Citrix Endpoint Management vs. IBM Security Verify

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Citrix Endpoint Management
Score 8.3 out of 10
N/A
Citrix Endpoint Management (formerly XenMobile), is a UEM and enterprise mobility management application for securing mobile applications and devices.N/A
IBM Security Verify
Score 8.6 out of 10
N/A
IBM Security Verify, formerly known as IBM Cloud Identity, is an identity-as-a-service (IDaaS) offering that aggregates dynamic user, device and environmental context to automate risk protection and continuously authenticate any user to any resource.
$1.71
per month per user
Pricing
Citrix Endpoint ManagementIBM Security Verify
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Citrix Endpoint ManagementIBM Security Verify
Free Trial
NoYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoYes
Entry-level Setup FeeNo setup feeOptional
Additional DetailsSample Pricing Breakdown (NOTE: for competitive pricing per contract, please consult with your IBM Security Account Rep) Users: 5,000 SSO* -- USD 1.71 per user per month MFA* -- USD 1.71 per user per month Adaptive Access* -- USD 1.71 per user per month Lifecycle and provisioning** -- USD 2.01 per user per month Identity analytics** -- USD 2.13 per user per month * Single sign-on (SSO), multifactor authentication (MFA) and adaptive access pricing based on total active monthly users per use case. Costs decrease if users are active less than once per month. ** Lifecycle and provisioning and identity analytics pricing based on total users per use case.
More Pricing Information
Community Pulse
Citrix Endpoint ManagementIBM Security Verify
Top Pros
Top Cons
Features
Citrix Endpoint ManagementIBM Security Verify
Identity Management
Comparison of Identity Management features of Product A and Product B
Citrix Endpoint Management
-
Ratings
IBM Security Verify
8.1
35 Ratings
1% above category average
ID-Management Access Control00 Ratings8.131 Ratings
ID Management Single-Sign On (SSO)00 Ratings8.433 Ratings
Multi-Factor Authentication00 Ratings8.431 Ratings
Password Management00 Ratings9.131 Ratings
Account Provisioning and De-provisioning00 Ratings7.428 Ratings
ID Management Workflow Automation00 Ratings7.030 Ratings
ID Risk Management00 Ratings8.230 Ratings
Best Alternatives
Citrix Endpoint ManagementIBM Security Verify
Small Businesses
NinjaOne
NinjaOne
Score 9.2 out of 10
Dashlane
Dashlane
Score 9.2 out of 10
Medium-sized Companies
NinjaOne
NinjaOne
Score 9.2 out of 10
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
Enterprises
Automox
Automox
Score 8.9 out of 10
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Citrix Endpoint ManagementIBM Security Verify
Likelihood to Recommend
9.0
(7 ratings)
8.3
(36 ratings)
Likelihood to Renew
-
(0 ratings)
9.1
(1 ratings)
Usability
10.0
(1 ratings)
7.7
(15 ratings)
Availability
-
(0 ratings)
8.6
(19 ratings)
Support Rating
9.8
(2 ratings)
7.8
(15 ratings)
Configurability
-
(0 ratings)
8.4
(19 ratings)
Contract Terms and Pricing Model
-
(0 ratings)
7.8
(7 ratings)
Professional Services
-
(0 ratings)
8.3
(5 ratings)
User Testimonials
Citrix Endpoint ManagementIBM Security Verify
Likelihood to Recommend
Citrix
This product is well suited for any healthcare organization, especially one privately owned by the providers. Many of our providers were displeased with our efforts to use a product that forced sandboxing of Exchange information. Therefore, we needed something that was flexible enough that sandboxing could be used where desired but still allowed native OS integration where necessary.
Read full review
IBM
Verify protects our on-premises resources and some of our cloud-based ones, too. We've used SSO with several apps without issues. MFA was the main driver for us, and Verify was found to be a good fit for our needs, enabling our end users to access resources securely. This facility helped us build cyber assurance with our stakeholders.
Read full review
Pros
Citrix
  • It has efficient security control system. Easy to use and administer.
  • It is very easy to install, it connects well with with other apps.
  • SecureWeb Xenmobile provides secured access to the websites and eliminates the need of VPN.
  • It connects very well with other apps.
Read full review
IBM
  • IBM Security Verify provides comprehensive identity and access management (IAM) capabilities.
  • IBM Security Verify provides multi-factor authentication (MFA) capabilities.
  • IBM Security Verify provides robust identity and access governance capabilities.
  • IBM Security Verify provides comprehensive auditing capabilities.
  • IBM Security Verify provides a comprehensive platform for managing and protecting privileged accounts.
Read full review
Cons
Citrix
  • issues with non apple, non samsung devices: if it is not setup with an apple or samsung phone, then the Certificate onboarding is a struggle/unable to be done.
  • user-pin setup: for a user to be onboarded, requiring a PIN; there is a self service way but it is clunky and users prefer to call in instead of trying to follow the 15 step process via PDF
  • if the certificate is ever lost, due to an upgrade via IOS or android, then the entire process [uninstall, reinstall] has to be done, which means downtime for the end user, and higher call volume when a service provider pushes an iOS update.
Read full review
IBM
  • The mobile app can be a bit buggy at times if it gets fixed it would be great.
  • UI seems a bit old compared to modern tools out there.
  • There is a bit of a learning curve; if the developers can make it more intuitive it would be awesome.
Read full review
Likelihood to Renew
Citrix
No answers on this topic
IBM
It works flawlessly, i have never faced any major issues with this. It has all the features such as Iam and security management. I think its a good investment and the benefits we reap from this software are worth the price.
Read full review
Usability
Citrix
The software's usability is what we expected. We knew what our organization needed and Citrix was able to meet our needs. The ability to have the apps on a mobile device has been a great plus and Citrix seems to have really developed a software based on the every day needs of the user.
Read full review
IBM
While setup and implementation takes work and time, the flexibility and possibilities make up for that in the long run. This is not a product you can just install and run, but if you design and implement your ruleset well, it will save you a lot of work afterwards. Just make sure that the systems you want to use it for have an existing and proven connector.
Read full review
Reliability and Availability
Citrix
No answers on this topic
IBM
It is almost always available. they do updates at night, minimizing the effect of upgrades. It is always around, it is just old and maybe needs to start from scratch to get a better product for nowadays. It is almost always available during business hours when you need it. for 24/7 companies it may be more difficult to time the upgrades so that it does not affect your work.
Read full review
Support Rating
Citrix
Overall the support from the customer service team has been good. They are very timely and expert in resolving the tickets. They have appropriate knowledge to resolve issues in all stages to development. They were up to the point during the implementation stage of the XenMobile, all queries were answered in time to help finish the deployment. The support for last three years has been extraordinary in helping us use XenMobile effectively and efficiently.
Read full review
IBM
The support team has always been the primary consultation base when we are faced by performance problems. From the deployment stage the team has managed to monitor the operation lifecycle and give best insights based on their observation. It works 24/7 to enhance productive service delivery to clients. The IBM Security Verify Support team has been the main player in the successful performance of this software.
Read full review
Alternatives Considered
Citrix
With a zero trust solution for the entire digital workspace, you can continually monitor and assess session activities before, during, and after login. Reduce risk, gain more control over every session, and get deeper insights across your entire application landscape. To achieve this strong security posture across all environments, you need an application delivery solution that shares a common code base. This lets you implement consistent security policies across all your applications for comprehensive protection.
Read full review
IBM
We evaluated Oracle Identity Manager and were ready to move ahead with the purchase plan, but then found that IBM addressed the needs of our company in a more robust fashion. The price was significantly higher, yet in the grand scheme of things, the safety of both our data and the data of our clients was the most important criteria.
Read full review
Contract Terms and Pricing Model
Citrix
No answers on this topic
IBM
The licensing terms were favourable due to their flexibility based on the size and purpose of implementation. The billing frequency is done on quarterly basis. The vendor team has enacted best user policies that gives the company the full control of this platform. It is cost-effective as compared to most security verification tools in the market.
Read full review
Professional Services
Citrix
No answers on this topic
IBM
In the case of adjustments, we were often able to carry them out completely on our own and only used professional services for new requirements. Particularly in the case of access management, it is very positive that we usually needed IBM for a task in less than an hour and then developed the solution further on our own.
Read full review
Return on Investment
Citrix
  • Specific ROI was on us avoiding purchasing company managed cell phones - one of the most important drivers
  • Makes on boarding, and especially offboarding remote users a heck of a lot easier w/the ability to wipe the container, even if not connected (via time setting)
  • Easy access to internal resources - no need for separate vpn, etc...
Read full review
IBM
  • Very much secured to the business as it provides granular level of configuration as far as authentication and authorization is concerned.
  • Works as a reverse Proxy so totally hides the backend application from anonymous access
  • It needs professional to install and manage it. It takes time to implement right set of policies but once setup as per requirement it will do its job
Read full review
ScreenShots

IBM Security Verify Screenshots

Screenshot of IBM Security Verify (for CIAM) - Privacy and ConsentScreenshot of IBM Security Verify - Custom Application TemplateScreenshot of IBM Security Verify - Select Application TypeScreenshot of IBM Security Verify - Privacy Policy