Introducing G2.ai, the future of software buying.Try now

Best Multi-Factor Authentication (MFA) Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Multi-factor authentication (MFA) software secures users’ accounts by requiring them to prove their identity in two or more ways before granting access to accounts, sensitive information, systems, or applications. In addition to a single authentication factor, such as inputting a username and password, users are prompted to provide a second authentication factor to validate who the user says they are. Examples of authentication factors include one-time passcodes (OTPs) for SMS, email, or phone call, software tokens, hardware tokens, which are commonly small thumb drives or keycards, mobile-push on a software application to a mobile device, biometric factors, and contextual or risk-based authentication.

Businesses use MFA tools for security purposes to confirm a user is who they say they are prior to accessing privileged information or applications. This software can help companies prevent internal theft or data loss, as well as external access from unapproved parties. MFA tools are traditionally used by businesses, but they can also be used by individuals hoping to improve security on their personal devices or online accounts.

Risk-based authentication software is a form of MFA, but achieves authentication through different means by taking into account factors such as the user’s geolocation, IP address, IP address reputation, time since last authentication, device posture, device management, and other factors to determine the user’s authentication and risk. Passwordless authentication software is a form of MFA as well, which eliminates passwords as an authentication factor, instead relying on additional factors to authenticate a user.

MFA software can be sold as a point solution, where it can be integrated with a business’ user accounts, or it can be sold as part of a compound solution, typically in identity products, such as workforce-based identity and access management (IAM) software or customer-based customer identity and access management (CIAM) solutions.

To qualify for inclusion in the Multi-Factor Authentication (MFA) category, a product must:

Utilize a secondary authentication method such as OTPs, mobile push, software token, hardware token, biometric factors, or more
Prompt authentication from a user
Allow for triggered MFA for new users and devices

Best Multi-Factor Authentication (MFA) Software At A Glance

Highest Performer:
Easiest to Use:
Best Free Software:
Top Trending:
Show LessShow More
Easiest to Use:
Best Free Software:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
257 Listings in Multi-Factor Authentication (MFA) Available
(498)4.6 out of 5
1st Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Google Authenticator is a multifactor app for mobile devices.

    Users
    • Software Engineer
    • Owner
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 45% Small-Business
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Google Authenticator Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    30
    Security
    20
    2FA Security
    15
    Time-Saving
    8
    Easy Setup
    6
    Cons
    Password Management
    5
    Storage Limitations
    5
    Inadequate Security
    4
    Login Issues
    3
    Slow Loading
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Authenticator features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Multi-Device Sync
    Average: 8.9
    9.5
    Easy Setup
    Average: 9.0
    8.6
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,750,646 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    310,061 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Google Authenticator is a multifactor app for mobile devices.

Users
  • Software Engineer
  • Owner
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 45% Small-Business
  • 36% Mid-Market
Google Authenticator Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
30
Security
20
2FA Security
15
Time-Saving
8
Easy Setup
6
Cons
Password Management
5
Storage Limitations
5
Inadequate Security
4
Login Issues
3
Slow Loading
3
Google Authenticator features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
8.8
Multi-Device Sync
Average: 8.9
9.5
Easy Setup
Average: 9.0
8.6
Backup
Average: 8.7
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,750,646 Twitter followers
LinkedIn® Page
www.linkedin.com
310,061 employees on LinkedIn®
Ownership
NASDAQ:GOOG
(792)4.5 out of 5
4th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

    Users
    • Software Engineer
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 38% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Entra ID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    115
    Security
    104
    Identity Management
    87
    Single Sign-On
    67
    Integrations
    60
    Cons
    Expensive
    49
    Integration Issues
    33
    Cost
    29
    Complexity
    26
    Missing Features
    24
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Entra ID features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.9
    Multi-Device Sync
    Average: 8.9
    8.9
    Easy Setup
    Average: 9.0
    8.6
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

Users
  • Software Engineer
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 38% Enterprise
  • 37% Mid-Market
Microsoft Entra ID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
115
Security
104
Identity Management
87
Single Sign-On
67
Integrations
60
Cons
Expensive
49
Integration Issues
33
Cost
29
Complexity
26
Missing Features
24
Microsoft Entra ID features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.0
8.9
Multi-Device Sync
Average: 8.9
8.9
Easy Setup
Average: 9.0
8.6
Backup
Average: 8.7
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(1,847)4.4 out of 5
Optimized for quick response
5th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:$4.25
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LastPass is a secure, cloud-based password manager that takes the hassle out of remembering and managing passwords. It works across all your devices, so you can log in faster and stay protected everyw

    Users
    • Owner
    • CEO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 63% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • LastPass Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    382
    Password Management
    257
    Security
    228
    Autofill Feature
    185
    Easy Access
    160
    Cons
    Password Management
    169
    Autofill Issues
    138
    Login Issues
    108
    Password Issues
    57
    Browser Extension Issues
    52
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LastPass features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.0
    9.1
    Multi-Device Sync
    Average: 8.9
    9.0
    Easy Setup
    Average: 9.0
    8.6
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LastPass
    Company Website
    Year Founded
    2008
    HQ Location
    Boston, Massachusetts
    Twitter
    @LastPass
    47,022 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    824 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LastPass is a secure, cloud-based password manager that takes the hassle out of remembering and managing passwords. It works across all your devices, so you can log in faster and stay protected everyw

Users
  • Owner
  • CEO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 63% Small-Business
  • 25% Mid-Market
LastPass Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
382
Password Management
257
Security
228
Autofill Feature
185
Easy Access
160
Cons
Password Management
169
Autofill Issues
138
Login Issues
108
Password Issues
57
Browser Extension Issues
52
LastPass features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.0
9.1
Multi-Device Sync
Average: 8.9
9.0
Easy Setup
Average: 9.0
8.6
Backup
Average: 8.7
Seller Details
Seller
LastPass
Company Website
Year Founded
2008
HQ Location
Boston, Massachusetts
Twitter
@LastPass
47,022 Twitter followers
LinkedIn® Page
www.linkedin.com
824 employees on LinkedIn®
(3,077)4.5 out of 5
Optimized for quick response
9th Easiest To Use in Multi-Factor Authentication (MFA) software
View top Consulting Services for Salesforce Platform
Save to My Lists
Entry Level Price:$25 /user/month* (bil...
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Salesforce Platform is the leading low-code development platform that empowers your team to build and extend your Customer 360 with AI, automation, and data. With the Salesforce Platform, you can exec

    Users
    • Salesforce Developer
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Salesforce Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    798
    Features
    390
    Customizability
    377
    Customization
    349
    Customization Options
    332
    Cons
    Learning Curve
    271
    Complexity
    254
    Expensive
    237
    Missing Features
    220
    Difficult Learning
    204
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Salesforce Platform features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.0
    8.9
    Multi-Device Sync
    Average: 8.9
    8.8
    Easy Setup
    Average: 9.0
    9.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1999
    HQ Location
    San Francisco, CA
    Twitter
    @salesforce
    583,254 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    78,342 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Salesforce Platform is the leading low-code development platform that empowers your team to build and extend your Customer 360 with AI, automation, and data. With the Salesforce Platform, you can exec

Users
  • Salesforce Developer
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 36% Enterprise
Salesforce Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
798
Features
390
Customizability
377
Customization
349
Customization Options
332
Cons
Learning Curve
271
Complexity
254
Expensive
237
Missing Features
220
Difficult Learning
204
Salesforce Platform features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.0
8.9
Multi-Device Sync
Average: 8.9
8.8
Easy Setup
Average: 9.0
9.0
Backup
Average: 8.7
Seller Details
Company Website
Year Founded
1999
HQ Location
San Francisco, CA
Twitter
@salesforce
583,254 Twitter followers
LinkedIn® Page
www.linkedin.com
78,342 employees on LinkedIn®
(1,096)4.6 out of 5
Optimized for quick response
6th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
100% off
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Keeper Security is transforming cybersecurity for millions of individuals and thousands of organizations globally. Built with end-to-end encryption, Keeper's intuitive cybersecurity platform is truste

    Users
    • IT Manager
    • Owner
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 45% Small-Business
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Keeper Password Manager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    235
    Security
    169
    Password Management
    134
    Secure Sharing
    126
    Sharing Ease
    102
    Cons
    Password Management
    102
    Autofill Issues
    68
    Login Issues
    51
    Browser Extension Issues
    43
    Learning Curve
    41
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Keeper Password Manager features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.7
    Multi-Device Sync
    Average: 8.9
    8.8
    Easy Setup
    Average: 9.0
    8.2
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    Chicago, IL
    Twitter
    @keepersecurity
    18,974 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    497 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Keeper Security is transforming cybersecurity for millions of individuals and thousands of organizations globally. Built with end-to-end encryption, Keeper's intuitive cybersecurity platform is truste

Users
  • IT Manager
  • Owner
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 45% Small-Business
  • 40% Mid-Market
Keeper Password Manager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
235
Security
169
Password Management
134
Secure Sharing
126
Sharing Ease
102
Cons
Password Management
102
Autofill Issues
68
Login Issues
51
Browser Extension Issues
43
Learning Curve
41
Keeper Password Manager features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.0
8.7
Multi-Device Sync
Average: 8.9
8.8
Easy Setup
Average: 9.0
8.2
Backup
Average: 8.7
Seller Details
Company Website
Year Founded
2011
HQ Location
Chicago, IL
Twitter
@keepersecurity
18,974 Twitter followers
LinkedIn® Page
www.linkedin.com
497 employees on LinkedIn®
(560)4.5 out of 5
Optimized for quick response
3rd Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
20% off: $2.87 user / month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trusted by more than 9,000 businesses worldwide, NordPass is a password management tool that upholds the finest privacy and security standards for businesses. Unlock the ease of cybersecurity and b

    Users
    • CEO
    • CTO
    Industries
    • Information Technology and Services
    • Marketing and Advertising
    Market Segment
    • 74% Small-Business
    • 24% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NordPass Business Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    279
    Security
    170
    Sharing Ease
    158
    Password Management
    142
    Secure Sharing
    142
    Cons
    Password Management
    112
    Password Issues
    100
    Login Issues
    63
    Autofill Issues
    62
    Browser Extension Issues
    56
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NordPass Business features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Multi-Device Sync
    Average: 8.9
    8.9
    Easy Setup
    Average: 9.0
    8.5
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2012
    HQ Location
    Global
    Twitter
    @NordPass
    9,422 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,709 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trusted by more than 9,000 businesses worldwide, NordPass is a password management tool that upholds the finest privacy and security standards for businesses. Unlock the ease of cybersecurity and b

Users
  • CEO
  • CTO
Industries
  • Information Technology and Services
  • Marketing and Advertising
Market Segment
  • 74% Small-Business
  • 24% Mid-Market
NordPass Business Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
279
Security
170
Sharing Ease
158
Password Management
142
Secure Sharing
142
Cons
Password Management
112
Password Issues
100
Login Issues
63
Autofill Issues
62
Browser Extension Issues
56
NordPass Business features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.0
8.8
Multi-Device Sync
Average: 8.9
8.9
Easy Setup
Average: 9.0
8.5
Backup
Average: 8.7
Seller Details
Company Website
Year Founded
2012
HQ Location
Global
Twitter
@NordPass
9,422 Twitter followers
LinkedIn® Page
www.linkedin.com
1,709 employees on LinkedIn®
(408)4.5 out of 5
Optimized for quick response
2nd Easiest To Use in Multi-Factor Authentication (MFA) software
View top Consulting Services for Cisco Duo
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

    Users
    • Software Engineer
    • Consultant
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 44% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Duo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    71
    Authentication Ease
    52
    Security
    51
    Authentication
    48
    Easy Access
    36
    Cons
    Authentication Issues
    28
    Access Limitations
    19
    Login Issues
    18
    Notification Issues
    13
    Slow Performance
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Duo features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Multi-Device Sync
    Average: 8.9
    9.0
    Easy Setup
    Average: 9.0
    8.2
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Company Website
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

Users
  • Software Engineer
  • Consultant
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 44% Enterprise
  • 38% Mid-Market
Cisco Duo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
71
Authentication Ease
52
Security
51
Authentication
48
Easy Access
36
Cons
Authentication Issues
28
Access Limitations
19
Login Issues
18
Notification Issues
13
Slow Performance
12
Cisco Duo features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.0
8.8
Multi-Device Sync
Average: 8.9
9.0
Easy Setup
Average: 9.0
8.2
Backup
Average: 8.7
Seller Details
Seller
Cisco
Company Website
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
(1,389)4.7 out of 5
13th Easiest To Use in Multi-Factor Authentication (MFA) software
View top Consulting Services for 1Password
Save to My Lists
100% off: 0
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Most Used Enterprise Password Manager, trusted by over 150,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secu

    Users
    • Software Engineer
    • Owner
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • 1Password Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    118
    Security
    91
    Intuitive
    41
    Password Management
    41
    Secure Sharing
    38
    Cons
    Password Management
    51
    Authentication Issues
    27
    Login Issues
    23
    Autofill Issues
    20
    Process Complexity
    20
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 1Password features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Multi-Device Sync
    Average: 8.9
    9.4
    Easy Setup
    Average: 9.0
    8.9
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    1Password
    Company Website
    Year Founded
    2005
    HQ Location
    Ontario
    Twitter
    @1Password
    140,436 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,559 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Most Used Enterprise Password Manager, trusted by over 150,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secu

Users
  • Software Engineer
  • Owner
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 31% Mid-Market
1Password Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
118
Security
91
Intuitive
41
Password Management
41
Secure Sharing
38
Cons
Password Management
51
Authentication Issues
27
Login Issues
23
Autofill Issues
20
Process Complexity
20
1Password features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
9.2
Multi-Device Sync
Average: 8.9
9.4
Easy Setup
Average: 9.0
8.9
Backup
Average: 8.7
Seller Details
Seller
1Password
Company Website
Year Founded
2005
HQ Location
Ontario
Twitter
@1Password
140,436 Twitter followers
LinkedIn® Page
www.linkedin.com
2,559 employees on LinkedIn®
(25)4.8 out of 5
12th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Yubico is a modern cybersecurity company, focused on stopping cyber attacks in their tracks. Most attackers don’t break in—they log in. Companies often rely on legacy passwords and authenticator app

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Small-Business
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Yubico Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    6
    Ease of Use
    3
    Easy Setup
    3
    Secure Sharing
    3
    Setup Ease
    3
    Cons
    Limited Compatibility
    2
    Authentication Issues
    1
    Complex Setup
    1
    Difficult Setup
    1
    Expertise Required
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Yubico features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    7.7
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Yubico
    Company Website
    Year Founded
    2007
    HQ Location
    Santa Clara
    Twitter
    @Yubico
    39,297 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    544 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Yubico is a modern cybersecurity company, focused on stopping cyber attacks in their tracks. Most attackers don’t break in—they log in. Companies often rely on legacy passwords and authenticator app

Users
No information available
Industries
No information available
Market Segment
  • 36% Small-Business
  • 36% Enterprise
Yubico Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
6
Ease of Use
3
Easy Setup
3
Secure Sharing
3
Setup Ease
3
Cons
Limited Compatibility
2
Authentication Issues
1
Complex Setup
1
Difficult Setup
1
Expertise Required
1
Yubico features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
9.2
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
7.7
Backup
Average: 8.7
Seller Details
Seller
Yubico
Company Website
Year Founded
2007
HQ Location
Santa Clara
Twitter
@Yubico
39,297 Twitter followers
LinkedIn® Page
www.linkedin.com
544 employees on LinkedIn®
(203)4.3 out of 5
24th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and se

    Users
    • Software Engineer
    • Software Developer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 51% Small-Business
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Auth0 Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    19
    Ease of Use
    17
    Integrations
    16
    Authentication
    14
    Easy Integrations
    13
    Cons
    Expensive
    7
    Complex Setup
    5
    Cost
    4
    Difficult Learning
    4
    Customization Difficulties
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Auth0 features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Multi-Device Sync
    Average: 8.9
    9.3
    Easy Setup
    Average: 9.0
    9.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okta
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @okta
    42,497 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,292 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and se

Users
  • Software Engineer
  • Software Developer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 51% Small-Business
  • 27% Mid-Market
Auth0 Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
19
Ease of Use
17
Integrations
16
Authentication
14
Easy Integrations
13
Cons
Expensive
7
Complex Setup
5
Cost
4
Difficult Learning
4
Customization Difficulties
3
Auth0 features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 9.0
8.8
Multi-Device Sync
Average: 8.9
9.3
Easy Setup
Average: 9.0
9.0
Backup
Average: 8.7
Seller Details
Seller
Okta
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@okta
42,497 Twitter followers
LinkedIn® Page
www.linkedin.com
8,292 employees on LinkedIn®
(149)4.2 out of 5
Optimized for quick response
35th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:$1.71 / user, per month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 62% Enterprise
    • 39% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • IBM Verify CIAM is a tool designed for protecting digital customer identities and securing digital services, with features such as passwordless and biometric authentication, risk scoring, and customer consent and data security mechanisms.
    • Users frequently mention the enhanced security, customer experience, 24/7 support, personalized interaction, and the ability to easily integrate the tool with other systems, as well as its robust identity and access management solution and integration capabilities.
    • Reviewers mentioned the complex implementation process, outdated and non-user-friendly interface, slow responsiveness, and the need for deep technical knowledge for setup, as well as difficulties in monitoring access risks and the high cost of the platform.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Verify CIAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    40
    Ease of Use
    26
    Authentication
    24
    Features
    22
    Identity Management
    21
    Cons
    Complex Setup
    18
    Complexity
    16
    Difficult Learning
    16
    Complex Administration
    12
    Expensive
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Verify CIAM features and usability ratings that predict user satisfaction
    8.1
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Multi-Device Sync
    Average: 8.9
    7.9
    Easy Setup
    Average: 9.0
    8.6
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Company Website
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,764 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331,391 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 62% Enterprise
  • 39% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • IBM Verify CIAM is a tool designed for protecting digital customer identities and securing digital services, with features such as passwordless and biometric authentication, risk scoring, and customer consent and data security mechanisms.
  • Users frequently mention the enhanced security, customer experience, 24/7 support, personalized interaction, and the ability to easily integrate the tool with other systems, as well as its robust identity and access management solution and integration capabilities.
  • Reviewers mentioned the complex implementation process, outdated and non-user-friendly interface, slow responsiveness, and the need for deep technical knowledge for setup, as well as difficulties in monitoring access risks and the high cost of the platform.
IBM Verify CIAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
40
Ease of Use
26
Authentication
24
Features
22
Identity Management
21
Cons
Complex Setup
18
Complexity
16
Difficult Learning
16
Complex Administration
12
Expensive
12
IBM Verify CIAM features and usability ratings that predict user satisfaction
8.1
Has the product been a good partner in doing business?
Average: 9.0
8.3
Multi-Device Sync
Average: 8.9
7.9
Easy Setup
Average: 9.0
8.6
Backup
Average: 8.7
Seller Details
Seller
IBM
Company Website
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,764 Twitter followers
LinkedIn® Page
www.linkedin.com
331,391 employees on LinkedIn®
(43)4.3 out of 5
33rd Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Help prevent account takeovers from phishing attacks.

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 44% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Google Security Key Enforcement Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    13
    Ease of Use
    4
    2FA Security
    3
    Automation
    1
    Cloud Services
    1
    Cons
    Inadequate Security
    3
    Compatibility Issues
    2
    Security Risks
    2
    Authentication Issues
    1
    Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Security Key Enforcement features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    8.6
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,750,646 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    310,061 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Help prevent account takeovers from phishing attacks.

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 44% Small-Business
  • 35% Mid-Market
Google Security Key Enforcement Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
13
Ease of Use
4
2FA Security
3
Automation
1
Cloud Services
1
Cons
Inadequate Security
3
Compatibility Issues
2
Security Risks
2
Authentication Issues
1
Complexity
1
Google Security Key Enforcement features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
8.6
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,750,646 Twitter followers
LinkedIn® Page
www.linkedin.com
310,061 employees on LinkedIn®
Ownership
NASDAQ:GOOG
(285)4.4 out of 5
11th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:$6 /User /Month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin e

    Users
    • Account Manager
    Industries
    • Computer Software
    • Education Management
    Market Segment
    • 49% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OneLogin Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    11
    Single Sign-On
    10
    SSO (Single Sign-On)
    8
    Easy Access
    6
    Security
    6
    Cons
    Bugs
    4
    Authentication Issues
    3
    Connection Issues
    3
    Error Handling
    3
    Login Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OneLogin features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.5
    Multi-Device Sync
    Average: 8.9
    9.1
    Easy Setup
    Average: 9.0
    9.5
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Aliso Viejo, CA
    Twitter
    @OneIdentity
    7,945 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    616 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin e

Users
  • Account Manager
Industries
  • Computer Software
  • Education Management
Market Segment
  • 49% Mid-Market
  • 40% Enterprise
OneLogin Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
11
Single Sign-On
10
SSO (Single Sign-On)
8
Easy Access
6
Security
6
Cons
Bugs
4
Authentication Issues
3
Connection Issues
3
Error Handling
3
Login Issues
3
OneLogin features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
9.5
Multi-Device Sync
Average: 8.9
9.1
Easy Setup
Average: 9.0
9.5
Backup
Average: 8.7
Seller Details
HQ Location
Aliso Viejo, CA
Twitter
@OneIdentity
7,945 Twitter followers
LinkedIn® Page
www.linkedin.com
616 employees on LinkedIn®
(70)4.8 out of 5
Optimized for quick response
7th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Descope is a drag & drop customer authentication and identity management platform. Our no / low code CIAM solution helps organizations easily create and customize their entire user journey using v

    Users
    • CTO
    Industries
    • Computer Software
    • Computer & Network Security
    Market Segment
    • 89% Small-Business
    • 11% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Descope Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    39
    Customer Support
    35
    Easy Integrations
    27
    Implementation Ease
    25
    Authentication
    21
    Cons
    Missing Features
    11
    Poor Documentation
    7
    Difficult Learning
    5
    Lack of Information
    5
    Learning Curve
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Descope features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Multi-Device Sync
    Average: 8.9
    9.8
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Descope
    Company Website
    Year Founded
    2022
    HQ Location
    Los Altos, California
    Twitter
    @descopeinc
    511 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    86 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Descope is a drag & drop customer authentication and identity management platform. Our no / low code CIAM solution helps organizations easily create and customize their entire user journey using v

Users
  • CTO
Industries
  • Computer Software
  • Computer & Network Security
Market Segment
  • 89% Small-Business
  • 11% Mid-Market
Descope Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
39
Customer Support
35
Easy Integrations
27
Implementation Ease
25
Authentication
21
Cons
Missing Features
11
Poor Documentation
7
Difficult Learning
5
Lack of Information
5
Learning Curve
5
Descope features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 9.0
10.0
Multi-Device Sync
Average: 8.9
9.8
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Seller
Descope
Company Website
Year Founded
2022
HQ Location
Los Altos, California
Twitter
@descopeinc
511 Twitter followers
LinkedIn® Page
www.linkedin.com
86 employees on LinkedIn®
(123)4.3 out of 5
28th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AuthPoint MFA: designed to be fatigue-resistant with features like the phishing toggle that prevent a faulty user experience. With offline and online authentication methods available, you can easily e

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 50% Small-Business
    • 46% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • WatchGuard AuthPoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WatchGuard AuthPoint features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Multi-Device Sync
    Average: 8.9
    8.8
    Easy Setup
    Average: 9.0
    8.8
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1996
    HQ Location
    Seatle, WA
    Twitter
    @watchguard
    19,681 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,191 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AuthPoint MFA: designed to be fatigue-resistant with features like the phishing toggle that prevent a faulty user experience. With offline and online authentication methods available, you can easily e

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 50% Small-Business
  • 46% Mid-Market
WatchGuard AuthPoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Cons
This product has not yet received any negative sentiments.
WatchGuard AuthPoint features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.0
9.4
Multi-Device Sync
Average: 8.9
8.8
Easy Setup
Average: 9.0
8.8
Backup
Average: 8.7
Seller Details
Year Founded
1996
HQ Location
Seatle, WA
Twitter
@watchguard
19,681 Twitter followers
LinkedIn® Page
www.linkedin.com
1,191 employees on LinkedIn®
(108)4.4 out of 5
36th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ensure users have convenient, secure access—from any device, anywhere—to the applications they need, whether in the cloud or on-premises. RSA SecurID Access is an enterprise-grade multi-factor authent

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 68% Enterprise
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RSA SecureID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Security
    3
    Risk Assessment
    2
    Security
    2
    Access Control
    1
    Adaptability
    1
    Cons
    Data Security
    1
    Expensive
    1
    Integration Issues
    1
    Login Issues
    1
    Mobile Compatibility
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RSA SecureID features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    8.5
    Multi-Device Sync
    Average: 8.9
    9.0
    Easy Setup
    Average: 9.0
    7.4
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Bedford, MA
    Twitter
    @RSAsecurity
    112,051 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,762 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ensure users have convenient, secure access—from any device, anywhere—to the applications they need, whether in the cloud or on-premises. RSA SecurID Access is an enterprise-grade multi-factor authent

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 68% Enterprise
  • 27% Mid-Market
RSA SecureID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Security
3
Risk Assessment
2
Security
2
Access Control
1
Adaptability
1
Cons
Data Security
1
Expensive
1
Integration Issues
1
Login Issues
1
Mobile Compatibility
1
RSA SecureID features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
8.5
Multi-Device Sync
Average: 8.9
9.0
Easy Setup
Average: 9.0
7.4
Backup
Average: 8.7
Seller Details
HQ Location
Bedford, MA
Twitter
@RSAsecurity
112,051 Twitter followers
LinkedIn® Page
www.linkedin.com
2,762 employees on LinkedIn®
(17)4.8 out of 5
21st Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative age

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Silverfort features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Multi-Device Sync
    Average: 8.9
    8.6
    Easy Setup
    Average: 9.0
    5.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Tel Aviv, Israel
    Twitter
    @silverfort
    627 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    484 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative age

Users
No information available
Industries
No information available
Market Segment
  • 47% Small-Business
  • 35% Mid-Market
Silverfort features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
8.3
Multi-Device Sync
Average: 8.9
8.6
Easy Setup
Average: 9.0
5.0
Backup
Average: 8.7
Seller Details
Year Founded
2016
HQ Location
Tel Aviv, Israel
Twitter
@silverfort
627 Twitter followers
LinkedIn® Page
www.linkedin.com
484 employees on LinkedIn®
(68)4.6 out of 5
34th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Two-Factor Authentication smartphone app for consumers, simplest 2fa Rest API for developers and a strong authentication platform for the enterprise.

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 62% Small-Business
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Twilio Verify Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Use
    1
    Implementation Ease
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Twilio Verify features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Multi-Device Sync
    Average: 8.9
    9.5
    Easy Setup
    Average: 9.0
    9.3
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Twilio
    Year Founded
    2008
    HQ Location
    San Francisco, CA
    Twitter
    @twilio
    81,744 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,439 employees on LinkedIn®
    Ownership
    NYSE: TWLO
Product Description
How are these determined?Information
This description is provided by the seller.

Two-Factor Authentication smartphone app for consumers, simplest 2fa Rest API for developers and a strong authentication platform for the enterprise.

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 62% Small-Business
  • 32% Mid-Market
Twilio Verify Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Use
1
Implementation Ease
1
Cons
This product has not yet received any negative sentiments.
Twilio Verify features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
9.4
Multi-Device Sync
Average: 8.9
9.5
Easy Setup
Average: 9.0
9.3
Backup
Average: 8.7
Seller Details
Seller
Twilio
Year Founded
2008
HQ Location
San Francisco, CA
Twitter
@twilio
81,744 Twitter followers
LinkedIn® Page
www.linkedin.com
6,439 employees on LinkedIn®
Ownership
NYSE: TWLO
(18)4.6 out of 5
17th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:$3.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HYPR, the leader in passwordless identity assurance, delivers the industry's most comprehensive end-to-end identity security for your workforce and customers. By unifying phishing-resistant passwor

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 56% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • HYPR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Customer Support
    7
    Customer Experience
    4
    Easy Access
    4
    Integrations
    4
    Cons
    Limited Access
    3
    Login Issues
    3
    System Errors
    3
    Account Management
    2
    Complexity
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HYPR features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.0
    9.1
    Multi-Device Sync
    Average: 8.9
    9.0
    Easy Setup
    Average: 9.0
    7.6
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    HYPR
    Company Website
    Year Founded
    2014
    HQ Location
    New York, NY
    Twitter
    @HyprCorp
    16,527 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    109 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HYPR, the leader in passwordless identity assurance, delivers the industry's most comprehensive end-to-end identity security for your workforce and customers. By unifying phishing-resistant passwor

Users
No information available
Industries
No information available
Market Segment
  • 56% Mid-Market
  • 33% Enterprise
HYPR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Customer Support
7
Customer Experience
4
Easy Access
4
Integrations
4
Cons
Limited Access
3
Login Issues
3
System Errors
3
Account Management
2
Complexity
2
HYPR features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.0
9.1
Multi-Device Sync
Average: 8.9
9.0
Easy Setup
Average: 9.0
7.6
Backup
Average: 8.7
Seller Details
Seller
HYPR
Company Website
Year Founded
2014
HQ Location
New York, NY
Twitter
@HyprCorp
16,527 Twitter followers
LinkedIn® Page
www.linkedin.com
109 employees on LinkedIn®
(101)4.5 out of 5
Optimized for quick response
20th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FusionAuth is a powerful customer identity and access management (CIAM) platform designed for developers, by developers. Headquartered in Denver, Colorado, FusionAuth was founded in 2016 to provide se

    Users
    • Product Manager
    Industries
    • Computer Software
    • Financial Services
    Market Segment
    • 50% Small-Business
    • 43% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FusionAuth Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    34
    Ease of Use
    33
    Easy Integrations
    30
    Integrations
    30
    Features
    27
    Cons
    Complexity
    13
    Difficult Learning
    12
    Complex Setup
    11
    Learning Curve
    10
    Customization Difficulties
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FusionAuth features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    7.8
    Multi-Device Sync
    Average: 8.9
    8.5
    Easy Setup
    Average: 9.0
    7.6
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    Broomfield, US
    Twitter
    @FusionAuth
    1,939 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    60 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FusionAuth is a powerful customer identity and access management (CIAM) platform designed for developers, by developers. Headquartered in Denver, Colorado, FusionAuth was founded in 2016 to provide se

Users
  • Product Manager
Industries
  • Computer Software
  • Financial Services
Market Segment
  • 50% Small-Business
  • 43% Mid-Market
FusionAuth Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
34
Ease of Use
33
Easy Integrations
30
Integrations
30
Features
27
Cons
Complexity
13
Difficult Learning
12
Complex Setup
11
Learning Curve
10
Customization Difficulties
9
FusionAuth features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
7.8
Multi-Device Sync
Average: 8.9
8.5
Easy Setup
Average: 9.0
7.6
Backup
Average: 8.7
Seller Details
Company Website
Year Founded
2009
HQ Location
Broomfield, US
Twitter
@FusionAuth
1,939 Twitter followers
LinkedIn® Page
www.linkedin.com
60 employees on LinkedIn®
(40)4.7 out of 5
15th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Developer tools and infrastructure to help every size of business succeed. The only fully integrated developer platform with to help you build, secure, and monetize production-scale products. Authe

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kinde Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    27
    Customer Support
    22
    Easy Setup
    15
    Pricing
    15
    Authentication
    14
    Cons
    Missing Features
    15
    Limited Features
    7
    Poor Documentation
    5
    Insufficient Information
    4
    Integration Issues
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kinde features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    10.0
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kinde
    Year Founded
    2021
    HQ Location
    Sydney, AU
    Twitter
    @HeyKinde
    7,754 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Developer tools and infrastructure to help every size of business succeed. The only fully integrated developer platform with to help you build, secure, and monetize production-scale products. Authe

Users
No information available
Industries
  • Computer Software
Market Segment
  • 100% Small-Business
Kinde Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
27
Customer Support
22
Easy Setup
15
Pricing
15
Authentication
14
Cons
Missing Features
15
Limited Features
7
Poor Documentation
5
Insufficient Information
4
Integration Issues
4
Kinde features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
10.0
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Seller
Kinde
Year Founded
2021
HQ Location
Sydney, AU
Twitter
@HeyKinde
7,754 Twitter followers
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
(106)4.4 out of 5
32nd Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:$3 Per User Per Month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ping Identity (NYSE: PING) builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 67% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ping Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Administration Management
    1
    Customer Management
    1
    Customer Support
    1
    Data Security
    1
    Cons
    Complex Administration
    2
    Complex Setup
    2
    Confusing Interface
    2
    Authentication Issues
    1
    Clunky Interface
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ping Identity features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.0
    7.7
    Multi-Device Sync
    Average: 8.9
    7.8
    Easy Setup
    Average: 9.0
    7.1
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,506 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,024 employees on LinkedIn®
    Phone
    1.303.468.2900
Product Description
How are these determined?Information
This description is provided by the seller.

Ping Identity (NYSE: PING) builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 67% Enterprise
  • 25% Mid-Market
Ping Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Administration Management
1
Customer Management
1
Customer Support
1
Data Security
1
Cons
Complex Administration
2
Complex Setup
2
Confusing Interface
2
Authentication Issues
1
Clunky Interface
1
Ping Identity features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.0
7.7
Multi-Device Sync
Average: 8.9
7.8
Easy Setup
Average: 9.0
7.1
Backup
Average: 8.7
Seller Details
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,506 Twitter followers
LinkedIn® Page
www.linkedin.com
2,024 employees on LinkedIn®
Phone
1.303.468.2900
(741)4.5 out of 5
Optimized for quick response
25th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:Pay As You Go
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Plivo’s cloud communication platform is a powerful, fast, scalable, and better option for customer engagement. Trusted by leading brands like IBM, MercadoLibre, OneLogin and Zomato, our API platform l

    Users
    • CEO
    • CTO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 78% Small-Business
    • 17% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Plivo is a platform that supports messaging and voice services in multiple countries, with API-driven scalability and global coverage.
    • Users like Plivo's competitive pricing, easy implementation and integration, high reliability, and excellent customer support, appreciating its affordability, feature richness, and the ability to handle high-volume messaging.
    • Reviewers experienced issues with inconsistent performance, poor communication skills from support, sudden price changes, lack of advanced analytics and intuitive interface, and compliance risks, with some finding the user dashboard and web portal functionality lacking.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Plivo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    26
    Customer Support
    19
    API Quality
    15
    Features
    14
    Pricing
    14
    Cons
    Poor Customer Support
    10
    Messaging Issues
    7
    Expensive
    5
    Limited Features
    5
    Call Issues
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Plivo features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.0
    7.5
    Multi-Device Sync
    Average: 8.9
    8.9
    Easy Setup
    Average: 9.0
    5.3
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Plivo
    Company Website
    Year Founded
    2011
    HQ Location
    Austin, TX
    Twitter
    @plivo
    12,766 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    235 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Plivo’s cloud communication platform is a powerful, fast, scalable, and better option for customer engagement. Trusted by leading brands like IBM, MercadoLibre, OneLogin and Zomato, our API platform l

Users
  • CEO
  • CTO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 78% Small-Business
  • 17% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Plivo is a platform that supports messaging and voice services in multiple countries, with API-driven scalability and global coverage.
  • Users like Plivo's competitive pricing, easy implementation and integration, high reliability, and excellent customer support, appreciating its affordability, feature richness, and the ability to handle high-volume messaging.
  • Reviewers experienced issues with inconsistent performance, poor communication skills from support, sudden price changes, lack of advanced analytics and intuitive interface, and compliance risks, with some finding the user dashboard and web portal functionality lacking.
Plivo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
26
Customer Support
19
API Quality
15
Features
14
Pricing
14
Cons
Poor Customer Support
10
Messaging Issues
7
Expensive
5
Limited Features
5
Call Issues
4
Plivo features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.0
7.5
Multi-Device Sync
Average: 8.9
8.9
Easy Setup
Average: 9.0
5.3
Backup
Average: 8.7
Seller Details
Seller
Plivo
Company Website
Year Founded
2011
HQ Location
Austin, TX
Twitter
@plivo
12,766 Twitter followers
LinkedIn® Page
www.linkedin.com
235 employees on LinkedIn®
(30)5.0 out of 5
8th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PropelAuth is the only authentication solution designed to help your company grow. Teams of all sizes are using PropelAuth to close Enterprise contracts with companies like Adobe, PWC, and Hubspot

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 93% Small-Business
    • 7% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PropelAuth Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    18
    Ease of Use
    18
    Easy Setup
    8
    Easy Integrations
    6
    Features
    6
    Cons
    Missing Features
    4
    Lack of Customization
    3
    Limited Customization
    3
    Customization Difficulties
    2
    Outdated Documentation
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PropelAuth features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    7.3
    Multi-Device Sync
    Average: 8.9
    9.8
    Easy Setup
    Average: 9.0
    8.1
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Redwood City, CA
    Twitter
    @PropelAuth
    409 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PropelAuth is the only authentication solution designed to help your company grow. Teams of all sizes are using PropelAuth to close Enterprise contracts with companies like Adobe, PWC, and Hubspot

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 93% Small-Business
  • 7% Mid-Market
PropelAuth Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
18
Ease of Use
18
Easy Setup
8
Easy Integrations
6
Features
6
Cons
Missing Features
4
Lack of Customization
3
Limited Customization
3
Customization Difficulties
2
Outdated Documentation
2
PropelAuth features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
7.3
Multi-Device Sync
Average: 8.9
9.8
Easy Setup
Average: 9.0
8.1
Backup
Average: 8.7
Seller Details
Year Founded
2021
HQ Location
Redwood City, CA
Twitter
@PropelAuth
409 Twitter followers
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
(107)4.4 out of 5
30th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:Starting at $2.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 48% Enterprise
    • 48% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Workforce Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    8
    Security
    7
    Ease of Use
    6
    Access Management
    5
    Access Control
    4
    Cons
    Timing Issues
    3
    Complexity
    2
    Complex Usability
    2
    Delayed Response
    2
    Difficult Learning
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Workforce Identity features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    9.2
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,416 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,051 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 48% Enterprise
  • 48% Mid-Market
CyberArk Workforce Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
8
Security
7
Ease of Use
6
Access Management
5
Access Control
4
Cons
Timing Issues
3
Complexity
2
Complex Usability
2
Delayed Response
2
Difficult Learning
2
CyberArk Workforce Identity features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
8.3
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
9.2
Backup
Average: 8.7
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,416 Twitter followers
LinkedIn® Page
www.linkedin.com
4,051 employees on LinkedIn®
Ownership
NASDAQ:CYBR
(338)4.9 out of 5
26th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Frontegg is the only solution that provides robust and scalable user management infrastructure for B2B SaaS, handling the full user journey, from signup to subscription. The platform is multi-tenant a

    Users
    • Software Engineer
    • CTO
    Industries
    • Computer Software
    • Computer & Network Security
    Market Segment
    • 55% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Frontegg Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    37
    Customer Support
    28
    Features
    25
    Easy Integrations
    24
    Integrations
    22
    Cons
    Missing Features
    11
    Poor Documentation
    10
    Integration Issues
    9
    Limited Customization
    8
    Lack of Information
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Frontegg features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Multi-Device Sync
    Average: 8.9
    9.4
    Easy Setup
    Average: 9.0
    9.4
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Mountain View, California, United States
    Twitter
    @FronteggForSaaS
    429 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    76 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Frontegg is the only solution that provides robust and scalable user management infrastructure for B2B SaaS, handling the full user journey, from signup to subscription. The platform is multi-tenant a

Users
  • Software Engineer
  • CTO
Industries
  • Computer Software
  • Computer & Network Security
Market Segment
  • 55% Small-Business
  • 33% Mid-Market
Frontegg Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
37
Customer Support
28
Features
25
Easy Integrations
24
Integrations
22
Cons
Missing Features
11
Poor Documentation
10
Integration Issues
9
Limited Customization
8
Lack of Information
7
Frontegg features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.0
9.4
Multi-Device Sync
Average: 8.9
9.4
Easy Setup
Average: 9.0
9.4
Backup
Average: 8.7
Seller Details
Company Website
Year Founded
2019
HQ Location
Mountain View, California, United States
Twitter
@FronteggForSaaS
429 Twitter followers
LinkedIn® Page
www.linkedin.com
76 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Thales’ SafeNet Trusted Access is a cloud-based Access Management and Authentication Service. It ensures that no user is a target by allowing you to expand authentication to all users and apps with di

    Users
    No information available
    Industries
    • Computer Networking
    Market Segment
    • 68% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Thales SafeNet Trusted Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Administration Management
    1
    Customer Support
    1
    Customizability
    1
    Customization
    1
    Features
    1
    Cons
    Integration Issues
    1
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Thales SafeNet Trusted Access features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Multi-Device Sync
    Average: 8.9
    8.9
    Easy Setup
    Average: 9.0
    9.4
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin, Texas
    Twitter
    @ThalesCloudSec
    6,798 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    941 employees on LinkedIn®
    Ownership
    EPA:HO
    Total Revenue (USD mm)
    $15,854
Product Description
How are these determined?Information
This description is provided by the seller.

Thales’ SafeNet Trusted Access is a cloud-based Access Management and Authentication Service. It ensures that no user is a target by allowing you to expand authentication to all users and apps with di

Users
No information available
Industries
  • Computer Networking
Market Segment
  • 68% Enterprise
  • 25% Mid-Market
Thales SafeNet Trusted Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Administration Management
1
Customer Support
1
Customizability
1
Customization
1
Features
1
Cons
Integration Issues
1
Poor Customer Support
1
Thales SafeNet Trusted Access features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
9.2
Multi-Device Sync
Average: 8.9
8.9
Easy Setup
Average: 9.0
9.4
Backup
Average: 8.7
Seller Details
HQ Location
Austin, Texas
Twitter
@ThalesCloudSec
6,798 Twitter followers
LinkedIn® Page
www.linkedin.com
941 employees on LinkedIn®
Ownership
EPA:HO
Total Revenue (USD mm)
$15,854
(102)4.5 out of 5
14th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Socure’s patented machine learning platform powers an elevated standard for seamless CIP/KYC compliance, fraud detection, ID document verification, and bank account ownership validation through a purp

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 52% Mid-Market
    • 32% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Socure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Customer Support
    3
    Detection Efficiency
    3
    Efficiency
    3
    ID Verification
    3
    Cons
    False Positives
    2
    Lack of Clarity
    2
    Missing Features
    2
    Account Management
    1
    Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Socure features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Socure
    Year Founded
    2012
    HQ Location
    Incline Village, Nevada
    LinkedIn® Page
    www.linkedin.com
    439 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Socure’s patented machine learning platform powers an elevated standard for seamless CIP/KYC compliance, fraud detection, ID document verification, and bank account ownership validation through a purp

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 52% Mid-Market
  • 32% Small-Business
Socure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Customer Support
3
Detection Efficiency
3
Efficiency
3
ID Verification
3
Cons
False Positives
2
Lack of Clarity
2
Missing Features
2
Account Management
1
Complexity
1
Socure features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Socure
Year Founded
2012
HQ Location
Incline Village, Nevada
LinkedIn® Page
www.linkedin.com
439 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Security and great experiences needn’t be mutually exclusive. You can give your customers both with Entersekt’s innovative authentication technology, trusted by over 100 financial institutions in more

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 67% Mid-Market
    • 42% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Entersekt Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Management
    1
    Customer Support
    1
    Easy Integrations
    1
    Fraud Prevention
    1
    Reliability
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Entersekt features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    9.6
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Entersekt
    Year Founded
    2008
    HQ Location
    Atlanta, US
    Twitter
    @Entersekt
    999 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    255 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Security and great experiences needn’t be mutually exclusive. You can give your customers both with Entersekt’s innovative authentication technology, trusted by over 100 financial institutions in more

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 67% Mid-Market
  • 42% Enterprise
Entersekt Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Management
1
Customer Support
1
Easy Integrations
1
Fraud Prevention
1
Reliability
1
Cons
This product has not yet received any negative sentiments.
Entersekt features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
9.2
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
9.6
Backup
Average: 8.7
Seller Details
Seller
Entersekt
Year Founded
2008
HQ Location
Atlanta, US
Twitter
@Entersekt
999 Twitter followers
LinkedIn® Page
www.linkedin.com
255 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Over 180 Customers and 170.000 Employees trust ProID Workforce Identity platform that provides a secure, passwordless and biometric-based digital identity management. It covers: • Multi-Factor Aut

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 56% Mid-Market
    • 41% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ProID Workforce Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    18
    Ease of Use
    13
    Easy Setup
    11
    Customer Support
    10
    Easy Access
    8
    Cons
    Complex Implementation
    2
    Complex Setup
    2
    Complexity
    1
    Delay Issues
    1
    Difficult Integration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ProID Workforce Identity features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    9.3
    Multi-Device Sync
    Average: 8.9
    9.0
    Easy Setup
    Average: 9.0
    9.4
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    MONET+
    Year Founded
    1996
    HQ Location
    Zlín, Zlínský kraj
    LinkedIn® Page
    www.linkedin.com
    231 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Over 180 Customers and 170.000 Employees trust ProID Workforce Identity platform that provides a secure, passwordless and biometric-based digital identity management. It covers: • Multi-Factor Aut

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 56% Mid-Market
  • 41% Small-Business
ProID Workforce Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
18
Ease of Use
13
Easy Setup
11
Customer Support
10
Easy Access
8
Cons
Complex Implementation
2
Complex Setup
2
Complexity
1
Delay Issues
1
Difficult Integration
1
ProID Workforce Identity features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
9.3
Multi-Device Sync
Average: 8.9
9.0
Easy Setup
Average: 9.0
9.4
Backup
Average: 8.7
Seller Details
Seller
MONET+
Year Founded
1996
HQ Location
Zlín, Zlínský kraj
LinkedIn® Page
www.linkedin.com
231 employees on LinkedIn®
(40)4.9 out of 5
10th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:$3.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proximity MFA for shared workstations. MFA for Shared Computers is a cutting-edge security solution designed to enhance user authentication and access control in environments where multiple users shar

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Electrical/Electronic Manufacturing
    Market Segment
    • 43% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • GateKeeper Proximity Authentication Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    14
    Security
    11
    Customer Support
    8
    Implementation Ease
    8
    Convenience
    6
    Cons
    Authentication Issues
    2
    Difficult Learning
    2
    Limited Compatibility
    2
    App Issues
    1
    Data Security
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GateKeeper Proximity Authentication features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 9.0
    9.3
    Multi-Device Sync
    Average: 8.9
    9.7
    Easy Setup
    Average: 9.0
    8.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    College Park, Maryland
    Twitter
    @gkaccess
    2,026 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    23 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Proximity MFA for shared workstations. MFA for Shared Computers is a cutting-edge security solution designed to enhance user authentication and access control in environments where multiple users shar

Users
No information available
Industries
  • Hospital & Health Care
  • Electrical/Electronic Manufacturing
Market Segment
  • 43% Small-Business
  • 35% Mid-Market
GateKeeper Proximity Authentication Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
14
Security
11
Customer Support
8
Implementation Ease
8
Convenience
6
Cons
Authentication Issues
2
Difficult Learning
2
Limited Compatibility
2
App Issues
1
Data Security
1
GateKeeper Proximity Authentication features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 9.0
9.3
Multi-Device Sync
Average: 8.9
9.7
Easy Setup
Average: 9.0
8.0
Backup
Average: 8.7
Seller Details
Company Website
Year Founded
2015
HQ Location
College Park, Maryland
Twitter
@gkaccess
2,026 Twitter followers
LinkedIn® Page
www.linkedin.com
23 employees on LinkedIn®
(16)4.8 out of 5
22nd Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protectimus Limited creates reliable products for organizing multifactor authentication in companies of all sizes — from startups to large corporations. The Protectimus lineup includes plugins for q

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Protectimus Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    2FA Security
    1
    Ease of Use
    1
    Easy Setup
    1
    Secure Sharing
    1
    Security
    1
    Cons
    Complexity
    1
    Poor Customer Support
    1
    Update Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Protectimus features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Multi-Device Sync
    Average: 8.9
    9.0
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Dublin, IE
    Twitter
    @Protectimus
    2,839 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    36 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Protectimus Limited creates reliable products for organizing multifactor authentication in companies of all sizes — from startups to large corporations. The Protectimus lineup includes plugins for q

Users
No information available
Industries
No information available
Market Segment
  • 75% Small-Business
  • 25% Mid-Market
Protectimus Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
2FA Security
1
Ease of Use
1
Easy Setup
1
Secure Sharing
1
Security
1
Cons
Complexity
1
Poor Customer Support
1
Update Issues
1
Protectimus features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
10.0
Multi-Device Sync
Average: 8.9
9.0
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Year Founded
2013
HQ Location
Dublin, IE
Twitter
@Protectimus
2,839 Twitter followers
LinkedIn® Page
www.linkedin.com
36 employees on LinkedIn®
(57)4.4 out of 5
Optimized for quick response
18th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:$1.50
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PortalGuard is a single, unified Identity and Access Management (IAM) platform designed to help organizations streamline their security processes while enhancing user experience. This comprehensive so

    Users
    No information available
    Industries
    • Higher Education
    • Education Management
    Market Segment
    • 56% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PortalGuard Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    19
    Customer Support
    13
    Easy Setup
    11
    Security
    11
    Reliability
    10
    Cons
    Inconvenience
    4
    Limited Customization
    4
    Limited Features
    4
    Compatibility Issues
    3
    Complexity
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PortalGuard features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.0
    7.7
    Multi-Device Sync
    Average: 8.9
    8.5
    Easy Setup
    Average: 9.0
    7.2
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BIO-key
    Company Website
    Year Founded
    1993
    HQ Location
    Wall, NJ
    Twitter
    @BIOkeyIntl
    1,476 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    70 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PortalGuard is a single, unified Identity and Access Management (IAM) platform designed to help organizations streamline their security processes while enhancing user experience. This comprehensive so

Users
No information available
Industries
  • Higher Education
  • Education Management
Market Segment
  • 56% Mid-Market
  • 40% Enterprise
PortalGuard Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
19
Customer Support
13
Easy Setup
11
Security
11
Reliability
10
Cons
Inconvenience
4
Limited Customization
4
Limited Features
4
Compatibility Issues
3
Complexity
3
PortalGuard features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.0
7.7
Multi-Device Sync
Average: 8.9
8.5
Easy Setup
Average: 9.0
7.2
Backup
Average: 8.7
Seller Details
Seller
BIO-key
Company Website
Year Founded
1993
HQ Location
Wall, NJ
Twitter
@BIOkeyIntl
1,476 Twitter followers
LinkedIn® Page
www.linkedin.com
70 employees on LinkedIn®
(42)4.8 out of 5
16th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:$1.88
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IDEE GmbH is the German technology vendor transforming the landscape of digital authentication. AuthN by IDEE, introduces MFA 2.0-a next generation phishproof, same-device multi-factor authentication

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AuthN by IDEE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Security
    6
    Customer Support
    4
    Setup Ease
    4
    Easy Integrations
    3
    Cons
    Access Restrictions
    1
    Authentication Issues
    1
    Complexity
    1
    Confusing Interface
    1
    Difficult Learning
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AuthN by IDEE features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 9.0
    8.7
    Multi-Device Sync
    Average: 8.9
    9.8
    Easy Setup
    Average: 9.0
    7.9
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IDEE GmbH
    Year Founded
    2015
    HQ Location
    München, Bayern
    Twitter
    @authnidee
    9 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IDEE GmbH is the German technology vendor transforming the landscape of digital authentication. AuthN by IDEE, introduces MFA 2.0-a next generation phishproof, same-device multi-factor authentication

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 31% Mid-Market
AuthN by IDEE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Security
6
Customer Support
4
Setup Ease
4
Easy Integrations
3
Cons
Access Restrictions
1
Authentication Issues
1
Complexity
1
Confusing Interface
1
Difficult Learning
1
AuthN by IDEE features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 9.0
8.7
Multi-Device Sync
Average: 8.9
9.8
Easy Setup
Average: 9.0
7.9
Backup
Average: 8.7
Seller Details
Seller
IDEE GmbH
Year Founded
2015
HQ Location
München, Bayern
Twitter
@authnidee
9 Twitter followers
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®
(28)4.7 out of 5
19th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secret Double Octopus is the passwordless authentication solution for the enterprise. We liberate end-users and security teams from the burden of passwords with the simplicity and security of strong p

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 68% Small-Business
    • 18% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Secret Double Octopus features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    9.3
    Multi-Device Sync
    Average: 8.9
    8.1
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Tel-Aviv, Tel-Aviv
    Twitter
    @double_octopus
    957 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    39 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secret Double Octopus is the passwordless authentication solution for the enterprise. We liberate end-users and security teams from the burden of passwords with the simplicity and security of strong p

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 68% Small-Business
  • 18% Mid-Market
Secret Double Octopus features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
9.3
Multi-Device Sync
Average: 8.9
8.1
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Year Founded
2015
HQ Location
Tel-Aviv, Tel-Aviv
Twitter
@double_octopus
957 Twitter followers
LinkedIn® Page
www.linkedin.com
39 employees on LinkedIn®
Entry Level Price:$3.00
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 74% Enterprise
    • 18% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PingID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Security
    6
    Biometric Authentication
    5
    Implementation Ease
    3
    2FA Security
    2
    Cons
    Authentication Issues
    3
    Login Issues
    3
    Notification Issues
    3
    Delay Issues
    2
    Complex Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PingID features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.0
    9.1
    Multi-Device Sync
    Average: 8.9
    9.2
    Easy Setup
    Average: 9.0
    8.3
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,506 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,024 employees on LinkedIn®
    Phone
    1.303.468.2900
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 74% Enterprise
  • 18% Small-Business
PingID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Security
6
Biometric Authentication
5
Implementation Ease
3
2FA Security
2
Cons
Authentication Issues
3
Login Issues
3
Notification Issues
3
Delay Issues
2
Complex Setup
1
PingID features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.0
9.1
Multi-Device Sync
Average: 8.9
9.2
Easy Setup
Average: 9.0
8.3
Backup
Average: 8.7
Seller Details
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,506 Twitter followers
LinkedIn® Page
www.linkedin.com
2,024 employees on LinkedIn®
Phone
1.303.468.2900
(45)4.8 out of 5
27th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    InstaSafe is redefining the challenge of secure access to modern networks by leveraging Zero Trust principles with its security solutions, that ensure seamless access to cloud applications, SAP applic

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 53% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Instasafe ZTAA Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Cloud Services
    2
    Customer Support
    2
    Easy Integrations
    2
    Security
    2
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Instasafe ZTAA features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Multi-Device Sync
    Average: 8.9
    8.8
    Easy Setup
    Average: 9.0
    8.6
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    San Francisco, Walnut, CA
    Twitter
    @InstaSafe
    727 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

InstaSafe is redefining the challenge of secure access to modern networks by leveraging Zero Trust principles with its security solutions, that ensure seamless access to cloud applications, SAP applic

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 53% Mid-Market
  • 31% Enterprise
Instasafe ZTAA Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Cloud Services
2
Customer Support
2
Easy Integrations
2
Security
2
Cons
This product has not yet received any negative sentiments.
Instasafe ZTAA features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.0
9.2
Multi-Device Sync
Average: 8.9
8.8
Easy Setup
Average: 9.0
8.6
Backup
Average: 8.7
Seller Details
Year Founded
2012
HQ Location
San Francisco, Walnut, CA
Twitter
@InstaSafe
727 Twitter followers
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®
(138)4.4 out of 5
31st Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Uniqkey: Protect every login. Access with confidence. Uniqkey is Europe’s trusted password and access management platform - purpose-built for companies that demand security, simplicity, and control

    Users
    No information available
    Industries
    • Marketing and Advertising
    • Information Technology and Services
    Market Segment
    • 61% Small-Business
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Uniqkey Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    10
    Security
    6
    Customer Support
    4
    Easy Access
    4
    Easy Setup
    4
    Cons
    Login Issues
    7
    Password Issues
    6
    Password Management
    5
    Slow Performance
    4
    Access Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Uniqkey features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.0
    8.7
    Multi-Device Sync
    Average: 8.9
    8.7
    Easy Setup
    Average: 9.0
    7.9
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Uniqkey
    Year Founded
    2017
    HQ Location
    Herlev, Hovedstaden
    Twitter
    @uniqkeyofficial
    258 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Uniqkey: Protect every login. Access with confidence. Uniqkey is Europe’s trusted password and access management platform - purpose-built for companies that demand security, simplicity, and control

Users
No information available
Industries
  • Marketing and Advertising
  • Information Technology and Services
Market Segment
  • 61% Small-Business
  • 38% Mid-Market
Uniqkey Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
10
Security
6
Customer Support
4
Easy Access
4
Easy Setup
4
Cons
Login Issues
7
Password Issues
6
Password Management
5
Slow Performance
4
Access Issues
2
Uniqkey features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.0
8.7
Multi-Device Sync
Average: 8.9
8.7
Easy Setup
Average: 9.0
7.9
Backup
Average: 8.7
Seller Details
Seller
Uniqkey
Year Founded
2017
HQ Location
Herlev, Hovedstaden
Twitter
@uniqkeyofficial
258 Twitter followers
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®
(29)4.4 out of 5
29th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

    Users
    No information available
    Industries
    • Hospital & Health Care
    Market Segment
    • 141% Mid-Market
    • 66% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureAuth: Workforce IAM features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Multi-Device Sync
    Average: 8.9
    8.3
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Irvine, CA
    Twitter
    @SecureAuth
    8,707 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    154 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

Users
No information available
Industries
  • Hospital & Health Care
Market Segment
  • 141% Mid-Market
  • 66% Small-Business
SecureAuth: Workforce IAM features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.0
10.0
Multi-Device Sync
Average: 8.9
8.3
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Company Website
Year Founded
2005
HQ Location
Irvine, CA
Twitter
@SecureAuth
8,707 Twitter followers
LinkedIn® Page
www.linkedin.com
154 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Azure ExpressRoute lets you extend your on-premises networks into the Microsoft cloud over a private connection facilitated by a connectivity provider. ExpressRoute allows you to establish connections

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Enterprise
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Azure ExpressRoute features and usability ratings that predict user satisfaction
    7.5
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Azure ExpressRoute lets you extend your on-premises networks into the Microsoft cloud over a private connection facilitated by a connectivity provider. ExpressRoute allows you to establish connections

Users
No information available
Industries
No information available
Market Segment
  • 38% Enterprise
  • 31% Mid-Market
Azure ExpressRoute features and usability ratings that predict user satisfaction
7.5
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
Entry Level Price:$2.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The OptimalCloud from Optimal IdM is a scalable and affordable Identity and Access Management (IAM) solution built for the security and usability needs of small, mid-sized and enterprise organizations

    Users
    No information available
    Industries
    • Consumer Goods
    • Information Technology and Services
    Market Segment
    • 48% Mid-Market
    • 39% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OptimalCloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Security
    10
    Authentication
    9
    Single Sign-On
    8
    SSO (Single Sign-On)
    8
    Cons
    Authentication Issues
    1
    Complexity
    1
    Delayed Response
    1
    Delay Issues
    1
    Difficult Integration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OptimalCloud features and usability ratings that predict user satisfaction
    8.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    8.3
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Lutz, FL
    Twitter
    @Optimal_IdM
    460 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The OptimalCloud from Optimal IdM is a scalable and affordable Identity and Access Management (IAM) solution built for the security and usability needs of small, mid-sized and enterprise organizations

Users
No information available
Industries
  • Consumer Goods
  • Information Technology and Services
Market Segment
  • 48% Mid-Market
  • 39% Small-Business
OptimalCloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Security
10
Authentication
9
Single Sign-On
8
SSO (Single Sign-On)
8
Cons
Authentication Issues
1
Complexity
1
Delayed Response
1
Delay Issues
1
Difficult Integration
1
OptimalCloud features and usability ratings that predict user satisfaction
8.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
8.3
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Year Founded
2005
HQ Location
Lutz, FL
Twitter
@Optimal_IdM
460 Twitter followers
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
(24)4.6 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trusted by 1,000+ leading companies to reduce fraud and improve consumer experiences, Prove is the world’s most accurate identity verification and authentication platform. Prove is the modern way f

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 38% Small-Business
    • 38% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Prove Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Identity Management
    1
    Identity Verification
    1
    KYC Product
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Prove features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    7.5
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Prove
    Company Website
    Year Founded
    2008
    HQ Location
    New York , New York
    Twitter
    @ProveIdentity
    2,662 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    521 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trusted by 1,000+ leading companies to reduce fraud and improve consumer experiences, Prove is the world’s most accurate identity verification and authentication platform. Prove is the modern way f

Users
No information available
Industries
  • Financial Services
Market Segment
  • 38% Small-Business
  • 38% Enterprise
Prove Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Identity Management
1
Identity Verification
1
KYC Product
1
Cons
This product has not yet received any negative sentiments.
Prove features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
7.5
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Seller
Prove
Company Website
Year Founded
2008
HQ Location
New York , New York
Twitter
@ProveIdentity
2,662 Twitter followers
LinkedIn® Page
www.linkedin.com
521 employees on LinkedIn®
(44)4.6 out of 5
23rd Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RingCaptcha offers phone 2FA, OTP, SMS, voice API to help companies verify, engage, and retain end-users - 'Real Users, Real Contact'. With RingCaptcha, you integrate once with us and gain access to t

    Users
    No information available
    Industries
    • Internet
    Market Segment
    • 66% Small-Business
    • 23% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RingCaptcha features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    10.0
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    San Francisco, CA
    Twitter
    @ringcaptcha
    225 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RingCaptcha offers phone 2FA, OTP, SMS, voice API to help companies verify, engage, and retain end-users - 'Real Users, Real Contact'. With RingCaptcha, you integrate once with us and gain access to t

Users
No information available
Industries
  • Internet
Market Segment
  • 66% Small-Business
  • 23% Mid-Market
RingCaptcha features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
10.0
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Year Founded
2012
HQ Location
San Francisco, CA
Twitter
@ringcaptcha
225 Twitter followers
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stytch is the most powerful identity platform built for developers. With advanced features like device fingerprinting and account takeover-resistant authentication, Stytch provides the infrastructure

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 81% Small-Business
    • 16% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Stytch Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Administration Management
    1
    Authentication
    1
    Cloud Services
    1
    Coding Simplicity
    1
    Communication
    1
    Cons
    API Limitations
    1
    Limited Compatibility
    1
    Limited Language Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Stytch features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    8.9
    Multi-Device Sync
    Average: 8.9
    9.5
    Easy Setup
    Average: 9.0
    8.7
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Stytch
    Year Founded
    2020
    HQ Location
    San Francisco, CA
    Twitter
    @stytchauth
    2,909 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    71 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Stytch is the most powerful identity platform built for developers. With advanced features like device fingerprinting and account takeover-resistant authentication, Stytch provides the infrastructure

Users
No information available
Industries
  • Computer Software
Market Segment
  • 81% Small-Business
  • 16% Mid-Market
Stytch Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Administration Management
1
Authentication
1
Cloud Services
1
Coding Simplicity
1
Communication
1
Cons
API Limitations
1
Limited Compatibility
1
Limited Language Support
1
Stytch features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
8.9
Multi-Device Sync
Average: 8.9
9.5
Easy Setup
Average: 9.0
8.7
Backup
Average: 8.7
Seller Details
Seller
Stytch
Year Founded
2020
HQ Location
San Francisco, CA
Twitter
@stytchauth
2,909 Twitter followers
LinkedIn® Page
www.linkedin.com
71 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Simple, secure, No Click Access(tm) for workstations, applications, and critical workflows Imprivata Enterprise Access Management (EAM) enables digital access for clinicians with the tap of a badge, d

    Users
    No information available
    Industries
    • Hospital & Health Care
    Market Segment
    • 61% Enterprise
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Imprivata Enterprise Access Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Biometric Authentication
    1
    Ease of Use
    1
    Easy Setup
    1
    Cons
    Admin Limitations
    1
    Authentication Issues
    1
    Complex Setup
    1
    Verification Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Imprivata Enterprise Access Management features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Imprivata
    Year Founded
    2004
    HQ Location
    Waltham, MA
    Twitter
    @Imprivata
    10,559 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,207 employees on LinkedIn®
    Phone
    (781) 674-2700
Product Description
How are these determined?Information
This description is provided by the seller.

Simple, secure, No Click Access(tm) for workstations, applications, and critical workflows Imprivata Enterprise Access Management (EAM) enables digital access for clinicians with the tap of a badge, d

Users
No information available
Industries
  • Hospital & Health Care
Market Segment
  • 61% Enterprise
  • 39% Mid-Market
Imprivata Enterprise Access Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Biometric Authentication
1
Ease of Use
1
Easy Setup
1
Cons
Admin Limitations
1
Authentication Issues
1
Complex Setup
1
Verification Issues
1
Imprivata Enterprise Access Management features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Imprivata
Year Founded
2004
HQ Location
Waltham, MA
Twitter
@Imprivata
10,559 Twitter followers
LinkedIn® Page
www.linkedin.com
1,207 employees on LinkedIn®
Phone
(781) 674-2700
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With only a few lines of code, LoginID enables websites and apps to provide FIDO/FIDO2 certified strong customer authentication. Our open SaaS product is both easy to integrate and free to try. LoginI

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 41% Mid-Market
    • 38% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • LoginID Authentication Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Biometric Authentication
    3
    Ease of Use
    3
    2FA Security
    2
    Security
    2
    Autofill Feature
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LoginID Authentication Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Multi-Device Sync
    Average: 8.9
    9.4
    Easy Setup
    Average: 9.0
    8.3
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LoginID
    Year Founded
    2019
    HQ Location
    San Mateo, US
    Twitter
    @loginid_io
    247 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    39 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

With only a few lines of code, LoginID enables websites and apps to provide FIDO/FIDO2 certified strong customer authentication. Our open SaaS product is both easy to integrate and free to try. LoginI

Users
No information available
Industries
  • Computer Software
Market Segment
  • 41% Mid-Market
  • 38% Enterprise
LoginID Authentication Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Biometric Authentication
3
Ease of Use
3
2FA Security
2
Security
2
Autofill Feature
1
Cons
This product has not yet received any negative sentiments.
LoginID Authentication Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
9.4
Multi-Device Sync
Average: 8.9
9.4
Easy Setup
Average: 9.0
8.3
Backup
Average: 8.7
Seller Details
Seller
LoginID
Year Founded
2019
HQ Location
San Mateo, US
Twitter
@loginid_io
247 Twitter followers
LinkedIn® Page
www.linkedin.com
39 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BlackBerry UEM is a suite of solutions that all rely on the same foundation of security to secure the digital workplace. It keeps employees productive on any device, anywhere, while allowing your secu

    Users
    • Consultant
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 55% Enterprise
    • 27% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BlackBerry UEM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Security
    5
    Easy Access
    4
    File Sharing
    4
    Intuitive
    4
    Cons
    Expensive
    4
    Missing Features
    3
    Outdated Technology
    3
    Poor Interface Design
    3
    Poor UI
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlackBerry UEM features and usability ratings that predict user satisfaction
    7.8
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1984
    HQ Location
    Waterloo, Ontario
    Twitter
    @BlackBerry
    3,780,381 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,300 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BlackBerry UEM is a suite of solutions that all rely on the same foundation of security to secure the digital workplace. It keeps employees productive on any device, anywhere, while allowing your secu

Users
  • Consultant
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 55% Enterprise
  • 27% Small-Business
BlackBerry UEM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Security
5
Easy Access
4
File Sharing
4
Intuitive
4
Cons
Expensive
4
Missing Features
3
Outdated Technology
3
Poor Interface Design
3
Poor UI
3
BlackBerry UEM features and usability ratings that predict user satisfaction
7.8
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Company Website
Year Founded
1984
HQ Location
Waterloo, Ontario
Twitter
@BlackBerry
3,780,381 Twitter followers
LinkedIn® Page
www.linkedin.com
2,300 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VeridiumID is a software-only platform for biometric authentication that works in conjunction with a front-end mobile SDK that allows you to embed biometrics into your company's mobile app.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 42% Enterprise
    • 42% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veridium features and usability ratings that predict user satisfaction
    5.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.6
    Multi-Device Sync
    Average: 8.9
    9.8
    Easy Setup
    Average: 9.0
    9.6
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Veridium
    Year Founded
    2016
    HQ Location
    New York, New York
    Twitter
    @veridiumid
    2,071 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    44 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VeridiumID is a software-only platform for biometric authentication that works in conjunction with a front-end mobile SDK that allows you to embed biometrics into your company's mobile app.

Users
No information available
Industries
No information available
Market Segment
  • 42% Enterprise
  • 42% Small-Business
Veridium features and usability ratings that predict user satisfaction
5.8
Has the product been a good partner in doing business?
Average: 9.0
9.6
Multi-Device Sync
Average: 8.9
9.8
Easy Setup
Average: 9.0
9.6
Backup
Average: 8.7
Seller Details
Seller
Veridium
Year Founded
2016
HQ Location
New York, New York
Twitter
@veridiumid
2,071 Twitter followers
LinkedIn® Page
www.linkedin.com
44 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cybernexa, a global leader in information security, pioneers cutting-edge solutions such as CyLock MFA, SSO, SSPR, and PKI. Committed to innovation, our robust products address the dynamic security ne

    Users
    No information available
    Industries
    • Logistics and Supply Chain
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyLock Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    14
    Ease of Use
    12
    Reliability
    3
    Seamless Experience
    3
    2FA Security
    2
    Cons
    Authentication Issues
    1
    Configuration Difficulty
    1
    Delay Issues
    1
    Learning Curve
    1
    Setup Difficulties
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyLock features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cybernexa
    Year Founded
    2018
    HQ Location
    Chennai, Tamil Nadu
    Twitter
    @cybernexa
    4 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    31 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cybernexa, a global leader in information security, pioneers cutting-edge solutions such as CyLock MFA, SSO, SSPR, and PKI. Committed to innovation, our robust products address the dynamic security ne

Users
No information available
Industries
  • Logistics and Supply Chain
Market Segment
  • 100% Mid-Market
CyLock Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
14
Ease of Use
12
Reliability
3
Seamless Experience
3
2FA Security
2
Cons
Authentication Issues
1
Configuration Difficulty
1
Delay Issues
1
Learning Curve
1
Setup Difficulties
1
CyLock features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Cybernexa
Year Founded
2018
HQ Location
Chennai, Tamil Nadu
Twitter
@cybernexa
4 Twitter followers
LinkedIn® Page
www.linkedin.com
31 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Authenticator Plus is a highly rated two factor authentication app to protect multiple accounts.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Authenticator Plus Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    2FA Security
    3
    Security
    3
    Cross-platform
    1
    Customer Support
    1
    Cons
    Authentication Issues
    1
    Complexity
    1
    Delay Issues
    1
    Integration Issues
    1
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Authenticator Plus features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    9.6
    Multi-Device Sync
    Average: 8.9
    9.3
    Easy Setup
    Average: 9.0
    8.3
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mufri
    HQ Location
    N/A
    Twitter
    @mufriapps
    13 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Authenticator Plus is a highly rated two factor authentication app to protect multiple accounts.

Users
No information available
Industries
No information available
Market Segment
  • 33% Enterprise
  • 33% Mid-Market
Authenticator Plus Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
2FA Security
3
Security
3
Cross-platform
1
Customer Support
1
Cons
Authentication Issues
1
Complexity
1
Delay Issues
1
Integration Issues
1
Missing Features
1
Authenticator Plus features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
9.6
Multi-Device Sync
Average: 8.9
9.3
Easy Setup
Average: 9.0
8.3
Backup
Average: 8.7
Seller Details
Seller
Mufri
HQ Location
N/A
Twitter
@mufriapps
13 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AuthX provides you with secure & seamless log-in capabilities. We make logging in easy, enabling you to focus on your business. Our enterprise-class authentication solutions provide anywhere acces

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 30% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AuthX Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    2
    Single Sign-On
    2
    Solutions
    2
    SSO Security
    2
    SSO (Single Sign-On)
    2
    Cons
    Slow Speed
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AuthX features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    9.7
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AuthX
    Year Founded
    2012
    HQ Location
    Gaithersburg, Maryland
    Twitter
    @auth_x
    229 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    30 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AuthX provides you with secure & seamless log-in capabilities. We make logging in easy, enabling you to focus on your business. Our enterprise-class authentication solutions provide anywhere acces

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 30% Small-Business
AuthX Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
2
Single Sign-On
2
Solutions
2
SSO Security
2
SSO (Single Sign-On)
2
Cons
Slow Speed
1
AuthX features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
9.7
Backup
Average: 8.7
Seller Details
Seller
AuthX
Year Founded
2012
HQ Location
Gaithersburg, Maryland
Twitter
@auth_x
229 Twitter followers
LinkedIn® Page
www.linkedin.com
30 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Practice Protect is The #1 cyber security and password management platform for accountants worldwide. Take control over client logins & sensitive data in the cloud with password protection, login

    Users
    No information available
    Industries
    • Accounting
    Market Segment
    • 86% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PracticeProtect Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Security
    2
    Threat Detection
    2
    Access Control
    1
    Administration Management
    1
    Cons
    Account Setup Issues
    1
    Complex Setup
    1
    Difficult Setup
    1
    Setup Difficulties
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PracticeProtect features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Multi-Device Sync
    Average: 8.9
    5.0
    Easy Setup
    Average: 9.0
    8.3
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Denver, US
    Twitter
    @PracProtect
    631 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    65 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Practice Protect is The #1 cyber security and password management platform for accountants worldwide. Take control over client logins & sensitive data in the cloud with password protection, login

Users
No information available
Industries
  • Accounting
Market Segment
  • 86% Small-Business
PracticeProtect Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Security
2
Threat Detection
2
Access Control
1
Administration Management
1
Cons
Account Setup Issues
1
Complex Setup
1
Difficult Setup
1
Setup Difficulties
1
PracticeProtect features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
8.3
Multi-Device Sync
Average: 8.9
5.0
Easy Setup
Average: 9.0
8.3
Backup
Average: 8.7
Seller Details
HQ Location
Denver, US
Twitter
@PracProtect
631 Twitter followers
LinkedIn® Page
www.linkedin.com
65 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SAP CIAM for B2C is about creating relationships built on trust, security, and compliance. For the consumer, they receive an exceptional user experience, from frictionless authentication, engagement,

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 36% Enterprise
    • 24% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SAP Customer Identity and Access Management features and usability ratings that predict user satisfaction
    8.0
    Has the product been a good partner in doing business?
    Average: 9.0
    9.0
    Multi-Device Sync
    Average: 8.9
    7.9
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SAP
    Year Founded
    1972
    HQ Location
    Walldorf
    Twitter
    @SAP
    299,880 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    129,051 employees on LinkedIn®
    Ownership
    NYSE:SAP
Product Description
How are these determined?Information
This description is provided by the seller.

SAP CIAM for B2C is about creating relationships built on trust, security, and compliance. For the consumer, they receive an exceptional user experience, from frictionless authentication, engagement,

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 36% Enterprise
  • 24% Mid-Market
SAP Customer Identity and Access Management features and usability ratings that predict user satisfaction
8.0
Has the product been a good partner in doing business?
Average: 9.0
9.0
Multi-Device Sync
Average: 8.9
7.9
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Seller
SAP
Year Founded
1972
HQ Location
Walldorf
Twitter
@SAP
299,880 Twitter followers
LinkedIn® Page
www.linkedin.com
129,051 employees on LinkedIn®
Ownership
NYSE:SAP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HyID enables strong multi-factor authentication based on One-Time-Password, Bio-metrics parameters validations, Device Hardware ID & PKI. HyID protects the corporate resources from unchecked acces

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 70% Mid-Market
    • 30% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Accops HyID features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Multi-Device Sync
    Average: 8.9
    9.6
    Easy Setup
    Average: 9.0
    9.4
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Pune, Maharastra
    Twitter
    @accopsinc
    226 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    298 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HyID enables strong multi-factor authentication based on One-Time-Password, Bio-metrics parameters validations, Device Hardware ID & PKI. HyID protects the corporate resources from unchecked acces

Users
No information available
Industries
No information available
Market Segment
  • 70% Mid-Market
  • 30% Enterprise
Accops HyID features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
8.8
Multi-Device Sync
Average: 8.9
9.6
Easy Setup
Average: 9.0
9.4
Backup
Average: 8.7
Seller Details
Year Founded
2012
HQ Location
Pune, Maharastra
Twitter
@accopsinc
226 Twitter followers
LinkedIn® Page
www.linkedin.com
298 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    homebase offers an AI-enabled, GDPR compliant, random based, dynamic biometric authentication SaaS solution. It is based on face recognition protecting workstations' physical access while e.g. working

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 54% Small-Business
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HomeID features and usability ratings that predict user satisfaction
    0.0
    No information available
    9.2
    Multi-Device Sync
    Average: 8.9
    9.2
    Easy Setup
    Average: 9.0
    9.2
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Munich, DE
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

homebase offers an AI-enabled, GDPR compliant, random based, dynamic biometric authentication SaaS solution. It is based on face recognition protecting workstations' physical access while e.g. working

Users
No information available
Industries
No information available
Market Segment
  • 54% Small-Business
  • 38% Mid-Market
HomeID features and usability ratings that predict user satisfaction
0.0
No information available
9.2
Multi-Device Sync
Average: 8.9
9.2
Easy Setup
Average: 9.0
9.2
Backup
Average: 8.7
Seller Details
Year Founded
2020
HQ Location
Munich, DE
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
Entry Level Price:$0.02
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Are you tired of passwords? So are your customers. Give them the passwordless future they deserve – without building it yourself. Passage is a modern authentication service that enables you to impleme

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Passage by 1Password Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    11
    Authentication
    6
    Implementation Ease
    6
    Setup Ease
    6
    Easy Integrations
    5
    Cons
    Authentication Issues
    3
    Missing Features
    3
    Complexity
    2
    Confusing Interface
    2
    Integration Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Passage by 1Password features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Multi-Device Sync
    Average: 8.9
    9.4
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Passage
    Company Website
    HQ Location
    Austin, TX
    Twitter
    @PassageIdentity
    392 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Are you tired of passwords? So are your customers. Give them the passwordless future they deserve – without building it yourself. Passage is a modern authentication service that enables you to impleme

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Passage by 1Password Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
11
Authentication
6
Implementation Ease
6
Setup Ease
6
Easy Integrations
5
Cons
Authentication Issues
3
Missing Features
3
Complexity
2
Confusing Interface
2
Integration Issues
2
Passage by 1Password features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.0
9.4
Multi-Device Sync
Average: 8.9
9.4
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Seller
Passage
Company Website
HQ Location
Austin, TX
Twitter
@PassageIdentity
392 Twitter followers
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Rublon enables your workforce to securely access your organization's networks, servers and applications. Protect your data via easy-to-use multi-factor authentication and comply with data protection r

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Rublon Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Customer Support
    3
    Easy Setup
    2
    2FA Security
    1
    Administration Management
    1
    Cons
    Expensive
    1
    Unstable Connectivity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Rublon features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Multi-Device Sync
    Average: 8.9
    9.7
    Easy Setup
    Average: 9.0
    7.5
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rublon
    Year Founded
    2011
    HQ Location
    Zielona Gora, Poland
    Twitter
    @rublon
    162 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Rublon enables your workforce to securely access your organization's networks, servers and applications. Protect your data via easy-to-use multi-factor authentication and comply with data protection r

Users
No information available
Industries
No information available
Market Segment
  • 75% Small-Business
  • 25% Mid-Market
Rublon Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Customer Support
3
Easy Setup
2
2FA Security
1
Administration Management
1
Cons
Expensive
1
Unstable Connectivity
1
Rublon features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
9.2
Multi-Device Sync
Average: 8.9
9.7
Easy Setup
Average: 9.0
7.5
Backup
Average: 8.7
Seller Details
Seller
Rublon
Year Founded
2011
HQ Location
Zielona Gora, Poland
Twitter
@rublon
162 Twitter followers
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Authentify pioneered the use of the telephone as an authentication tool by synchronizing the use of the telephone's voice channel to an online event at the 2001 RSA Conference. Since that introduction

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Authentify Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Security
    3
    Easy Integrations
    2
    Easy Setup
    2
    Features
    2
    Cons
    Poor Customer Support
    3
    Inconvenience
    2
    Complexity
    1
    Data Privacy
    1
    Inadequate Security
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Authentify features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Multi-Device Sync
    Average: 8.9
    9.0
    Easy Setup
    Average: 9.0
    9.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Prove
    Year Founded
    2008
    HQ Location
    New York , New York
    Twitter
    @ProveIdentity
    2,662 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    521 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Authentify pioneered the use of the telephone as an authentication tool by synchronizing the use of the telephone's voice channel to an online event at the 2001 RSA Conference. Since that introduction

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 40% Enterprise
Authentify Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Security
3
Easy Integrations
2
Easy Setup
2
Features
2
Cons
Poor Customer Support
3
Inconvenience
2
Complexity
1
Data Privacy
1
Inadequate Security
1
Authentify features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
9.2
Multi-Device Sync
Average: 8.9
9.0
Easy Setup
Average: 9.0
9.0
Backup
Average: 8.7
Seller Details
Seller
Prove
Year Founded
2008
HQ Location
New York , New York
Twitter
@ProveIdentity
2,662 Twitter followers
LinkedIn® Page
www.linkedin.com
521 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    F5® BIG-IP® Access Policy Manager® (APM) is an access management proxy solution managing global access to user's network, cloud providers, applications, and application programming interfaces (APIs).

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 72% Enterprise
    • 22% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • F5 BIG-IP Access Policy Manager (APM) features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    6.7
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    8.3
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    F5
    HQ Location
    Seattle, Washington
    Twitter
    @F5Networks
    1,401 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,142 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

F5® BIG-IP® Access Policy Manager® (APM) is an access management proxy solution managing global access to user's network, cloud providers, applications, and application programming interfaces (APIs).

Users
No information available
Industries
No information available
Market Segment
  • 72% Enterprise
  • 22% Mid-Market
F5 BIG-IP Access Policy Manager (APM) features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
6.7
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
8.3
Backup
Average: 8.7
Seller Details
Seller
F5
HQ Location
Seattle, Washington
Twitter
@F5Networks
1,401 Twitter followers
LinkedIn® Page
www.linkedin.com
6,142 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Mid-Market
    • 35% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LogMeOnce features and usability ratings that predict user satisfaction
    5.8
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LogmeOnce
    Year Founded
    2011
    HQ Location
    McLean, VA
    Twitter
    @LogmeOnce
    9,588 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Mid-Market
  • 35% Enterprise
LogMeOnce features and usability ratings that predict user satisfaction
5.8
Has the product been a good partner in doing business?
Average: 9.0
10.0
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Seller
LogmeOnce
Year Founded
2011
HQ Location
McLean, VA
Twitter
@LogmeOnce
9,588 Twitter followers
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Symantec™ VIP is a leading user-friendly, cloud-based, strong authentication service that provides secure access to sensitive data and applications anytime, anywhere, from any device.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Hospital & Health Care
    Market Segment
    • 77% Enterprise
    • 16% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Symantec VIP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Services
    1
    Ease of Use
    1
    Seamless Experience
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec VIP features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    6.7
    Multi-Device Sync
    Average: 8.9
    6.7
    Easy Setup
    Average: 9.0
    5.8
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Symantec™ VIP is a leading user-friendly, cloud-based, strong authentication service that provides secure access to sensitive data and applications anytime, anywhere, from any device.

Users
No information available
Industries
  • Information Technology and Services
  • Hospital & Health Care
Market Segment
  • 77% Enterprise
  • 16% Small-Business
Symantec VIP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Services
1
Ease of Use
1
Seamless Experience
1
Security
1
Cons
This product has not yet received any negative sentiments.
Symantec VIP features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
6.7
Multi-Device Sync
Average: 8.9
6.7
Easy Setup
Average: 9.0
5.8
Backup
Average: 8.7
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    UserLock provides on-premise Active Directory Identities with secure access to corporate networks and multiple cloud applications, from wherever they are working. Enable Multi-Factor Authentication (

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 63% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • UserLock Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Easy Setup
    2
    Setup Ease
    2
    2FA Security
    1
    Customer Support
    1
    Cons
    Access Issues
    1
    Authentication Issues
    1
    Lack of Customization
    1
    Limited Features
    1
    Limited OS Compatibility
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UserLock features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    9.2
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    BIDART, Aquitaine
    LinkedIn® Page
    www.linkedin.com
    45 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

UserLock provides on-premise Active Directory Identities with secure access to corporate networks and multiple cloud applications, from wherever they are working. Enable Multi-Factor Authentication (

Users
No information available
Industries
No information available
Market Segment
  • 63% Small-Business
  • 25% Mid-Market
UserLock Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Easy Setup
2
Setup Ease
2
2FA Security
1
Customer Support
1
Cons
Access Issues
1
Authentication Issues
1
Lack of Customization
1
Limited Features
1
Limited OS Compatibility
1
UserLock features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
8.3
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
9.2
Backup
Average: 8.7
Seller Details
Year Founded
2000
HQ Location
BIDART, Aquitaine
LinkedIn® Page
www.linkedin.com
45 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Enabling your organization to comply with cybersecurity regulations and strengthen IBM i security by controlling access to systems and data, enforcing data privacy, monitoring for compliance, and asse

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Assure Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Assure Security features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Multi-Device Sync
    Average: 8.9
    9.2
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Precisely
    HQ Location
    Burlington, Massachusetts
    Twitter
    @PreciselyData
    3,981 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,990 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Enabling your organization to comply with cybersecurity regulations and strengthen IBM i security by controlling access to systems and data, enforcing data privacy, monitoring for compliance, and asse

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 33% Enterprise
Assure Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
1
Cons
This product has not yet received any negative sentiments.
Assure Security features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
9.2
Multi-Device Sync
Average: 8.9
9.2
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Seller
Precisely
HQ Location
Burlington, Massachusetts
Twitter
@PreciselyData
3,981 Twitter followers
LinkedIn® Page
www.linkedin.com
2,990 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Unified digital security for the "human factor": DoubleClue combines Identity- and Access Management with a hardwareless multi factor authentication and comes with an integrated password- and confiden

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Mid-Market
    • 36% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DoubleClue: Identity Security Platform features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    7.8
    Multi-Device Sync
    Average: 8.9
    9.4
    Easy Setup
    Average: 9.0
    8.9
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    Neustadt, Bavaria
    Twitter
    @HWS_Gruppe
    4 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    118 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Unified digital security for the "human factor": DoubleClue combines Identity- and Access Management with a hardwareless multi factor authentication and comes with an integrated password- and confiden

Users
No information available
Industries
No information available
Market Segment
  • 64% Mid-Market
  • 36% Small-Business
DoubleClue: Identity Security Platform features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
7.8
Multi-Device Sync
Average: 8.9
9.4
Easy Setup
Average: 9.0
8.9
Backup
Average: 8.7
Seller Details
Year Founded
2000
HQ Location
Neustadt, Bavaria
Twitter
@HWS_Gruppe
4 Twitter followers
LinkedIn® Page
www.linkedin.com
118 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HelloID is a complete, cloud-based IDaaS solution that streamlines user provisioning, self-service, and single sign-on processes within your organization or educational institution. Automate the entir

    Users
    No information available
    Industries
    • Primary/Secondary Education
    • Education Management
    Market Segment
    • 59% Mid-Market
    • 38% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HelloID features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    8.3
    Easy Setup
    Average: 9.0
    8.3
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1999
    HQ Location
    Lynbrook, New York
    Twitter
    @Tools4ever
    336 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    65 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HelloID is a complete, cloud-based IDaaS solution that streamlines user provisioning, self-service, and single sign-on processes within your organization or educational institution. Automate the entir

Users
No information available
Industries
  • Primary/Secondary Education
  • Education Management
Market Segment
  • 59% Mid-Market
  • 38% Enterprise
HelloID features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
8.3
Easy Setup
Average: 9.0
8.3
Backup
Average: 8.7
Seller Details
Year Founded
1999
HQ Location
Lynbrook, New York
Twitter
@Tools4ever
336 Twitter followers
LinkedIn® Page
www.linkedin.com
65 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ManageEngine ADSelfService Plus is an identity security solution with MFA, SSO, and SSPR capabilities. ADSelfService Plus is an identity security solution that ensures secure and seamless access to en

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Enterprise
    • 47% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ManageEngine ADSelfService Plus Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Device Compatibility
    1
    Ease of Implementation
    1
    Ease of Understanding
    1
    Ease of Use
    1
    Flexibility
    1
    Cons
    Error Handling
    1
    Lack of Clarity
    1
    Performance Issues
    1
    Poor Customer Support
    1
    Product Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine ADSelfService Plus features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    6.7
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,677 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    464 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ManageEngine ADSelfService Plus is an identity security solution with MFA, SSO, and SSPR capabilities. ADSelfService Plus is an identity security solution that ensures secure and seamless access to en

Users
No information available
Industries
No information available
Market Segment
  • 47% Enterprise
  • 47% Mid-Market
ManageEngine ADSelfService Plus Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Device Compatibility
1
Ease of Implementation
1
Ease of Understanding
1
Ease of Use
1
Flexibility
1
Cons
Error Handling
1
Lack of Clarity
1
Performance Issues
1
Poor Customer Support
1
Product Issues
1
ManageEngine ADSelfService Plus features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
6.7
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,677 Twitter followers
LinkedIn® Page
www.linkedin.com
464 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Workspace ONE is a digital workspace platform that simply and securely delivers and manages any app on any device by integrating access control, application management and multi-platform endpoint mana

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 39% Mid-Market
    • 37% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Workspace ONE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    This product has not yet received any positive sentiments.
    Cons
    Access Issues
    1
    Account Setup Issues
    1
    Complex Setup
    1
    Confusing Interface
    1
    Delay Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Workspace ONE features and usability ratings that predict user satisfaction
    7.4
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Workspace ONE is a digital workspace platform that simply and securely delivers and manages any app on any device by integrating access control, application management and multi-platform endpoint mana

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 39% Mid-Market
  • 37% Enterprise
Workspace ONE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
This product has not yet received any positive sentiments.
Cons
Access Issues
1
Account Setup Issues
1
Complex Setup
1
Confusing Interface
1
Delay Issues
1
Workspace ONE features and usability ratings that predict user satisfaction
7.4
Has the product been a good partner in doing business?
Average: 9.0
10.0
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CryptoPhoto is a mutual-authentication solution that is faster than passwords, two assurance levels stronger (LoA3) than 2FA, privacy-respectful, and suitable for everyday use to keep ordinary people

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 83% Small-Business
    • 17% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CryptoPhoto Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    2FA Security
    1
    Data Security
    1
    Ease of Use
    1
    Reliability
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CryptoPhoto features and usability ratings that predict user satisfaction
    0.0
    No information available
    6.7
    Multi-Device Sync
    Average: 8.9
    5.0
    Easy Setup
    Average: 9.0
    6.7
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    Twitter
    @CryptoPhoto
    49 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CryptoPhoto is a mutual-authentication solution that is faster than passwords, two assurance levels stronger (LoA3) than 2FA, privacy-respectful, and suitable for everyday use to keep ordinary people

Users
No information available
Industries
No information available
Market Segment
  • 83% Small-Business
  • 17% Mid-Market
CryptoPhoto Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
2FA Security
1
Data Security
1
Ease of Use
1
Reliability
1
Security
1
Cons
This product has not yet received any negative sentiments.
CryptoPhoto features and usability ratings that predict user satisfaction
0.0
No information available
6.7
Multi-Device Sync
Average: 8.9
5.0
Easy Setup
Average: 9.0
6.7
Backup
Average: 8.7
Seller Details
HQ Location
N/A
Twitter
@CryptoPhoto
49 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entrust Identity as a Service is a cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). En

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 36% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Entrust Identity as a Service features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    6.7
    Multi-Device Sync
    Average: 8.9
    6.7
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1969
    HQ Location
    Minneapolis, MN
    Twitter
    @Entrust_Corp
    6,415 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,812 employees on LinkedIn®
    Phone
    1-888-690-2424
Product Description
How are these determined?Information
This description is provided by the seller.

Entrust Identity as a Service is a cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). En

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 36% Mid-Market
Entrust Identity as a Service features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
6.7
Multi-Device Sync
Average: 8.9
6.7
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Year Founded
1969
HQ Location
Minneapolis, MN
Twitter
@Entrust_Corp
6,415 Twitter followers
LinkedIn® Page
www.linkedin.com
3,812 employees on LinkedIn®
Phone
1-888-690-2424
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FastPass IVM (Identity Verification Manager) is a security enhancement tool, designed for IT help desk security. This solution is essential for Chief Information Security Officers (CISOs) in protectin

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Enterprise
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FastPass IVM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    3
    Security
    3
    Ease of Use
    2
    Easy Integrations
    2
    Customer Support
    1
    Cons
    Authentication Issues
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FastPass IVM features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    Copenhagen
    Twitter
    @FastPassCorpAS
    166 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    64 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FastPass IVM (Identity Verification Manager) is a security enhancement tool, designed for IT help desk security. This solution is essential for Chief Information Security Officers (CISOs) in protectin

Users
No information available
Industries
No information available
Market Segment
  • 60% Enterprise
  • 20% Mid-Market
FastPass IVM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
3
Security
3
Ease of Use
2
Easy Integrations
2
Customer Support
1
Cons
Authentication Issues
1
Learning Curve
1
FastPass IVM features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
10.0
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Year Founded
2000
HQ Location
Copenhagen
Twitter
@FastPassCorpAS
166 Twitter followers
LinkedIn® Page
www.linkedin.com
64 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortiToken Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Easy Access
    1
    Security
    1
    Cons
    Authentication Issues
    1
    Inadequate Security
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiToken Cloud features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    9.6
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    8.3
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,611 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,832 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Users
No information available
Industries
No information available
Market Segment
  • 80% Mid-Market
  • 20% Small-Business
FortiToken Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Easy Access
1
Security
1
Cons
Authentication Issues
1
Inadequate Security
1
FortiToken Cloud features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
9.6
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
8.3
Backup
Average: 8.7
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,611 Twitter followers
LinkedIn® Page
www.linkedin.com
14,832 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    App ID helps developers to easily add authentication to their web and mobile apps with few lines of code, and secure their Cloud-native applications and services on IBM Cloud. App ID also helps manage

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM App ID features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,764 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331,391 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

App ID helps developers to easily add authentication to their web and mobile apps with few lines of code, and secure their Cloud-native applications and services on IBM Cloud. App ID also helps manage

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Mid-Market
IBM App ID features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,764 Twitter followers
LinkedIn® Page
www.linkedin.com
331,391 employees on LinkedIn®
Ownership
SWX:IBM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ID.me simplifies how individuals prove and share their identity online. The ID.me secure digital identity network has over 98 million users, as well as partnerships with 30 states, 10 federal agencies

    Users
    No information available
    Industries
    • Retail
    • Apparel & Fashion
    Market Segment
    • 39% Mid-Market
    • 30% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ID.me features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ID.Me
    Year Founded
    2010
    HQ Location
    McLean, US
    Twitter
    @IDme
    19,627 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,075 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ID.me simplifies how individuals prove and share their identity online. The ID.me secure digital identity network has over 98 million users, as well as partnerships with 30 states, 10 federal agencies

Users
No information available
Industries
  • Retail
  • Apparel & Fashion
Market Segment
  • 39% Mid-Market
  • 30% Small-Business
ID.me features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
ID.Me
Year Founded
2010
HQ Location
McLean, US
Twitter
@IDme
19,627 Twitter followers
LinkedIn® Page
www.linkedin.com
1,075 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    miniOrange IAM trusted platform offers frictionless solutions like - Single Sign-On, Multi-Factor Authentication, User lifeCycle Management, Passwordless Authentication, and much more. miniOrange’s u

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 42% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • miniOrange Identity & Access Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Single Sign-On
    2
    Solutions
    2
    SSO
    2
    SSO (Single Sign-On)
    2
    Cons
    Access Restrictions
    1
    Active Directory Issues
    1
    High Licensing Cost
    1
    Licensing Issues
    1
    Limited Access
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • miniOrange Identity & Access Management features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Pune, India
    Twitter
    @miniOrange_it
    27 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    454 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

miniOrange IAM trusted platform offers frictionless solutions like - Single Sign-On, Multi-Factor Authentication, User lifeCycle Management, Passwordless Authentication, and much more. miniOrange’s u

Users
No information available
Industries
No information available
Market Segment
  • 42% Enterprise
  • 32% Mid-Market
miniOrange Identity & Access Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Single Sign-On
2
Solutions
2
SSO
2
SSO (Single Sign-On)
2
Cons
Access Restrictions
1
Active Directory Issues
1
High Licensing Cost
1
Licensing Issues
1
Limited Access
1
miniOrange Identity & Access Management features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2012
HQ Location
Pune, India
Twitter
@miniOrange_it
27 Twitter followers
LinkedIn® Page
www.linkedin.com
454 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OAuth.io handles identity infrastructure, maintenance, and security overhead with Social Login, Token Authentication, Multi-Factor Authentication, and more. OAuth.io allows you to choose identity prov

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
    • 20% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OAuth.io features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OAuth.io
    Year Founded
    2013
    HQ Location
    San Francisco, California
    Twitter
    @OAuth_io
    995 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OAuth.io handles identity infrastructure, maintenance, and security overhead with Social Login, Token Authentication, Multi-Factor Authentication, and more. OAuth.io allows you to choose identity prov

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
  • 20% Enterprise
OAuth.io features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
OAuth.io
Year Founded
2013
HQ Location
San Francisco, California
Twitter
@OAuth_io
995 Twitter followers
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OLOID provides passwordless identity and access solutions, converging cyber and physical security. Physical identity factors such as access card, face, palm scan, etc. for frictionless login into devi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Mid-Market
    • 28% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OLOID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    17
    Customer Support
    8
    Helpful
    7
    Easy Integrations
    6
    Integrations
    6
    Cons
    Performance Issues
    5
    Storage Limitations
    4
    Size Issues
    3
    Data Inaccuracy
    2
    Lagging Performance
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OLOID features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oloid
    Year Founded
    2018
    HQ Location
    Sunnyvale, US
    Twitter
    @oloid_ai
    64 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    72 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OLOID provides passwordless identity and access solutions, converging cyber and physical security. Physical identity factors such as access card, face, palm scan, etc. for frictionless login into devi

Users
No information available
Industries
No information available
Market Segment
  • 47% Mid-Market
  • 28% Enterprise
OLOID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
17
Customer Support
8
Helpful
7
Easy Integrations
6
Integrations
6
Cons
Performance Issues
5
Storage Limitations
4
Size Issues
3
Data Inaccuracy
2
Lagging Performance
2
OLOID features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Oloid
Year Founded
2018
HQ Location
Sunnyvale, US
Twitter
@oloid_ai
64 Twitter followers
LinkedIn® Page
www.linkedin.com
72 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Specops Authentication for O365 is the ideal solution for organizations that need a simple approach to O365 user management and authentication. It uses existing Group Policy configurations for on-dema

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Enterprise
    • 20% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Specops Authentication for O365 features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Multi-Device Sync
    Average: 8.9
    8.3
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2001
    HQ Location
    Stockholm, Sweden
    Twitter
    @specopssoftware
    3,373 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Specops Authentication for O365 is the ideal solution for organizations that need a simple approach to O365 user management and authentication. It uses existing Group Policy configurations for on-dema

Users
No information available
Industries
No information available
Market Segment
  • 80% Enterprise
  • 20% Small-Business
Specops Authentication for O365 features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
10.0
Multi-Device Sync
Average: 8.9
8.3
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Year Founded
2001
HQ Location
Stockholm, Sweden
Twitter
@specopssoftware
3,373 Twitter followers
LinkedIn® Page
www.linkedin.com
59 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Automate customer on-boarding with AI driven Facial Bio and end to end eKYC

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Valydate features and usability ratings that predict user satisfaction
    5.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Perth, AU
    Twitter
    @BlueBrickss
    16 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    36 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Automate customer on-boarding with AI driven Facial Bio and end to end eKYC

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 40% Mid-Market
Valydate features and usability ratings that predict user satisfaction
5.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2014
HQ Location
Perth, AU
Twitter
@BlueBrickss
16 Twitter followers
LinkedIn® Page
www.linkedin.com
36 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cerby provides identity teams with the only comprehensive access management platform for non-federated applications. Harnessing the power of identity providers, Cerby makes passwordless authentication

    Users
    No information available
    Industries
    • Marketing and Advertising
    • Retail
    Market Segment
    • 44% Enterprise
    • 28% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cerby features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cerby
    Year Founded
    2020
    HQ Location
    Alameda, US
    Twitter
    @CerbyHQ
    489 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    111 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cerby provides identity teams with the only comprehensive access management platform for non-federated applications. Harnessing the power of identity providers, Cerby makes passwordless authentication

Users
No information available
Industries
  • Marketing and Advertising
  • Retail
Market Segment
  • 44% Enterprise
  • 28% Mid-Market
Cerby features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Cerby
Year Founded
2020
HQ Location
Alameda, US
Twitter
@CerbyHQ
489 Twitter followers
LinkedIn® Page
www.linkedin.com
111 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    XTIUM's Desktop as a Service (DaaS) provides secure, cloud-based virtual desktops, enabling employees to access company applications and data from any device, anywhere. This solution enhances security

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 37% Mid-Market
    • 37% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Desktop as a Service (DaaS) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Positive Experience
    2
    Reliability
    2
    Administration Management
    1
    Ease of Use
    1
    Cons
    Delay Issues
    1
    Feature Issues
    1
    High Resource Usage
    1
    Inefficient Processes
    1
    Inefficient Ticketing System
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Desktop as a Service (DaaS) features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    6.7
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Xtium
    Year Founded
    2007
    HQ Location
    Wayne, PA
    Twitter
    @EvolveIP
    2,909 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    307 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

XTIUM's Desktop as a Service (DaaS) provides secure, cloud-based virtual desktops, enabling employees to access company applications and data from any device, anywhere. This solution enhances security

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 37% Mid-Market
  • 37% Small-Business
Desktop as a Service (DaaS) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Positive Experience
2
Reliability
2
Administration Management
1
Ease of Use
1
Cons
Delay Issues
1
Feature Issues
1
High Resource Usage
1
Inefficient Processes
1
Inefficient Ticketing System
1
Desktop as a Service (DaaS) features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
6.7
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Seller
Xtium
Year Founded
2007
HQ Location
Wayne, PA
Twitter
@EvolveIP
2,909 Twitter followers
LinkedIn® Page
www.linkedin.com
307 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The award-winning all-in-one Identity Management and Cloud Security platform offering IGA, IAM, and PAM capabilities on-premise, hybrid, and SaaS. Built as a unified identity fabric for manageability

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • EmpowerID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Authentication
    1
    Cloud Services
    1
    Customer Support
    1
    Device Management
    1
    Cons
    Difficult Integration
    1
    Error Handling
    1
    Integration Difficulty
    1
    Integration Issues
    1
    Needs Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • EmpowerID features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    EmpowerID
    Year Founded
    2005
    HQ Location
    Dublin, Ohio
    Twitter
    @EmpowerID
    387 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    69 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The award-winning all-in-one Identity Management and Cloud Security platform offering IGA, IAM, and PAM capabilities on-premise, hybrid, and SaaS. Built as a unified identity fabric for manageability

Users
No information available
Industries
No information available
Market Segment
  • 38% Mid-Market
  • 38% Small-Business
EmpowerID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Authentication
1
Cloud Services
1
Customer Support
1
Device Management
1
Cons
Difficult Integration
1
Error Handling
1
Integration Difficulty
1
Integration Issues
1
Needs Improvement
1
EmpowerID features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
10.0
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Seller
EmpowerID
Year Founded
2005
HQ Location
Dublin, Ohio
Twitter
@EmpowerID
387 Twitter followers
LinkedIn® Page
www.linkedin.com
69 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entrust Identity Enterprise is an integrated IAM platform that supports a full suite of workforce, consumer, and citizen use cases. Ideally suited for high-assurance applications that require a Zero T

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Enterprise
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Entrust Identity Enterprise features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    10.0
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1969
    HQ Location
    Minneapolis, MN
    Twitter
    @Entrust_Corp
    6,415 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,812 employees on LinkedIn®
    Phone
    1-888-690-2424
Product Description
How are these determined?Information
This description is provided by the seller.

Entrust Identity Enterprise is an integrated IAM platform that supports a full suite of workforce, consumer, and citizen use cases. Ideally suited for high-assurance applications that require a Zero T

Users
No information available
Industries
No information available
Market Segment
  • 60% Enterprise
  • 40% Mid-Market
Entrust Identity Enterprise features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
10.0
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Year Founded
1969
HQ Location
Minneapolis, MN
Twitter
@Entrust_Corp
6,415 Twitter followers
LinkedIn® Page
www.linkedin.com
3,812 employees on LinkedIn®
Phone
1-888-690-2424
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mi-Token is an advanced two-factor authentication solution that offers unparalleled security, flexibility, cost-effectiveness and ease of use.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Mid-Market
    • 40% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Mi-Token Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    1
    Coding Simplicity
    1
    Cross-platform
    1
    Ease of Use
    1
    Cons
    Difficult Learning Process
    1
    Expertise Required
    1
    Setup Difficulties
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mi-Token features and usability ratings that predict user satisfaction
    5.8
    Has the product been a good partner in doing business?
    Average: 9.0
    7.5
    Multi-Device Sync
    Average: 8.9
    4.2
    Easy Setup
    Average: 9.0
    8.3
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Austin, TX, USA
    Twitter
    @Mi_Token
    887 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    64 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Mi-Token is an advanced two-factor authentication solution that offers unparalleled security, flexibility, cost-effectiveness and ease of use.

Users
No information available
Industries
No information available
Market Segment
  • 40% Mid-Market
  • 40% Small-Business
Mi-Token Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
1
Coding Simplicity
1
Cross-platform
1
Ease of Use
1
Cons
Difficult Learning Process
1
Expertise Required
1
Setup Difficulties
1
Mi-Token features and usability ratings that predict user satisfaction
5.8
Has the product been a good partner in doing business?
Average: 9.0
7.5
Multi-Device Sync
Average: 8.9
4.2
Easy Setup
Average: 9.0
8.3
Backup
Average: 8.7
Seller Details
Year Founded
2009
HQ Location
Austin, TX, USA
Twitter
@Mi_Token
887 Twitter followers
LinkedIn® Page
www.linkedin.com
64 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Weak, lost or stolen passwords are the leading cause of data breaches. Protect your data, systems and resources by ensuring that only authorized users are given access to applications and information,

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 63% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Passly features and usability ratings that predict user satisfaction
    8.0
    Has the product been a good partner in doing business?
    Average: 9.0
    1.7
    Multi-Device Sync
    Average: 8.9
    6.7
    Easy Setup
    Average: 9.0
    6.7
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,550 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,018 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Weak, lost or stolen passwords are the leading cause of data breaches. Protect your data, systems and resources by ensuring that only authorized users are given access to applications and information,

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 63% Small-Business
  • 33% Mid-Market
Passly features and usability ratings that predict user satisfaction
8.0
Has the product been a good partner in doing business?
Average: 9.0
1.7
Multi-Device Sync
Average: 8.9
6.7
Easy Setup
Average: 9.0
6.7
Backup
Average: 8.7
Seller Details
Seller
Kaseya
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,550 Twitter followers
LinkedIn® Page
www.linkedin.com
5,018 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    2FAS is a well-crafted and convenient application that protects access to your online services and accounts. Often a single password for your Facebook or Instagram account isn’t enough to protect your

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • 2FAS Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Implementation Ease
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 2FAS features and usability ratings that predict user satisfaction
    0.0
    No information available
    9.4
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    9.4
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Henderson, US
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

2FAS is a well-crafted and convenient application that protects access to your online services and accounts. Often a single password for your Facebook or Instagram account isn’t enough to protect your

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
2FAS Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Implementation Ease
1
Cons
This product has not yet received any negative sentiments.
2FAS features and usability ratings that predict user satisfaction
0.0
No information available
9.4
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
9.4
Backup
Average: 8.7
Seller Details
Year Founded
2015
HQ Location
Henderson, US
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    cidaas, the European cloud identity and access management system from Widas ID GmbH, delivers an out-of-the-box solution for federated identities, single sign-on and multi-factor authentication. With

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • cidaas features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    8.3
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1997
    HQ Location
    Wimsheim, Germany
    Twitter
    @WidasGroup
    132 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    87 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

cidaas, the European cloud identity and access management system from Widas ID GmbH, delivers an out-of-the-box solution for federated identities, single sign-on and multi-factor authentication. With

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
cidaas features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
8.3
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
8.3
Backup
Average: 8.7
Seller Details
Year Founded
1997
HQ Location
Wimsheim, Germany
Twitter
@WidasGroup
132 Twitter followers
LinkedIn® Page
www.linkedin.com
87 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CLEAR Verified reduces friction across the user journey by delivering a single, holistic identity for your customers. Experience instant, real-time verification spanning biographics, biometrics, and I

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 83% Small-Business
    • 17% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CLEAR Verified Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Speed
    2
    Time-saving
    2
    Customer Support
    1
    Implementation Ease
    1
    Cons
    ID Verification
    2
    Authentication Issues
    1
    Data Breach
    1
    Data Inaccuracy
    1
    Data Privacy
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CLEAR Verified features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CLEAR
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

CLEAR Verified reduces friction across the user journey by delivering a single, holistic identity for your customers. Experience instant, real-time verification spanning biographics, biometrics, and I

Users
No information available
Industries
No information available
Market Segment
  • 83% Small-Business
  • 17% Mid-Market
CLEAR Verified Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Speed
2
Time-saving
2
Customer Support
1
Implementation Ease
1
Cons
ID Verification
2
Authentication Issues
1
Data Breach
1
Data Inaccuracy
1
Data Privacy
1
CLEAR Verified features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
CLEAR
LinkedIn® Page
www.linkedin.com
(3)3.5 out of 5
View top Consulting Services for CoffeeBean Identity and Access Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Social-ID for CIAM, a solution to authenticate and to register customers at Website, Mobile apps and Wifi portals.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CoffeeBean Identity and Access Platform features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2008
    HQ Location
    Fremont, CA
    Twitter
    @coffeebeantech
    254 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Social-ID for CIAM, a solution to authenticate and to register customers at Website, Mobile apps and Wifi portals.

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Enterprise
CoffeeBean Identity and Access Platform features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2008
HQ Location
Fremont, CA
Twitter
@coffeebeantech
254 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Corbado provides the most secure and convenient passwordless authentication with passkeys to onboard, authenticate and engage users. We take care of your cross-platform and cross-device aspects. You b

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 90% Small-Business
    • 10% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Corbado Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Implementation Ease
    5
    Authentication
    3
    Password Management
    3
    Biometric Authentication
    2
    Cons
    Limited Compatibility
    3
    Login Issues
    2
    Missing Features
    2
    Authentication Issues
    1
    SSO Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Corbado features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Corbado
    Year Founded
    2021
    HQ Location
    Munich, Germany
    Twitter
    @corbadotech
    225 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Corbado provides the most secure and convenient passwordless authentication with passkeys to onboard, authenticate and engage users. We take care of your cross-platform and cross-device aspects. You b

Users
No information available
Industries
  • Computer Software
Market Segment
  • 90% Small-Business
  • 10% Mid-Market
Corbado Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Implementation Ease
5
Authentication
3
Password Management
3
Biometric Authentication
2
Cons
Limited Compatibility
3
Login Issues
2
Missing Features
2
Authentication Issues
1
SSO Issues
1
Corbado features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Corbado
Year Founded
2021
HQ Location
Munich, Germany
Twitter
@corbadotech
225 Twitter followers
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cryptr is a plug-and-play B2B authentication platform that allows SaaS to manage and deploy all their authentication strategies like Single Sign On, automated user provisioning with Directory Sync, TO

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cryptr Universal SSO Connector Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Single Sign-On
    7
    SSO (Single Sign-On)
    7
    Implementation Ease
    6
    SSO Support
    6
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cryptr Universal SSO Connector features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cryptr
    Year Founded
    2019
    HQ Location
    Lille, Hauts-de-France
    Twitter
    @getcryptr
    92 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cryptr is a plug-and-play B2B authentication platform that allows SaaS to manage and deploy all their authentication strategies like Single Sign On, automated user provisioning with Directory Sync, TO

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Cryptr Universal SSO Connector Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Single Sign-On
7
SSO (Single Sign-On)
7
Implementation Ease
6
SSO Support
6
Cons
This product has not yet received any negative sentiments.
Cryptr Universal SSO Connector features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Cryptr
Year Founded
2019
HQ Location
Lille, Hauts-de-France
Twitter
@getcryptr
92 Twitter followers
LinkedIn® Page
www.linkedin.com
8 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    eID-Me is the identity verification and digital ID solution for Canadian businesses and governments. What benefits does eID-Me provide? 1. Improved sign up experience with verification results in se

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Small-Business
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • eID-Me Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Easy Access
    3
    Security
    3
    Cloud Services
    1
    Customer Support
    1
    Cons
    Authentication Issues
    1
    ID Verification
    1
    Sharing Issues
    1
    Sharing Limitations
    1
    Slow Verification
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • eID-Me features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    9.4
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Bluink
    Year Founded
    2010
    HQ Location
    Ottawa, CA
    LinkedIn® Page
    www.linkedin.com
    23 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

eID-Me is the identity verification and digital ID solution for Canadian businesses and governments. What benefits does eID-Me provide? 1. Improved sign up experience with verification results in se

Users
No information available
Industries
No information available
Market Segment
  • 75% Small-Business
  • 25% Enterprise
eID-Me Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Easy Access
3
Security
3
Cloud Services
1
Customer Support
1
Cons
Authentication Issues
1
ID Verification
1
Sharing Issues
1
Sharing Limitations
1
Slow Verification
1
eID-Me features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
9.4
Backup
Average: 8.7
Seller Details
Seller
Bluink
Year Founded
2010
HQ Location
Ottawa, CA
LinkedIn® Page
www.linkedin.com
23 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 25% Small-Business
    • 13% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Firebase Authentication Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Documentation
    2
    Biometric Authentication
    1
    Easy Integrations
    1
    Easy Setup
    1
    Implementation Ease
    1
    Cons
    Limited Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Firebase Authentication features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    6.7
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,750,646 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    310,061 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Users
No information available
Industries
No information available
Market Segment
  • 25% Small-Business
  • 13% Mid-Market
Firebase Authentication Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Documentation
2
Biometric Authentication
1
Easy Integrations
1
Easy Setup
1
Implementation Ease
1
Cons
Limited Customization
1
Firebase Authentication features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
10.0
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
6.7
Backup
Average: 8.7
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,750,646 Twitter followers
LinkedIn® Page
www.linkedin.com
310,061 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetIQ Advanced Authentication is a standards-based framework built to meet today’s authentication challenges. Its open architecture is designed to enable organizations to protect their applications an

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText NetIQ Advanced Authentication features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.0
    5.0
    Multi-Device Sync
    Average: 8.9
    8.3
    Easy Setup
    Average: 9.0
    5.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,716 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22,403 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

NetIQ Advanced Authentication is a standards-based framework built to meet today’s authentication challenges. Its open architecture is designed to enable organizations to protect their applications an

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Small-Business
OpenText NetIQ Advanced Authentication features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.0
5.0
Multi-Device Sync
Average: 8.9
8.3
Easy Setup
Average: 9.0
5.0
Backup
Average: 8.7
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,716 Twitter followers
LinkedIn® Page
www.linkedin.com
22,403 employees on LinkedIn®
Ownership
NASDAQ:OTEX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RapidIdentity is an identity management software that helps organizations embrace security, increase business agility, and deliver an enhanced user experience.

    Users
    No information available
    Industries
    • Primary/Secondary Education
    Market Segment
    • 50% Enterprise
    • 30% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RapidIdentity features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2004
    HQ Location
    Houston, US
    Twitter
    @identityauto
    614 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    78 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RapidIdentity is an identity management software that helps organizations embrace security, increase business agility, and deliver an enhanced user experience.

Users
No information available
Industries
  • Primary/Secondary Education
Market Segment
  • 50% Enterprise
  • 30% Mid-Market
RapidIdentity features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2004
HQ Location
Houston, US
Twitter
@identityauto
614 Twitter followers
LinkedIn® Page
www.linkedin.com
78 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Routee is a leading cloud communications provider that designs, develops, and distributes advanced Web & API automation solutions. Through its robust platform and scalable API, it helps corporati

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ROUTEE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    1
    Business Enhancement
    1
    Communication
    1
    Communication Efficiency
    1
    Communication Improvement
    1
    Cons
    API Issues
    1
    API Limitations
    1
    Complex Features
    1
    Complexity
    1
    Difficult Navigation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ROUTEE features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    8.9
    Multi-Device Sync
    Average: 8.9
    8.3
    Easy Setup
    Average: 9.0
    8.9
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    San Francisco, California
    LinkedIn® Page
    www.linkedin.com
    166 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Routee is a leading cloud communications provider that designs, develops, and distributes advanced Web & API automation solutions. Through its robust platform and scalable API, it helps corporati

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 20% Enterprise
ROUTEE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
1
Business Enhancement
1
Communication
1
Communication Efficiency
1
Communication Improvement
1
Cons
API Issues
1
API Limitations
1
Complex Features
1
Complexity
1
Difficult Navigation
1
ROUTEE features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
8.9
Multi-Device Sync
Average: 8.9
8.3
Easy Setup
Average: 9.0
8.9
Backup
Average: 8.7
Seller Details
Year Founded
2000
HQ Location
San Francisco, California
LinkedIn® Page
www.linkedin.com
166 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SecureAuth: Customer Identity Access Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Authentication
    2
    Customer Support
    2
    Security
    2
    Automation
    1
    Cons
    Poor Interface Design
    3
    Complex Administration
    2
    Complex Setup
    1
    Error Handling
    1
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureAuth: Customer Identity Access Management features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Multi-Device Sync
    Average: 8.9
    9.2
    Easy Setup
    Average: 9.0
    6.7
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Irvine, CA
    Twitter
    @SecureAuth
    8,707 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    154 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
SecureAuth: Customer Identity Access Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Authentication
2
Customer Support
2
Security
2
Automation
1
Cons
Poor Interface Design
3
Complex Administration
2
Complex Setup
1
Error Handling
1
Expensive
1
SecureAuth: Customer Identity Access Management features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
9.2
Multi-Device Sync
Average: 8.9
9.2
Easy Setup
Average: 9.0
6.7
Backup
Average: 8.7
Seller Details
Company Website
Year Founded
2005
HQ Location
Irvine, CA
Twitter
@SecureAuth
8,707 Twitter followers
LinkedIn® Page
www.linkedin.com
154 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    TraitWare provides native mult-factor authentication and single sign-on. Built from the ground up with Zero Trust architecture and with patented technology, TraitWare is simple, secure login.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TraitWare features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    TraitWare
    Year Founded
    2017
    HQ Location
    Reno, US
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

TraitWare provides native mult-factor authentication and single sign-on. Built from the ground up with Zero Trust architecture and with patented technology, TraitWare is simple, secure login.

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
TraitWare features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
TraitWare
Year Founded
2017
HQ Location
Reno, US
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trusona, the pioneering leader of passwordless MFA for enterprises, secures the identity behind every digital interaction. The company's solutions provide a complete alternative to usernames and passw

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Small-Business
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trusona Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    2
    2FA Security
    1
    Autofill Feature
    1
    Data Security
    1
    Ease of Use
    1
    Cons
    Access Issues
    1
    Access Restrictions
    1
    ID Verification
    1
    Login Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trusona features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    8.3
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trusona
    Year Founded
    2015
    HQ Location
    Scottsdale, AZ
    Twitter
    @trusona_inc
    1,065 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    39 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trusona, the pioneering leader of passwordless MFA for enterprises, secures the identity behind every digital interaction. The company's solutions provide a complete alternative to usernames and passw

Users
No information available
Industries
No information available
Market Segment
  • 80% Small-Business
  • 20% Mid-Market
Trusona Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
2
2FA Security
1
Autofill Feature
1
Data Security
1
Ease of Use
1
Cons
Access Issues
1
Access Restrictions
1
ID Verification
1
Login Issues
1
Trusona features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
10.0
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
8.3
Backup
Average: 8.7
Seller Details
Seller
Trusona
Year Founded
2015
HQ Location
Scottsdale, AZ
Twitter
@trusona_inc
1,065 Twitter followers
LinkedIn® Page
www.linkedin.com
39 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Flexible, scalable, secure – two factor authentication at its best. Deployed in over 54 countries and implemented across enterprises including finance, government, healthcare, education, and manufactu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AuthControl Sentry Multi-Factor Authentication Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customizability
    1
    Easy Setup
    1
    Integrations
    1
    Setup Ease
    1
    Simple
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AuthControl Sentry Multi-Factor Authentication features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    Wetherby, West Yorkshire, United Kingdom
    Twitter
    @swivelsecure
    575 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
    Phone
    206-512-7390
Product Description
How are these determined?Information
This description is provided by the seller.

Flexible, scalable, secure – two factor authentication at its best. Deployed in over 54 countries and implemented across enterprises including finance, government, healthcare, education, and manufactu

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
AuthControl Sentry Multi-Factor Authentication Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customizability
1
Easy Setup
1
Integrations
1
Setup Ease
1
Simple
1
Cons
Expensive
1
AuthControl Sentry Multi-Factor Authentication features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
10.0
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Year Founded
2000
HQ Location
Wetherby, West Yorkshire, United Kingdom
Twitter
@swivelsecure
575 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
Phone
206-512-7390
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Authsignal is a B2C consumer authentication and orchestration platform. Built to deliver enterprise and mid-market teams' rapid capabilities to deploy omnichannel authentication and verification flows

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Authsignal Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    1
    Easy Setup
    1
    Implementation Ease
    1
    Integrations
    1
    Setup Ease
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Authsignal features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Auckland
    Twitter
    @authsignal
    113 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Authsignal is a B2C consumer authentication and orchestration platform. Built to deliver enterprise and mid-market teams' rapid capabilities to deploy omnichannel authentication and verification flows

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Authsignal Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
1
Easy Setup
1
Implementation Ease
1
Integrations
1
Setup Ease
1
Cons
This product has not yet received any negative sentiments.
Authsignal features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
10.0
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Year Founded
2021
HQ Location
Auckland
Twitter
@authsignal
113 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®

Learn More About Multi-Factor Authentication (MFA) Software

What You Should Know About Multi-Factor Authentication (MFA) Software


What is Multi-Factor Authentication (MFA) Software?

The main purpose of using multi-factor authentication (MFA) software is for increased security when users log in to accounts. Companies use this software to ensure only authorized users—such as employees, contractors, or customers have secure access to specific company accounts. This helps prevent both insider threats, such as unauthorized employees from accessing sensitive data, and external threats, like cybercriminals deploying phishing attacks for data breaches, from accessing restricted accounts. 

MFA requires users to complete additional authentication steps to prove their identity prior to being granted access to applications, systems, or sensitive information. The software helps secure accounts by providing additional security using a layered, multi-step authentication approach. Generally, the first step to authenticate a user’s identity includes a standard username and password login process. After this initial login attempt, the second step might require users to enter a code provided by a software app on a mobile device, a hardware token like a key fob, or a code sent to a user via (SMS) text message, email, or phone call. Other authentication steps might include presenting a biometric like a fingerprint or a faceprint, or presenting other identifying signals like the user’s typical IP address, their device ID, or via behavioral factors verified by risk-based authentication (RBA) tools.

What Does MFA Stand For?

MFA stands for multi-factor authentication. It requires two or more different authentication factors. This software may also be referred to as two-factor authentication (2FA) or two-step verification when employing exactly two different authentication factors. 

What are the factors of authentication?

MFA software requires users to authenticate with some or all of the following five factors:

Single-factor authentication: Single-factor authentication requires users to authenticate with something they know. The most common single-factor authentication is password-based authentication. This is considered insecure because many people use weak passwords or passwords that are easily compromised.

Two-factor authentication: Two-factor authentication requires users to authenticate with something they have. It requires users to provide the information they have, usually, a code provided by an authenticator app on their mobile devices, SMS or text message, software token (soft token), or hardware token (hard token). The code provided can be either an HMAC-based one-time password (HOTP) which does not expire until used, or a time-based one-time password (TOTP) that expires in 30 seconds.

Three-factor authentication: Three-factor authentication requires users to authenticate with what they are. It takes into account something unique to the user such as biometric factors. They can include fingerprint scans, finger geometry, palmprint or hand geometry scans, and facial recognition. Using biometrics for authentication is becoming increasingly common as biometric logins on mobile devices, including facial recognition software and fingerprint scanning capabilities, have gained in popularity among consumers. Other biometric authentication methods, such as ear shape recognition, voiceprints, retina scans, iris scans, DNA, odor identity, gait patterns, vein patterns, handwriting and signature analysis, and typing recognition, have not yet been widely commercialized for MFA purposes.

Four-factor authentication: Four-factor authentication requires users to authenticate with where they are and when. It considers a user’s geographic location and the time it took for them to get there. Usually, these authentication methods do not require a user to actively authenticate this information, instead, this runs in the background when determining a specific user’s authentication risk. Four-factor authentication verifies a user’s geolocation, which points to where they currently are and their geo-velocity, which is the reasonable amount of time it takes for a person to travel to a given location. For example, if a user authenticates with an MFA software provider in Chicago and 10 minutes later attempts to authenticate from Moscow, there is a security issue.

Five-factor authentication: Five-factor authentication requires users to authenticate with something they do. It relates to specific gestures or touch patterns that users generate. For example, using a touch-screen enabled with a relatively new OS, that supports the feature, users can create a picture password where they draw circles, straight lines, or tap an image to create a unique gesture password.

What Types of Multi-Factor Authentication (MFA) Software Exist?

There are several kinds of MFA software. In addition to standard MFA functionality, many companies are moving toward RBA software, also known as intelligent MFA, which uses risk monitoring to determine when to request users for authentication. The different types of authentication methods can include:

Mobile apps: A common way users prefer to authenticate is using MFA software’s mobile app.

Software token: Software tokens enable users to use MFA mobile apps including wearable devices. Using software tokens is considered more secure than using OTP via SMS, since these messages can be intercepted by hackers. Software tokens can be used when offline, making it convenient for end users who may not have access to the internet.

Push notifications: Push notifications make authentication simple for end users. A notification is sent to a user’s mobile device asking them to approve or deny the authentication request. Convenience is crucial for user adoption of MFA tools.

Hardware token: Hardware tokens are pieces of hardware users carry with them to authenticate their identity. Examples include OTP key fobs, USB devices, and smart cards. Common issues with hardware tokens include the hardware’s expense plus the added cost of replacements when users lose them.

One-time passwords (OTP) via SMS, voice, or email: Users who can’t use mobile apps on their phones can opt to use OTP sent to their mobile devices via SMS text message, voice call, or email. However, receiving authentication codes via SMS is considered one of the least secure ways to authenticate users.

Risk-based authentication (RBA) software: RBA, also known as intelligent or adaptive MFA, uses real-time information about end users to evaluate their risk and prompt them to authenticate when needed. RBA software analyzes IP addresses, devices, behaviors, and identities to set personalized authentication methods for each distinct user attempting to access the network. 

Passwordless authentication: Passwordless authentication, also known as invisible authentication, relies on RBA factors such as location, IP address, and other user behaviors. Push notifications are considered passwordless authentication, as a user is not required to enter a code, but merely asked to accept or reject an authentication request.

Biometrics: Biometric authentication factors, such as facial and fingerprint recognition, are gaining popularity among consumers, and therefore, MFA software providers are beginning to support them. Currently, other biometric factors, such as iris scanning, are not available in MFA tools. One issue with using biometrics for authentication is that once they are compromised, they are compromised forever.

MFA as a service: Tying in with a company’s cloud-based directories, some MFA providers offer cloud-based MFA as a service solution. These often support multiple authentication methods including push notifications, software tokens, hardware tokens, online and offline authentication, and biometrics.

On-premises MFA: On-premises MFA solutions run on a company’s server. Many software vendors are phasing out these kinds of MFA solutions and pushing customers to cloud-based solutions.

Offline-available MFA: Users who need to authenticate, but do not have access to the internet, can use MFA solutions with offline support. For example, many federal employees work in controlled, secure environments and might not have access to the internet. Federal government civilian employees might use personal identity verification (PIV) cards to authenticate, while the Department of Defense employees authenticate using a common access card (CAC). For general civilians, they can authenticate offline using a mobile app with offline access to OTPs or one that uses a hardware-based U2F security key. 

Enterprise solutions: Companies that manage MFA deployments to many users need robust solutions and will opt for software with administrator consoles, endpoint visibility, and connect with single sign-on (SSO) software.

What are the Common Features of Multi-Factor Authentication (MFA) Software?

The following are some core features within MFA software that can help users authenticate via multiple modalities.

Multiple authentication methods: To meet diverse needs, end users may like to authenticate in different ways. These might include OTPs sent via SMS, voice, email, push notifications sent to mobile devices, biometrics like fingerprints or facial recognition, hardware tokens such as key fobs, or fast identity online (FIDO) devices. Different software offer various kinds of authentication methods. It’s important to consider what type of authentication would work best for a specific organization.

Supports access types: Ensuring MFA software works with a company’s existing cloud applications, local and remote desktops, web, VPN, and other applications is important.

Prebuilt APIs: Developers adding MFA software in their applications may seek a provider with a prebuilt API for ease of development. Many software providers offer branded MFA functionality to maintain the look and feel of a developer’s own applications.

Supports FIDO protocols: FIDO is a set of protocols based on public-key encryption created by the FIDO Alliance that is more secure than OTPs. FIDO supports authentication of almost any type, including USB, near-field communication (NFC), and Bluetooth. FIDO protocols are the basis of passwordless authentication.

Self-registration and self-help portals: Positive user experience is critical for end-user adoption of MFA software. Many providers offer self-registration processes for end users, as well as self-service portals which save the deployment team’s time.

Administrator tools: Administrators need tools to help them be most effective in deploying MFA software, as well as meeting company policies. Some MFA providers allow administrators to limit MFA to specific IP addresses or applications and specific geographical or secure locations. Many MFA tools have policy settings that restrict end users from using jailbroken devices. When employees leave or change roles, some MFA providers offer automatic deprovisioning features.

Other Features of Multi-Factor Authentication Software: Backup Capabilities, Biometric Factor Capabilities, Compound Capabilities, Email Capabilities, Hardware Capabilities, Mobile SDK Capabilities, Multi-Device Sync Capabilities, Phone Capabilities, Point Capabilities, Risk-based Capabilities, SMS Capabilities, Voice-Based Telephony Capabilities, Web SDK Capabilities

What are the Benefits of Multi-Factor Authentication (MFA) Software?

Security: The main purpose of MFA software is for increased security when logging in to accounts. Companies use this software to ensure that only authorized users can log on and have access to specific company accounts. This helps the company prevent both insider threats, such as unauthorized employees, and external threats, like hackers, from accessing restricted accounts.

Simplified login processes: Another reason businesses use MFA software is to simplify login processes for their employees. Passwords can be a hassle and are not enough to secure an account anymore. Considering the number of accounts users have, many people struggle to remember their passwords and reuse weak or compromised passwords across multiple accounts. Because of password fatigue, companies need ways to secure their employees' accounts while keeping the process simple for end users. MFA can reduce, and in some instances entirely remove the need for passwords.

Improve customer experience: Developers use MFA software to increase security while simplifying login processes for their customers by embedding MFA tools in their applications. Trust is paramount for a company's success, so encouraging customers and other end users to secure their accounts is essential. Application developers are increasingly implementing MFA in the design of their applications.

Save time for helpdesk teams: MFA software also improves productivity for help desk teams who deploy these tools to employees. Many of these tools are easy to install and have simple interfaces, contributing to widespread adoption. Many include self-help tools that free up help desk team members' time.

Meet regulatory compliance: Some regulatory compliance rules, such as payment processing and healthcare regulations, require that MFA software be set up on user accounts.

Who Uses Multi-Factor Authentication (MFA) Software?

Everyone--from individual users to company employees and customers--should use MFA software to protect their accounts. It is even more important to use it to secure email accounts and password vaults to reduce the risk of being hacked. There are free versions of MFA software available for individuals and light users, as well as enterprise-level software available with added functionality for corporate deployments.

Individuals: individuals use MFA software to protect their personal accounts including email, password vaults, social media, banking, and other apps.

Administrators: Administrators or help desk technicians deploy MFA software to their colleagues. With large deployments, many administrators seek an MFA solution that provides a robust administrator platform to help with provisioning, deprovisioning, and setting risk policies.

End users: End users, like company employees or customers, use MFA software on a daily basis. Accessible solutions with easy usability increase the adoption of these tools, improving security. Presently, many MFA software deployments utilize mobile device applications in the process.

Developers: Developers, engineers, and product teams use MFA software to ensure the applications they’ve built are secure for end users. While some developers might choose to build their own MFA software, many are embedding existing MFA software solutions in their apps using APIs that allow developers’ software to integrate with the MFA software.

Software Related to Multi-Factor Authentication (MFA) Software

Related solutions include:

Passwordless authentication software: Passwordless authentication is a type of MFA software that eliminates a password as an authentication type. Instead of using passwords (something the user knows), passwordless authentication relies on authenticating a user via other means, such as something a user has (like a trusted mobile device or a hardware security key) and something that they are (for example, scanning their fingerprint).

Biometric authentication software: Biometric authentication software is a type of MFA software that helps improve security for networks, applications, and physical locations by requiring biometric factors as an additional access qualifier. Biometric authentication tools utilize physical characteristics including facial, fingerprint, or voice recognition, to verify a user’s identity.

Risk-based authentication software: RBA software is a type of MFA software that analyzes contextual factors like the user’s IP addresses, devices, behaviors, and identities to set customized authentication methods for each individual user attempting to access the network. Non-suspicious users accessing applications from known devices, locations, and networks may be automatically signed in. Suspicious users may be required to provide step-up authentication methods, such as inputting an SMS code, biometric verification, or email confirmation actions to properly verify their identity.

Single sign-on (SSO) software: SSO software is an authentication tool that provides users with access to multiple applications or datasets without requiring multiple logins through the use of federation. Many SSO solutions have MFA functionality native within their software.

Identity and access management (IAM) software: IAM software authenticates workforce users, provides access to systems and data, tracks user activity, and provides reporting tools to ensure employees comply with company policies. MFA is one component of this software.

Customer identity and access management (CIAM) software: Businesses use CIAM software to manage customer user identities and offer those customers a secure, seamless login experience for the company’s websites, applications, and other online services. MFA is one component of this software. CIAM software also allows businesses to manage customer identities, preferences, and profile information at scale. These solutions enable customers to self register for services, login and authenticate, and manage their own user profiles, including consent and other preferences.

Identity verification software: Businesses verify user identities to create trust online and offline, prevent identity fraud, and comply with privacy and anti-fraud regulations using identity verification software. This is different from authentication. With identity verification, companies are trying to verify who an unknown person is (1:N match). With authentication, however, a company is trying to ensure that the person logging in is indeed the known person they already know (1:1 match).

Challenges with Multi-Factor Authentication (MFA) Software

MFA methods: It is important to choose the best MFA methods for the workforce. For example, if the workforce cannot carry mobile phones to their job sites—such as those in manufacturing, healthcare, or government roles—businesses must consider using a hardware token. If the workforce often needs to authenticate themselves while they are not online, businesses should choose a solution that allows offline authentication. 

User adoption: Unlike many security tools that information security professionals deploy in the background, MFA tools are used by everyday users. It is important to properly train employees and ensure they understand how to use these tools.

Which Companies Should Buy Multi-Factor Authentication (MFA) Software?

All companies that have end users accessing important company resources should authenticate their users’ identities prior to granting access. Given that usernames and passwords are easily hacked, having a second or third form of authentication is advisable. 

All companies: Any company that wants to ensure that only verified, permissioned people--such as employees, contractors, or customers--have access to company accounts.

Regulated industries: While all companies should secure their resources, companies operating in regulated industries may be required by industry standards or law to do so. For example, many businesses that process credit card payments are subject to the Payment Card Industry Data Security Standard (PCI DSS) compliance standards that require MFA on their accounts. Similarly, the European Union Payment Services Directive requires strong customer authentication for electronic payments. Additionally, other bodies, such as the Health Insurance Portability and Accountability Act (HIPAA) for healthcare and the Sarbanes-Oxley Act (SOX) for finance and accounting, require strong authentication processes.

How to Buy Multi-Factor Authentication (MFA) Software

Requirements Gathering (RFI/RFP) for Multi-Factor Authentication (MFA) Software

As the buyer develops their list of requirements and priorities for selecting MFA software, they must keep these items in mind:

End user use cases: Determining the company’s end-user use cases is essential. The buyer should also classify the users they are trying to authenticate--are they employees, contractors, or customers? For example, employees may be able to use authentication methods such as hardware tokens and biometrics, while customers might rely on in-app mobile pushes or OTPs sent via email, SMS, or phone. 

Authentication methods: The buyer must determine the types of authentication methods that will and will not work for their end users. Are there limitations on the types of factors that the employees can use? For example, if employees in a manufacturing facility or healthcare unit cannot carry a mobile phone with them, authentication factors requiring a mobile device may not be suitable.

Licenses needed: Buyers must determine how many licenses are needed for their end users and if there are different license types based on user type.

Business segment or region-specific solution: If someone is looking for software tailored to the small businesses segment versus mid-market or enterprise segments, they have to be clear in their RFP about this. Similarly, if the buyer needs a tool that works well in a specific geographical region or language, they should include it in their RFP.

Integrations: The buyer must determine which integrations are important to their company.

Timeline: The company must decide how quickly they need to implement the solution.

Level of support: Buyers should know if they require high-quality support or if they prefer implementing the solution in house.

Compare Multi-Factor Authentication (MFA) Software Products

Create a long list

There are hundreds of MFA solutions available on the market, which can be daunting to sift through. It is best to narrow the list of potential vendors based on the features that are most important to the organization, such as the type of authentication available to end users. 

Buyers can review MFA products on g2.com, where they can search by languages supported, features such as authentication type, and whether the solution is a point solution for MFA or if MFA is a part of a more comprehensive identity product. Once the buyer has narrowed down the product selection, they can save them in the “My List” on g2.com.

Create a short list

After storing the long list of potential MFA products, the list further can be further narrowed down by reading user reviews, checking the product’s ranking on the G2 Grid® report for the Multi-Factor Authentication (MFA) software category, and reading usability ratings.

Conduct demos

After researching the options, it is time to conduct demos to ask detailed questions of the vendor and ensure it meets particular business needs. Potential buyers can contact many vendors directly on g2.com to request demos by selecting the “Get a quote” button. At each demo, buyers must be sure to ask the same questions and use case scenarios to best evaluate each product. 

Selection of Multi-Factor Authentication (MFA) Software

Choose a selection team

The software selection team should be a handful of people representing different areas of the business. Personas should include the ultimate decision maker, IT or security administrators, and end users. It is important to include at least one end user on the selection team because end-user adoption is critical to the success of this software solution.

Negotiation

When negotiating a contract, typically longer length contracts and larger license counts can improve discounting. 

Final decision

Prior to making a final decision on which tool to purchase, buyers should ask the vendor if they offer a trial period to test with a small number of users before going all in on the product. If the tool is well received by end users and administrators, businesses can feel more confident in their purchase.