User Authentication Reviews and Ratings

What is User Authentication?

Gartner defines user authentication as the journey-time process that provides credence in a claim to an identity established for a person for access to digital assets. User authentication is delivered by some combination of (a) an authenticator, (b) signals evaluation and (c) an authentication decision point, which may be from different vendors. User authentication is used to provide credence in an identity claim for a person already known to an organization. The credence must be sufficient to bring account takeover (ATO) risks within the organization’s risk tolerance. User authentication is foundational to and protects the value of other functions with an organization’s identity fabric, namely: runtime authorization, especially segregation of duties (SOD); audit (individual accountability); and identity analytics.

Products In User Authentication Market

"Strengthen Security and Compliance with DUO's Authentication"

DUO is the best multi factor authentication provider I've used. We utilize both the key fob and mobile device authentication for all of our users M365 accounts and servers. If you need to increase your security, meet compliance, or be able to manage your security more, than DUO will work for you.

Read reviews

"How Microsoft Entra ID Streamlines Cloud Domain Management"

Microsoft Entra ID is full of convenient features for a cloud domain. With the ability to create dynamic groups, reset passwords, update MFA, set MFA policies and conditional access. All of these features create an extensive host of advantages for an organization. Ability to also add in app registrations to a tenant gives the ability to utilize third party applications with great security.

Read reviews

"Revolutionizing Threat Detection: Falcon's Identity Threat Protection Explained"

Falcon Identity Threat Protection is an extensive solution used to address identity-based threats in real-time. It works by integrating identity security with endpoint protection, which leverages lightweight agents to provide a unified threat detection and response platform. This non-intrusive approach provides continuous protection without disrupting the normal activities of the platform or the endpoints. One of the standout features is its ability to monitor and correlate activities based on identity with the behavior of the endpoints. This extensive integration across identity and endpoint data improves the platform's ability to detect advanced threats which helps to reduce the rate of undetected data. It also promotes continual monitoring of user activities, which helps in identifying and preventing unauthorized access and possible threats before they escalate to endpoints.

Read reviews

"Efficient Multi-factor Authentication Tool: A Comprehensive Look"

It is a great tool that gives us the functionality we need for Multi-factor Authentication

Read reviews

"YubiKey: A High Value Investment for Digital Security with usability and cost hurdles"

Overall, YubiKey provides a high level of security and convenience for the protection of online accounts, it a valuable tool for both individual and organization. Its strengths in security and ease outweigh the drawbacks, making it a worthwhile investment for those looking to enhance their digital security.

Read reviews

"Symantec VIP helped replace all hard-token with soft-tokens"

Overall easy to use, easy to setup and easy overall administration

Read reviews

"RSA SecureID is the best corporate VPN"

Have been using it for 3 years and love it, never had a bad experience ever!

Read reviews

"Great end user tool."

Very responsive and customer focused, great attention to detail and thoroughly discussed how things were going to work in advance.

Read reviews

"Unleash the power of PingOne Cloud Platform for Identity Solution"

PingOne Cloud Platform is a cloud-based Identity and access management (IAM) Platform. It provides secure and seamless access to application, systems and data for employees, partners and customers. User can login once and gain access to various resources across different applications without any username or password. Its key features are single sign-on (SSO) where user can login once and access multiple application without any need to enter the user id and password. Multi factor Authentication, provides extra layer of security, API security used for different application to integrate with PingOne cloud. Identity Governance Administrator allows to enforce policies and control to manage users' identities and access. Integration with cloud and variety of on-premises applications. It also provides insights into user access patterns, and compliance related activities.

Read reviews

"Revolutionizing Identity Risk Management and Threat Visibility"

We really like the innovative approach to protecting identities using rule and condition based authentication. Being able to easily understand where our current identity risks are and the ease of protecting them make the product simple to use yet incredibly powerful. The insights gained from the platform are far greater than any other capability we previously had in our organisation and gives us full visibility on any potential threats. A close working relationship with our CSM and the ability to gain access to the product managers means that we get a 1st class level of service that feels very personal. We are very happy with our investment so far.

Read reviews

"User Friendly "

Very good and user-friendly interface. Great features and many options.

Read reviews

"They deliver on the expectation for reducing friction while increasing security"

They have been outstanding to work with, very helpful in implementation and support overall.

Read reviews

"Thales STA: Addressing Business Requirements with Unwavering Commitment"

I have worked closely with the Thales STA team for 3+ years. They have been a phenomenal partner. I get on the phone whenever we have an issue, and they bend over backwards to ensure business requirements are met. I am extremely satisfied with the product and their customer support team.

Read reviews

"Great Partner and product!"

We implemented MFA when users leverage sudo on our UNIX/Linux Infrastructure. It was a successful installation and Centrify was a great partner. In addition Centify made product modifications based on unique requirements.

Read reviews

"Entrust, the kind of safety you need!"

This feels safe and secure, and still makes overall IAM easy to manage.

Read reviews

"Thales' Product Allows In-House Corporate Authenticator"

I am very satisfied with our collaboration with Thales. They are a reliable partner in various fields, especially security.

Read reviews

"Safe and steady application for VPN MFA solution "

Application runs without admin overhead, when things did break, the vendor provided fast support for a quick resolution

Read reviews

"Prevents out-of-date devices and unsupported browsers from accessing applications"

One of the really cool things about BioConnect Enterprise is that it doesnt cost a lot of time or money to deploy and it offers several different authentication methods for both technical and nontechnical users. Using BioConnect Enterprise we are able to lovk down access to the company applications and crafted a custom security policy through which our employees can request access from outside the company.

Read reviews

"Digital Identity: Navigating Biometric Authentication and Compliance"

It is a good solution for digital identity and access management solution.

Read reviews

"Established trust in user identities and ensured the trustworthiness of devices"

This solution allowed us to create custom security policies to ensure users are who they say they are and their devices are secure enough to access business applications. We were able to leverage the benefits of SSO instantly and ensure basic security controls such as passcode lock and encryption were enabled on the device before they were granted access to cloud applications.

Read reviews
Products 1 - 20