User Authentication Reviews and Ratings

What is User Authentication?

Gartner defines user authentication as the journey-time process that provides credence in a claim to an identity established for a person for access to digital assets. User authentication is delivered by some combination of (a) an authenticator, (b) signals evaluation and (c) an authentication decision point, which may be from different vendors. User authentication is used to provide credence in an identity claim for a person already known to an organization. The credence must be sufficient to bring account takeover (ATO) risks within the organization’s risk tolerance. User authentication is foundational to and protects the value of other functions with an organization’s identity fabric, namely: runtime authorization, especially segregation of duties (SOD); audit (individual accountability); and identity analytics.

Products In User Authentication Market

"A Truly amazing product with indepth IT Administartion capabilities."

Ease of Use; The bredth of capabilities is amazing for this product. User management tokens is very good. Management of User Authentications by integrating DUO with SSO makes it a remarkable product and can be integrated on many platforms.

Read reviews

"Microsoft Entra ID simplifies authentification with other providers"

We use Microsoft Entra ID for the user authentification part of Azure and Microsoft Office 365

Read reviews

"Prevents Breaches Before They Begin With Crowd strike Identity Protection"

CrowdStrike Identity protection goes beyond endpoint security to tackle identity-based attacks, which are becoming increasingly common. The solution leverages AI and ML to continuously monitor user activity and identify anomalous behavior that could indicate an attack. This proactive approach helps prevent breaches before they can cause significant damage. Crowd Strike seamlessly integrates with the Falcon platform, offering a unified security console for endpoint, workloads, and identity protection. Crowd Strike Falcon complete identity threat protection offers a fully managed service that handles, setup, monitoring and remediation tasks associated with identity security.

Read reviews

"Efficient Multi-factor Authentication Tool: A Comprehensive Look"

It is a great tool that gives us the functionality we need for Multi-factor Authentication

Read reviews

"Symantec VIP helped replace all hard-token with soft-tokens"

Overall easy to use, easy to setup and easy overall administration

Read reviews

"RSA SecureID is the best corporate VPN"

Have been using it for 3 years and love it, never had a bad experience ever!

Read reviews

"Modernize MFA with Yubico"

I have been using Yubikey's from yubico for about 2 years now. I have 2 different models and we distribute another to all of our IT resources with admin credentials. Being able to enforce strong MFA with Yubico has been a game changer to our security posture and has reduced the number of security incidents since implementation

Read reviews

"Unleash the power of PingOne Cloud Platform for Identity Solution"

PingOne Cloud Platform is a cloud-based Identity and access management (IAM) Platform. It provides secure and seamless access to application, systems and data for employees, partners and customers. User can login once and gain access to various resources across different applications without any username or password. Its key features are single sign-on (SSO) where user can login once and access multiple application without any need to enter the user id and password. Multi factor Authentication, provides extra layer of security, API security used for different application to integrate with PingOne cloud. Identity Governance Administrator allows to enforce policies and control to manage users' identities and access. Integration with cloud and variety of on-premises applications. It also provides insights into user access patterns, and compliance related activities.

Read reviews

"Manages each users complete collection of application passwords for fast login/logout"

With Imprivata OneSign, a single action of user authentication permits employees to access all computers and applications they are authorized to use and I was pleased that Imprivata OneSign also easily managed OTP tokens and finger biometrics which we use for remote user authentication to allow fast access to applications.

Read reviews

"User Friendly "

Very good and user-friendly interface. Great features and many options.

Read reviews

"They deliver on the expectation for reducing friction while increasing security"

They have been outstanding to work with, very helpful in implementation and support overall.

Read reviews

"Solid MFA Platform that provides 100% coverage for AD"

MFA Solution was easy to setup. The virtual appliances were easy to do. We did want to go cloud-hosted, but, at this time, they only supported entirely US deployments. Hopefully that will change.

Read reviews

"Trusted Platform for Data Security with Strong Authentication Capabilities"

The best cloud-based reliable security system. By its authentication capability, it allows users to access the data safely and securely.

Read reviews

"Great Partner and product!"

We implemented MFA when users leverage sudo on our UNIX/Linux Infrastructure. It was a successful installation and Centrify was a great partner. In addition Centify made product modifications based on unique requirements.

Read reviews

"Entrust, the kind of safety you need!"

This feels safe and secure, and still makes overall IAM easy to manage.

Read reviews

"Prevents out-of-date devices and unsupported browsers from accessing applications"

One of the really cool things about BioConnect Enterprise is that it doesnt cost a lot of time or money to deploy and it offers several different authentication methods for both technical and nontechnical users. Using BioConnect Enterprise we are able to lovk down access to the company applications and crafted a custom security policy through which our employees can request access from outside the company.

Read reviews

"Safenet authentication best way to connect devices remotely"

Safenet authentication provides best way to connect to the any devices from any location remotely. I liked the interface which is very much user friendly. It has pretty good Identity and Access Management features. I loved its fully automated administration of users, token.

Read reviews

"Excellent product and easy to deploy"

product delivery was easy, quick setup and good support.

Read reviews

"Established trust in user identities and ensured the trustworthiness of devices"

This solution allowed us to create custom security policies to ensure users are who they say they are and their devices are secure enough to access business applications. We were able to leverage the benefits of SSO instantly and ensure basic security controls such as passcode lock and encryption were enabled on the device before they were granted access to cloud applications.

Read reviews

"Fraudmanager works very good "

This tool is a grea asset here in our institution. It provides us a lot of information about the suspect fraud. Also its administration is very lightway, it doesnt fail frequently, and when it does it just a restart needed.

Read reviews
Products 1 - 20