

Oracle Identity Governance and IBM Security Verify Access compete in the identity management category. Oracle seems to have an advantage in comprehensive lifecycle management, while IBM stands out for its advanced security features.
Features: Oracle Identity Governance provides extensive identity lifecycle management, role management, and compliance facilities suitable for complex environments. Its provisioning capabilities are robust, supporting automation and integration with various systems. IBM Security Verify Access focuses on adaptive access management, multi-factor authentication, and strong authorization capabilities, making it ideal for secure applications. IBM's strength lies in its advanced authentication processes and versatile integration capabilities.
Room for Improvement: Oracle Identity Governance could improve its deployment speed, user interface customization options, and reduce complexity in configuration. Users also report a need for more seamless integration with non-Oracle products. IBM Security Verify Access could benefit from enhancing its reporting capabilities, offering more granular control in user management, and improving its documentation for easier troubleshooting. Streamlining complex configuration processes would also be advantageous for IBM.
Ease of Deployment and Customer Service: Oracle Identity Governance often requires a longer deployment period due to its complexity but provides a robust support system to assist users. IBM Security Verify Access is generally easier to deploy with its streamlined setup processes, ensuring efficient technical support and better user experience throughout the deployment phase.
Pricing and ROI: Oracle Identity Governance is known for higher upfront costs but delivers strong ROI in large deployments where all features are utilized extensively. Its pricing might be a barrier for smaller organizations. IBM Security Verify Access offers a flexible pricing model that is more cost-effective, particularly for organizations focused on enhancing security and access management, and often justifies its expense through its valuable functionalities.
| Product | Market Share (%) |
|---|---|
| Oracle Identity Governance | 2.1% |
| IBM Security Verify Access | 1.3% |
| Other | 96.6% |

| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 1 |
| Large Enterprise | 5 |
| Company Size | Count |
|---|---|
| Small Business | 22 |
| Midsize Enterprise | 11 |
| Large Enterprise | 46 |
IBM Security Verify Access is a complete authorization and network security policy management solution. It provides end-to-end protection of resources over geographically dispersed intranets and extranets.Provides a wide range of built-in authenticators and supports external authenticators.Provides permit and deny decisions for protected resources requests in the secure domain through the authorization API.Manages secure access to private internal network-based resources by using the public Internet's broad connectivity and ease of use with a corporate firewall system.
Oracle Identity Governance (OIG) is a very versatile and robust enterprise identity management solution that offers functional and business performance competence by supplying centralized administration and total automation of identity and client provisioning events throughout the organization and user applications. Oracle Identity Governance monitors the complete identity and role process to satisfy rapidly changing business and complex compliance regulations and quickly delivers critical reporting and compliance capabilities.
Oracle Identity Governance is designed to easily identify which users have approved access to specific applications and other resources. It does this by using processes such as segregation of duties (SOD), role-based access control (RBAC), certifications, and access requests.
Oracle Identity Governance Features
Reviews from Real Users
“The one thing that stands out was the automatic sign-out when an employee goes on vacation. Identity Governance can monitor when an employee goes on vacation and returns. We use this feature to automatically disable all the employee's accounts when they go on vacation, and they're automatically enabled when they come back. We can also automatically delete the employee's accounts when they're dismissed. Oracle has a model that gives you precise reports. It's called Crystal, and it's similar to JasperReports, so we can derive reports from this database. “ - Fabio L., Partner at a tech services company.
“We are using Oracle Identity Manager for the management of the identity cycle. We have a human resources system as a source, and we have some custom-made applications as a destination of the changes in the identities. - A PeerSpot user who is a Project Manager at a government “
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.