Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Access Auditor
Score 7.9 out of 10
N/A
Access Auditor from UK-based company SCC is an identity management and user provisioning solution.N/A
IBM Security Verify
Score 8.3 out of 10
N/A
IBM Security Verify, formerly known as IBM Cloud Identity, is an identity-as-a-service (IDaaS) offering that aggregates dynamic user, device and environmental context to automate risk protection and continuously authenticate any user to any resource.
$1.71
per month per user
Pricing
Access AuditorIBM Security Verify
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Access AuditorIBM Security Verify
Free Trial
NoYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoYes
Entry-level Setup FeeNo setup feeOptional
Additional DetailsSample Pricing Breakdown (NOTE: for competitive pricing per contract, please consult with your IBM Security Account Rep) Users: 5,000 SSO* -- USD 1.71 per user per month MFA* -- USD 1.71 per user per month Adaptive Access* -- USD 1.71 per user per month Lifecycle and provisioning** -- USD 2.01 per user per month Identity analytics** -- USD 2.13 per user per month * Single sign-on (SSO), multifactor authentication (MFA) and adaptive access pricing based on total active monthly users per use case. Costs decrease if users are active less than once per month. ** Lifecycle and provisioning and identity analytics pricing based on total users per use case.
More Pricing Information
Features
Access AuditorIBM Security Verify
Identity Management
Comparison of Identity Management features of Product A and Product B
Access Auditor
7.6
1 Ratings
7% below category average
IBM Security Verify
7.4
18 Ratings
10% below category average
ID-Management Access Control7.01 Ratings7.717 Ratings
ID Management Single-Sign On (SSO)7.01 Ratings7.917 Ratings
Multi-Factor Authentication8.01 Ratings7.916 Ratings
Password Management6.01 Ratings7.815 Ratings
Account Provisioning and De-provisioning9.01 Ratings6.915 Ratings
ID Management Workflow Automation7.01 Ratings7.415 Ratings
ID Risk Management9.01 Ratings6.416 Ratings
Best Alternatives
Access AuditorIBM Security Verify
Small Businesses
1Password
1Password
Score 9.1 out of 10
1Password
1Password
Score 9.1 out of 10
Medium-sized Companies
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
Enterprises
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Access AuditorIBM Security Verify
Likelihood to Recommend
8.0
(1 ratings)
7.2
(19 ratings)
Likelihood to Renew
-
(0 ratings)
8.2
(1 ratings)
Usability
-
(0 ratings)
7.7
(8 ratings)
Availability
-
(0 ratings)
7.1
(8 ratings)
Support Rating
8.0
(2 ratings)
7.3
(8 ratings)
Configurability
-
(0 ratings)
7.0
(8 ratings)
Contract Terms and Pricing Model
-
(0 ratings)
7.7
(4 ratings)
Professional Services
-
(0 ratings)
8.8
(3 ratings)
User Testimonials
Access AuditorIBM Security Verify
Likelihood to Recommend
SCC
Access Auditor is great for evaluate your Governance Process and enhances that workflow before deployment. As we had to get the business up to speed afterword and that slowed us down.
Read full review
IBM
IBM Security Verify is well-suited for scenarios where there is a need to verify user identity or authentication. For example, it is ideal for verifying customers’ identities when they are making payments or other financial transactions. Additionally, it is ideal for verifying user access to sensitive data or resources, such as a company’s intranet or other confidential systems.

IBM Security Verify is less appropriate for scenarios where there is a need for more complex authentication or authorization. For example, it is less suitable for scenarios where there is a need for multi-factor authentication, such as biometric authentication or multi-factor authentication with a physical token. Additionally, it is less suitable for scenarios where there is a need for more sophisticated authorization, such as role-based access control.
Read full review
Pros
SCC
  • Create internal/operational efficiencies
  • Improve business process outcomes
Read full review
IBM
  • MFA authentication - you can verify the users using the mobile app.
  • Password repository - We don't have to remember passwords for each app; we only need one for IBM security, which then authenticates us and lets us access the app.
  • Sharing access to new users, we just create a new user in IBM and it authenticates and takes care of the user.
Read full review
Cons
SCC
  • Product functionality and performance
  • Product roadmap and future vision
Read full review
IBM
  • It was a bit overwhelming to implement and was neither obvious nor user-friendly.
  • While the product is quite powerful, the documentation left something to be desired if one wants to fully appreciate its capabilities.
  • The cost was almost prohibitive, but it was the only product we could find that addressed all the needs of our organization in one place.
Read full review
Likelihood to Renew
SCC
No answers on this topic
IBM
This is a platform that adapts very well to our IT ecosystem, allowing us to develop an effective identification and access control to our applications. It is secure and reliable.
Read full review
Usability
SCC
No answers on this topic
IBM
IBM Security Verify is a cloud-based identity and access management solution that helps businesses protect their data and applications from unauthorized access. It provides secure authentication, user access control, single sign-on, and two-factor authentication. It also offers audit logging and reporting capabilities, as well as advanced threat protection and vulnerability assessment. Our Customers report that the product is easy to use and the dashboard is intuitive. Customer support is also highly praised by users.
Read full review
Reliability and Availability
SCC
No answers on this topic
IBM
It is almost always available. they do updates at night, minimizing the effect of upgrades. It is always around, it is just old and maybe needs to start from scratch to get a better product for nowadays. It is almost always available during business hours when you need it. for 24/7 companies it may be more difficult to time the upgrades so that it does not affect your work.
Read full review
Support Rating
SCC
It is hard to pick just one. Access Auditor has dramatically improved our processes and saved us a ton of time. Also, their support is top-notch.
Read full review
IBM
IBM Security Verify has a general support that guarantees a personalized attention, their opinions and answers are timely and respond correctly to the requirements requested
Read full review
Alternatives Considered
SCC
Even if you only use their Auditing/Access Certification tool and not their Identity Management/Password Management tools, you're still able to complete entitlement reviews for SOX or any other compliance requirements.
Read full review
IBM
I believe that the decision for selecting IBM Security Verify was based on our IT technical analysis but also due to our trust that this provider would deploy a solution according to our needs and expectations. The free trial made it possible to test it and understand, at an early stage, if it was the type of solution we were looking for. Previous recommendations and pricing were also important issues for this decision process.
Read full review
Contract Terms and Pricing Model
SCC
No answers on this topic
IBM
No, The unit pricing is competitive, and the billing frequency is flexible, which makes it easy to budget and manage.
Read full review
Professional Services
SCC
No answers on this topic
IBM
Very good Service
Read full review
Return on Investment
SCC
  • Strong customer focus
  • Overall cost
Read full review
IBM
  • It has allowed us to securely store and access data which is hard to put a price on, but is of tremendous value.
  • It has performed well and we did not have to upgrade any of the current equipment that we had.
  • It has allowed us to branch out slightly and offer more mobile solutions both internally and externally.
Read full review
ScreenShots

IBM Security Verify Screenshots

Screenshot of IBM Security Verify (for CIAM) - Privacy and ConsentScreenshot of IBM Security Verify - Custom Application TemplateScreenshot of IBM Security Verify - Select Application TypeScreenshot of IBM Security Verify - Privacy Policy