Overview
Product Information on SafeNet Trusted Access
What is SafeNet Trusted Access?
SafeNet Trusted Access Pricing
SafeNet Trusted Access Product Images



Overall experience with SafeNet Trusted Access
“Gemalto is great”
“Not the best out there, but gets the job done.”
About Company
Company Description
Thales is a worldwide entity focusing on digital security. The company's main objective is to provide trust in an ever-increasing digitally interconnected society. To achieve this, Thales has developed a variety of products, software, and services that hinge on two foundational technologies: digital identification and data security. These technologies play a crucial role in various aspects of contemporary life such as payment methods, enterprise security, and the internet of things. The purpose of the technology is to assist in delivering digital services securely for a multitude of individuals and things.
Company Details
Do You Manage Peer Insights at Thales?
Access Vendor Portal to update and manage your profile.
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
Reviewer Insights for: SafeNet Trusted Access
Deciding Factors: SafeNet Trusted Access Vs. Market Average
Performance of SafeNet Trusted Access Across Market Features
SafeNet Trusted Access Likes & Dislikes
I like most about the product is that it works as expected. The access policies and adding applications is very easy to setup and understand.
Once you learn to use the software and the ins and outs of it, it is fairly easy to navigate. We use this mostly to manage our onsite users, offsite users, contractors etc who need access to files on our system or access into our network whether onsite or via VPN/RDP/RDS etc. We have run into our share of issues, but at the end of the day this software keep a good audit trail, as well as allows us to grant access for whatever to whomever needs it. This may not be the best software or easiest to use, but it is as reliable as the rest.
SafeNet Trusted Access protects Hybrid and complex environments. Offers flexible and risk-based protection. Authentication is fast/reliable. I like the SSO feature.
I dislike switching from the STA and SAS console to view data.
The setup isn't as clean as it could be. We were helped all along the way by a Thales technician, but it felt very rushed with not a lot of information hand off, so we were left figuring out a lot of it ourselves as things didn't work as they should. It is a fairly solid product, when it is working properly. However, any sort of hiccup, ie loss of internet, faulty NIC etc can leave you chasing your til for a while.
SafeNet Trusted Access has always been reliable. No issues.
Top SafeNet Trusted Access Alternatives
Peer Discussions
SafeNet Trusted Access Reviews and Ratings
- ANALYST ACTIVE DIRECTORY1B-10B USDConsumer GoodsReview Source
Gemalto is great
My overall experience using Safenet Trusted Access is be excellent. The product has worked as expected. If we had a problem the tech support has resolved it in a timely manner. - Android Developer50M-1B USDServices (non-Government)Review Source
Great Access Management Security Features
The platform is unique as it offers risk based security in our hybrid IT environment. It seamlessly secures applications and users on cloud, legacy, and on-premises. The authentication process is fast and the passwordless access ensures both secure and super fast access. It has effectively dealt with data breaches while reducing IT overhead related costs. - INFORMATION SYSTEMS MANAGER LEGAL INDUS50M-1B USDMiscellaneousReview Source
Product Stability Noted With Requests for Improved Licensing and Password Features
I think the rating comes down to the excellent support they provide. - IT Specialist50M-1B USDServices (non-Government)Review Source
Great Access Management Features
SafeNet Trusted Access facilitates smooth/fast access management by enabling risk-based, SSO, and adaptable authentication thus securing our cloud and on-premises apps/data. It ensures security compliance and greatly reduces IT costs. - DIRECTOR OF IT50M-1B USDManufacturingReview Source
Proven Security Meets Approval While Complex Setup Impacts Enterprise Rollout
Product instills security and trus with technical capabilities, but is challenging to implement in the enterprise, on user workstations and mobile phones.



