IBM Security Verify vs. Lightning Tools DeliverPoint

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
IBM Security Verify
Score 8.6 out of 10
N/A
IBM Security Verify, formerly known as IBM Cloud Identity, is an identity-as-a-service (IDaaS) offering that aggregates dynamic user, device and environmental context to automate risk protection and continuously authenticate any user to any resource.
$1.71
per month per user
Lightning Tools DeliverPoint
Score 8.2 out of 10
Enterprise companies (1,001+ employees)
DeliverPoint supports reporting and managing SharePoint permissions. Site Owners, Site Collection Administrators, and SharePoint Administrators can run permission reports that reflect the permissions of every user. Site collections, Teams Channels, Hub Sites, SharePoint Sites, OneDrive, Lists, Folders and Items can all be reported on individually or in bulk. Permissions can be modified, transferred, copied or deleted between accounts as staff changes occur.
$1,950
per year per installation
Pricing
IBM Security VerifyLightning Tools DeliverPoint
Editions & Modules
No answers on this topic
DeliverPoint OnPrem
From $1950
per year per installation
DeliverPoint OnPrem Enterprise Edition
POA
per year per installation
DeliverPoint Online
From $2000
per year per installation
DeliverPoint Online Enterprise Edition (>10,000 users)
POA
per year per installation
Offerings
Pricing Offerings
IBM Security VerifyLightning Tools DeliverPoint
Free Trial
YesYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
YesNo
Entry-level Setup FeeOptionalNo setup fee
Additional DetailsSample Pricing Breakdown (NOTE: for competitive pricing per contract, please consult with your IBM Security Account Rep) Users: 5,000 SSO* -- USD 1.71 per user per month MFA* -- USD 1.71 per user per month Adaptive Access* -- USD 1.71 per user per month Lifecycle and provisioning** -- USD 2.01 per user per month Identity analytics** -- USD 2.13 per user per month * Single sign-on (SSO), multifactor authentication (MFA) and adaptive access pricing based on total active monthly users per use case. Costs decrease if users are active less than once per month. ** Lifecycle and provisioning and identity analytics pricing based on total users per use case.Prices listed are starting prices for "stock" product. Enterprise product is designed for 10,000+ users, and can be customised if required to meet business needs. Prices are based on 12 month contract from 1st purchase month. Installation included in price. Full technical support available. Online versions will have access to free product updates during contract period.
More Pricing Information
Community Pulse
IBM Security VerifyLightning Tools DeliverPoint
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Features
IBM Security VerifyLightning Tools DeliverPoint
Identity Management
Comparison of Identity Management features of Product A and Product B
IBM Security Verify
8.1
35 Ratings
0% above category average
Lightning Tools DeliverPoint
7.7
1 Ratings
5% below category average
ID-Management Access Control8.131 Ratings7.31 Ratings
ID Management Single-Sign On (SSO)8.433 Ratings00 Ratings
Multi-Factor Authentication8.431 Ratings00 Ratings
Password Management9.131 Ratings00 Ratings
Account Provisioning and De-provisioning7.328 Ratings8.21 Ratings
ID Management Workflow Automation7.030 Ratings00 Ratings
ID Risk Management8.230 Ratings00 Ratings
Best Alternatives
IBM Security VerifyLightning Tools DeliverPoint
Small Businesses
Dashlane
Dashlane
Score 9.2 out of 10
Dashlane
Dashlane
Score 9.2 out of 10
Medium-sized Companies
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
Enterprises
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
IBM Security VerifyLightning Tools DeliverPoint
Likelihood to Recommend
8.3
(36 ratings)
8.2
(1 ratings)
Likelihood to Renew
9.1
(1 ratings)
-
(0 ratings)
Usability
7.7
(15 ratings)
-
(0 ratings)
Availability
8.6
(19 ratings)
-
(0 ratings)
Support Rating
7.8
(15 ratings)
-
(0 ratings)
Configurability
8.4
(19 ratings)
-
(0 ratings)
Contract Terms and Pricing Model
7.8
(7 ratings)
-
(0 ratings)
Professional Services
8.3
(5 ratings)
-
(0 ratings)
User Testimonials
IBM Security VerifyLightning Tools DeliverPoint
Likelihood to Recommend
IBM
Verify protects our on-premises resources and some of our cloud-based ones, too. We've used SSO with several apps without issues. MFA was the main driver for us, and Verify was found to be a good fit for our needs, enabling our end users to access resources securely. This facility helped us build cyber assurance with our stakeholders.
Read full review
Lightning Tools
Copy user permissions through the whole sites of SharePoint farm
Read full review
Pros
IBM
  • IBM Security Verify provides comprehensive identity and access management (IAM) capabilities.
  • IBM Security Verify provides multi-factor authentication (MFA) capabilities.
  • IBM Security Verify provides robust identity and access governance capabilities.
  • IBM Security Verify provides comprehensive auditing capabilities.
  • IBM Security Verify provides a comprehensive platform for managing and protecting privileged accounts.
Read full review
Lightning Tools
  • Discover Site Permisions
  • Sheduled reports of required lists, libraries, sites...
  • Compact set of commands which works with user permissions
Read full review
Cons
IBM
  • The mobile app can be a bit buggy at times if it gets fixed it would be great.
  • UI seems a bit old compared to modern tools out there.
  • There is a bit of a learning curve; if the developers can make it more intuitive it would be awesome.
Read full review
Lightning Tools
  • Linking basic information to the object selected in the left panel (site structure view)
Read full review
Likelihood to Renew
IBM
It works flawlessly, i have never faced any major issues with this. It has all the features such as Iam and security management. I think its a good investment and the benefits we reap from this software are worth the price.
Read full review
Lightning Tools
No answers on this topic
Usability
IBM
While setup and implementation takes work and time, the flexibility and possibilities make up for that in the long run. This is not a product you can just install and run, but if you design and implement your ruleset well, it will save you a lot of work afterwards. Just make sure that the systems you want to use it for have an existing and proven connector.
Read full review
Lightning Tools
No answers on this topic
Reliability and Availability
IBM
It is almost always available. they do updates at night, minimizing the effect of upgrades. It is always around, it is just old and maybe needs to start from scratch to get a better product for nowadays. It is almost always available during business hours when you need it. for 24/7 companies it may be more difficult to time the upgrades so that it does not affect your work.
Read full review
Lightning Tools
No answers on this topic
Support Rating
IBM
The support team has always been the primary consultation base when we are faced by performance problems. From the deployment stage the team has managed to monitor the operation lifecycle and give best insights based on their observation. It works 24/7 to enhance productive service delivery to clients. The IBM Security Verify Support team has been the main player in the successful performance of this software.
Read full review
Lightning Tools
No answers on this topic
Alternatives Considered
IBM
We evaluated Oracle Identity Manager and were ready to move ahead with the purchase plan, but then found that IBM addressed the needs of our company in a more robust fashion. The price was significantly higher, yet in the grand scheme of things, the safety of both our data and the data of our clients was the most important criteria.
Read full review
Lightning Tools
No answers on this topic
Contract Terms and Pricing Model
IBM
The licensing terms were favourable due to their flexibility based on the size and purpose of implementation. The billing frequency is done on quarterly basis. The vendor team has enacted best user policies that gives the company the full control of this platform. It is cost-effective as compared to most security verification tools in the market.
Read full review
Lightning Tools
No answers on this topic
Professional Services
IBM
In the case of adjustments, we were often able to carry them out completely on our own and only used professional services for new requirements. Particularly in the case of access management, it is very positive that we usually needed IBM for a task in less than an hour and then developed the solution further on our own.
Read full review
Lightning Tools
No answers on this topic
Return on Investment
IBM
  • Very much secured to the business as it provides granular level of configuration as far as authentication and authorization is concerned.
  • Works as a reverse Proxy so totally hides the backend application from anonymous access
  • It needs professional to install and manage it. It takes time to implement right set of policies but once setup as per requirement it will do its job
Read full review
Lightning Tools
  • Speeds up the management of user permissions
  • Provides a comprehensive overview of permissions and settings of individual security levels across areas of company informations
Read full review
ScreenShots

IBM Security Verify Screenshots

Screenshot of IBM Security Verify (for CIAM) - Privacy and ConsentScreenshot of IBM Security Verify - Custom Application TemplateScreenshot of IBM Security Verify - Select Application TypeScreenshot of IBM Security Verify - Privacy Policy

Lightning Tools DeliverPoint Screenshots

Screenshot of CONTEXTUAL SHAREPOINT PERMISSION REPORTING
SharePoint Permissions are not just the responsibility of IT. Business Users (Content Owners) can create sites, lists, libraries and of course list and library content. The business user is capable of sharing the content with internal users, but perhaps also external users. Sharing such content can result in users gaining permissions to sites or content not intended to be shared. For example, if a site is shared, the user who the site is shared with becomes a member of the members group by default. That members group may have Edit permissions to other sites or content elsewhere within the site collection. DeliverPoint gives visibility of such permissions to support better SharePoint permission decisions from within the Site, List or Library itself.Screenshot of GRANULAR SHAREPOINT CONTENT PERMISSION REPORTS
The DeliverPoint Discover Permissions report displays a full transparent report of all users that have permissions to the site, list/library or item. This displays what permissions each account has to the selected object, as well as how the permissions were assigned. Filter can be used for each user to check for duplicate permissions, filter by Permission Level to see which users are granted each permission level, and also filter by the ‘Permissioned Via’ column to see who has received permissions via a particular SharePoint, Microsoft 365 Group, or Azure AD Security group. The Discover Permissions report can be executed against multiple documents or items, lists and within the site or subsites.Screenshot of EXTERNAL SHARING LINKS REPORTING AND MANAGEMENT
Within SharePoint, users can share links with anyone, internal users and external users. DeliverPoint provides an External Sharing Links report that can be used within a site or across sites. The user can see who shared the link, when they shared the link, and optionally remove the link if it’s required.Screenshot of REPORT AND MANAGE PERMISSIONS FROM WITHIN MICROSOFT TEAMS
DeliverPoint is also available within Microsoft Teams. Team Owners can produce Microsoft Teams Permission reports within their Teams Channels and across Private Channels. The reports provide confidence and assurance that permissions are set correctly and that sharing isn’t out of control. Changes to permissions can be made contextually within a Team or centrally across multiple Teams should permissions need to be removed or managed.Screenshot of MANAGE SHAREPOINT PERMISSIONS
Using DeliverPoint, Site Owners, Site Collection Administrators and Tenant Administrators can manage permissions across the objects that they have Full Control to. Within organizations, users change roles, leave organizations, or join organizations. Making permission changes to accounts to reflect these changes is time consuming. DeliverPoint can be used to simply select the scope to change, and perform the change as one operation. The operations include Transfer, Delete, Copy or Revoke Permissions.Screenshot of UNIQUE PERMISSION REPORTING
The DeliverPoint Unique Permissions Report enables Site Collection Administrators or SharePoint Administrators to view the permissions assigned to a specific user account or group throughout site collections. The report includes all Microsoft 365 Groups, SharePoint Groups and Active Directory Security Groups that the user is a member of. A list of Site Permissions, List Permissions and Item Permissions that the user has been assigned permissions to are listed, allowing  the permissions to be removed or transferred if they are incorrect.