Compare IBM Verify CIAM and Zscaler Private Access

At a Glance
IBM Verify CIAM
IBM Verify CIAM
Star Rating
(182)4.3 out of 5
Market Segments
Enterprise (39.6% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$1.71 / user, per month
Free Trial is available
Browse all 5 pricing plans
Zscaler Private Access
Zscaler Private Access
Star Rating
(128)4.5 out of 5
Market Segments
Enterprise (49.1% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Zscaler Private Access
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Zscaler Private Access excels in user experience, with many users appreciating its seamless operation that runs in the background. This convenience allows users to focus on their work without the hassle of manual connections, making it a preferred choice for those seeking efficiency.
  • Users say that IBM Verify CIAM offers robust security features, including a wide range of built-in authenticators and support for external authenticators. Reviewers highlight its strong security measures, such as adaptive authentication and multi-factor authentication, which are crucial for enterprise-grade identity management.
  • According to verified reviews, Zscaler Private Access is noted for its ease of use, with users finding it straightforward and user-friendly. The platform's ability to provide access only to necessary applications, rather than the entire network, enhances security and speeds up access times, which is a significant advantage for daily operations.
  • Reviewers mention that IBM Verify CIAM shines in its integration capabilities, particularly with its Application Gateway. This feature allows for easy connections between older on-premise applications and modern cloud apps, facilitating smoother transitions without extensive rewrites, which is a big plus for enterprises with legacy systems.
  • G2 reviewers highlight that Zscaler Private Access has a slight edge in implementation speed, with many users reporting a quick setup process. This is particularly beneficial for organizations looking to minimize downtime and get their teams up and running swiftly.
  • Users express that while IBM Verify CIAM has strong features, it faces challenges in administration and setup, with some reviewers noting that the initial configuration can be complex. In contrast, Zscaler Private Access is praised for its straightforward administrative console, making it easier for IT teams to manage.
Pricing
Entry-Level Pricing
IBM Verify CIAM
Single sign-on (SSO)
$1.71
/ user, per month
Browse all 5 pricing plans
Zscaler Private Access
No pricing available
Free Trial
IBM Verify CIAM
Free Trial is available
Zscaler Private Access
No trial information available
Ratings
Meets Requirements
8.6
135
9.1
98
Ease of Use
8.3
141
8.9
101
Ease of Setup
7.6
93
8.8
72
Ease of Admin
8.1
50
9.0
31
Quality of Support
8.6
135
8.9
88
Has the product been a good partner in doing business?
8.3
50
9.2
31
Product Direction (% positive)
9.2
139
9.5
96
Features by Category
8.3
35
8.7
32
Authentication Options
8.8
26
8.9
30
8.2
25
8.9
29
8.8
26
9.2
29
8.7
25
9.2
28
7.9
24
8.6
25
8.2
24
8.7
25
Access Control Types
8.7
25
9.2
28
8.6
24
8.8
27
8.5
24
8.7
30
8.0
24
7.9
25
7.8
24
7.9
26
Administration
7.4
26
8.5
28
8.8
25
8.9
29
8.1
26
9.0
28
7.9
24
8.9
28
8.5
22
8.4
28
Platform
8.4
25
8.5
27
8.3
24
8.5
27
8.4
25
8.5
26
8.3
24
8.3
25
8.5
26
8.7
26
8.4
25
8.5
26
8.1
24
8.5
24
User Provisioning and Governance ToolsHide 15 FeaturesShow 15 Features
7.8
18
Not enough data
User on/off Boarding
7.5
17
|
Verified
Not enough data
7.7
17
|
Verified
Not enough data
6.9
16
|
Verified
Not enough data
7.6
16
|
Verified
Not enough data
8.0
16
|
Verified
Not enough data
8.0
15
|
Verified
Not enough data
User Maintenance
7.9
15
|
Verified
Not enough data
8.3
14
|
Verified
Not enough data
7.5
14
|
Verified
Not enough data
Governance
8.3
13
Not enough data
8.2
14
|
Verified
Not enough data
Administration
8.6
16
|
Verified
Not enough data
8.9
12
|
Verified
Not enough data
7.4
15
|
Verified
Not enough data
6.9
14
|
Verified
Not enough data
Multi-Factor Authentication (MFA)Hide 13 FeaturesShow 13 Features
8.4
73
Not enough data
Authentication type
8.6
63
|
Verified
Not enough data
8.1
61
Not enough data
8.7
62
|
Verified
Not enough data
Feature Not Available
Not enough data
8.4
58
|
Verified
Not enough data
8.4
60
|
Verified
Not enough data
8.6
57
|
Verified
Not enough data
8.8
60
|
Verified
Not enough data
Functionality
8.2
60
Not enough data
8.6
58
Not enough data
Implementation
7.8
62
Not enough data
7.8
60
Not enough data
8.3
59
Not enough data
Not enough data
8.8
72
Network Management
Not enough data
8.9
61
Not enough data
8.7
64
Not enough data
9.1
63
Not enough data
8.5
60
Security
Not enough data
9.1
65
Not enough data
9.2
66
Not enough data
8.6
61
Not enough data
9.3
64
Identity Management
Not enough data
9.0
62
Not enough data
9.0
61
Not enough data
9.0
63
Generative AI
Not enough data
7.9
39
Not enough data
7.8
39
Risk-Based Authentication (RBA)Hide 4 FeaturesShow 4 Features
7.5
24
Not enough data
Administration
8.8
19
Not enough data
8.0
19
Not enough data
8.2
20
Not enough data
6.0
8
Not enough data
Self-Service Password Reset (SSPR) ToolsHide 11 FeaturesShow 11 Features
7.9
24
Not enough data
Administration
8.8
19
Not enough data
8.0
19
Not enough data
8.2
20
Not enough data
6.0
8
Not enough data
Authentication
9.2
13
Not enough data
9.3
12
Not enough data
8.7
5
Not enough data
10.0
5
Not enough data
User Experience
6.9
12
Not enough data
8.1
13
Not enough data
5.7
5
Not enough data
Consent Management Platform (CMP)Hide 9 FeaturesShow 9 Features
8.6
36
Not enough data
Customer Identity and Access Management (CIAM)Hide 15 FeaturesShow 15 Features
8.2
35
Not enough data
Functionality
8.2
30
|
Verified
Not enough data
8.6
30
|
Verified
Not enough data
8.6
29
|
Verified
Not enough data
8.0
30
Not enough data
8.3
29
Not enough data
7.8
29
|
Verified
Not enough data
AI Authentication Risk Management - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Biometric & Behavioral Analysis - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
AI Context-Aware Security Controls - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
Passwordless AuthenticationHide 4 FeaturesShow 4 Features
8.3
33
Not enough data
Functionality
7.8
27
Not enough data
Feature Not Available
Not enough data
8.8
30
Not enough data
Feature Not Available
Not enough data
Identity and Access Management (IAM)Hide 18 FeaturesShow 18 Features
8.7
79
Not enough data
Functionality
8.5
64
Not enough data
8.8
62
Not enough data
9.0
63
Not enough data
8.8
68
Not enough data
8.9
65
Not enough data
9.2
67
Not enough data
Type
8.4
61
Not enough data
8.6
61
Not enough data
Reporting
8.6
62
Not enough data
8.6
62
Not enough data
Not enough data
Not enough data
8.7
5
Not enough data
Authentication & Authorization - Identity and Access Management (IAM)
8.6
6
Not enough data
Administration & Governance - Identity and Access Management (IAM)
9.0
7
Not enough data
Not enough data
Not enough data
Generative AI - Identity and Access Management (IAM)
8.7
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Protection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Secure Access Service Edge (SASE) PlatformsHide 12 FeaturesShow 12 Features
Not enough data
Not enough data
Components - Secure Access Service Edge (SASE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence - Secure Access Service Edge (SASE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Secure Access Service Edge (SASE) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Usage
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Miscellaneous
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
IBM Verify CIAM
IBM Verify CIAM
Small-Business(50 or fewer emp.)
21.4%
Mid-Market(51-1000 emp.)
39.0%
Enterprise(> 1000 emp.)
39.6%
Zscaler Private Access
Zscaler Private Access
Small-Business(50 or fewer emp.)
18.2%
Mid-Market(51-1000 emp.)
32.7%
Enterprise(> 1000 emp.)
49.1%
Reviewers' Industry
IBM Verify CIAM
IBM Verify CIAM
Information Technology and Services
19.6%
Computer Software
18.4%
Financial Services
7.0%
Banking
3.2%
Computer & Network Security
3.2%
Other
48.7%
Zscaler Private Access
Zscaler Private Access
Information Technology and Services
24.5%
Computer Software
11.8%
Financial Services
9.1%
Computer & Network Security
8.2%
Telecommunications
4.5%
Other
41.8%
Alternatives
IBM Verify CIAM
IBM Verify CIAM Alternatives
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
Okta
Okta
Add Okta
Cisco Duo
Cisco Duo
Add Cisco Duo
SailPoint
SailPoint
Add SailPoint
Zscaler Private Access
Zscaler Private Access Alternatives
Twingate
Twingate
Add Twingate
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
Okta
Okta
Add Okta
JumpCloud
JumpCloud
Add JumpCloud
Discussions
IBM Verify CIAM
IBM Verify CIAM Discussions
Monty the Mongoose crying
IBM Verify CIAM has no discussions with answers
Zscaler Private Access
Zscaler Private Access Discussions
What is private access zscaler?
1 Comment
Vikram J.
VJ
In Simple form, its sort of VPN connectivity but provide access to only application which user requires and secondly it is controlled by access policy...Read more
What does zscaler software do?
1 Comment
Shiva Reddy P.
SP
Used as VPN to secure internal network and used for cloud security Read more
Monty the Mongoose crying
Zscaler Private Access has no more discussions with answers