Likelihood to Recommend Verify protects our on-premises resources and some of our cloud-based ones, too. We've used SSO with several apps without issues. MFA was the main driver for us, and Verify was found to be a good fit for our needs, enabling our end users to access resources securely. This facility helped us build cyber assurance with our stakeholders.
Read full review We are happy with the management of the Id, accounts where the user can request any access easily. Also the many connector which Sailpoint is offering in order to onboard lots of applications is quite helpful. The access review module has also have been improve so that large campaigns can we work out easily. Where we see some improvement is on the UI as here it is not so intuitive for the end user, so that we need to make lots of communications and training so that the user is able to understand how to use it. For the administration and creation of roles it also would be great to have some improvements here to make it more easily its management.
Read full review Pros IBM Security Verify provides comprehensive identity and access management (IAM) capabilities. IBM Security Verify provides multi-factor authentication (MFA) capabilities. IBM Security Verify provides robust identity and access governance capabilities. IBM Security Verify provides comprehensive auditing capabilities. IBM Security Verify provides a comprehensive platform for managing and protecting privileged accounts. Read full review Brings users access, profiles and accounts all into one place Manages the Life Cycle Management process across ALL identities, permanent and Temporary Secures and manages access to critical applications and resources across the group Enables Info. Security to customise, share and delegate authority across the group Single version of the truth across our technology platform Read full review Cons The mobile app can be a bit buggy at times if it gets fixed it would be great. UI seems a bit old compared to modern tools out there. There is a bit of a learning curve; if the developers can make it more intuitive it would be awesome. Read full review The user interface is not very intuitive. It is hard for the occasional user to navigate through the request process. There are no instructions on the screen to help the user to know what to do. It is left up to the user to figure out what to click on and how to navigate through the process. Read full review Likelihood to Renew It works flawlessly, i have never faced any major issues with this. It has all the features such as Iam and security management. I think its a good investment and the benefits we reap from this software are worth the price.
Read full review Usability While setup and implementation takes work and time, the flexibility and possibilities make up for that in the long run. This is not a product you can just install and run, but if you design and implement your ruleset well, it will save you a lot of work afterwards. Just make sure that the systems you want to use it for have an existing and proven connector.
Read full review Overall usablity is excellent. The product is capable of performing all the expected tasks for a IAM solution.
Read full review Reliability and Availability It is almost always available. they do updates at night, minimizing the effect of upgrades. It is always around, it is just old and maybe needs to start from scratch to get a better product for nowadays. It is almost always available during business hours when you need it. for 24/7 companies it may be more difficult to time the upgrades so that it does not affect your work.
Read full review Support Rating The support team has always been the primary consultation base when we are faced by performance problems. From the deployment stage the team has managed to monitor the operation lifecycle and give best insights based on their observation. It works 24/7 to enhance productive service delivery to clients. The IBM Security Verify Support team has been the main player in the successful performance of this software.
Read full review Support for Customizations is very limited.
Read full review Implementation Rating Implementation was done correctly and all the requirements were met.
Read full review Alternatives Considered We evaluated
Oracle Identity Manager and were ready to move ahead with the purchase plan, but then found that IBM addressed the needs of our company in a more robust fashion. The price was significantly higher, yet in the grand scheme of things, the safety of both our data and the data of our clients was the most important criteria.
Read full review The on-prem SailPoint IdentityIQ platform provides the necessary customization that is required in our dynamic environment. Although we may look at a cloud-based Identity Management service again in the future, (there are many advantages), our identity management, authentication, and application assignment processes cannot be quickly consolidated to a single cloud-based service at this time.
Read full review Contract Terms and Pricing Model The licensing terms were favourable due to their flexibility based on the size and purpose of implementation. The billing frequency is done on quarterly basis. The vendor team has enacted best user policies that gives the company the full control of this platform. It is cost-effective as compared to most security verification tools in the market.
Read full review Professional Services In the case of adjustments, we were often able to carry them out completely on our own and only used professional services for new requirements. Particularly in the case of access management, it is very positive that we usually needed IBM for a task in less than an hour and then developed the solution further on our own.
Read full review Return on Investment Very much secured to the business as it provides granular level of configuration as far as authentication and authorization is concerned. Works as a reverse Proxy so totally hides the backend application from anonymous access It needs professional to install and manage it. It takes time to implement right set of policies but once setup as per requirement it will do its job Read full review Over 300,000 password change/reset calls avoided to the helpdesk annually. 1,000 plus accounts with proper accesses provisioned via automated birthright processes weekly versus 1-2 days of manual provisioning and approvals. With a call center population that churns many people per week, this brings many dollars of efficiency to the operations teams. Flexibility on terminations to manage accounts and access for target applications based on regulatory or business rules to ensure compliance and avoid fines for non-compliance. Read full review ScreenShots IBM Security Verify Screenshots