Thales (SafeNet Trusted Access) vs IBM Security Verify

Which One Is A Better Workforce IAM?

Read on to find out what they reveal:



  • Thales (SafeNet Trusted Access)'s Strong Authentication & HSM Focus makes them a fan favorite.
  • IBM Security Verify offers Integration with IBM Ecosystem & Customization.
  • Thales (SafeNet Trusted Access) suits best for Enterprise, whereas IBM Security Verify has target audience in Large Enterprise.
    ( Link )
See how Thales fares against competitors

Industry Analysts pick Thales (SafeNet Trusted Access) over IBM Security Verify

INDUSTRY LEADER
By the way, if you are looking for a CIAM platform, do explore LoginRadius, which has been recognized as an overall leader by Kupingercole, ahead of Thales (SafeNet Trusted Access)!

Your Peers pick Thales (SafeNet Trusted Access) over IBM Security Verify

Thales (SafeNet Trusted Access)
ProsDeep External integrationsSecurity and reliabilitySSO
ConsExpensive and MAU Traps
IBM Security Verify
ProsIntegration with M365SecurityIdentity Governance and SSO
ConsExpensive and external integration issues

When we were looking for an customer identity management platform, we tried a lot of big companies. Of which some were too expensive, and some were not feature-rich enough. We needed something that was as powerful as it was cost-effective. That’s when we found LoginRadius, and it was kind of exactly that right fit—easy to use, feature-rich, and had reasonable pricing.

City of Rochester

Why Organizations Choose LoginRadius for CIAM

Purpose-built CIAM

Purpose-built CIAM

Expert Support - NOT Outsourced!

Expert Support - NOT Outsourced!

Developer-Supported Deployment

Developer-Supported Deployment

Flexible Partnership

Flexible Partnership

We believe that the best CIAM platform is one that is purpose-built for your use cases and can help your developers go-to market quickly. See for yourself.

Feature-by-Feature Comparison

Parameter
Thales (SafeNet Trusted Access)
IBM Security Verify
General Assessment & Market Position
Conducive pricing models for Startups
High Per User Cost
Complex RU model
Prevalent in SMB and Mid Market Segments
Limited
Limited
Shines in the Enterprise Market Segment
Supported
Supported
Authentication
Password restrictions
Supported
Supported
MFA
Supported
Supported
Risk-based authn
Supported
Limited
(licensed separately)
SSO for multi applications
Supported
Supported
Social Login
Supported
Supported
Magic Links phone and email
Supported
Limited
(via flows)
Biometrics
Supported
Supported
FIDO Keys
Supported
Supported
Push notification MFA
Supported
Supported
SAML, OAuth 2.0, OIDC
Supported
Supported
Authorization
RBAC
Supported
Supported
ABAC
Supported
Supported
Fine-grained authorization
Supported
Supported
Identity Governance and Administration
Universal Directory and security
Supported
Supported
SSPR
Supported
Supported
Automated Provisioning/de-provisioning
Supported
Limited
(higher cost)
Access updates and recertification
Not Supported
Limited
(seperate module)
Attestation/Audit logs for compliance reporting
Supported
Limited
(seperate module)
Segregation of Duties
Not Supported
Limited
(seperate module)
Policy-based entitlement management
Supported
Limited
(seperate module)
Access dashboards
Supported
Limited
(advanced license)
Risk scoring
Supported
Limited
(seperate license)
Priviledges Access Management
Secure Vault
Not Supported
Limited
(seperate module)
Automated Rotation
Not Supported
Limited
(seperate module)
Credential Injection
Not Supported
Limited
(seperate module)
Session Recording & Monitoring
Not Supported
Limited
(seperate module)
Just-In-Time (JIT) Access
Limited
(lacks dedicated solution)
Supported
Privilege Elevation and Delegation Management (PEDM)
Limited
Supported
Orchestration & Workflow
Robust Journey Orchestration Platform
Limited
Supported
Workflow Tool for Automating Administrative Tasks
Supported
Supported
No-Code Tool for User Journeys
Limited
(no visual designer)
Supported

You might also be interested in

cardImage

Thales (SafeNet Trusted Access) Vs IBM Security Verify

cardImage

IBM Security Verify Vs ForgeRock

cardImage

ForgeRock Vs Cyber Ark Identity

cardImage

Cyber Ark Identity Vs BeyondTrust

Customer Identity, Simplified.

No Complexity. No Limits.
Thousands of businesses trust LoginRadius for reliable customer identity. Easy to integrate, effortless to scale.

See how simple identity management can be. Start today!