# Best Enterprise Biometric Authentication Software

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Products classified in the overall Biometric Authentication category are similar in many regards and help companies of all sizes solve their business problems. However, enterprise business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Enterprise Business Biometric Authentication to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2&#39;s buying advisors to find the right solutions within the Enterprise Business Biometric Authentication category.

In addition to qualifying for inclusion in the Biometric Authentication Software category, to qualify for inclusion in the Enterprise Business Biometric Authentication Software category, a product must have at least 10 reviews left by a reviewer from an enterprise business.





## Category Overview

**Total Products under this Category:** 187


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 8,600+ Authentic Reviews
- 187+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.



---

**Sponsored**

### AU10TIX

AU10TIX is a leading global provider of automated identity verification solutions, offering a full-service portfolio with one API endpoint. Originating in airport security and border control, AU10TIX&#39;s home-grown technology leverages artificial intelligence and machine learning algorithms to deliver deep fraud detection. Our mature neural networks and advanced detection techniques handle sophisticated threats like deepfake and synthetic identity fraud. Our fully automated verification increases both accuracy and fosters a frictionless user experience to yield the highest pass rates and effectively manage high transaction volumes. Designed for scalability, our automation technology optimizes verification workflows, manages high transaction volumes, and provides actionable insights to enhance decision-making capabilities, meeting diverse customer needs and facilitating seamless business expansion.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=1977&amp;secure%5Bdisplayable_resource_id%5D=1977&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=1977&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=75660&amp;secure%5Bresource_id%5D=1977&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fbiometric-authentication%3Fpage%3D7&amp;secure%5Btoken%5D=14d52c969962b9e75b7907a7c739c5f3073c4ed96648adc1a34b2ebf687650ec&amp;secure%5Burl%5D=https%3A%2F%2Fwww.au10tix.com%2Flanding%2Fidv-1%2F&amp;secure%5Burl_type%5D=custom_url)

---

## Top-Rated Products (Ranked by G2 Score)
### 1. [iDenfy](https://www.g2.com/products/idenfy/reviews)
  iDenfy is an identity verification, business verification, anti-money laundering and fraud prevention platform (KYC, KYB, AML) that helps businesses verify identities, detect fraudulent activity, and ensure compliance with regulatory requirements in real time. It provides a suite of tools designed for organizations that need to onboard users securely, meet KYC/AML regulations, and reduce fraud risk across digital channels. iDenfy is commonly used by industries such as financial services, fintech, e-commerce, online marketplaces, gaming, and mobility platforms. The platform combines automated identity verification with human supervision to increase accuracy and minimize false positives. iDenfy supports global document verification, biometric checks, government registries, credit bureau and continuous monitoring, enabling companies to create secure and frictionless onboarding experiences. By integrating iDenfy’s solutions, businesses can streamline their compliance workflows while maintaining user trust and meeting legal obligations. Key features and capabilities include: - Identity Verification: Automated document and biometric verification supporting passports, ID cards, driver’s licenses, and other identity documents from over 200 countries. - Business Verification: Make every company transparent at your fingertips. Verify company ownership, understand who is behind the business, and onboard with greater trust and confidence. - AML Screening: See the risks behind every name. Screen for sanctions, politically exposed persons, and adverse media to detect AML risk early and make confident compliance decisions. - Fraud Prevention: Advanced fraud detection mechanisms such as liveness detection, duplicate checks, and AI-powered risk scoring to identify suspicious activity. - Compliance Tools: Built-in support for KYC (Know Your Customer), AML (Anti-Money Laundering), and GDPR and CCPA requirements to help organizations maintain regulatory compliance. - Integration Options: Flexible APIs and SDKs for web and mobile applications, allowing businesses to integrate identity verification into existing onboarding flows with minimal development effort. - Manual Review: A hybrid approach combining AI automation with trained human specialists for higher accuracy in edge cases. Typical use cases include customer onboarding for financial institutions, age verification for regulated industries, fraud prevention for e-commerce platforms, and user authentication for digital services. iDenfy serves compliance teams, fraud prevention specialists, product managers, and developers who need a reliable and scalable identity verification solution. By consolidating multiple verification and fraud prevention functions into one platform, iDenfy helps organizations reduce operational costs, improve onboarding conversion rates, and protect both their business and users from fraud. Its modular structure enables companies to adopt the features that fit their specific risk profile and regulatory environment.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 213

**User Satisfaction Scores:**

- **Encryption:** 9.5/10 (Category avg: 9.2/10)
- **Uses Open Standards:** 9.3/10 (Category avg: 8.7/10)
- **Regulatory Compliance:** 9.7/10 (Category avg: 9.0/10)
- **Ease of Setup:** 9.7/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [iDenfy](https://www.g2.com/sellers/idenfy)
- **Company Website:** https://idenfy.com
- **Year Founded:** 2017
- **HQ Location:** Kaunas, Kauno
- **Twitter:** @iDenfy (2,439 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/idenfy/ (51 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CEO
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 68% Small-Business, 28% Mid-Market


#### Pros & Cons

**Pros:**

- Verification Efficiency (90 reviews)
- Fraud Prevention (47 reviews)
- Detection Efficiency (45 reviews)
- Ease of Use (40 reviews)
- ID Verification (40 reviews)

**Cons:**

- Verification Issues (28 reviews)
- Slow Verification (14 reviews)
- Slow Performance (13 reviews)
- Expensive (12 reviews)
- Insufficient Information (8 reviews)

### 2. [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews)
  Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications while incorporating identity visibility and context from multiple identity sources.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 492

**User Satisfaction Scores:**

- **Encryption:** 9.3/10 (Category avg: 9.2/10)
- **Uses Open Standards:** 8.9/10 (Category avg: 8.7/10)
- **Regulatory Compliance:** 9.2/10 (Category avg: 9.0/10)
- **Ease of Setup:** 9.0/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [Cisco](https://www.g2.com/sellers/cisco)
- **Company Website:** https://www.cisco.com
- **Year Founded:** 1984
- **HQ Location:** San Jose, CA
- **Twitter:** @Cisco (721,388 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cisco/ (95,742 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, Network Administrator
  - **Top Industries:** Information Technology and Services, Higher Education
  - **Company Size:** 41% Enterprise, 37% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (71 reviews)
- Security (67 reviews)
- Authentication (46 reviews)
- Easy Access (46 reviews)
- Authentication Ease (40 reviews)

**Cons:**

- Authentication Issues (24 reviews)
- Login Issues (16 reviews)
- Complexity (15 reviews)
- Notification Issues (15 reviews)
- Delay Issues (14 reviews)

### 3. [1Password](https://www.g2.com/products/1password/reviews)
  The Most Used Enterprise Password Manager, trusted by over 180,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure every sign-in by integrating 1Password with your existing IAM infrastructure. Enforce strong, integrated security policies at scale, be proactive about cybersecurity threats to reduce risk, and quickly and easily generate detailed reports on password security posture.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 1,745

**User Satisfaction Scores:**

- **Encryption:** 9.6/10 (Category avg: 9.2/10)
- **Uses Open Standards:** 9.2/10 (Category avg: 8.7/10)
- **Regulatory Compliance:** 9.3/10 (Category avg: 9.0/10)
- **Ease of Setup:** 8.9/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [1Password](https://www.g2.com/sellers/1password)
- **Company Website:** https://1password.com/
- **Year Founded:** 2005
- **HQ Location:** Ontario
- **Twitter:** @1Password (139,662 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1password/ (2,911 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, CEO
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 54% Small-Business, 32% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (333 reviews)
- Security (271 reviews)
- Password Management (182 reviews)
- Intuitive (144 reviews)
- Easy Access (134 reviews)

**Cons:**

- Password Management (95 reviews)
- Expensive (91 reviews)
- Login Issues (69 reviews)
- Autofill Issues (64 reviews)
- Cost (60 reviews)

### 4. [Ondato](https://www.g2.com/products/ondato/reviews)
  Ondato is a global identity and age verification provider that helps businesses streamline Know Your Customer (KYC), Anti-Money Laundering (AML), and age-related compliance. With a focus on accuracy and speed, Ondato enables organisations to verify user identities and ensure compliance with regulatory standards, enhancing operational efficiency and reducing risks associated with identity fraud. Compliant with global regulation standards such as eIDAS, ISO/IEC, NIST, KJM, CAADCA, DSA, GDPR, COPPA, PIPEDA, and others, Ondato is a trusted provider worldwide, catering to various industries, including financial institutions, gaming platforms, e-commerce sites, telecommunications, adult entertainment, and more. Recognised by the Financial Times as one of the fastest-growing companies in Europe, Ondato: -Verifies user identity with 99.8% accuracy -Provides coverage for 192 countries -Confirms onboarding results in less than 30 seconds -Cuts KYC-related business costs up to 90% Ondato&#39;s high level of precision builds trust with customers while minimising the risk of fraud. Its extensive coverage ensures that companies can maintain compliance with local regulations while expanding their customer base internationally without compromising quality and security. The fast processing time reduces both friction and user drop-off rates during the onboarding process. By employing Ondato, businesses can decrease AML compliance costs and avoid hefty fines. Overall, Ondato stands out in the identity and age verification industry due to its combination of high accuracy, global coverage, and rapid processing capabilities. By offering a complete Know Your Customer, Anti-Money Laundering, and age verification solution, Ondato enables companies to handle complex regulatory environments while enhancing customer satisfaction and operational effectiveness.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 100

**User Satisfaction Scores:**

- **Encryption:** 9.8/10 (Category avg: 9.2/10)
- **Uses Open Standards:** 9.2/10 (Category avg: 8.7/10)
- **Regulatory Compliance:** 9.9/10 (Category avg: 9.0/10)
- **Ease of Setup:** 9.9/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [Ondato](https://www.g2.com/sellers/ondato)
- **Company Website:** https://ondato.com/
- **Year Founded:** 2016
- **HQ Location:** London, GB
- **Twitter:** @ondatokyc (553 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/ondato/ (97 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Founder
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 60% Small-Business, 31% Mid-Market


#### Pros & Cons

**Pros:**

- Verification Efficiency (34 reviews)
- Fraud Prevention (20 reviews)
- ID Verification (19 reviews)
- Security (19 reviews)
- Ease of Use (16 reviews)

**Cons:**

- Slow Performance (6 reviews)
- Verification Issues (5 reviews)
- Delays in Process (4 reviews)
- ID Verification (3 reviews)
- Integration Issues (3 reviews)

### 5. [LastPass](https://www.g2.com/products/lastpass/reviews)
  LastPass delivers Secure Access Essentials, helping individuals and organizations manage and protect access to AI, applications, and credentials straight from the browser. Trusted by more than 100,000 businesses and millions of users worldwide, LastPass combines strong security with everyday simplicity. For individuals, LastPass makes online life easier by securely storing credentials, generating strong passwords, and autofilling logins when needed. That means less friction, fewer resets, and safer access wherever work and life happens. For businesses, LastPass helps lean IT teams secure AI‑driven work by reducing risk by controlling access to unapproved apps, while storing and managing employee credentials and integrating with identity providers to fill gaps left by SSO. It’s simpler access, better visibility, and stronger security without added complexity.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 2,007

**User Satisfaction Scores:**

- **Encryption:** 9.0/10 (Category avg: 9.2/10)
- **Uses Open Standards:** 8.3/10 (Category avg: 8.7/10)
- **Regulatory Compliance:** 8.3/10 (Category avg: 9.0/10)
- **Ease of Setup:** 8.7/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [LastPass](https://www.g2.com/sellers/lastpass)
- **Company Website:** https://www.lastpass.com/
- **Year Founded:** 2008
- **HQ Location:** Boston, Massachusetts
- **Twitter:** @LastPass (46,029 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/lastpass/ (772 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Owner, CEO
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 63% Small-Business, 25% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (227 reviews)
- Password Management (170 reviews)
- Security (155 reviews)
- Autofill Feature (107 reviews)
- Password Security (99 reviews)

**Cons:**

- Autofill Issues (83 reviews)
- Password Management (78 reviews)
- Login Issues (66 reviews)
- Password Issues (44 reviews)
- Browser Extension Issues (43 reviews)

### 6. [PingID](https://www.g2.com/products/ping-identity-pingid/reviews)
  PingID is a cloud-based, adaptive multi-factor authentication (MFA) solution designed to enhance security while maintaining user convenience. It enables organizations to implement robust authentication measures across various applications and services, ensuring that only authorized users gain access. By integrating seamlessly with existing identity systems, PingID supports a range of authentication methods, including mobile apps, biometrics, security keys, and more, catering to diverse user preferences and security requirements. Key Features and Functionality: - Versatile Authentication Methods: Supports multiple authentication options such as mobile push notifications, biometrics (fingerprint and facial recognition), SMS, email, voice calls, and hardware tokens, allowing users to choose their preferred method. - Adaptive Authentication: Evaluates contextual factors like device posture, geolocation, and IP address to adjust authentication requirements dynamically, enhancing security without compromising user experience. - Seamless Integration: Integrates with various platforms, including PingOne, PingFederate, VPNs, Microsoft Azure AD, and Active Directory Federation Services (AD FS), facilitating easy deployment within existing IT infrastructures. - User Self-Service Portal: Empowers users to manage their authentication devices and methods, reducing the burden on IT support and improving overall productivity. - Comprehensive Administrative Insights: Provides dashboards for monitoring MFA usage and associated costs, enabling administrators to make informed decisions regarding security policies and resource allocation. Primary Value and Problem Solved: PingID addresses the critical need for enhanced security in an era where cyber threats are increasingly sophisticated. By implementing adaptive MFA, it ensures that access to sensitive applications and data is granted only to verified users, thereby mitigating the risk of unauthorized access and potential data breaches. Simultaneously, PingID maintains a user-friendly experience by offering flexible authentication methods and minimizing disruptions, striking a balance between stringent security measures and operational efficiency.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 34

**User Satisfaction Scores:**

- **Encryption:** 10.0/10 (Category avg: 9.2/10)
- **Uses Open Standards:** 10.0/10 (Category avg: 8.7/10)
- **Regulatory Compliance:** 10.0/10 (Category avg: 9.0/10)
- **Ease of Setup:** 8.1/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [Ping Identity](https://www.g2.com/sellers/ping-identity)
- **Year Founded:** 2002
- **HQ Location:** Denver, CO
- **Twitter:** @pingidentity (42,126 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/21870/ (2,319 employees on LinkedIn®)
- **Phone:** 1.303.468.2900

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 73% Enterprise, 19% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (3 reviews)
- Reliability (3 reviews)
- Seamless Experience (3 reviews)
- Security (3 reviews)
- Intuitive (2 reviews)

**Cons:**

- Complex Setup (2 reviews)
- Setup Difficulties (2 reviews)
- API Issues (1 reviews)
- Configuration Difficulty (1 reviews)
- Connectivity Issues (1 reviews)

### 7. [Keeper Password Manager](https://www.g2.com/products/keeper-password-manager/reviews)
  Keeper Security is transforming cybersecurity for millions of individuals and thousands of organizations globally. Built with end-to-end encryption, Keeper&#39;s intuitive cybersecurity platform is trusted by Fortune 100 companies to protect every user, on every device, in every location. Our patented zero-trust and zero-knowledge privileged access management solution unifies enterprise password, secrets and connections management with zero-trust network access and endpoint privilege mangement. By combining these critical identity and access management components into a single cloud-based solution, Keeper delivers unparalleled visibility, security and control while ensuring compliance and audit requirements are met. Learn how Keeper can defend your organization against today’s cyber threats at KeeperSecurity.com.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 1,184

**User Satisfaction Scores:**

- **Encryption:** 9.1/10 (Category avg: 9.2/10)
- **Uses Open Standards:** 8.9/10 (Category avg: 8.7/10)
- **Regulatory Compliance:** 9.4/10 (Category avg: 9.0/10)
- **Ease of Setup:** 8.7/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [Keeper Security](https://www.g2.com/sellers/keeper-security)
- **Company Website:** https://www.keepersecurity.com/
- **Year Founded:** 2011
- **HQ Location:** Chicago, IL
- **Twitter:** @keepersecurity (18,946 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3554342/ (756 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Owner
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 42% Small-Business, 42% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (168 reviews)
- Security (128 reviews)
- Secure Sharing (88 reviews)
- Password Management (87 reviews)
- Features (74 reviews)

**Cons:**

- Password Management (71 reviews)
- Autofill Issues (49 reviews)
- Login Issues (39 reviews)
- Password Issues (34 reviews)
- Learning Curve (33 reviews)

### 8. [RSA SecureID](https://www.g2.com/products/rsa-secureid/reviews)
  Ensure users have convenient, secure access—from any device, anywhere—to the applications they need, whether in the cloud or on-premises. RSA SecurID Access is an enterprise-grade multi-factor authentication and access management solution that lets organizations consistently and centrally enforce dynamic risk-driven access policies aimed at providing continuous, seamless authentication. It protects all of your resources with a wide range of authentication methods, including push notification, biometrics, OTP, SMS, and traditional hardware and software tokens. Visit us at https://www.rsa.com/


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 104

**User Satisfaction Scores:**

- **Encryption:** 9.2/10 (Category avg: 9.2/10)
- **Uses Open Standards:** 8.9/10 (Category avg: 8.7/10)
- **Regulatory Compliance:** 9.2/10 (Category avg: 9.0/10)
- **Ease of Setup:** 9.1/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [RSA Security](https://www.g2.com/sellers/rsa-security-520d10cb-0052-4033-b6ef-85c594df8c8b)
- **HQ Location:** Bedford, MA
- **Twitter:** @RSAsecurity (110,527 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/rsasecurity/ (2,735 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 67% Enterprise, 27% Mid-Market


#### Pros & Cons

**Pros:**

- Data Security (3 reviews)
- Security (3 reviews)
- Risk Assessment (2 reviews)
- 2FA Security (1 reviews)
- Access Control (1 reviews)

**Cons:**

- Expensive (2 reviews)
- 2FA Issues (1 reviews)
- Complex Administration (1 reviews)
- Complexity (1 reviews)
- Complex Setup (1 reviews)

### 9. [Entrust IDV, formerly Onfido](https://www.g2.com/products/entrust-idv-formerly-onfido/reviews)
  Entrust fights fraud and cyberthreats with comprehensive identity-centric security that protects people, devices, and data. Our solutions help enterprises and governments safeguard critical systems from every angle, enabling secure onboarding and issuance, providing everyday identity protection, and empowering them with 360-degree visibility and orchestration across keys, secrets, and certificates so they can transact and grow with confidence. Building on our decades as a pioneer and innovator in establishing trust, Entrust has a global partner network and supports customers in over 150 countries.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 109

**User Satisfaction Scores:**

- **Encryption:** 8.4/10 (Category avg: 9.2/10)
- **Uses Open Standards:** 8.5/10 (Category avg: 8.7/10)
- **Regulatory Compliance:** 9.0/10 (Category avg: 9.0/10)
- **Ease of Setup:** 8.4/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [Entrust, Inc.](https://www.g2.com/sellers/entrust-inc)
- **Company Website:** https://www.entrust.com/
- **Year Founded:** 1969
- **HQ Location:** Minneapolis, MN
- **Twitter:** @Entrust_Corp (6,414 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/entrust/ (3,737 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Product Manager
  - **Top Industries:** Financial Services, Banking
  - **Company Size:** 65% Mid-Market, 20% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (8 reviews)
- Identity Verification (6 reviews)
- Verification Efficiency (6 reviews)
- Easy Integrations (5 reviews)
- Fast Verification (5 reviews)

**Cons:**

- Expensive (4 reviews)
- Integration Issues (3 reviews)
- Slow Performance (3 reviews)
- Slow Processes (3 reviews)
- Software Bugs (3 reviews)

### 10. [CyberArk Workforce Identity](https://www.g2.com/products/cyberark-workforce-identity/reviews)
  CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security, and credential management. Identity Management capabilities include lifecycle management, identity orchestration, and identity governance. With CyberArk Identity, organizations can secure workforce access to applications, endpoints, and infrastructure and protect themselves from the leading cause of data breaches – compromised credentials. CyberArk Identity is part of the CyberArk Identity Security Platform. Built for the dynamic enterprise, CyberArk Identity Security Platform secures access for any identity to any resource or environment from anywhere using any device. The CyberArk Identity Security Platform enables operational efficiencies with a single admin portal, streamlines meeting compliance requirements with unified audit capabilities, and delivers Identity Security Intelligence for continuous identity threat detection and protection. Workforce Access solutions: • CyberArk Single Sign-On (SSO) is an easy-to-manage solution for one-click access to your cloud, mobile, and legacy apps. CyberArk SSO enables a secure and frictionless sign-in experience for both internal and external users that adjusts based on risk. • CyberArk App Gateway is an add-on to our Single Sign-On solution that enables VPN-less access to legacy applications. It allows companies to set up per-application, per-user access to individual legacy applications hosted on-premises. • CyberArk Adaptive Multi-Factor Authentication (MFA) helps strengthen security and prevent attacks involving compromised credentials by requiring users to present multiple forms of evidence to gain access to your applications. Unlike traditional MFA solutions, CyberArk Adaptive MFA uses AI-powered behavioral analytics and contextual information to determine which authentication factors to apply to a particular user in a specific situation. • CyberArk Secure Web Sessions is a cloud-based service that enables organizations to monitor, record, and audit end-user activity within high-risk and high-value web applications. Security and compliance specialists can use Secure Web Sessions to search recorded sessions using free text input and quickly filter events by users, dates, and actions. • CyberArk Workforce Password Management is an enterprise-focused password manager providing a user-friendly solution to store business application credentials in a centralized vault and securely share them with other users in the organization. Identity Management Services: • CyberArk Identity Lifecycle Management provides an easy way to route application access requests, create application accounts, manage entitlements for those accounts, and revoke access when necessary. • CyberArk Identity Flows is an identity orchestration solution that improves security, efficiency, and productivity by automating identity data and events. With Identity Flows, organizations can orchestrate complex identity management processes and synchronize identity data across diverse applications, directory stores, and repositories. • CyberArk Identity Compliance solution continuously discovers access, streamlines access certifications, and provides comprehensive identity analytics. Identity Compliance automates manually intensive, error-prone administrative processes, ensuring all workforce and privileged access rights are properly assigned and continually certified across enterprises.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 126

**User Satisfaction Scores:**

- **Ease of Setup:** 8.4/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [CyberArk](https://www.g2.com/sellers/cyberark)
- **Year Founded:** 1999
- **HQ Location:** Newton, MA
- **Twitter:** @CyberArk (17,740 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/26630/ (5,022 employees on LinkedIn®)
- **Ownership:** NASDAQ:CYBR

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 48% Enterprise, 48% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (14 reviews)
- Access Management (6 reviews)
- Intuitive (6 reviews)
- Customer Support (5 reviews)
- Access Control (4 reviews)

**Cons:**

- Missing Features (4 reviews)
- Integration Issues (2 reviews)
- Lack of Automation (2 reviews)
- Lack of Features (2 reviews)
- Browser Extension Issues (1 reviews)

### 11. [FullCircl](https://www.g2.com/products/fullcircl/reviews)
  FullCircl | Start smarter, to grow faster with compliance solved. FullCircl is the first-of-its-kind single orchestration platform that brings regulation fully in step with customer acquisition, to create better business from the start. Our global solutions drive customer acquisition, retention and revenue growth while seamlessly addressing risk and compliance challenges associated with customer onboarding, identity, fraud, financial crime and on-going monitoring. Reduce the cost to acquire and serve, clear the way for positive customer relationships, and accelerate profitable growth. FullCircl identifies millions of actionable insights daily, providing a near real-time record of companies, their officers and shareholders, and the relationships between them. Our customers can verify the identity of corporate entities or individuals and orchestrate many of the time-consuming checks needed to conduct customer due diligence during onboarding, such as KYC, KYB and AML, empowering them to satisfy regulatory requirements and make informed decisions about their customers. By embedding KYB and KYC from the very beginning of the customer engagement, FullCircl has compliance solved. With reach into 160 countries, FullCircl is uniquely positioned at the epicentre of a rapidly growing, multi-billion dollar market. Today it serves 450+ customers, 15,000+ web application users, processes over 300 million checks per month and facilitates the onboarding of 200,000+ customers annually. FullCircl is an nCino company (NASDAQ:NCNO), bringing together people, AI and data to power a new era in regulated business. Visit fullcircl.com to find out more.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 239

**User Satisfaction Scores:**

- **Ease of Setup:** 8.8/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [FullCircl](https://www.g2.com/sellers/fullcircl)
- **Year Founded:** 2011
- **HQ Location:** London, England
- **Twitter:** @WeAreFullCircl (6,467 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/960609/ (18 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Business Development Manager, Account Manager
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 66% Enterprise, 23% Mid-Market




## Parent Category

[Identity Management Software](https://www.g2.com/categories/identity-management)



## Related Categories

- [Multi-Factor Authentication (MFA) Software](https://www.g2.com/categories/multi-factor-authentication-mfa)
- [Identity Verification Software](https://www.g2.com/categories/identity-verification)
- [Passwordless Authentication Software](https://www.g2.com/categories/passwordless-authentication)




