What is IBM Verify?
The modernized, modular IBM Verify solution provides deep, AI-powered context for both consumer and workforce identity and access management (IAM). Protect your users and apps, inside and outside the enterprise, with a low-friction, cloud-native, software-as-a-service (SaaS) approach that leverages the cloud. For legacy, on-premises apps, the Verify Access version provides a smooth path to cloud, so you can transition at your own pace.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceIBM Verify Ratings
Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard
to access more information on IBM Verify.
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
85 Likeliness to Recommend
97 Plan to Renew
75 Satisfaction of Cost Relative to Value
1
Since last award
Emotional Footprint Overview
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
+89 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love IBM Verify?
Pros
- Acts with Integrity
- Reliable
- Client Friendly Policies
- Altruistic
How to read the Emotional Footprint
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Negative
Neutral
Positive
Feature Ratings
Provisioning Deprovisioning
Web Cloud Single Sign on (SSO)
Multi-Factor Authentication (MFA)
Activity Monitoring Alerts
Advanced Provisioning
Password Management
Identity Governance
Reporting
Privileged Access Management
Access Request Management
Mobility Support
Vendor Capability Ratings
Breadth of Features
Vendor Support
Quality of Features
Ease of IT Administration
Ease of Data Integration
Usability and Intuitiveness
Ease of Customization
Product Strategy and Rate of Improvement
Business Value Created
Ease of Implementation
Availability and Quality of Training
IBM Verify Reviews
Nakul S.
- Role: Information Technology
- Industry: Banking
- Involvement: IT Development, Integration, and Administration
Submitted May 2024
Easy to use as IDM tool
Likeliness to Recommend
What differentiates IBM Verify from other similar products?
Scalability
What is your favorite aspect of this product?
Easy to use
What do you dislike most about this product?
Process are too lengthy
What recommendations would you give to someone considering this product?
Move to cloud for better explore
Pros
- Helps Innovate
- Reliable
- Performance Enhancing
- Trustworthy
- Role: Information Technology
- Industry: Other
- Involvement: End User of Application
Submitted Feb 2026
Secure and scalable access control.
Likeliness to Recommend
Pros
- Helps Innovate
- Reliable
- Enables Productivity
- Efficient Service
Cons
- Less Respectful
Yurie Katri P.
- Role: Information Technology
- Industry: Telecommunications
- Involvement: End User of Application
Submitted Feb 2023
The security is more important than ever
Likeliness to Recommend
What differentiates IBM Verify from other similar products?
Strong authentication is the process of using a combination of things like passwords, pins, and fingerprints to verify who you are. You can sell services in the form of subscriptions to help your clients stay safe on the go. IBM Security Identity Manager is a powerful multifactor authentication solution that provides unprecedented simplicity for users and administrators. It provides a simple interface, centralized policy, and a single access point to integrate your web, mobile, IoT, and cloud applications. You can quickly deliver strong authentication with enterprise-grade security with IBM Security Identity Manager.
What is your favorite aspect of this product?
Strong authentication is one of the many features it offers. However, to access certain sensitive or risky parts of your account, a user must enter a one-time password generated by the mobile app or email verification, which makes our product secure and user-friendly. Mobile security is a complex issue. It would help if you balanced convenience, security, and reliability. It's a secure multi-factor authentication solution that lets you establish a risk-based decision process for granting or denying mobile requests automatically. The best way to manage your mobile risk is by verifying who they are and where they're from.
What recommendations would you give to someone considering this product?
The multi-factor authentication service allows you to adjust permissions based on risk factors in your application, such as data, location, and IP reputation. Adopt risk-based access controls to secure your enterprise better. Utilize the Verify Access risk scoring engine to reduce the likelihood of a cyber breach with context-aware authorization. Automated risk-based access controls.
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Performance Enhancing