Best Multi-Factor Authentication (MFA) Software with Email Capabilities

Below are the top-rated Multi-Factor Authentication (MFA) Software with Email capabilities, as verified by G2’s Research team. Real users have identified Email as an important function of Multi-Factor Authentication (MFA) Software. Compare different products that offer this feature so you can decide which is best for your business needs.
Show More
Show Less

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

1 filter applied
Clear All
23 Listings in Multi-Factor Authentication (MFA) Available
(253)4.3 out of 5
11th Easiest To Use in Multi-Factor Authentication (MFA) software
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and se

    Users
    • Software Engineer
    • Software Developer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 47% Small-Business
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Auth0 Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    54
    Security
    47
    Authentication
    39
    Integrations
    34
    Easy Integrations
    33
    Cons
    Expensive
    27
    Cost
    20
    Expensive Pricing
    17
    Difficult Learning
    15
    Complexity
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Auth0 features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    8.7
    Multi-Device Sync
    Average: 8.9
    9.2
    Easy Setup
    Average: 9.0
    8.9
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okta
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @okta
    42,664 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,230 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and se

Users
  • Software Engineer
  • Software Developer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 47% Small-Business
  • 30% Mid-Market
Auth0 Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
54
Security
47
Authentication
39
Integrations
34
Easy Integrations
33
Cons
Expensive
27
Cost
20
Expensive Pricing
17
Difficult Learning
15
Complexity
12
Auth0 features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
8.7
Multi-Device Sync
Average: 8.9
9.2
Easy Setup
Average: 9.0
8.9
Backup
Average: 8.7
Seller Details
Seller
Okta
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@okta
42,664 Twitter followers
LinkedIn® Page
www.linkedin.com
7,230 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PingID is a cloud-based, adaptive multi-factor authentication (MFA) solution designed to enhance security while maintaining user convenience. It enables organizations to implement robust authenticatio

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 73% Enterprise
    • 19% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PingID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Reliability
    3
    Seamless Experience
    3
    Security
    3
    Intuitive
    2
    Cons
    Complex Setup
    2
    Setup Difficulties
    2
    API Issues
    1
    Configuration Difficulty
    1
    Connectivity Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PingID features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Multi-Device Sync
    Average: 8.9
    9.3
    Easy Setup
    Average: 9.0
    8.1
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,161 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,311 employees on LinkedIn®
    Phone
    1.303.468.2900
Product Description
How are these determined?Information
This description is provided by the seller.

PingID is a cloud-based, adaptive multi-factor authentication (MFA) solution designed to enhance security while maintaining user convenience. It enables organizations to implement robust authenticatio

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 73% Enterprise
  • 19% Small-Business
PingID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Reliability
3
Seamless Experience
3
Security
3
Intuitive
2
Cons
Complex Setup
2
Setup Difficulties
2
API Issues
1
Configuration Difficulty
1
Connectivity Issues
1
PingID features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.0
9.2
Multi-Device Sync
Average: 8.9
9.3
Easy Setup
Average: 9.0
8.1
Backup
Average: 8.7
Seller Details
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,161 Twitter followers
LinkedIn® Page
www.linkedin.com
2,311 employees on LinkedIn®
Phone
1.303.468.2900
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The P

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 67% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ping Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Management
    1
    Customer Support
    1
    Ease of Use
    1
    Identity Management
    1
    Integrations
    1
    Cons
    Authentication Issues
    1
    Complex Administration
    1
    Complex Setup
    1
    Confusing Interface
    1
    Confusing Options
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ping Identity features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.0
    7.7
    Multi-Device Sync
    Average: 8.9
    7.8
    Easy Setup
    Average: 9.0
    7.1
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,161 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,311 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The P

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 67% Enterprise
  • 25% Mid-Market
Ping Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Management
1
Customer Support
1
Ease of Use
1
Identity Management
1
Integrations
1
Cons
Authentication Issues
1
Complex Administration
1
Complex Setup
1
Confusing Interface
1
Confusing Options
1
Ping Identity features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.0
7.7
Multi-Device Sync
Average: 8.9
7.8
Easy Setup
Average: 9.0
7.1
Backup
Average: 8.7
Seller Details
Company Website
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,161 Twitter followers
LinkedIn® Page
www.linkedin.com
2,311 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 49% Enterprise
    • 49% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Workforce Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    14
    Access Management
    6
    Intuitive
    6
    Customer Support
    5
    Access Control
    4
    Cons
    Missing Features
    4
    Integration Issues
    2
    Lack of Automation
    2
    Lack of Features
    2
    Browser Extension Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Workforce Identity features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    9.2
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,726 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,022 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 49% Enterprise
  • 49% Mid-Market
CyberArk Workforce Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
14
Access Management
6
Intuitive
6
Customer Support
5
Access Control
4
Cons
Missing Features
4
Integration Issues
2
Lack of Automation
2
Lack of Features
2
Browser Extension Issues
1
CyberArk Workforce Identity features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.0
8.3
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
9.2
Backup
Average: 8.7
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,726 Twitter followers
LinkedIn® Page
www.linkedin.com
5,022 employees on LinkedIn®
Ownership
NASDAQ:CYBR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protectimus Limited creates reliable products for organizing multifactor authentication in companies of all sizes — from startups to large corporations. The Protectimus lineup includes plugins for

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 78% Small-Business
    • 22% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Protectimus Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Easy Setup
    1
    Secure Sharing
    1
    Security
    1
    Cons
    Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Protectimus features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Multi-Device Sync
    Average: 8.9
    9.2
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Dublin, IE
    Twitter
    @Protectimus
    2,783 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    30 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Protectimus Limited creates reliable products for organizing multifactor authentication in companies of all sizes — from startups to large corporations. The Protectimus lineup includes plugins for

Users
No information available
Industries
No information available
Market Segment
  • 78% Small-Business
  • 22% Mid-Market
Protectimus Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Easy Setup
1
Secure Sharing
1
Security
1
Cons
Complexity
1
Protectimus features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
10.0
Multi-Device Sync
Average: 8.9
9.2
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Year Founded
2013
HQ Location
Dublin, IE
Twitter
@Protectimus
2,783 Twitter followers
LinkedIn® Page
www.linkedin.com
30 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin e

    Users
    • Account Manager
    Industries
    • Computer Software
    • Education Management
    Market Segment
    • 49% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OneLogin Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Single Sign-On
    8
    SSO (Single Sign-On)
    8
    Ease of Use
    7
    SSO
    6
    Security
    5
    Cons
    Service Interruptions
    5
    Connection Issues
    4
    Bugs
    3
    Error Handling
    3
    Limited Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OneLogin features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Multi-Device Sync
    Average: 8.9
    9.0
    Easy Setup
    Average: 9.0
    9.3
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Aliso Viejo, CA
    Twitter
    @OneIdentity
    7,872 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    667 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin e

Users
  • Account Manager
Industries
  • Computer Software
  • Education Management
Market Segment
  • 49% Mid-Market
  • 40% Enterprise
OneLogin Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Single Sign-On
8
SSO (Single Sign-On)
8
Ease of Use
7
SSO
6
Security
5
Cons
Service Interruptions
5
Connection Issues
4
Bugs
3
Error Handling
3
Limited Features
3
OneLogin features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.0
9.4
Multi-Device Sync
Average: 8.9
9.0
Easy Setup
Average: 9.0
9.3
Backup
Average: 8.7
Seller Details
HQ Location
Aliso Viejo, CA
Twitter
@OneIdentity
7,872 Twitter followers
LinkedIn® Page
www.linkedin.com
667 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The OptimalCloud from Optimal IdM is a scalable and affordable Identity and Access Management (IAM) solution built for the security and usability needs of small, mid-sized and enterprise organizations

    Users
    No information available
    Industries
    • Consumer Goods
    • Information Technology and Services
    Market Segment
    • 48% Mid-Market
    • 39% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OptimalCloud features and usability ratings that predict user satisfaction
    8.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    8.3
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Lutz, FL
    Twitter
    @Optimal_IdM
    458 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The OptimalCloud from Optimal IdM is a scalable and affordable Identity and Access Management (IAM) solution built for the security and usability needs of small, mid-sized and enterprise organizations

Users
No information available
Industries
  • Consumer Goods
  • Information Technology and Services
Market Segment
  • 48% Mid-Market
  • 39% Small-Business
OptimalCloud features and usability ratings that predict user satisfaction
8.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
8.3
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Year Founded
2005
HQ Location
Lutz, FL
Twitter
@Optimal_IdM
458 Twitter followers
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stytch is the most powerful identity platform built for developers. With advanced features like device fingerprinting and account takeover-resistant authentication, Stytch provides the infrastructure

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 81% Small-Business
    • 16% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Stytch features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    8.9
    Multi-Device Sync
    Average: 8.9
    9.5
    Easy Setup
    Average: 9.0
    8.7
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Stytch
    Year Founded
    2020
    HQ Location
    San Francisco, CA
    Twitter
    @stytchauth
    3,181 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    39 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Stytch is the most powerful identity platform built for developers. With advanced features like device fingerprinting and account takeover-resistant authentication, Stytch provides the infrastructure

Users
No information available
Industries
  • Computer Software
Market Segment
  • 81% Small-Business
  • 16% Mid-Market
Stytch features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
8.9
Multi-Device Sync
Average: 8.9
9.5
Easy Setup
Average: 9.0
8.7
Backup
Average: 8.7
Seller Details
Seller
Stytch
Year Founded
2020
HQ Location
San Francisco, CA
Twitter
@stytchauth
3,181 Twitter followers
LinkedIn® Page
www.linkedin.com
39 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Enabling your organization to comply with cybersecurity regulations and strengthen IBM i security by controlling access to systems and data, enforcing data privacy, monitoring for compliance, and asse

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Assure Security features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Multi-Device Sync
    Average: 8.9
    9.2
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Precisely
    HQ Location
    Burlington, Massachusetts
    Twitter
    @PreciselyData
    3,970 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,962 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Enabling your organization to comply with cybersecurity regulations and strengthen IBM i security by controlling access to systems and data, enforcing data privacy, monitoring for compliance, and asse

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 33% Enterprise
Assure Security features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
9.2
Multi-Device Sync
Average: 8.9
9.2
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Seller
Precisely
HQ Location
Burlington, Massachusetts
Twitter
@PreciselyData
3,970 Twitter followers
LinkedIn® Page
www.linkedin.com
2,962 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entrust Identity as a Service is a cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). En

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 36% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Entrust Identity as a Service features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    6.7
    Multi-Device Sync
    Average: 8.9
    6.7
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1969
    HQ Location
    Minneapolis, MN
    Twitter
    @Entrust_Corp
    6,409 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,732 employees on LinkedIn®
    Phone
    1-888-690-2424
Product Description
How are these determined?Information
This description is provided by the seller.

Entrust Identity as a Service is a cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). En

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 36% Mid-Market
Entrust Identity as a Service features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
6.7
Multi-Device Sync
Average: 8.9
6.7
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Year Founded
1969
HQ Location
Minneapolis, MN
Twitter
@Entrust_Corp
6,409 Twitter followers
LinkedIn® Page
www.linkedin.com
3,732 employees on LinkedIn®
Phone
1-888-690-2424
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    cidaas, the European cloud identity and access management system from Widas ID GmbH, delivers an out-of-the-box solution for federated identities, single sign-on and multi-factor authentication. With

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • cidaas features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    8.3
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1997
    HQ Location
    Wimsheim, DE
    Twitter
    @WidasGroup
    132 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    93 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

cidaas, the European cloud identity and access management system from Widas ID GmbH, delivers an out-of-the-box solution for federated identities, single sign-on and multi-factor authentication. With

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
cidaas features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
8.3
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
8.3
Backup
Average: 8.7
Seller Details
Year Founded
1997
HQ Location
Wimsheim, DE
Twitter
@WidasGroup
132 Twitter followers
LinkedIn® Page
www.linkedin.com
93 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The HID DigitalPersona software offers a new way to provide authentication services to users. Whereas traditional 2FA/MFA solutions are stuck on “what you have/what you know”, DigitalPersona leverages

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HID DigitalPersona features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1991
    HQ Location
    Austin, TX
    Twitter
    @HIDGlobal
    12,040 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,918 employees on LinkedIn®
    Phone
    (800) 237-7769
Product Description
How are these determined?Information
This description is provided by the seller.

The HID DigitalPersona software offers a new way to provide authentication services to users. Whereas traditional 2FA/MFA solutions are stuck on “what you have/what you know”, DigitalPersona leverages

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 25% Mid-Market
HID DigitalPersona features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1991
HQ Location
Austin, TX
Twitter
@HIDGlobal
12,040 Twitter followers
LinkedIn® Page
www.linkedin.com
3,918 employees on LinkedIn®
Phone
(800) 237-7769
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetIQ Advanced Authentication is a standards-based framework built to meet today’s authentication challenges. Its open architecture is designed to enable organizations to protect their applications an

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText NetIQ Advanced Authentication features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.0
    5.0
    Multi-Device Sync
    Average: 8.9
    8.3
    Easy Setup
    Average: 9.0
    5.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,591 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    23,270 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

NetIQ Advanced Authentication is a standards-based framework built to meet today’s authentication challenges. Its open architecture is designed to enable organizations to protect their applications an

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Small-Business
OpenText NetIQ Advanced Authentication features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.0
5.0
Multi-Device Sync
Average: 8.9
8.3
Easy Setup
Average: 9.0
5.0
Backup
Average: 8.7
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,591 Twitter followers
LinkedIn® Page
www.linkedin.com
23,270 employees on LinkedIn®
Ownership
NASDAQ:OTEX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The HID Authentication Service provides a secure and scalable authentication platform for trusted identity, along with HID’s mobile authentication solution, HID Approve™. The Authentication Service of

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HID Authentication Service features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    6.7
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1991
    HQ Location
    Austin, TX
    Twitter
    @HIDGlobal
    12,040 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,918 employees on LinkedIn®
    Phone
    (800) 237-7769
Product Description
How are these determined?Information
This description is provided by the seller.

The HID Authentication Service provides a secure and scalable authentication platform for trusted identity, along with HID’s mobile authentication solution, HID Approve™. The Authentication Service of

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
HID Authentication Service features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
6.7
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Year Founded
1991
HQ Location
Austin, TX
Twitter
@HIDGlobal
12,040 Twitter followers
LinkedIn® Page
www.linkedin.com
3,918 employees on LinkedIn®
Phone
(800) 237-7769
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Authyo makes authentication simple and secure. Use passwordless login, OTPs, and multi-factor authentication via SMS, Email, Voice, WhatsApp, or QR—all in one platform. With easy-to-use APIs and

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Authyo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    CRM Quality
    1
    Ease of Use
    1
    Easy Integrations
    1
    Integrations
    1
    Cons
    Complexity
    1
    Difficult Learning Process
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Authyo features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    10.0
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Authyo.io
    Year Founded
    2008
    HQ Location
    Ahmedabad, IN
    LinkedIn® Page
    www.linkedin.com
    48 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Authyo makes authentication simple and secure. Use passwordless login, OTPs, and multi-factor authentication via SMS, Email, Voice, WhatsApp, or QR—all in one platform. With easy-to-use APIs and

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Authyo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
CRM Quality
1
Ease of Use
1
Easy Integrations
1
Integrations
1
Cons
Complexity
1
Difficult Learning Process
1
Learning Curve
1
Authyo features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
10.0
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Seller
Authyo.io
Year Founded
2008
HQ Location
Ahmedabad, IN
LinkedIn® Page
www.linkedin.com
48 employees on LinkedIn®