Try our new research platform with insights from 80,000+ expert users

IBM Security Verify Access vs Workspace ONE UEM comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 2, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

IBM Security Verify Access
Ranking in Identity and Access Management as a Service (IDaaS) (IAMaaS)
15th
Average Rating
7.8
Reviews Sentiment
6.4
Number of Reviews
8
Ranking in other categories
Single Sign-On (SSO) (14th), Identity Management (IM) (21st), Access Management (13th)
Workspace ONE UEM
Ranking in Identity and Access Management as a Service (IDaaS) (IAMaaS)
11th
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
102
Ranking in other categories
Remote Access (6th), Virtual Desktop Infrastructure (VDI) (7th), Enterprise Mobility Management (EMM) (2nd), Unified Endpoint Management (UEM) (3rd)
 

Mindshare comparison

As of January 2026, in the Identity and Access Management as a Service (IDaaS) (IAMaaS) category, the mindshare of IBM Security Verify Access is 2.1%, up from 1.7% compared to the previous year. The mindshare of Workspace ONE UEM is 1.2%, up from 1.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity and Access Management as a Service (IDaaS) (IAMaaS) Market Share Distribution
ProductMarket Share (%)
Workspace ONE UEM1.2%
IBM Security Verify Access2.1%
Other96.7%
Identity and Access Management as a Service (IDaaS) (IAMaaS)
 

Featured Reviews

Ateeq Rehman - PeerSpot reviewer
Unit Head System Implementor at Allied Bank Limited
Has improved secure user access while managing development through multiple technologies
I have already explained this in my previous call; I don't handle financial terms and commercials. Pricing is generally managed by functional teams and management looking after licensing matters. In Pakistan, vendors such as Oracle and IBM manage account relationships with clients and have tailored pricing models, so I do not have sufficient insights into that aspect.IBM Security Verify Access installation process is not straightforward; it requires underlying specialized knowledge upon which the IBM products are based. The complexity and scalability of the architecture necessitate in-depth technical knowledge and understanding of the system. Thus, installation is not as simple as clicking through; it requires extensive configuration of the underlying application servers, such as IBM WebSphere, where these products are deployed and configured.
Vishal Bhatia - PeerSpot reviewer
Trainer/Consultant at Koenig Solutions Pvt. Ltd.
Effective product tracking and monitoring enhances daily operations despite needing documentation improvement
The documentation part of Workspace ONE UEM can be confusing. The documentation is not comprehensive compared to other VMware solutions or Microsoft documentation. Most people struggle to connect the dots when looking at the documentation. Even the training material and PowerPoint slide decks that trainers use are sometimes too confusing or overwhelming, with too much content but not enough clarity. The support side has recently become weaker compared to what it used to be with VMware. This is another area that needs improvement. Since working with Workspace ONE UEM from when it was AirWatch, it has improved significantly over the last five years. However, there are still some gray areas and scope for improvement, especially in documentation and workflow between different aspects of the solution.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"IBM Security Verify Access is providing a secure way of handling the user login journey, and secure user authentication is fully managed by ISAM or ISVA."
"The solution has powerful authentification and authorization. It offers a good way to increase security."
"IBM Security Verify Access, formerly known as ISAM, IBM Security Access Manager, now renamed to ISVA, integrates with central directory services for our organization and provides user management functionality."
"I have found this solution to be really practical and when a user wants to log in, it is effortless and runs smooth."
"The most valuable feature of IBM Security Access Manager, at least for my company, is multi-factor authentication. That's the only feature my company is using. The solution works well and has no glitches. IBM Security Access Manager is a very good solution, so my company is still using it."
"From the integration point of view, it supports SAML, OIDC, and OAuth. For legacy applications that don't have support for SAML and other new protocols, it provides single sign-on access to end-users. From the integration compatibility point of view, it is highly capable."
"It's a good solution for identification and access management."
"The tool provides a password vault, single sign-on, and multifactor authentication. It offers various authentication methods like fingerprint integration, one-time passwords, or tokens sent via email or SMS. This ensures secure access to your accounts by providing multiple authentication options."
"We can impose cybersecurity requirements."
"The Client Control feature in VMware Workspace ONE is most valuable for managing client devices, including mobile devices and laptops. Another impactful feature is the per-service tooling, allowing access to the data centre on a per-application basis. We use the complete VMware stack, integrating Horizon for application delivery and Carbon Black for endpoint protection. We have outsourced our device management, which streamlines our IT tasks as our supplier handles them competitively."
"People who want to adopt this solution may be thinking about it from the end-user's perspective, but this solution is also very friendly for the people who manage it. It's administration-friendly."
"The most valuable feature of VMware Workspace ONE is its reliability."
"The solution has very good documentation."
"For me, the integration of AirWatch with various enterprise components is something I like. The way they are partnering with various services, like security services, or some of the big guys like Google, Android, Apple, and including Microsoft; that's really awesome. And the way they look at providing functionality to create self-service and automation, that's really usefully and beneficial. That's where I see they differentiate themselves."
"It was easy to use."
"The most valuable feature of VMware Workspace ONE is it provides the ability to find out the location of devices and manage end-point solutions when they are deployed, and keep them secure."
 

Cons

"The user interface for users and administrators could be improved to make it easier. Automating some functions could also be beneficial."
"IBM Security Verify Access installation process is not straightforward; it requires underlying specialized knowledge upon which the IBM products are based."
"IBM Security Verify Access installation process is not straightforward; it requires underlying specialized knowledge upon which the IBM products are based."
"They can improve the single sign-on configuration for OIDC and OAuth. That is not very mature in this product, and they can improve it in this particular area. OIDC is a third-party integration that we do with the cloud platforms, and OAuth is an authorization mechanism for allowing a user having an account with Google or any other provider to access an application. Organizations these days are looking for just-in-time provisioning use cases, but IBM Security Access Manager is not very mature for such use cases. There are only a few applications that can be integrated, and this is where this product is lagging. However, in terms of configuration and single sign-on mechanisms, it is a great product."
"There are a lot of areas that can be improved, but the main area is the lack of customization. You cannot easily customize anything in the product. It is not easy to tweak the functionality. It is challenging to change the out-of-the-box functionality."
"The solution could be classified as a hilt system. There are a lot of resources being used and it is suitable for very large enterprises or the public sector."
"The user interface needs to be simplified, it's complex and not user-friendly."
"Configuration could be simplified for the end-user."
"The security features could always use improvement, although there has already been a huge improvement from years ago."
"The technical support could be improved."
"We have a lot of problems when it comes to integrating with Active Directory."
"Another concern is that support is getting reduced by Workspace ONE; some customers are saying there are support issues on Workspace ONE right now."
"I tried to use the tool on an encrypted disk, but it was inconvenient."
"Patching, fixing, and training for VMware Workspace ONE are areas that need to be improved."
"We'd like to see a better connection to Microsoft Azure and a better connection with Check Point."
"It's a costly product. It would help if they could offer it at a discount."
 

Pricing and Cost Advice

"It costs about 300K AED for a year. Its pricing is a bit on the higher end, but in comparison to other products in the market, its price is still better. There are lots of other products that are very costly."
"The product is not expensive. It depends on the number of users."
"The license and costs depend on the amount range of users you have. For just approximately 2,000 users, the price is practical and fair. However, when you have 20,000 users, it starts to become really expensive, and the discount per user is not attractive enough to go ahead and purchase."
"The price of the solution is costly for the number of users I am using it for."
"You should take out a dedicated license agreement of your MDM fleet and invest heavily in innovating in this space."
"We've purchased various licenses for VMware Workspace ONE, including premium and gold tiers. These licenses include security measures and support for managing telecom expenses like data and voice usage."
"I think the pricing of the product needs advisement. It would be great to bundle the VM products together. I think the actual box itself should be included in the license. At present, it is not paired with the mobile device."
"Pricing is an area that could be improved."
"The pricing currently is higher than the competition."
"VMware Workspace ONE is not cheap; it's quite expensive. However, in the end, they gave us a reasonable price."
"We are paying about $145,000 a year on a three-year subscription with no ability to scale up or scale down within that class model."
report
Use our free recommendation engine to learn which Identity and Access Management as a Service (IDaaS) (IAMaaS) solutions are best for your needs.
881,114 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Insurance Company
12%
Government
11%
Computer Software Company
10%
Computer Software Company
11%
Manufacturing Company
9%
Financial Services Firm
8%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business3
Midsize Enterprise1
Large Enterprise5
By reviewers
Company SizeCount
Small Business41
Midsize Enterprise21
Large Enterprise58
 

Questions from the Community

What do you like most about IBM Security Access Manager?
The tool provides a password vault, single sign-on, and multifactor authentication. It offers various authentication methods like fingerprint integration, one-time passwords, or tokens sent via ema...
What needs improvement with IBM Security Access Manager?
I have already explained this in my previous call; I don't handle financial terms and commercials. Pricing is generally managed by functional teams and management looking after licensing matters. I...
What is your primary use case for IBM Security Access Manager?
We are still using the IBM BPM platform to automate the processes for our organization.I generally use Microsoft Project for project planning and schedule management, especially in relation to Orac...
How does Microsoft Intune compare with VMware Workspace One?
Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes it easy to control security and manage the usage of mobile apps when you have a ...
How does VMware Workspace One compare with VMware Horizon 7?
VMware Workspace One has a powerful set of helpful features. The solution offers very good documentation, the initial setup is easy, and the product is very stable and reliable. I think the fact th...
What do you like most about VMware Workspace ONE?
The platform provides a stable environment for operations and quickly creates new environments. Additionally, it offers efficient flexibility.
 

Also Known As

IBM Security Verify Access (SVA), IBM Security Access Manager, ISAM
VMware Workspace ONE, VMware AirWatch, Workspace ONE Assist, VMware Identity Manager, Workspace ONE Access, VMware Horizon Air
 

Overview

 

Sample Customers

POST Luxembourg
Australian Sports Commission, Stockport NHS Foundation Trust, Lomond School, Merck, United Bank, Medical College of Wisconsin, Latymer Upper School, 2gether NHS Foundation Trust, Dowling Aaron Inc., Trillium Lakelands District School Board, Harrogate Grammar School, Duke University Football, Delta Air Lines, Adventist Health System, Giochi Preziosi, Cramlington Learning Village, Intermountain Healthcare, Safexpress, TAG Aviation
Find out what your peers are saying about IBM Security Verify Access vs. Workspace ONE UEM and other solutions. Updated: December 2025.
881,114 professionals have used our research since 2012.