IBM Verify Features
What are the features of IBM Verify?
Authentication type
- SMS-Based
- Voice-Based Telephony
- Email-Based
Functionality
- Multi-Device Sync
- User provisioning
- Password manager
- Single Sign-on
- Enforces policies
- Authentication
- Multi-factor authentication
Type
- On-premises solution
- Cloud-solution
Reporting
- Tracking
- Reporting
Implementation
- Easy Setup
Top Rated IBM Verify Alternatives
IBM Verify Categories on G2
Filter for Features
Authentication Options
Authentication User experience | As reported in 21 IBM Verify reviews. Process of providing credentials and logging into multiple systems is easy and intuitive for users | 88% (Based on 21 reviews) | |
Supports Required Authentication systems | Based on 20 IBM Verify reviews. Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc. | 83% (Based on 20 reviews) | |
Multi-Factor Authentication | Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are. This feature was mentioned in 20 IBM Verify reviews. | 90% (Based on 20 reviews) | |
Supports Required Authentication Methods/Protocols | Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case This feature was mentioned in 20 IBM Verify reviews. | 88% (Based on 20 reviews) | |
Federation/SAML support (idp) | Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials. This feature was mentioned in 19 IBM Verify reviews. | 82% (Based on 19 reviews) | |
Federation/SAML support (sp) | Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider. 19 reviewers of IBM Verify have provided feedback on this feature. | 80% (Based on 19 reviews) |
Access Control Types
Endpoint access | As reported in 20 IBM Verify reviews. Provides ability to control access to PC's, Mobile devices, and other endpoint devices. | 84% (Based on 20 reviews) | |
Local Access | Based on 19 IBM Verify reviews. Controls access to legacy applications, web based applications, network resources and servers while employees are on the companies local area network. | 84% (Based on 19 reviews) | |
Remote Access | Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network. 19 reviewers of IBM Verify have provided feedback on this feature. | 83% (Based on 19 reviews) | |
Partner Access | Controls access to users that are not company employees that are either within the companies local area network or outside the network This feature was mentioned in 19 IBM Verify reviews. | 77% (Based on 19 reviews) | |
Supports BYOD users | Enables users to use their own device to access company applications. This feature was mentioned in 19 IBM Verify reviews. | 76% (Based on 19 reviews) |
Administration
Ease of installation on server | Installation process is easy and flexible. This feature was mentioned in 20 IBM Verify reviews. | 83% (Based on 20 reviews) | |
Password Policy Enforcement | Based on 20 IBM Verify reviews. Options for resetting and enforcing password policies | 88% (Based on 20 reviews) | |
Administration Console | Provides Administration tools/console that are easy to use and learn for routine maintenance tasks 20 reviewers of IBM Verify have provided feedback on this feature. | 87% (Based on 20 reviews) | |
Ease of connecting applications | Based on 19 IBM Verify reviews. Easily provisions new systems, platforms or applications using configuration and not customization. | 83% (Based on 19 reviews) | |
Self Service Password Administration | Based on 19 IBM Verify reviews. Users can set, change passwords without interaction from IT staff | 89% (Based on 19 reviews) | |
Reporting | Based on 11 IBM Verify reviews and verified by the G2 Product R&D team. Standard and customized report creation to ensure appropriate access rights have been assigned | 85% (Based on 11 reviews) | |
Mobile App | Provides mobile application that alerts administrators of potential issues and allows administrators manage access rights | Not enough data | |
Ease of set up for target systems | Based on 10 IBM Verify reviews and verified by the G2 Product R&D team. Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured | 85% (Based on 10 reviews) | |
APIs | Provides appropriate application interfaces to enable custom integrations for unique business requirements | Not enough data | |
Bi-Directional Identity Synchronization | Based on 13 IBM Verify reviews. Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application. | 88% (Based on 13 reviews) | |
Policy Management | Based on 13 IBM Verify reviews. Enables administrators to create access policies and applies policy controls throughout request and provisioning processes. | 87% (Based on 13 reviews) | |
Cloud Directory | Based on 14 IBM Verify reviews. Provides or integrates with a cloud based directory option that contains all user names and attributes. | 90% (Based on 14 reviews) | |
Application Integrations | Integrates with common applications such as service desk tools. | Not enough data |
Platform
Multiple Operating system support | Supports Endpoint access control to multiple operating systems 20 reviewers of IBM Verify have provided feedback on this feature. | 83% (Based on 20 reviews) | |
Multi-Domain Support | Based on 19 IBM Verify reviews. Allows user authentication to be honored by all the hosts in two or more domains | 82% (Based on 19 reviews) | |
Cross Browser support | Support access to browser based applications across required browser types This feature was mentioned in 20 IBM Verify reviews. | 83% (Based on 20 reviews) | |
Fail over protection | Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate This feature was mentioned in 19 IBM Verify reviews. | 84% (Based on 19 reviews) | |
Reporting | Contains pre-built and custom reporting tools to required to manage business 21 reviewers of IBM Verify have provided feedback on this feature. | 88% (Based on 21 reviews) | |
Auditing | Provides mechanism for auditing authentication for trouble shooting purposes. 20 reviewers of IBM Verify have provided feedback on this feature. | 88% (Based on 20 reviews) | |
Third Party Web Services support | Can call and pass credentials to third party web services. 19 reviewers of IBM Verify have provided feedback on this feature. | 82% (Based on 19 reviews) |
User on/off Boarding
Self Service Access requests | Based on 12 IBM Verify reviews and verified by the G2 Product R&D team. Users can request access to an application and be automatically provisioned if they meet policy requirements | 78% (Based on 12 reviews) | |
Smart/Automated Provisioning | Based on 12 IBM Verify reviews and verified by the G2 Product R&D team. Automates account/access rights creation, changes and removals for on-premise and cloud apps | 81% (Based on 12 reviews) | |
Role Management | Based on 11 IBM Verify reviews and verified by the G2 Product R&D team. Establish roles that create a set of authentication rights for each user in the role | 77% (Based on 11 reviews) | |
Policy Management | Based on 11 IBM Verify reviews and verified by the G2 Product R&D team. Enables administrators to create access policies and applies policy controls throughout request and provisioning processes | 83% (Based on 11 reviews) | |
Access Termination | Based on 11 IBM Verify reviews and verified by the G2 Product R&D team. Terminate access to multiple applications based on dates | 82% (Based on 11 reviews) | |
Approval Workflows | Based on 11 IBM Verify reviews and verified by the G2 Product R&D team. Allow business stake-holders/managers to approve or reject requested changes to access via a defined workflow | 82% (Based on 11 reviews) |
User Maintenance
Self Service Password Reset | Based on 10 IBM Verify reviews and verified by the G2 Product R&D team. Enables users to reset passwords without administrator interaction. Enforces password policies when resetting. | 80% (Based on 10 reviews) | |
Bulk Changes | Based on 10 IBM Verify reviews and verified by the G2 Product R&D team. Change users and permissions in bulk | 88% (Based on 10 reviews) | |
Bi-directional Identity Synchronization | Based on 10 IBM Verify reviews and verified by the G2 Product R&D team. Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application | 80% (Based on 10 reviews) |
Governance
Identifies and Alerts for Threats | Alerts administrators when inappropriate access occurs | Not enough data | |
Compliance Audits | Based on 10 IBM Verify reviews and verified by the G2 Product R&D team. Proactively audits access rights against policies | 82% (Based on 10 reviews) |
Authentication type
SMS-Based | Based on 53 IBM Verify reviews and verified by the G2 Product R&D team. Sends a one-time passcode (OTP) via SMS. | 86% (Based on 53 reviews) | |
Voice-Based Telephony | Based on 52 IBM Verify reviews. Provides a one-time passcode (OTP) via voice-call. | 81% (Based on 52 reviews) | |
Email-Based | Based on 53 IBM Verify reviews and verified by the G2 Product R&D team. Sends a one-time passcode (OTP) via email. | 86% (Based on 53 reviews) | |
Software Token | Based on 49 IBM Verify reviews and verified by the G2 Product R&D team. Offers software tokens, which are applications installed on a mobile phone, wearable devices, or desktops and generate time-based one-time passcodes (TOTP) that a user can easily copy. Software tokens work both online and offline. | 83% (Based on 49 reviews) | |
Biometric Factor | Based on 51 IBM Verify reviews and verified by the G2 Product R&D team. Allows biometric factors such as fingerprints, faceprints, voiceprints, or other biometric information to be used as an authentication factor. | 83% (Based on 51 reviews) | |
Mobile-Push | Based on 49 IBM Verify reviews and verified by the G2 Product R&D team. Offers mobile push authentication, which is a user-friendly method that does not require a user to copy a code, but rather accept or deny an authentication using a mobile application. Mobile push authentication only works when a user is connected to the internet. | 85% (Based on 49 reviews) | |
Risk-Based Authentication | Based on 51 IBM Verify reviews and verified by the G2 Product R&D team. Analyzes users' IP addresses, devices, behaviors and identities to authenticate a user. | 86% (Based on 51 reviews) |
Functionality
Multi-Device Sync | Allows the use of tokens on multiple devices. This feature can also be turned off if the user does not want this. 52 reviewers of IBM Verify have provided feedback on this feature. | 83% (Based on 52 reviews) | |
Backup | Based on 50 IBM Verify reviews. Offers encrypted backup recovery stored by the vendor. | 86% (Based on 50 reviews) | |
Dashboard | Offers a dashboard to capture, store, and manage granular user consents This feature was mentioned in 29 IBM Verify reviews. | 88% (Based on 29 reviews) | |
Reporting | As reported in 29 IBM Verify reviews. Provide reporting functions showing granular data to demonstrate compliance to regulators | 87% (Based on 29 reviews) | |
Integrations | Integrates with marketing software and other analytical tools 29 reviewers of IBM Verify have provided feedback on this feature. | 91% (Based on 29 reviews) | |
End-user management | Based on 29 IBM Verify reviews. Allows end-users to manage their preferences online | 89% (Based on 29 reviews) | |
Audit trails | Based on 29 IBM Verify reviews. Shows audit trails of how user consent preferences have changed | 91% (Based on 29 reviews) | |
APIs | As reported in 29 IBM Verify reviews. Offers APIs to link to your data | 86% (Based on 29 reviews) | |
Mobile SDK | Based on 28 IBM Verify reviews. Offers a mobile SDK to use consent management tools on mobile apps | 89% (Based on 28 reviews) | |
Customizable design | Offers customizeable designs to match corporate branding 29 reviewers of IBM Verify have provided feedback on this feature. | 87% (Based on 29 reviews) | |
Server-side storage | Offers server-side storage of consent, not client-side, for compliance reporting purposes 29 reviewers of IBM Verify have provided feedback on this feature. | 87% (Based on 29 reviews) | |
Self-registration and self-service | Based on 21 IBM Verify reviews and verified by the G2 Product R&D team. Enables a seamless customer experience with self-registration and self-service functions, including account creation and preference management. | 83% (Based on 21 reviews) | |
Authentication | Based on 21 IBM Verify reviews and verified by the G2 Product R&D team. Verifies user identity with authentication, which may include multiple multi-factor authentication methods. | 84% (Based on 21 reviews) | |
Scalability | Based on 21 IBM Verify reviews and verified by the G2 Product R&D team. Scales to support growing a customer base. | 84% (Based on 21 reviews) | |
Consent and preference management | Captures and manages a customer's consent and preferences to comply with data privacy laws such as GDPR and CCPA. This feature was mentioned in 21 IBM Verify reviews. | 78% (Based on 21 reviews) | |
Social login | Offers users the option to sign in with social media accounts. This feature was mentioned in 21 IBM Verify reviews. | 84% (Based on 21 reviews) | |
Customer data linking | Based on 21 IBM Verify reviews and verified by the G2 Product R&D team. Integrates with directories or other data stores that house customer data to create a complete view of a customer. | 84% (Based on 21 reviews) | |
FIDO2-compliant | Offers FIDO2-enabled authentication method 24 reviewers of IBM Verify have provided feedback on this feature. | 78% (Based on 24 reviews) | |
Multiple authentication methods | Based on 27 IBM Verify reviews. Offer users multiple ways to authenticate including, but not limited to: mobile push on trusted devices, FIDO-enabled devices, physical security keys, keycards, smart watches, biometrics, QR codes, desktop app + pin, and others. | 87% (Based on 27 reviews) | |
User provisioning | Simplifies or automates user provisioning, deprovisioning, and other user role changes. This feature was mentioned in 55 IBM Verify reviews. | 86% (Based on 55 reviews) | |
Password manager | Offers password management tools to end users. This feature was mentioned in 54 IBM Verify reviews. | 88% (Based on 54 reviews) | |
Single Sign-on | Offers single sign-on functionalities to end users, allowing them to authenticate once and be given access to all of their company accounts. 52 reviewers of IBM Verify have provided feedback on this feature. | 90% (Based on 52 reviews) | |
Enforces policies | As reported in 54 IBM Verify reviews. Enforces user-access policies based on individual, role type, group membership or other factors to prevent unauthorized access to company systems and data. | 87% (Based on 54 reviews) | |
Authentication | Authenticates users prior to granting access to company systems. This feature was mentioned in 53 IBM Verify reviews. | 88% (Based on 53 reviews) | |
Multi-factor authentication | Offers multi-factor authentication methods to verify a user's identity. This feature was mentioned in 52 IBM Verify reviews. | 90% (Based on 52 reviews) |
User Experience
Self-Service Experience | Allows users to set, change passwords easily without interaction from IT staff. | Not enough data | |
Mobile App Usability | Integrates with your mobile device for use on mobile apps. | Not enough data | |
Multilingual Support | Accommodates multiple languages. | Not enough data |
Authentication
Multi-Factor Authentication | Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are. | Not enough data | |
Biometric Authentication | Uses biometric trait or characteristic to authenticate. Additional hardware may be required to support this type. | Not enough data | |
Other Authentication Methods | Provides authentication capabilities outside standard authentication methods such as MFA and biometric . | Not enough data | |
Role-Specific Authentication | Able to assign authentication requirements for different levels of users, such as more robust authentication for senior level executives. | Not enough data |
Type
On-premises solution | As reported in 54 IBM Verify reviews. Provides an IAM solution for on-prem systems. | 84% (Based on 54 reviews) | |
Cloud-solution | Based on 53 IBM Verify reviews. Provides an IAM solution for cloud-based systems. | 86% (Based on 53 reviews) |
Reporting
Tracking | As reported in 55 IBM Verify reviews. Tracks user activities across protected systems. | 84% (Based on 55 reviews) | |
Reporting | Provides reporting functionality. This feature was mentioned in 55 IBM Verify reviews. | 85% (Based on 55 reviews) |
Implementation
Easy Setup | Based on 51 IBM Verify reviews. Offers an easy to understand user interface to make setup smooth. | 83% (Based on 51 reviews) | |
Mobile SDK | Offers a mobile software development kit (SDK) for iOS, Blackberry, and Android. This feature was mentioned in 51 IBM Verify reviews. | 81% (Based on 51 reviews) | |
Web SDK | As reported in 51 IBM Verify reviews. Offers a software development kit (SDK) for web-based applications. | 83% (Based on 51 reviews) |