Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs IBM Security Verify Access comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Omada Identity
Sponsored
Ranking in Identity Management (IM)
4th
Average Rating
8.0
Reviews Sentiment
6.7
Number of Reviews
51
Ranking in other categories
User Provisioning Software (4th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (4th), Customer Identity and Access Management (CIAM) (5th)
CyberArk Identity
Ranking in Identity Management (IM)
8th
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
29
Ranking in other categories
Authentication Systems (9th), Authorization Software (3rd), Enterprise Password Managers (6th), User Entity Behavior Analytics (UEBA) (8th), Access Management (6th), Active Directory Management (6th), Cloud Resource Access Management (3rd), Customer Identity and Access Management (CIAM) (7th)
IBM Security Verify Access
Ranking in Identity Management (IM)
20th
Average Rating
7.8
Reviews Sentiment
6.4
Number of Reviews
8
Ranking in other categories
Single Sign-On (SSO) (13th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (14th), Access Management (13th)
 

Mindshare comparison

As of November 2025, in the Identity Management (IM) category, the mindshare of Omada Identity is 3.2%, down from 3.6% compared to the previous year. The mindshare of CyberArk Identity is 2.2%, up from 1.5% compared to the previous year. The mindshare of IBM Security Verify Access is 1.3%, up from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Management (IM) Market Share Distribution
ProductMarket Share (%)
Omada Identity3.2%
CyberArk Identity2.2%
IBM Security Verify Access1.3%
Other93.3%
Identity Management (IM)
 

Featured Reviews

Lars Henrik Jensen - PeerSpot reviewer
Faced deployment delays and daily errors but have streamlined access reviews and improved termination processes
The deployment of Omada Identity is complex; the product is not brilliantly documented, and it lacks the same level of documentation that could be found for systems such as SailPoint or Saviynt, making it harder to find material or help online, particularly with Omada Cloud. The system performance of Omada Identity is inconsistent; we've been analyzing this issue together with Omada, but we haven't been able to resolve whether the problem lies on their side or my client's side, which causes long response times and long run times in Omada sometimes. Omada Identity does not help deploy IGA within 12 weeks; the time frame for applying the rapid deployment solution was much longer than expected, and I am unsure if it is built on best practices across all systems. When we receive an error or system message from Omada Identity, it's very hard to decode what it means; we have had serious issues in daily imports that we can't explain, indicating a need for improved stability. The comprehensiveness of out-of-the-box connectors that Omada provides differs; the connectors for Microsoft and Salesforce are good, but for SAP, they are basically non-existent.
Hariharan Thangasamy - PeerSpot reviewer
Has strengthened privileged access control and improved audit visibility through session monitoring and password rotation
On the identity product side, it is awesome. However, they can improve in the documentation parts. For example, if there is a migration process, I can see the maximum customers are moving from self-hosted to on-premises or from on-premises to the cloud. It would be helpful if they released a generalized document for processes such as migration. A clear overview document would assist us in understanding more about the tool, configurations, and automations to enhance our security. Regarding the initial setup of CyberArk Identity, I faced some challenges. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components. I could not find the proper documentation in the community portal.
Ateeq Rehman - PeerSpot reviewer
Has improved secure user access while managing development through multiple technologies
I have already explained this in my previous call; I don't handle financial terms and commercials. Pricing is generally managed by functional teams and management looking after licensing matters. In Pakistan, vendors such as Oracle and IBM manage account relationships with clients and have tailored pricing models, so I do not have sufficient insights into that aspect.IBM Security Verify Access installation process is not straightforward; it requires underlying specialized knowledge upon which the IBM products are based. The complexity and scalability of the architecture necessitate in-depth technical knowledge and understanding of the system. Thus, installation is not as simple as clicking through; it requires extensive configuration of the underlying application servers, such as IBM WebSphere, where these products are deployed and configured.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Support-wise, working with Omada has been good. We have very good direct interactions and fast responses."
"The most relevant feature is Omada's reporting engine. Omada never 'forgets' and archives every process. All steps an admin, user, or manager has executed, are recorded in Omada."
"It has a very user-friendly interface compared to what we are used to, and it is highly configurable. In the old solution, when we needed to do something, we had to have a programmer sitting next to us, whereas, in Omada Identity, everything is configurable."
"Omada Identity saves time in provisioning access for identities as it is linked to the HR system, allowing onboarding and offboarding to be done automatically; this includes the automatic creation of access roles."
"The teams we work with at Omada provide great insights and support. Overall, it has been a pleasure working with them. That's the part we value the most."
"Its best feature is definitely the process design. It is quite easy and straightforward to design a process."
"Omada Identity has helped us consolidate solutions for access management as they provide access request concepts, access reviews, and different types of access reviews that can be used."
"Two valuable features of Omada Identity are the ability to discover accounts and link them to identities, and the automatic disabling of inactive accounts or identities."
"The tool helps with authentication. It acts as an MFA for any kind of privileged access that occurs in our organization."
"If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity."
"I find the CyberArk Identity portal quite intuitive; it has changed a lot over the last year and a half and if you think logically and understand your environment, it is easy to establish a suitable setup for yourself and all your vendors."
"The tool is a very strong and valuable enterprise solution, particularly in ensuring the continuity of service."
"The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients."
"The straight-through approach of CyberArk Identity is very easy to start with; after you start with it, you can very easily onboard your privileged accounts, and from there on, you can advance further and make it more and more secure."
"It has aided in troubleshooting by allowing logs to be extracted and sent to a correlation engine, such as QRadar, for notifications or alerts."
"The most valuable feature of CyberArk Identity is the adaptive interface."
"It's a good solution for identification and access management."
"I have found this solution to be really practical and when a user wants to log in, it is effortless and runs smooth."
"IBM Security Verify Access is providing a secure way of handling the user login journey, and secure user authentication is fully managed by ISAM or ISVA."
"Its stability and UI are most valuable."
"IBM Security Verify Access, formerly known as ISAM, IBM Security Access Manager, now renamed to ISVA, integrates with central directory services for our organization and provides user management functionality."
"The tool provides a password vault, single sign-on, and multifactor authentication. It offers various authentication methods like fingerprint integration, one-time passwords, or tokens sent via email or SMS. This ensures secure access to your accounts by providing multiple authentication options."
"From the integration point of view, it supports SAML, OIDC, and OAuth. For legacy applications that don't have support for SAML and other new protocols, it provides single sign-on access to end-users. From the integration compatibility point of view, it is highly capable."
"The most valuable feature of IBM Security Access Manager, at least for my company, is multi-factor authentication. That's the only feature my company is using. The solution works well and has no glitches. IBM Security Access Manager is a very good solution, so my company is still using it."
 

Cons

"We are still on Omada on-prem, but I understand that when Omada is in the cloud, you cannot send an attachment via email. We have some emails with attachments for new employees because we have to explain to them how to register and do their multi-factor authentication. All that information is in the attachment. People have to do that before they are in our system. We cannot give them a link to our Intranet and SharePoint because they do not yet have access. They have to register before that, so I need to send the attachments, but this functionality is not there in the cloud."
"Omada could make it a bit more convenient to send emails based on events automatically. Having that functionality is critical for us to maintain transparency."
"Omada Identity has two main issues that need to be solved or improved the most. One is its setup or installation process because it's complex and cumbersome. I'm talking about the process for on-premises deployment because I've never tried the cloud version of Omada Identity. Setting up the cloud version should be much easier. The second area for improvement in Omada Identity is that it's piggybacking on Microsoft's complex way of having all kinds of add-ons, extensions, or setups, whether small or large, such as the new SQL Server, and it's cumbersome to make sure that everything works. Omada Identity is a complex solution and could still be improved."
"The comprehensiveness of Omada's out-of-the-box connectors for the applications we use could be better. We are getting a new HR system called Cornerstone for which they do not have an out-of-the-box connector, so we have to take the REST connector and play around with it."
"The web GUI can be improved."
"I am not working with the product, but they have this BI tool for role-based mining, and I think that should be included in the core product rather than an add-on."
"Omada Identity is definitely not better than both Saviynt or SailPoint, so we are struggling and having issues with everything."
"We are trying to use Omada's standards and to adapt our processes. But we have had some trouble with the bad documentation. This is something that they could improve on. It has not been possible for us to analyze some of the problems so far, based on the documentation. We always need consultants. The documentation should include some implementation hints and some guidelines for implementing the processes."
"Some areas experience slowness based on the workload. There's a need to enhance network performance despite the good user experience with access management."
"Something they could improve is the management of multifactor authentication. When you translate the page from one language to another, it can be a difficult process."
"In terms of general user feedback, the more security you put in front of a user, the more they complain. So usability and the user experience are always a challenge. So there's always room for improvement."
"There is room for improvement in documentation. The documentation could be more specific about the changes needed to achieve specific goals."
"At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
"Room for improvement for CyberArk Identity might be on the support side, as they constantly improve with new features and remove redundant ones, integrating multiple steps into a single one for easier use; however, this is not just CyberArk Identity, as many vendors start with basic troubleshooting services without recognizing that knowledgeable users often reach out after exhausting those options."
"To enhance the product, they can consider improving the user interface of the software and possibly the customer support team. Sometimes, there is a delay in handling my inquiries via email, which could be addressed for better service."
"IBM Security Verify Access installation process is not straightforward; it requires underlying specialized knowledge upon which the IBM products are based."
"The user interface for users and administrators could be improved to make it easier. Automating some functions could also be beneficial."
"The solution could be classified as a hilt system. There are a lot of resources being used and it is suitable for very large enterprises or the public sector."
"The user interface needs to be simplified, it's complex and not user-friendly."
"Configuration could be simplified for the end-user."
"IBM Security Verify Access installation process is not straightforward; it requires underlying specialized knowledge upon which the IBM products are based."
"There are a lot of areas that can be improved, but the main area is the lack of customization. You cannot easily customize anything in the product. It is not easy to tweak the functionality. It is challenging to change the out-of-the-box functionality."
"They can improve the single sign-on configuration for OIDC and OAuth. That is not very mature in this product, and they can improve it in this particular area. OIDC is a third-party integration that we do with the cloud platforms, and OAuth is an authorization mechanism for allowing a user having an account with Google or any other provider to access an application. Organizations these days are looking for just-in-time provisioning use cases, but IBM Security Access Manager is not very mature for such use cases. There are only a few applications that can be integrated, and this is where this product is lagging. However, in terms of configuration and single sign-on mechanisms, it is a great product."
 

Pricing and Cost Advice

"From an on-prem point of view, the cost is quite transparent and reasonable. The direct cost is primarily for licenses and maintenance on licenses."
"There were a lot of administrator, partner, and supplier accounts for people who were no longer working for us but still in the system. So, we reduced the number of users no longer with the company, which saved us some money on licensing."
"It's a fair price for the on-premises system. Compared with what we had before, it's much cheaper and we get all the modules in one. We tried to go with the cloud, but it was far too expensive."
"It is fairly priced for an on-premise environment, but for the cloud environment, I am not that happy with the pricing."
"It is not cheap. None of these solutions are cheap, but we have good pricing at least for now from a licensing perspective."
"The pricing for Omada Identity is fair."
"It is not cheap. It is expensive, but compared to what we did almost three years ago, it is value for money. It is worth it."
"While Omada Identity carries a premium price tag, it proves to be cost-effective."
"There is an initial license and then there is a subscription needed."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"The pricing of CyberArk Identity is competitive."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"The solution is cheap and I rate its pricing an eight out of ten."
"The pricing is acceptable. It is worth considering what we are protecting with the amount charged."
"CyberArk Identity is an expensive solution."
"I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap."
"It costs about 300K AED for a year. Its pricing is a bit on the higher end, but in comparison to other products in the market, its price is still better. There are lots of other products that are very costly."
"The license and costs depend on the amount range of users you have. For just approximately 2,000 users, the price is practical and fair. However, when you have 20,000 users, it starts to become really expensive, and the discount per user is not attractive enough to go ahead and purchase."
"The product is not expensive. It depends on the number of users."
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
873,085 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
12%
Manufacturing Company
9%
Government
6%
Financial Services Firm
15%
Computer Software Company
13%
Manufacturing Company
11%
Healthcare Company
6%
Financial Services Firm
20%
Insurance Company
13%
Government
11%
Computer Software Company
10%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise3
Large Enterprise42
By reviewers
Company SizeCount
Small Business20
Midsize Enterprise4
Large Enterprise10
By reviewers
Company SizeCount
Small Business3
Midsize Enterprise1
Large Enterprise5
 

Questions from the Community

What do you like most about Omada Identity Cloud?
As an administrator, we benefit from a lot of functionality that is available out of the box, but it is also configur...
What is your experience regarding pricing and costs for Omada Identity Cloud?
I'm not fully aware of the pricing details, which are managed by higher management; however, the product itself is sa...
What needs improvement with Omada Identity Cloud?
There is room for improvement in Omada Identity, primarily in customization for administrators; many custom tasks req...
What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I am not certain about CyberArk Identity's exact pricing model. For comparison, Okta was around five dollars per user...
What needs improvement with CyberArk Identity?
We do not specifically use the password vaulting feature of CyberArk Identity. The centralized user dashboard of Cybe...
What do you like most about IBM Security Access Manager?
The tool provides a password vault, single sign-on, and multifactor authentication. It offers various authentication ...
What needs improvement with IBM Security Access Manager?
I have already explained this in my previous call; I don't handle financial terms and commercials. Pricing is general...
What is your primary use case for IBM Security Access Manager?
We are still using the IBM BPM platform to automate the processes for our organization.I generally use Microsoft Proj...
 

Also Known As

Omada Identity Suite, Omada Identity Cloud
Idaptive
IBM Security Verify Access (SVA), IBM Security Access Manager, ISAM
 

Overview

 

Sample Customers

Bayer, ECCO Shoes, Vattenfall, NuStar Energy, Unicredit, Schiphol Group, BMW Group, Deutsche Leasing
MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
POST Luxembourg
Find out what your peers are saying about CyberArk Identity vs. IBM Security Verify Access and other solutions. Updated: September 2025.
873,085 professionals have used our research since 2012.