IBM Security Verify vs. PingOne from Ping Identity

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
IBM Security Verify
Score 8.6 out of 10
N/A
IBM Security Verify, formerly known as IBM Cloud Identity, is an identity-as-a-service (IDaaS) offering that aggregates dynamic user, device and environmental context to automate risk protection and continuously authenticate any user to any resource.
$1.71
per month per user
PingOne from Ping Identity
Score 7.2 out of 10
N/A
The PingOne Cloud Platform from Ping Identity in Denver, Colorado is an identity management and access solution (IAM) for enterprises. Features of the products include single sign-on, multi-factor authentication, user management with directory, provisioning and deprovisioning. The solution is presented as a comprehensive, standards-based platform that allows users and devices to securely access any service, application or API from any device. Designed for hybrid IT environments, it can be…
$20,000
per year
Pricing
IBM Security VerifyPingOne from Ping Identity
Editions & Modules
No answers on this topic
Essential
$20,000
per year
Plus
$40,000
per year
Premium
Contact Sales
Offerings
Pricing Offerings
IBM Security VerifyPingOne from Ping Identity
Free Trial
YesYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
YesNo
Entry-level Setup FeeOptionalNo setup fee
Additional DetailsSample Pricing Breakdown (NOTE: for competitive pricing per contract, please consult with your IBM Security Account Rep) Users: 5,000 SSO* -- USD 1.71 per user per month MFA* -- USD 1.71 per user per month Adaptive Access* -- USD 1.71 per user per month Lifecycle and provisioning** -- USD 2.01 per user per month Identity analytics** -- USD 2.13 per user per month * Single sign-on (SSO), multifactor authentication (MFA) and adaptive access pricing based on total active monthly users per use case. Costs decrease if users are active less than once per month. ** Lifecycle and provisioning and identity analytics pricing based on total users per use case.Try PingOne for Customers for free. Sign up for a free 30-day trial of PingOne for customers.
More Pricing Information
Community Pulse
IBM Security VerifyPingOne from Ping Identity
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Features
IBM Security VerifyPingOne from Ping Identity
Identity Management
Comparison of Identity Management features of Product A and Product B
IBM Security Verify
8.1
35 Ratings
1% above category average
PingOne from Ping Identity
6.5
7 Ratings
21% below category average
ID-Management Access Control8.131 Ratings8.85 Ratings
ID Management Single-Sign On (SSO)8.433 Ratings9.97 Ratings
Multi-Factor Authentication8.431 Ratings9.97 Ratings
Password Management9.131 Ratings8.85 Ratings
Account Provisioning and De-provisioning7.428 Ratings1.64 Ratings
ID Management Workflow Automation7.030 Ratings2.33 Ratings
ID Risk Management8.230 Ratings4.34 Ratings
Best Alternatives
IBM Security VerifyPingOne from Ping Identity
Small Businesses
Dashlane
Dashlane
Score 9.2 out of 10
Dashlane
Dashlane
Score 9.2 out of 10
Medium-sized Companies
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
Enterprises
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
IBM Security VerifyPingOne from Ping Identity
Likelihood to Recommend
8.3
(36 ratings)
7.9
(8 ratings)
Likelihood to Renew
9.1
(1 ratings)
-
(0 ratings)
Usability
7.7
(15 ratings)
9.0
(1 ratings)
Availability
8.6
(19 ratings)
-
(0 ratings)
Support Rating
7.8
(15 ratings)
8.6
(4 ratings)
Configurability
8.4
(19 ratings)
-
(0 ratings)
Contract Terms and Pricing Model
7.8
(7 ratings)
-
(0 ratings)
Professional Services
8.3
(5 ratings)
-
(0 ratings)
User Testimonials
IBM Security VerifyPingOne from Ping Identity
Likelihood to Recommend
IBM
Verify protects our on-premises resources and some of our cloud-based ones, too. We've used SSO with several apps without issues. MFA was the main driver for us, and Verify was found to be a good fit for our needs, enabling our end users to access resources securely. This facility helped us build cyber assurance with our stakeholders.
Read full review
Ping Identity
Really like [this] solution, it fits our requirements 100%. There are unlimited possibilities to extend the product, either by creating additional adapters or selectors. We really like the policy management level in PingFederate. It's extremely helpful when we can specify customer journey per many different requirements like user location, application type etc. As well, both StepUp and TopDown authentication flows were implemented [easily].
Read full review
Pros
IBM
  • IBM Security Verify provides comprehensive identity and access management (IAM) capabilities.
  • IBM Security Verify provides multi-factor authentication (MFA) capabilities.
  • IBM Security Verify provides robust identity and access governance capabilities.
  • IBM Security Verify provides comprehensive auditing capabilities.
  • IBM Security Verify provides a comprehensive platform for managing and protecting privileged accounts.
Read full review
Ping Identity
  • Based on open standards, we can use as much or as little of the Ping suite as we like, depending on which other technologies we've already implemented.
  • Continuous innovation and product enhancements have ensured their products continue to meet our rapidly evolving needs.
  • Ping Identity has been an outstanding partner, starting with the RFP process and continuing to this day, years after the sale. They are focused on our success at every level of the company and are highly responsive to our needs, issues, and product suggestions.
Read full review
Cons
IBM
  • The mobile app can be a bit buggy at times if it gets fixed it would be great.
  • UI seems a bit old compared to modern tools out there.
  • There is a bit of a learning curve; if the developers can make it more intuitive it would be awesome.
Read full review
Ping Identity
  • solution has some propriety solution which is hard to customize
  • doesn't support all workflow and hooks
  • solution has aged and not all configuration are supported
Read full review
Likelihood to Renew
IBM
It works flawlessly, i have never faced any major issues with this. It has all the features such as Iam and security management. I think its a good investment and the benefits we reap from this software are worth the price.
Read full review
Ping Identity
No answers on this topic
Usability
IBM
While setup and implementation takes work and time, the flexibility and possibilities make up for that in the long run. This is not a product you can just install and run, but if you design and implement your ruleset well, it will save you a lot of work afterwards. Just make sure that the systems you want to use it for have an existing and proven connector.
Read full review
Ping Identity
Easy to use; all UI's are user friendly and easy to learn.[The] possibility to use API is [a] big value as well. We really like integration with CyberArk; with it we can manage privileged accounts according to company standards without breaking any rules, and we can be 100% sure that only approved persons will have administrative access.
Read full review
Reliability and Availability
IBM
It is almost always available. they do updates at night, minimizing the effect of upgrades. It is always around, it is just old and maybe needs to start from scratch to get a better product for nowadays. It is almost always available during business hours when you need it. for 24/7 companies it may be more difficult to time the upgrades so that it does not affect your work.
Read full review
Ping Identity
No answers on this topic
Support Rating
IBM
The support team has always been the primary consultation base when we are faced by performance problems. From the deployment stage the team has managed to monitor the operation lifecycle and give best insights based on their observation. It works 24/7 to enhance productive service delivery to clients. The IBM Security Verify Support team has been the main player in the successful performance of this software.
Read full review
Ping Identity
Ping's support is willing and attentive, but if I am in a position to engage them I am often at a point where most of the usual support engineers would not be in a position to answer the questions I have. However, Ping has been more than willing to engage their product and development teams with our organization as we take advanced deployment and use case challenges to them.
Read full review
Alternatives Considered
IBM
We evaluated Oracle Identity Manager and were ready to move ahead with the purchase plan, but then found that IBM addressed the needs of our company in a more robust fashion. The price was significantly higher, yet in the grand scheme of things, the safety of both our data and the data of our clients was the most important criteria.
Read full review
Ping Identity
Two-way authentication and ease of use. I've used several applications that just email a link but never ask for a verification code. By entering the verification code you are sure that the site is safe, secured, and reliable. Using Ping, we can ensure no one other than you will access the application using your credential as you can log in only after you confirm using the verification code that you receive on your personal email or device.
Read full review
Contract Terms and Pricing Model
IBM
The licensing terms were favourable due to their flexibility based on the size and purpose of implementation. The billing frequency is done on quarterly basis. The vendor team has enacted best user policies that gives the company the full control of this platform. It is cost-effective as compared to most security verification tools in the market.
Read full review
Ping Identity
No answers on this topic
Professional Services
IBM
In the case of adjustments, we were often able to carry them out completely on our own and only used professional services for new requirements. Particularly in the case of access management, it is very positive that we usually needed IBM for a task in less than an hour and then developed the solution further on our own.
Read full review
Ping Identity
No answers on this topic
Return on Investment
IBM
  • Very much secured to the business as it provides granular level of configuration as far as authentication and authorization is concerned.
  • Works as a reverse Proxy so totally hides the backend application from anonymous access
  • It needs professional to install and manage it. It takes time to implement right set of policies but once setup as per requirement it will do its job
Read full review
Ping Identity
  • it is positive with saving the cost
  • some drawback with aging solution
  • directory is solid and provide lots of cost saving
Read full review
ScreenShots

IBM Security Verify Screenshots

Screenshot of IBM Security Verify (for CIAM) - Privacy and ConsentScreenshot of IBM Security Verify - Custom Application TemplateScreenshot of IBM Security Verify - Select Application TypeScreenshot of IBM Security Verify - Privacy Policy