Compare IBM Security Access Manager vs. Okta

IBM Security Access Manager is ranked 14th in Access Management with 2 reviews while Okta is ranked 2nd in Access Management with 11 reviews. IBM Security Access Manager is rated 7.6, while Okta is rated 8.6. The top reviewer of IBM Security Access Manager writes "Secure access with authentication and good technical support, but needs a more simplified user interface". On the other hand, the top reviewer of Okta writes "Stable sign-on with provisioning and has the ability to enable and disable features". IBM Security Access Manager is most compared with Okta, Microsoft Azure Active Directory Premium and ForgeRock, whereas Okta is most compared with Microsoft Azure Active Directory Premium, OneLogin and Auth0.
Cancel
You must select at least 2 products to compare!
Okta Logo
Read 11 Okta reviews.
22,322 views|17,478 comparisons
Most Helpful Review
Use IBM Security Access Manager? Share your opinion.
Find out what your peers are saying about CyberArk, Okta, Microsoft and others in Access Management. Updated: February 2020.
398,567 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
It's a good solution for identification and access management.The solution has powerful authentification and authorization. It offers a good way to increase security.

Read more »

The most valuable feature of this solution for most customers is access management.This solution allows us to do the provisioning. Also the most important for us is the ability to enable and disable features to employees as they onboard and offboard.The most valuable aspects of the solution are the integration with external websites one-factor authentication.It made things a lot easier, especially with passwords.It has a wide range of MFA options. I prefer "Okta Verify" out of them all.Other than Okta being an easy and awesome integration tool, one of the best features it has is the provisioning and deprovisioning, which makes management way easier. You don't need to be too technical to understand how it works.The feature that is most valuable to me is the automated user provisioning that we set up using Okta as a major part of that process.Valuable features include UD, SSO functionality, MFA and Adaptive MFA functionality, ability to link multiple Directory databases with UD.

Read more »

Cons
The user interface needs to be simplified, it's complex and not user-friendly.Configuration could be simplified for the end-user.

Read more »

This solution would be improved by adding biometrics features.I don't know if it is possible to make it simpler to use or simpler to understand, but that would be the most important thing to improve.The solution lacks an on-premises deployment model so it can't offer a hybrid solution. It would be ideal if clients had options that weren't just cloud-based.On the admin side, we can create our own passwords instead of generating one, which is usually difficult to explain to a user.RESTful Web Service calls and their response seem a bit slow.We still had to write several internal programs/scripts to complete the user-provisioning process. Okta does not have the ability to provision mailbox accounts for on-premise Exchange or in a hybrid O365 environment. The Group Push function from Okta to AD did not work reliably in our environment.UD attribute mapping, Okta group rules, and dynamic usage could use improvement. It also needs more in-depth functionality and features to integrate with RADIUS solutions.

Read more »

Pricing and Cost Advice
Information Not Available
Pricing might be high, but it comes down when the number of people using the product goes up.

Read more »

report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
398,567 professionals have used our research since 2012.
Ranking
14th
out of 26 in Access Management
Views
286
Comparisons
242
Reviews
2
Average Words per Review
227
Avg. Rating
7.5
2nd
out of 26 in Access Management
Views
22,322
Comparisons
17,478
Reviews
10
Average Words per Review
290
Avg. Rating
8.6
Top Comparisons
Compared 38% of the time.
Compared 12% of the time.
Compared 11% of the time.
Also Known As
ISAM
Learn
IBM
Okta
Overview

IBM Security Access Manager helps you simplify your users' access while more securely adopting web, mobile, IoT and cloud technologies. It can be deployed on-premises, in a virtual or hardware appliance or containerized with Docker. ISAM helps you strike a balance between usability and security through the use of risk-based access, single sign-on, integrated access management control, identity federation and mobile multi-factor authentication. Take back control of your access management with IBM Security Access Manager.

Okta is an enterprise grade identity management service, built from the ground up in the cloud and delivered with an unwavering focus on customer success. With Okta, IT can manage access across any application, person or device. Whether the people are employees, partners or customers or the applications are in the cloud, on-premises or on a mobile device, Okta helps IT become more secure, make people more productive, and maintain compliance. Okta is an on-demand identity and access management service for web based applications, both in the cloud and behind the firewall.

Offer
Learn more about IBM Security Access Manager
Learn more about Okta
Sample Customers
POST LuxembourgBox, Groupon, National Geographic, Western Union, DocuSign
Top Industries
No Data Available
VISITORS READING REVIEWS
Software R&D Company31%
Comms Service Provider8%
Financial Services Firm6%
Media Company6%
Find out what your peers are saying about CyberArk, Okta, Microsoft and others in Access Management. Updated: February 2020.
398,567 professionals have used our research since 2012.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.