

Symantec Identity Governance and Administration and IBM Security Verify Access compete in the identity management and security domain. While Symantec excels in governance capabilities, IBM's comprehensive feature set provides an edge, even at a premium.
Features: Symantec Identity Governance and Administration offers strong compliance management, robust governance over user access, and effective audit capabilities. On the other hand, IBM Security Verify Access includes adaptive access management, advanced threat intelligence, and sophisticated risk analysis tools. IBM's feature set is deemed more extensive, providing better security enhancements.
Room for Improvement: Symantec could improve in areas like more intuitive user interfaces, expanding integration capabilities, and better reporting tools. IBM could enhance ease of customization, reduce complexity in deployment, and improve its pricing structure to offer better cost efficiency for smaller organizations.
Ease of Deployment and Customer Service: Symantec Identity Governance and Administration is known for a straightforward deployment model and reliable technical support, ensuring smooth integration. IBM Security Verify Access, while complex due to advanced features, provides comprehensive customer service that aids navigation and implementation, enhancing the deployment experience despite complexities.
Pricing and ROI: Symantec Identity Governance and Administration offers a cost-effective setup with attractive ROI for governance-focused organizations. IBM Security Verify Access commands a higher initial cost but promises longer-term ROI through extensive capabilities and security enhancements, making it a significant investment with valuable security benefits.
| Product | Mindshare (%) |
|---|---|
| IBM Security Verify Access | 1.5% |
| Symantec Identity Governance and Administration | 2.5% |
| Other | 96.0% |

| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 2 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 23 |
| Midsize Enterprise | 9 |
| Large Enterprise | 45 |
IBM Security Verify Access offers adaptable access management with multi-factor authentication, seamless protocol integration, and strong user management, suitable for cloud and on-premises environments.
IBM Security Verify Access provides multi-factor authentication, seamless integration with protocols like SAML and OAuth, and features including password vaults and single sign-on. Its adaptable nature allows for deployment both in cloud and on-premises settings. Users appreciate its quick setup, reliable authorization, and efficient user management, especially when integrated with Active Directory. The intuitive interface enhances security with mobile features like QR code enrollment, making it suitable for diverse environments. However, cloud deployment could be simpler, and the interface could use enhancements for better ease. Onboarding applications and support availability need improvements, and configuration for OIDC and OAuth should mature. More comprehensive documentation and simplified installation are also needed, along with automation to reduce resource consumption.
What are the key features of IBM Security Verify Access?IBM Security Verify Access is widely used in the banking and educational sectors for access management, supporting activities like single sign-on and control across different user groups. Many in these industries utilize it for customer authentication and integrate it with mobile systems to enhance security. Its adaptability allows it to serve complex needs, particularly useful in environments such as universities and financial institutions.
Symantec Identity Governance and Administration offers automated management for identity lifecycles, provisioning, and entitlements, featuring easy integration, flexibility, role-based access, and strong compliance support.
This software provides effective identity lifecycle automation, entitlement management, provisioning, and access control while offering codeless customization through Policy and Identity Xpress technology. The integration with multiple applications supports regulatory compliance efforts, enhancing security and operational efficiency with a user-friendly interface. Users appreciate its ease of customization, though challenges in integrating with cloud services and external systems remain. Improvements are needed in technical support, reporting capabilities, and workflows. Its comprehensive identity solutions target sectors like retail, financial, and government, emphasizing risk management and compliance while integrating with HR systems.
What key features does it offer?Organizations in retail, financial, and government sectors utilize this software to streamline identity management and standardize user accounts. Businesses focus on user creation, privilege management, and compliance certification by aligning access with business rules. Integration with HR systems for identity solutions is achieved through technical customizations.
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.