward; it requires underlying specialized knowledge upon which the IBM products are based."
"Configuration could be simplified for the end-user."
"IBM Security Verify Access installation process is not straightforward; it requires underlying specialized knowledge upon which the IBM products are based."
"They can improve the single sign-on configuration for OIDC and OAuth. That is not very mature in this product, and they can improve it in this particular area."
"Self Service features are still limited in IDCS, and there is a need for more customization of the self-service screens."
"The initial setup was a little complex. At that time, the method of integration was a bit complicated due to the scripts that we were required to write for the integration."
"Self Service features are still limited in IDCS, and there is a need for more customization of the self-service screens."
"The tool doesn't have many out-of-the-box connectors for the target integration."
"The IDs that are not used for a particular number of days should be disabled automatically."
"The cost of this solution should be reduced."
"The protocol could be easier to use."
"Oracle needs to improve the GUI and many other aspects of the cloud console."
 

Pricing and Cost Advice

"The product is not expensive. It depends on the number of users."
"It costs about 300K AED for a year. Its pricing is a bit on the higher end, but in comparison to other products in the market, its price is still better. There are lots of other products that are very costly."
"The license and costs depend on the amount range of users you have. For just approximately 2,000 users, the price is practical and fair. However, when you have 20,000 users, it starts to become really expensive, and the discount per user is not attractive enough to go ahead and purchase."
"The foundation tier that is offered with other cloud services subscriptions is fairly extensive and supports the use of identities, groups, and privileges in those cloud services."
"The tool's implementation costs totally depend on the number of users. The cost depends on how many users are going to use it, so a per-user cost model is needed for the tool."
"Our licensing costs are on a yearly basis."
report
Use our free recommendation engine to learn which Identity and Access Management as a Service (IDaaS) (IAMaaS) solutions are best for your needs.
893,221 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
9%
Government
9%
Insurance Company
8%
Financial Services Firm
18%
Performing Arts
8%
Marketing Services Firm
8%
Construction Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business3
Midsize Enterprise2
Large Enterprise4
By reviewers
Company SizeCount
Small Business2
Midsize Enterprise1
Large Enterprise4
 

Questions from the Community

What needs improvement with IBM Security Access Manager?
I have already explained this in my previous call; I don't handle financial terms and commercials. Pricing is generally managed by functional teams and management looking after licensing matters. I...
What is your primary use case for IBM Security Access Manager?
We are still using the IBM BPM platform to automate the processes for our organization.I generally use Microsoft Project for project planning and schedule management, especially in relation to Orac...
What advice do you have for others considering IBM Security Access Manager?
My current domain is leading project development, overseeing both technical and functional areas in process automation and orchestration, along with the hands-on implementation of process automatio...
What is your experience regarding pricing and costs for Oracle Identity Cloud Service?
The tool's implementation costs totally depend on the number of users. The cost depends on how many users are going to use it, so a per-user cost model is needed for the tool.
What needs improvement with Oracle Identity Cloud Service?
The tool doesn't have many out-of-the-box connectors for the target integration. The connectors are very small and don't have much customization scope. If we talk about the IAM tool from Oracle, it...
What is your primary use case for Oracle Identity Cloud Service?
I use the solution in my company as it is the same version of the tools' IAM product but on the cloud. If we look at IAM before, there is AAM, which is adaptive access management, which was discont...
 

Also Known As

IBM Security Verify Access (SVA), IBM Security Access Manager, ISAM
No data available
 

Overview

 

Sample Customers

POST Luxembourg
Valuecube, Doosan Heavy Industries & Construction, Ricoh
Find out what your peers are saying about IBM Security Verify Access vs. Oracle Identity Cloud Service and other solutions. Updated: April 2026.
893,221 professionals have used our research since 2012.