Introducing G2.ai, the future of software buying.Try now

Compare IBM Verify CIAM and Usercentrics

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
IBM Verify CIAM
IBM Verify CIAM
Star Rating
(173)4.3 out of 5
Market Segments
Enterprise (40.5% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$1.71 / user, per month
Free Trial is available
Browse all 5 pricing plans
Usercentrics
Usercentrics
Star Rating
(197)4.3 out of 5
Market Segments
Small-Business (42.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free
Free Trial is available
Browse all 6 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that IBM Verify CIAM excels in its Audit Trails feature, scoring 8.9, which allows for comprehensive tracking of user activities. In contrast, Usercentrics only scores 7.4 in this area, leading reviewers to mention that they find IBM's audit capabilities more robust for compliance needs.
  • Reviewers mention that IBM Verify CIAM's Integrations score of 8.7 is a significant advantage, as it seamlessly connects with various enterprise systems. Usercentrics, with a score of 8.2, is noted for having fewer integration options, which some users find limiting.
  • Users on G2 highlight the Mobile SDK of IBM Verify CIAM, which scores 8.8, as a standout feature for mobile app developers. In comparison, Usercentrics' Mobile SDK scores 7.5, leading some users to express disappointment in its mobile capabilities.
  • Reviewers say that IBM Verify CIAM's Product Direction is highly rated at 9.2, indicating strong confidence in the product's future development. Usercentrics, with a score of 8.3, has users expressing some concerns about its long-term roadmap.
  • Users report that IBM Verify CIAM's Quality of Support is rated at 8.5, with many praising the responsiveness and expertise of the support team. Usercentrics, scoring 8.8, also receives positive feedback, but some users mention that IBM's support is more tailored for enterprise needs.
  • G2 users highlight the Ease of Setup for Usercentrics, which scores 8.0, making it more user-friendly for small businesses. In contrast, IBM Verify CIAM's score of 7.3 suggests a steeper learning curve, with some users noting that the initial configuration can be complex.
Pricing
Entry-Level Pricing
IBM Verify CIAM
Single sign-on (SSO)
$1.71
/ user, per month
Browse all 5 pricing plans
Usercentrics
Free
Free
Browse all 6 pricing plans
Free Trial
IBM Verify CIAM
Free Trial is available
Usercentrics
Free Trial is available
Ratings
Meets Requirements
8.5
131
8.7
166
Ease of Use
8.3
137
8.2
171
Ease of Setup
7.5
89
8.0
156
Ease of Admin
8.1
48
8.4
131
Quality of Support
8.5
131
8.6
141
Has the product been a good partner in doing business?
8.3
48
8.6
122
Product Direction (% positive)
9.2
135
8.1
163
Features by Category
8.3
34
Not enough data
Authentication Options
8.8
26
Not enough data
8.2
25
Not enough data
8.8
26
Not enough data
8.7
25
Not enough data
7.9
24
Not enough data
8.2
24
Not enough data
Access Control Types
8.7
25
Not enough data
8.6
24
Not enough data
8.5
24
Not enough data
8.0
24
Not enough data
7.8
24
Not enough data
Administration
7.4
26
Not enough data
8.8
25
Not enough data
8.3
25
Not enough data
7.9
24
Not enough data
8.5
22
Not enough data
Platform
8.4
25
Not enough data
8.3
24
Not enough data
8.4
25
Not enough data
8.3
24
Not enough data
8.5
26
Not enough data
8.4
25
Not enough data
8.1
24
Not enough data
User Provisioning and Governance ToolsHide 15 FeaturesShow 15 Features
7.8
18
Not enough data
User on/off Boarding
7.5
17
|
Verified
Not enough data
7.7
17
|
Verified
Not enough data
6.9
16
|
Verified
Not enough data
7.6
16
|
Verified
Not enough data
8.0
16
|
Verified
Not enough data
8.0
15
|
Verified
Not enough data
User Maintenance
7.9
15
|
Verified
Not enough data
8.3
14
|
Verified
Not enough data
7.5
14
|
Verified
Not enough data
Governance
8.3
13
Not enough data
8.2
14
|
Verified
Not enough data
Administration
8.6
16
|
Verified
Not enough data
8.9
12
|
Verified
Not enough data
7.4
15
|
Verified
Not enough data
6.9
14
|
Verified
Not enough data
Multi-Factor Authentication (MFA)Hide 13 FeaturesShow 13 Features
8.4
72
Not enough data
Authentication type
8.7
62
|
Verified
Not enough data
8.1
61
Not enough data
8.7
62
|
Verified
Not enough data
Feature Not Available
Not enough data
8.4
58
|
Verified
Not enough data
8.4
60
|
Verified
Not enough data
8.6
57
|
Verified
Not enough data
8.8
60
|
Verified
Not enough data
Functionality
8.2
60
Not enough data
8.6
58
Not enough data
Implementation
7.8
62
Not enough data
7.8
60
Not enough data
8.3
59
Not enough data
Risk-Based Authentication (RBA)Hide 4 FeaturesShow 4 Features
7.5
24
Not enough data
Administration
8.8
19
Not enough data
8.0
19
Not enough data
8.2
20
Not enough data
6.0
8
Not enough data
Self-Service Password Reset (SSPR) ToolsHide 11 FeaturesShow 11 Features
7.9
24
Not enough data
Administration
8.8
19
Not enough data
8.0
19
Not enough data
8.2
20
Not enough data
6.0
8
Not enough data
Authentication
9.2
13
Not enough data
9.3
12
Not enough data
8.7
5
Not enough data
10.0
5
Not enough data
User Experience
6.9
12
Not enough data
8.1
13
Not enough data
5.7
5
Not enough data
Consent Management Platform (CMP)Hide 9 FeaturesShow 9 Features
8.6
36
7.7
144
Not enough data
8.2
68
Customer Identity and Access Management (CIAM)Hide 15 FeaturesShow 15 Features
8.2
33
Not enough data
Functionality
8.2
30
|
Verified
Not enough data
8.6
29
|
Verified
Not enough data
8.6
29
|
Verified
Not enough data
7.9
29
Not enough data
8.3
29
Not enough data
7.8
29
|
Verified
Not enough data
AI Authentication Risk Management - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Biometric & Behavioral Analysis - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
AI Context-Aware Security Controls - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
Passwordless AuthenticationHide 4 FeaturesShow 4 Features
8.2
34
Not enough data
Functionality
7.7
28
Not enough data
Feature Not Available
Not enough data
8.7
31
Not enough data
Feature Not Available
Not enough data
Identity and Access Management (IAM)Hide 18 FeaturesShow 18 Features
8.7
76
Not enough data
Functionality
8.5
65
Not enough data
8.7
63
Not enough data
8.9
63
Not enough data
8.8
67
Not enough data
8.8
63
Not enough data
9.1
65
Not enough data
Type
8.3
62
Not enough data
8.5
62
Not enough data
Reporting
8.5
63
Not enough data
8.5
63
Not enough data
Not enough data
Not enough data
8.7
5
Not enough data
Authentication & Authorization - Identity and Access Management (IAM)
8.6
6
Not enough data
Administration & Governance - Identity and Access Management (IAM)
9.0
7
Not enough data
Not enough data
Not enough data
Generative AI - Identity and Access Management (IAM)
8.7
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Privacy Policy GeneratorHide 6 FeaturesShow 6 Features
Not enough data
8.4
27
Functionality
Not enough data
8.0
24
Not enough data
8.3
20
Not enough data
8.8
22
Not enough data
8.6
25
Not enough data
8.2
22
Not enough data
8.5
25
Data Subject Access Request (DSAR)Hide 4 FeaturesShow 4 Features
Not enough data
Not enough data
Functionality
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
IBM Verify CIAM
IBM Verify CIAM
Small-Business(50 or fewer emp.)
21.6%
Mid-Market(51-1000 emp.)
37.9%
Enterprise(> 1000 emp.)
40.5%
Usercentrics
Usercentrics
Small-Business(50 or fewer emp.)
42.9%
Mid-Market(51-1000 emp.)
38.7%
Enterprise(> 1000 emp.)
18.3%
Reviewers' Industry
IBM Verify CIAM
IBM Verify CIAM
Information Technology and Services
19.5%
Computer Software
18.2%
Financial Services
6.5%
Telecommunications
3.2%
Marketing and Advertising
3.2%
Other
49.4%
Usercentrics
Usercentrics
Computer Software
12.0%
Marketing and Advertising
7.9%
Retail
7.3%
Information Technology and Services
6.3%
Consumer Goods
4.7%
Other
61.8%
Alternatives
IBM Verify CIAM
IBM Verify CIAM Alternatives
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
Okta
Okta
Add Okta
Cisco Duo
Cisco Duo
Add Cisco Duo
SailPoint
SailPoint
Add SailPoint
Usercentrics
Usercentrics Alternatives
CookieYes
CookieYes
Add CookieYes
OneTrust Privacy Automation
OneTrust Privacy Automation
Add OneTrust Privacy Automation
Osano
Osano
Add Osano
TrustArc
TrustArc
Add TrustArc
Discussions
IBM Verify CIAM
IBM Verify CIAM Discussions
Monty the Mongoose crying
IBM Verify CIAM has no discussions with answers
Usercentrics
Usercentrics Discussions
What is Usercentrics used for?
1 Comment
Official Response from Usercentrics
Usercentrics is used to help organizations comply with data privacy regulations. Usercentrics Consent Management Platform (CMP) enables the display of a...Read more
Monty the Mongoose crying
Usercentrics has no more discussions with answers