Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs IBM Security Verify Access comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Identity
Ranking in Identity Management (IM)
9th
Ranking in Access Management
8th
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
29
Ranking in other categories
Authentication Systems (9th), Authorization Software (3rd), Enterprise Password Managers (9th), User Entity Behavior Analytics (UEBA) (9th), Active Directory Management (6th), Cloud Resource Access Management (3rd), Customer Identity and Access Management (CIAM) (7th)
IBM Security Verify Access
Ranking in Identity Management (IM)
17th
Ranking in Access Management
15th
Average Rating
7.8
Reviews Sentiment
6.4
Number of Reviews
8
Ranking in other categories
Single Sign-On (SSO) (15th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (17th)
 

Mindshare comparison

As of March 2026, in the Identity Management (IM) category, the mindshare of CyberArk Identity is 2.3%, down from 2.4% compared to the previous year. The mindshare of IBM Security Verify Access is 1.5%, up from 1.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Management (IM) Mindshare Distribution
ProductMindshare (%)
CyberArk Identity2.3%
IBM Security Verify Access1.5%
Other96.2%
Identity Management (IM)
 

Featured Reviews

Hariharan Thangasamy - PeerSpot reviewer
Cybersecurity Delivery Analyst at Accenture
Has strengthened privileged access control and improved audit visibility through session monitoring and password rotation
On the identity product side, it is awesome. However, they can improve in the documentation parts. For example, if there is a migration process, I can see the maximum customers are moving from self-hosted to on-premises or from on-premises to the cloud. It would be helpful if they released a generalized document for processes such as migration. A clear overview document would assist us in understanding more about the tool, configurations, and automations to enhance our security. Regarding the initial setup of CyberArk Identity, I faced some challenges. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components. I could not find the proper documentation in the community portal.
Ateeq Rehman - PeerSpot reviewer
Unit Head System Implementor at Allied Bank Limited
Has improved secure user access while managing development through multiple technologies
I have already explained this in my previous call; I don't handle financial terms and commercials. Pricing is generally managed by functional teams and management looking after licensing matters. In Pakistan, vendors such as Oracle and IBM manage account relationships with clients and have tailored pricing models, so I do not have sufficient insights into that aspect.IBM Security Verify Access installation process is not straightforward; it requires underlying specialized knowledge upon which the IBM products are based. The complexity and scalability of the architecture necessitate in-depth technical knowledge and understanding of the system. Thus, installation is not as simple as clicking through; it requires extensive configuration of the underlying application servers, such as IBM WebSphere, where these products are deployed and configured.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I found the solution to be stable."
"The most valuable features of CyberArk Identity are its ability to control access to administrative staff."
"I find the CyberArk Identity portal quite intuitive; it has changed a lot over the last year and a half and if you think logically and understand your environment, it is easy to establish a suitable setup for yourself and all your vendors."
"The best features in CyberArk Identity that I appreciate most are the recent updates that have added features in the cloud privilege environment."
"The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring."
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"The best feature of CyberArk Identity is the single sign-on feature that offers quick and one-click access."
"Being able to integrate CyberArk Identity with Microsoft Defender is valuable."
"The solution has powerful authentification and authorization. It offers a good way to increase security."
"It's a good solution for identification and access management."
"IBM Security Access Manager is a very good solution, so my company is still using it."
"It can do a lot of different functions, and different types of teams can use this product for a variety of use cases, such as RSA, OTP, and single sign-on functionalities."
"IBM Security Verify Access is providing a secure way of handling the user login journey, and secure user authentication is fully managed by ISAM or ISVA."
"From the integration point of view, it supports SAML, OIDC, and OAuth; for legacy applications that don't have support for SAML and other new protocols, it provides single sign-on access to end-users, and from the integration compatibility point of view, it is highly capable."
"The solution has powerful authentification and authorization and offers a good way to increase security."
"I have found this solution to be really practical and when a user wants to log in, it is effortless and runs smooth."
 

Cons

"The product is not cheap, especially if you opt for an on-premise deployment requiring a complex server infrastructure. On the other hand, choosing the software as a service version simplifies infrastructure requirements but necessitates being online all the time."
"We would like to see an improvement in the ability to manage mobile devices."
"Integration or deployment is extremely difficult for CyberArk Identity."
"Something they could improve is the management of multifactor authentication. When you translate the page from one language to another, it can be a difficult process."
"More integrations would be better."
"The solution's difficulty in gaining skill sets should be improved because it's a vertical product."
"One area for improvement is the complexity of the learning curve for new users."
"I'm not sure what needs improvement. It is a good platform."
"The solution could be classified as a hilt system. There are a lot of resources being used and it is suitable for very large enterprises or the public sector."
"They can improve the single sign-on configuration for OIDC and OAuth. That is not very mature in this product, and they can improve it in this particular area."
"The user interface for users and administrators could be improved to make it easier. Automating some functions could also be beneficial."
"IBM Security Verify Access installation process is not straightforward; it requires underlying specialized knowledge upon which the IBM products are based."
"They can improve the single sign-on configuration for OIDC and OAuth. That is not very mature in this product, and they can improve it in this particular area. OIDC is a third-party integration that we do with the cloud platforms, and OAuth is an authorization mechanism for allowing a user having an account with Google or any other provider to access an application. Organizations these days are looking for just-in-time provisioning use cases, but IBM Security Access Manager is not very mature for such use cases. There are only a few applications that can be integrated, and this is where this product is lagging. However, in terms of configuration and single sign-on mechanisms, it is a great product."
"What we'd like improved in IBM Security Access Manager is its onboarding process as it's complex, particularly when onboarding new applications."
"Configuration could be simplified for the end-user."
"There are a lot of areas that can be improved, but the main area is the lack of customization. You cannot easily customize anything in the product. It is not easy to tweak the functionality. It is challenging to change the out-of-the-box functionality."
 

Pricing and Cost Advice

"The solution is cheap and I rate its pricing an eight out of ten."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"There is an initial license and then there is a subscription needed."
"The product is not expensive. It depends on the number of users."
"It costs about 300K AED for a year. Its pricing is a bit on the higher end, but in comparison to other products in the market, its price is still better. There are lots of other products that are very costly."
"The license and costs depend on the amount range of users you have. For just approximately 2,000 users, the price is practical and fair. However, when you have 20,000 users, it starts to become really expensive, and the discount per user is not attractive enough to go ahead and purchase."
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
885,286 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Manufacturing Company
10%
Computer Software Company
9%
Healthcare Company
6%
Financial Services Firm
16%
Insurance Company
11%
Government
10%
Computer Software Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business20
Midsize Enterprise4
Large Enterprise10
By reviewers
Company SizeCount
Small Business3
Midsize Enterprise2
Large Enterprise4
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I am not certain about CyberArk Identity's exact pricing model. For comparison, Okta was around five dollars per user. CyberArk Identity offers good discounts to some clients, which influences thei...
What needs improvement with CyberArk Identity?
We do not specifically use the password vaulting feature of CyberArk Identity. The centralized user dashboard of CyberArk Identity has not been that important for us. If it would be possible to sha...
What do you like most about IBM Security Access Manager?
The tool provides a password vault, single sign-on, and multifactor authentication. It offers various authentication methods like fingerprint integration, one-time passwords, or tokens sent via ema...
What needs improvement with IBM Security Access Manager?
I have already explained this in my previous call; I don't handle financial terms and commercials. Pricing is generally managed by functional teams and management looking after licensing matters. I...
What is your primary use case for IBM Security Access Manager?
We are still using the IBM BPM platform to automate the processes for our organization.I generally use Microsoft Project for project planning and schedule management, especially in relation to Orac...
 

Also Known As

Idaptive
IBM Security Verify Access (SVA), IBM Security Access Manager, ISAM
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
POST Luxembourg
Find out what your peers are saying about CyberArk Identity vs. IBM Security Verify Access and other solutions. Updated: March 2026.
885,286 professionals have used our research since 2012.