User Authentication Reviews and Ratings

What is User Authentication?

User authentication provides real-time corroboration of an identity claim by a person accessing an organization’s assets. It is foundational to network, application and data security, because it reduces fraud, mitigates account takeover (ATO) and other identity risks, and addresses regulatory requirements. Tools in this market enable or provide one or more credential-based or signal-based authentication methods that can augment or replace legacy passwords for employees, contingent workers, partners, suppliers, business or retail customers, or citizens in one or more use cases.

Vendors In User Authentication Market

" Great way to do MFA without a security admin or paying for PS. Solid Initial support"

We were able to implement as a smaller hospital of about 1500 users. We don't' have a security analyst/person, let alone a dept, just a sys-admin like me. I was able to deploy and implement with the SE and Account rep without any PS/costs. Surprisingly easy to implement.

Read reviews

"The skinny on cloud computing, as well as specific Azure AD environments and options"

Microsoft Azure Active (AAD) is primarily used for two purposes: access permissions in Exchange, SharePoint, and other Office 365 services, as well as domain/workstation access and logging on our local network. AAD provided us with numerous opportunities to improve our organization and bring it up to speed in terms of technology and what our users can do. Some of our users, for example, had two or more sets of credentials (1 for Office 365, another for domain access and another for SharePoint).

Read reviews

"Fastest Way of MFA"

As a MFA solution both mobile and web application working responsive and real time. 3th party solutions could be integrated. Ease of use is the prominent feature.

Read reviews

"Haven't found a comparable vendor to Okta's MFA"

Okta Multi-Factor authentication is the only MFA solution my company uses. It supports YubiKey, SMS, Voice, OTP and the mobile application is great (even works with iwatch). There's also new functionality coming that uses risk based factors to drive challenges

Read reviews

"Imprivata OneSign is an incredibly best tool that keeps data safe and secure"

Overall experience with this amazing tool is amazing. The tool is really useful in terms of time savings and accessibility. I collaborated with the developers to help bring important toolsets within the system into production. As a result, adopting this sign-in approach became highly beneficial to us. It reduced help desk calls and support issues and ease of access to managed and unmanaged systems. It provides security to all resources and boosts its overall performance, with this tool we never face downtime.

Read reviews

"Great product, design and build quality!"

We use Gemalto readers with our Multifactor authentication system, also from Gemalto. Readers are used with laptops and systems which do dot have built in card readers. Also we them to write/rewrite certificates on card in the process of user support.

Read reviews

"Digipass for mobile Es Review"

This multilayered time based authentication platform has been used on small and portable devices has really been helpful in helping myself and my team to securely and remotely complete assignment away from the office. We can connect to our enterprise network effortlessly and ensure deadlines are met even away from the office. It’s so user friendly and compatible with different devices.It gives access to virtual private network and secure socket layer which guarantees the security of business transactions that require that level of internet security.

Read reviews

"An incredible tool for User's Authentication."

Offers usernames and passwords protection. It's also offers one-time passcodes (OTPs)for emails and passwords. Protects access to our organization computers, networks and websites from unauthorized identities.

Read reviews

"Attackers are moving to take down user accounts, you must have Identity Threat Protection"

CrowdStrike Identity Protection is a fairly new solution, I was initially invited to do a PoV of the product and it went very well, the tool it self has a lot of power and the sales person was very receptive in terms of what the company needs were and how to fit them and convert them into requirements.

Read reviews

"Great Partner and product!"

We implemented MFA when users leverage sudo on our UNIX/Linux Infrastructure. It was a successful installation and Centrify was a great partner. In addition Centify made product modifications based on unique requirements.

Read reviews

"The best 2FA key I've found - works flawlessly, easily, and is tiny!"

Those key are awesome and user friendly, unless you don't know how to insert a USB into your computer or turn on NFC on your phone (then you are in need of help beyond this key). We do use it for all ours systems administrators.

Read reviews

"A complete package to implement multi factor authenticaion"

It is nice tool to setup multi or two factor authentication. Best thing about this product is we can setup RSA Authentication Manager application in both mobile and laptop. It provides secure access to our application 6 to 8 digit pin which is used to generate the authentication code for every time we need to access the application. We have used it for Citrix to make it more secure since now a days work from is very common in IT industry.

Read reviews

"Would highly recommend"

Excellent product. Very easy to implement, and when you need support it was fast and very professional. The product had all the features we wanted, and with the cloud integration even more with possibility to use SAML to integrated the on premise solution with cloud solutions.

Read reviews

"Ping Identity is a trusted partner interested in our success"

We use several products from Ping Identity: PingFederate, PingOne for Enterprise, PingID multi-factor authentication, and PingCentral for self-service SSO relationship administration. The main use case is workforce authentication with thousands of SaaS relationships for over 200k people. As a vendor, they took the time to understand our needs, pain points, and opportunities. They are extremely responsive and engaged with us on an ongoing basis. Many of the features we've requested over the past six years have been integrated into the product line. PingCentral is the most recent addition to the suite at my company, and it brings an invaluable means for my application owners to manage their SSO relationships, which lowers SLAs, improves speed to market for new web properties, reduces load on my engineering teams, and creates customer delight. Overall, the products are great and the customer focus is outstanding. Highly recommended.

Read reviews

"A great access and authentication platform with smooth enrolment feature"

My experience with BioConnect has been great. It integrates with our readers (BioMini & BioEntry W) so well. The management of the application is simple and not complicated. There has also been a great improvement in the look of the newer version when compared with the older ones. At the initial stage when we imported our templates from BioStar and had identity mis-match, BioConnect was able to help resolve this problem.

Read reviews

"Great fraud finding tool"

Fantastic fraud finding and prevention tool. Their rules and internal networks make this a good investment to stop losses.

Read reviews

"Bio-Key is an enhancement to security device that are very secure for BOD"

This hardware is very helpful for the directors in my place of work to feel more comfortable on every device they use

Read reviews

"Way to remotely access assets with complete protection along with seamless authentication"

Zero Trust remote access helps to create secure boundaries where resources are protected and users will be allowed access only after verifying their identity.

Read reviews

"Reliable access management system . "

The version 6 have significant enhancements . It includes a wide range of option . Customers may find the products a bit hard . But it provides a strong anti fraud access feature system .

Read reviews

"2FA ONE: Most sophisticated two factor authentication solution"

With 2FA ONE it's possible to automate all authentication needs in the organization. It has allowed us to reduce risks on agency data and accounts.

Read reviews
Vendors 1 - 20

Gartner Research

This research requires a log in to determine access