UserLock and IBM Security Verify Access are two leading security solutions. While UserLock offers a cost-effective option with good customer support, IBM Security Verify Access is considered superior due to its extensive features, making it worth the investment for many users.
Features: UserLock offers straightforward integration, efficient multi-factor authentication, and ease of use. IBM Security Verify Access provides robust functionality, flexibility in handling complex security needs, and comprehensive access management.
Room for Improvement: UserLock could benefit from enhancements in scalability, advanced reporting, and user interface updates. IBM Security Verify Access users highlight the need for improvements in ease of use, simplifying configuration, and reducing setup complexity.
Ease of Deployment and Customer Service: UserLock is praised for its quick deployment and excellent customer service. IBM Security Verify Access, though having a more complex deployment process, also offers reliable customer support.
Pricing and ROI: UserLock stands out for its competitive pricing and attractive ROI for small to mid-sized enterprises. IBM Security Verify Access, while higher in price, delivers substantial ROI through its comprehensive security features.
IBM Security Verify Access is a complete authorization and network security policy management solution. It provides end-to-end protection of resources over geographically dispersed intranets and extranets.Provides a wide range of built-in authenticators and supports external authenticators.Provides permit and deny decisions for protected resources requests in the secure domain through the authorization API.Manages secure access to private internal network-based resources by using the public Internet's broad connectivity and ease of use with a corporate firewall system.
Two Factor Authentication & Access Management for Windows Active Directory.
UserLock helps administrators to manage and secure access for every user, without obstructing employees or frustrating IT.
Two Factor Authentication on Windows logon, RDP, IIS and VPN connections. UserLock supports 2FA using authenticator applications which include Google Authenticator, Microsoft Authenticator and LastPass Authenticator, or programmable hardware tokens such as YubiKey and Token2.
Single Sign-On: Secure and frictionless access to Microsoft 365 and other Cloud Applications, using on-premise Active Directory credentials.
Access Restrictions: Using the contextual information around a user’s logon, UserLock will authorize, deny or limit how a user can access the network, once authenticated.
Access Monitoring: Track and alert on all users’ logon and logoff activity in real-time. Interact remotely with any session and respond to login behavior.
Access Auditing: Record and report on all user connection events to provide a central audit across the whole network.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.