Latest Research


This content is currently locked.

Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
+1-888-670-8889 (US/CAN) or
+1-703-340-1171 (International)
IBM Security Verify Logo
IBM Security Verify Logo
IBM

IBM Security Verify

Composite Score
7.4 /10
CX Score
7.8 /10
IBM Security Verify
7.4 /10

What is IBM Security Verify?

Empower your security and intelligence in user access decisions with visibility across all environments.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

IBM Security Verify Ratings

Real user data aggregated to summarize the product performance and customer experience.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

83 Likeliness to Recommend

100 Plan to Renew

79 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+94 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love IBM Security Verify?

0% Negative
13% Neutral
87% Positive

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Enables Productivity

Feature Ratings

Average 81

Role-Based Multi-Factor Authentication

87

Email Authentication

86

Dashboards, Analytics and Reporting

86

Multi-Device Protection

85

OTP Authentication

85

Biometrics Authentication

84

Role and User Management

83

Integration APIs

82

Hard Token Authentication

80

Browser Push Notifications

74

Soft Token Authentication

63

Vendor Capability Ratings

Average 78

Quality of Features

90

Breadth of Features

81

Business Value Created

80

Usability and Intuitiveness

79

Availability and Quality of Training

78

Product Strategy and Rate of Improvement

77

Ease of IT Administration

77

Ease of Customization

77

Ease of Implementation

76

Ease of Data Integration

73

Vendor Support

71

IBM Security Verify Reviews

Aryan S.

  • Role: Information Technology
  • Industry: Other
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Dec 2023

Best Security and Network Management Product!

Likeliness to Recommend

10 /10

What differentiates IBM Security Verify from other similar products?

Using IBM Security Verify one can easily get access using Multi-Factor Authentication and mobile application makes it more easier as its on fingertips thus reducing time consumption and increasing security more.

What is your favorite aspect of this product?

It comes with a simple, clear and easy to access user-friendly user interface and great thing is that mobile application for the same is available which makes it more easily accessible.

What do you dislike most about this product?

Analytics interface and reporting can ve improved more and even customer service provided as of now is time consuming.

What recommendations would you give to someone considering this product?

If you're looking for most trusted and wide variety of features provider, easy to access UI, and mobile platform then you should opt for IBM Security Verify it will work best for you.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Esteban M.

  • Role: Sales Marketing
  • Industry: Telecommunications
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Mar 2023

High level protection solution

Likeliness to Recommend

10 /10

What differentiates IBM Security Verify from other similar products?

Unlike other products, this tool is of excellent quality because it allows you to adjust the risk settings in the identity of the analyzed cloud. It's productive because we have the ability to apply a specific policy to every login attempt from an untrusted IP address.

What is your favorite aspect of this product?

What intrigues me most about this tool is that IBM has secure ways and reliable stability that help control user input and examine threat-based authentication of visitors before allowing them to connect to the system or applications.

What do you dislike most about this product?

From my point of view, I can mention that this tool is flawless because it is quite good and it preserves the stability of our own information and keeps us safe.

What recommendations would you give to someone considering this product?

One of the reasons why we can recommend this tool is that this stability system is capable of generating authentication resolutions that increase stability and control access to enterprise stability systems such as: B. Data operations, application development or removal special for the organization

Pros

  • Continually Improving Product
  • Performance Enhancing
  • Enables Productivity
  • Efficient Service
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171