Introducing G2.ai, the future of software buying.Try now

Best Risk-Based Authentication Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Risk-based authentication (RBA) solutions are identity management products that weigh user variables to determine and identify threats. Companies use RBA software to increase the effectiveness of user governance and authentication procedures. Users who are determined to be riskier are required to provide additional authentication information. These analyze IP addresses, devices, behaviors and identities to set customized authentication methods for each individual user attempting to access the network. Non-suspicious users accessing applications from known devices, locations, and networks may be automatically signed in. Suspicious users may be required to prompted to provide SMS code, biometric verification, or email confirmation actions to properly verify their identity.

Risk-based authentication products often contain multi-factor authentication features, but set unique requirements based the administrators configuration. RBA tools may work in sync with cloud identity and access management products, but typically only provide the authentication component, rather than the application access and governance components.

To qualify for inclusion in the Risk-Based Authentication category, a product must:

Assess a user’s unique network, device, and behavior to determine risk
Prompt authentication measures after assessment
Utilize authentication methods such as SMS, questioning, or email confirmation
Periodically store and update suspicious networks, devices, and behaviors

Best Risk-Based Authentication Software At A Glance

Leader:
Best Free Software:
Top Trending:
Show LessShow More
Best Free Software:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
106 Listings in Risk-Based Authentication (RBA) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    TrustLayer gives mid-market organisations the confidence and control of enterprise-grade cyber protection. Its Autonomous Security platform integrates attack intel across email, web, and cloud to ensu

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TrustLayer IAM features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Basingstoke, England
    LinkedIn® Page
    www.linkedin.com
    57 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

TrustLayer gives mid-market organisations the confidence and control of enterprise-grade cyber protection. Its Autonomous Security platform integrates attack intel across email, web, and cloud to ensu

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
TrustLayer IAM features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2015
HQ Location
Basingstoke, England
LinkedIn® Page
www.linkedin.com
57 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure access to a wide range of systems, services and applications using an adaptive, cloud-based multi-factor authentication solution. Protect user accounts with more than just a password and reduce

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • TrustLayer MFA (Multi-Factor Authentication) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    2FA Security
    1
    Data Analysis
    1
    Data Security
    1
    Security
    1
    SSO Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TrustLayer MFA (Multi-Factor Authentication) features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Basingstoke, England
    LinkedIn® Page
    www.linkedin.com
    57 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secure access to a wide range of systems, services and applications using an adaptive, cloud-based multi-factor authentication solution. Protect user accounts with more than just a password and reduce

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
TrustLayer MFA (Multi-Factor Authentication) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
2FA Security
1
Data Analysis
1
Data Security
1
Security
1
SSO Security
1
Cons
This product has not yet received any negative sentiments.
TrustLayer MFA (Multi-Factor Authentication) features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
10.0
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
Year Founded
2015
HQ Location
Basingstoke, England
LinkedIn® Page
www.linkedin.com
57 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Twosense is changing the way that BPOs handle identity security. Deploying Passive or Continuous Multi-Factor Authentication powered by passive biometrics allows for organizations to deploy phishing

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TWOSENSE.AI features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Twosense is changing the way that BPOs handle identity security. Deploying Passive or Continuous Multi-Factor Authentication powered by passive biometrics allows for organizations to deploy phishing

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
TWOSENSE.AI features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Risk-based Authentication

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Unbound CORE for Identity Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

Risk-based Authentication

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Unbound CORE for Identity Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Next Generation Platform for Identity and Authentication Hate passwords? So do we. We believe that within five years, passwords will no longer be the predominant method of authentication. We are U

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UnifyID features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Prove
    Year Founded
    2008
    HQ Location
    New York , New York
    Twitter
    @ProveIdentity
    2,662 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    521 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Next Generation Platform for Identity and Authentication Hate passwords? So do we. We believe that within five years, passwords will no longer be the predominant method of authentication. We are U

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
UnifyID features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Prove
Year Founded
2008
HQ Location
New York , New York
Twitter
@ProveIdentity
2,662 Twitter followers
LinkedIn® Page
www.linkedin.com
521 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zighra is a mobile security company that provifes patented continuous authentication and behavioral fraud detection powered by artificial intelligence.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zighra features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zighra
    Year Founded
    2009
    HQ Location
    Ottawa, CA
    Twitter
    @zfraudshield
    2 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zighra is a mobile security company that provifes patented continuous authentication and behavioral fraud detection powered by artificial intelligence.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Zighra features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Zighra
Year Founded
2009
HQ Location
Ottawa, CA
Twitter
@zfraudshield
2 Twitter followers
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®