User authentication provides real-time corroboration of an identity claim by a person accessing an organization’s assets. It is foundational to network, application and data security, because it reduces fraud, mitigates account takeover (ATO) and other identity risks, and addresses regulatory requirements. Tools in this market enable or provide one or more credential-based or signal-based authentication methods that can augment or replace legacy passwords for employees, contingent workers, partners, suppliers, business or retail customers, or citizens in one or more use cases.
" Great way to do MFA without a security admin or paying for PS. Solid Initial support"
We were able to implement as a smaller hospital of about 1500 users. We don't' have a security analyst/person, let alone a dept, just a sys-admin like me. I was able to deploy and implement with the SE and Account rep without any PS/costs. Surprisingly easy to implement.
"The skinny on cloud computing, as well as specific Azure AD environments and options"
Microsoft Azure Active (AAD) is primarily used for two purposes: access permissions in Exchange, SharePoint, and other Office 365 services, as well as domain/workstation access and logging on our local network. AAD provided us with numerous opportunities to improve our organization and bring it up to speed in terms of technology and what our users can do. Some of our users, for example, had two or more sets of credentials (1 for Office 365, another for domain access and another for SharePoint).
"Fastest Way of MFA"
As a MFA solution both mobile and web application working responsive and real time. 3th party solutions could be integrated. Ease of use is the prominent feature.
"Haven't found a comparable vendor to Okta's MFA"
Okta Multi-Factor authentication is the only MFA solution my company uses. It supports YubiKey, SMS, Voice, OTP and the mobile application is great (even works with iwatch). There's also new functionality coming that uses risk based factors to drive challenges
"Imprivata OneSign is an incredibly best tool that keeps data safe and secure"
Overall experience with this amazing tool is amazing. The tool is really useful in terms of time savings and accessibility. I collaborated with the developers to help bring important toolsets within the system into production. As a result, adopting this sign-in approach became highly beneficial to us. It reduced help desk calls and support issues and ease of access to managed and unmanaged systems. It provides security to all resources and boosts its overall performance, with this tool we never face downtime.
"Great product, design and build quality!"
We use Gemalto readers with our Multifactor authentication system, also from Gemalto. Readers are used with laptops and systems which do dot have built in card readers. Also we them to write/rewrite certificates on card in the process of user support.
"Digipass for mobile Es Review"
This multilayered time based authentication platform has been used on small and portable devices has really been helpful in helping myself and my team to securely and remotely complete assignment away from the office. We can connect to our enterprise network effortlessly and ensure deadlines are met even away from the office. It’s so user friendly and compatible with different devices.It gives access to virtual private network and secure socket layer which guarantees the security of business transactions that require that level of internet security.
"An incredible tool for User's Authentication."
Offers usernames and passwords protection. It's also offers one-time passcodes (OTPs)for emails and passwords. Protects access to our organization computers, networks and websites from unauthorized identities.
"Attackers are moving to take down user accounts, you must have Identity Threat Protection"
CrowdStrike Identity Protection is a fairly new solution, I was initially invited to do a PoV of the product and it went very well, the tool it self has a lot of power and the sales person was very receptive in terms of what the company needs were and how to fit them and convert them into requirements.
"Great Partner and product!"
We implemented MFA when users leverage sudo on our UNIX/Linux Infrastructure. It was a successful installation and Centrify was a great partner. In addition Centify made product modifications based on unique requirements.
"The best 2FA key I've found - works flawlessly, easily, and is tiny!"
Those key are awesome and user friendly, unless you don't know how to insert a USB into your computer or turn on NFC on your phone (then you are in need of help beyond this key). We do use it for all ours systems administrators.
"A complete package to implement multi factor authenticaion"
It is nice tool to setup multi or two factor authentication. Best thing about this product is we can setup RSA Authentication Manager application in both mobile and laptop. It provides secure access to our application 6 to 8 digit pin which is used to generate the authentication code for every time we need to access the application. We have used it for Citrix to make it more secure since now a days work from is very common in IT industry.
"Would highly recommend"
Excellent product. Very easy to implement, and when you need support it was fast and very professional. The product had all the features we wanted, and with the cloud integration even more with possibility to use SAML to integrated the on premise solution with cloud solutions.
"Ping Identity is a trusted partner interested in our success"
We use several products from Ping Identity: PingFederate, PingOne for Enterprise, PingID multi-factor authentication, and PingCentral for self-service SSO relationship administration. The main use case is workforce authentication with thousands of SaaS relationships for over 200k people. As a vendor, they took the time to understand our needs, pain points, and opportunities. They are extremely responsive and engaged with us on an ongoing basis. Many of the features we've requested over the past six years have been integrated into the product line. PingCentral is the most recent addition to the suite at my company, and it brings an invaluable means for my application owners to manage their SSO relationships, which lowers SLAs, improves speed to market for new web properties, reduces load on my engineering teams, and creates customer delight. Overall, the products are great and the customer focus is outstanding. Highly recommended.
"A great access and authentication platform with smooth enrolment feature"
My experience with BioConnect has been great. It integrates with our readers (BioMini & BioEntry W) so well. The management of the application is simple and not complicated. There has also been a great improvement in the look of the newer version when compared with the older ones. At the initial stage when we imported our templates from BioStar and had identity mis-match, BioConnect was able to help resolve this problem.
"Way to remotely access assets with complete protection along with seamless authentication"
Zero Trust remote access helps to create secure boundaries where resources are protected and users will be allowed access only after verifying their identity.
"Reliable access management system . "
The version 6 have significant enhancements . It includes a wide range of option . Customers may find the products a bit hard . But it provides a strong anti fraud access feature system .