Likelihood to Recommend During the onboarding process, remote workers can enroll their fingerprints or create secure PINs. This eliminates the need for complicated passwords and enables them to safely access company resources and critical apps from remote locations. HID DigitalPersona's robust authentication techniques and access control features can assist you in adhering to data security laws.
Read full review Verify protects our on-premises resources and some of our cloud-based ones, too. We've used SSO with several apps without issues. MFA was the main driver for us, and Verify was found to be a good fit for our needs, enabling our end users to access resources securely. This facility helped us build cyber assurance with our stakeholders.
Read full review Pros Speeding up the login process with fingerprint in PIN rather than having to remember a long password. Our IT department has seen a huge decrease in the amount of account lockout and forgot password calls. It is highly customizable to meet the needs of remote or on-premises workers. It is all configurable through group policy, so it is very easy to set specific requirements on certain groups. Setup was quick and the administration guides are very easy to follow if you need to go back in and adjust things. Read full review IBM Security Verify provides comprehensive identity and access management (IAM) capabilities. IBM Security Verify provides multi-factor authentication (MFA) capabilities. IBM Security Verify provides robust identity and access governance capabilities. IBM Security Verify provides comprehensive auditing capabilities. IBM Security Verify provides a comprehensive platform for managing and protecting privileged accounts. Read full review Cons I find that sometimes I have had to delete a users fingerprints and re-add them. There must be something going on where the software believes that the user has changed their fingerprints. I have on occasion come across a person where the reader was unable to create fingerprints for that user. It would be interesting to see if the sensitivity of the 4500 reader could be improved on. I find that using the DigitalPersona software makes the users ultimately forget their passwords. Maybe every once in a while the software could require the user to type in their Windows password to help them remember it. Read full review The mobile app can be a bit buggy at times if it gets fixed it would be great. UI seems a bit old compared to modern tools out there. There is a bit of a learning curve; if the developers can make it more intuitive it would be awesome. Read full review Likelihood to Renew It is wonderful for multifactor authentication and gives us many options for what we use to authenticate. All of our users use it and it is engrained into our group policies and people would be very disappointed if it went away.
Read full review It works flawlessly, i have never faced any major issues with this. It has all the features such as Iam and security management. I think its a good investment and the benefits we reap from this software are worth the price.
Read full review Usability I think there are still fundamental enhancements needed to be added to the management consoles and I think there ought to be a Centralized, Windows Based "Thick" Management Application instead of individual utilities which vary from MMCs, Scripts, Wizards, etc.
Read full review While setup and implementation takes work and time, the flexibility and possibilities make up for that in the long run. This is not a product you can just install and run, but if you design and implement your ruleset well, it will save you a lot of work afterwards. Just make sure that the systems you want to use it for have an existing and proven connector.
Read full review Reliability and Availability It is almost always available. they do updates at night, minimizing the effect of upgrades. It is always around, it is just old and maybe needs to start from scratch to get a better product for nowadays. It is almost always available during business hours when you need it. for 24/7 companies it may be more difficult to time the upgrades so that it does not affect your work.
Read full review Support Rating Extremely poor; I've never encountered such. Professional Services completely dropped us for months. Crossmatch tech support seems like it has 3 techs tops! No response to emails, calls, the absolute worst! I will never recommend DP to anyone.
Read full review The support team has always been the primary consultation base when we are faced by performance problems. From the deployment stage the team has managed to monitor the operation lifecycle and give best insights based on their observation. It works 24/7 to enhance productive service delivery to clients. The IBM Security Verify Support team has been the main player in the successful performance of this software.
Read full review Implementation Rating Could use tools to audit license usage at a more granular level as to allow an administrator to free up licenses from users whom seldom use their biometrics to login.
Read full review Alternatives Considered We have used One Identity for software tokens. The Defender software tokens were originally included with our bundle and work pretty well for integration into the AnyConnect VPN client with Cisco. All that said, we use the two products for different applications and DP does what it does very well.
Read full review We evaluated
Oracle Identity Manager and were ready to move ahead with the purchase plan, but then found that IBM addressed the needs of our company in a more robust fashion. The price was significantly higher, yet in the grand scheme of things, the safety of both our data and the data of our clients was the most important criteria.
Read full review Contract Terms and Pricing Model The licensing terms were favourable due to their flexibility based on the size and purpose of implementation. The billing frequency is done on quarterly basis. The vendor team has enacted best user policies that gives the company the full control of this platform. It is cost-effective as compared to most security verification tools in the market.
Read full review Professional Services In the case of adjustments, we were often able to carry them out completely on our own and only used professional services for new requirements. Particularly in the case of access management, it is very positive that we usually needed IBM for a task in less than an hour and then developed the solution further on our own.
Read full review Return on Investment I'm happy to say I'm not involved in budgeting or finance, but the financial benefits are easy to state: Less helpdesk time - helpdesk staff don't have to spend time resetting people's passwords. Users don't have to wait for Helpdesk to get around to helping them log in. Read full review Very much secured to the business as it provides granular level of configuration as far as authentication and authorization is concerned. Works as a reverse Proxy so totally hides the backend application from anonymous access It needs professional to install and manage it. It takes time to implement right set of policies but once setup as per requirement it will do its job Read full review ScreenShots IBM Security Verify Screenshots