User Reviews of CyberArk Identity & IBM Security Verify Access

Updated March 2024

Would you like to learn about products from people using them now? Simplify your research with trusted advice from people like you.

Download our FREE report comparing CyberArk Identity and IBM Security Verify Access based on reviews, features, and more!

Where should we email your report?






CyberArk Identity review

Avinash Gopu.
Avinash Gopu.
Associate VP & Cyber Security Specialist at US Bank
Allows Linux and Unix administrators to login with single password
The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring. It is integrated with tools like Splunk and Dynatrace for the analysis of risk behavior and user activity. The pushing teams...
IBM Security Verify Access review

Gaurav Gaurav
Gaurav Gaurav
Architect at a tech services company with 10,001+ employees
Supports on-prem and cloud environments, has good integration capabilities, and is...
They can improve the single sign-on configuration for OIDC and OAuth. That is not very mature in this product, and they can improve it in this particular area. OIDC is a third-party integration that we do with the cloud platforms, and OAuth is an authorization mechanism for allowing a user having an account with Google or any other provider...

Since 2012, we've had 768,246 professionals use our research.

As seen in