

Symantec Identity Governance and Administration and IBM Security Verify Access compete in the identity management and security domain. While Symantec excels in governance capabilities, IBM's comprehensive feature set provides an edge, even at a premium.
Features: Symantec Identity Governance and Administration offers strong compliance management, robust governance over user access, and effective audit capabilities. On the other hand, IBM Security Verify Access includes adaptive access management, advanced threat intelligence, and sophisticated risk analysis tools. IBM's feature set is deemed more extensive, providing better security enhancements.
Room for Improvement: Symantec could improve in areas like more intuitive user interfaces, expanding integration capabilities, and better reporting tools. IBM could enhance ease of customization, reduce complexity in deployment, and improve its pricing structure to offer better cost efficiency for smaller organizations.
Ease of Deployment and Customer Service: Symantec Identity Governance and Administration is known for a straightforward deployment model and reliable technical support, ensuring smooth integration. IBM Security Verify Access, while complex due to advanced features, provides comprehensive customer service that aids navigation and implementation, enhancing the deployment experience despite complexities.
Pricing and ROI: Symantec Identity Governance and Administration offers a cost-effective setup with attractive ROI for governance-focused organizations. IBM Security Verify Access commands a higher initial cost but promises longer-term ROI through extensive capabilities and security enhancements, making it a significant investment with valuable security benefits.
| Product | Market Share (%) |
|---|---|
| IBM Security Verify Access | 1.3% |
| Symantec Identity Governance and Administration | 1.7% |
| Other | 97.0% |

| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 1 |
| Large Enterprise | 5 |
| Company Size | Count |
|---|---|
| Small Business | 23 |
| Midsize Enterprise | 9 |
| Large Enterprise | 45 |
IBM Security Verify Access is a complete authorization and network security policy management solution. It provides end-to-end protection of resources over geographically dispersed intranets and extranets.Provides a wide range of built-in authenticators and supports external authenticators.Provides permit and deny decisions for protected resources requests in the secure domain through the authorization API.Manages secure access to private internal network-based resources by using the public Internet's broad connectivity and ease of use with a corporate firewall system.
The Symantec Identity Governance and Administration (formerly CA Identity Suite) provides comprehensive identity management and governance capabilities with a simple, intuitive user experience. This user experience can dramatically simplify processes such as user access requests and access certifications, resulting in improved productivity and user satisfaction. In addition, the Symantec Identity Governance and Administration performs risk analysis and certification and enables remediation actions in real-time during the access provisioning steps, thereby improving audit performance and risk posture with preventive policy enforcement.
While providing these business and governance-centric capabilities for business users, the Symantec Identity Governance and Administration also delivers core enterprise-grade identity management and governance capabilities, including broad provisioning support for on-premise and cloud apps, extensibility and flexibility to integrate with other IT systems and consumer-grade scale. This means organizations are not forced to choose between usability and performance. With the Symantec Identity Governance and Administration, they can have both.
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.