Introducing G2.ai, the future of software buying.Try now

Best Multi-Factor Authentication (MFA) Software with Email Capabilities

Below are the top-rated Multi-Factor Authentication (MFA) Software with Email capabilities, as verified by G2’s Research team. Real users have identified Email as an important function of Multi-Factor Authentication (MFA) Software. Compare different products that offer this feature so you can decide which is best for your business needs.
Show More
Show Less

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Multi-Factor Authentication (MFA) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
1 filter applied
Clear All
24 Listings in Multi-Factor Authentication (MFA) Available
(231)4.3 out of 5
15th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and se

    Users
    • Software Engineer
    • Software Developer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 48% Small-Business
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Auth0 Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    30
    Security
    30
    Authentication
    23
    Integrations
    23
    Easy Integrations
    22
    Cons
    Expensive
    15
    Cost
    10
    Pricing Issues
    9
    Difficult Learning
    8
    Expensive Pricing
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Auth0 features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Multi-Device Sync
    Average: 8.9
    9.2
    Easy Setup
    Average: 9.0
    9.2
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okta
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @okta
    42,480 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,682 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and se

Users
  • Software Engineer
  • Software Developer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 48% Small-Business
  • 30% Mid-Market
Auth0 Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
30
Security
30
Authentication
23
Integrations
23
Easy Integrations
22
Cons
Expensive
15
Cost
10
Pricing Issues
9
Difficult Learning
8
Expensive Pricing
8
Auth0 features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
8.8
Multi-Device Sync
Average: 8.9
9.2
Easy Setup
Average: 9.0
9.2
Backup
Average: 8.7
Seller Details
Seller
Okta
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@okta
42,480 Twitter followers
LinkedIn® Page
www.linkedin.com
6,682 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The P

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 67% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ping Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Management
    1
    Customer Support
    1
    Ease of Use
    1
    Identity Management
    1
    Integrations
    1
    Cons
    Authentication Issues
    1
    Complex Administration
    1
    Complex Setup
    1
    Confusing Interface
    1
    Confusing Options
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ping Identity features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.0
    7.7
    Multi-Device Sync
    Average: 8.9
    7.8
    Easy Setup
    Average: 9.0
    7.1
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,247 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,223 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The P

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 67% Enterprise
  • 25% Mid-Market
Ping Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Management
1
Customer Support
1
Ease of Use
1
Identity Management
1
Integrations
1
Cons
Authentication Issues
1
Complex Administration
1
Complex Setup
1
Confusing Interface
1
Confusing Options
1
Ping Identity features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.0
7.7
Multi-Device Sync
Average: 8.9
7.8
Easy Setup
Average: 9.0
7.1
Backup
Average: 8.7
Seller Details
Company Website
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,247 Twitter followers
LinkedIn® Page
www.linkedin.com
2,223 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin e

    Users
    • Account Manager
    Industries
    • Computer Software
    • Education Management
    Market Segment
    • 49% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OneLogin Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Single Sign-On
    8
    SSO (Single Sign-On)
    8
    Easy Access
    5
    Security
    5
    Cons
    Service Interruptions
    4
    Bugs
    3
    Connection Issues
    3
    Error Handling
    3
    Login Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OneLogin features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Multi-Device Sync
    Average: 8.9
    9.0
    Easy Setup
    Average: 9.0
    9.3
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Aliso Viejo, CA
    Twitter
    @OneIdentity
    7,917 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    632 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin e

Users
  • Account Manager
Industries
  • Computer Software
  • Education Management
Market Segment
  • 49% Mid-Market
  • 40% Enterprise
OneLogin Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Single Sign-On
8
SSO (Single Sign-On)
8
Easy Access
5
Security
5
Cons
Service Interruptions
4
Bugs
3
Connection Issues
3
Error Handling
3
Login Issues
3
OneLogin features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.0
9.4
Multi-Device Sync
Average: 8.9
9.0
Easy Setup
Average: 9.0
9.3
Backup
Average: 8.7
Seller Details
HQ Location
Aliso Viejo, CA
Twitter
@OneIdentity
7,917 Twitter followers
LinkedIn® Page
www.linkedin.com
632 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 49% Enterprise
    • 49% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Workforce Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    14
    Access Management
    6
    Intuitive
    6
    Customer Support
    5
    Access Control
    4
    Cons
    Missing Features
    4
    Integration Issues
    2
    Lack of Automation
    2
    Lack of Features
    2
    Browser Extension Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Workforce Identity features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    9.2
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,642 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,948 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 49% Enterprise
  • 49% Mid-Market
CyberArk Workforce Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
14
Access Management
6
Intuitive
6
Customer Support
5
Access Control
4
Cons
Missing Features
4
Integration Issues
2
Lack of Automation
2
Lack of Features
2
Browser Extension Issues
1
CyberArk Workforce Identity features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.0
8.3
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
9.2
Backup
Average: 8.7
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,642 Twitter followers
LinkedIn® Page
www.linkedin.com
4,948 employees on LinkedIn®
Ownership
NASDAQ:CYBR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protectimus Limited creates reliable products for organizing multifactor authentication in companies of all sizes — from startups to large corporations. The Protectimus lineup includes plugins for q

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 76% Small-Business
    • 24% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Protectimus Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    2FA Security
    1
    Ease of Use
    1
    Easy Setup
    1
    Secure Sharing
    1
    Security
    1
    Cons
    Complexity
    1
    Poor Customer Support
    1
    Update Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Protectimus features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Multi-Device Sync
    Average: 8.9
    9.0
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Dublin, IE
    Twitter
    @Protectimus
    2,759 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    28 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Protectimus Limited creates reliable products for organizing multifactor authentication in companies of all sizes — from startups to large corporations. The Protectimus lineup includes plugins for q

Users
No information available
Industries
No information available
Market Segment
  • 76% Small-Business
  • 24% Mid-Market
Protectimus Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
2FA Security
1
Ease of Use
1
Easy Setup
1
Secure Sharing
1
Security
1
Cons
Complexity
1
Poor Customer Support
1
Update Issues
1
Protectimus features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
10.0
Multi-Device Sync
Average: 8.9
9.0
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Year Founded
2013
HQ Location
Dublin, IE
Twitter
@Protectimus
2,759 Twitter followers
LinkedIn® Page
www.linkedin.com
28 employees on LinkedIn®
Entry Level Price:$3.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PingID is a cloud-based, adaptive multi-factor authentication solution designed to enhance security while maintaining user convenience. It enables organizations to implement strong authentication meas

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 72% Enterprise
    • 19% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PingID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    11
    Security
    8
    Biometric Authentication
    6
    Implementation Ease
    3
    Reliability
    3
    Cons
    Authentication Issues
    3
    Login Issues
    3
    Notification Issues
    3
    Complex Setup
    2
    Delay Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PingID features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Multi-Device Sync
    Average: 8.9
    9.3
    Easy Setup
    Average: 9.0
    8.5
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,247 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,223 employees on LinkedIn®
    Phone
    1.303.468.2900
Product Description
How are these determined?Information
This description is provided by the seller.

PingID is a cloud-based, adaptive multi-factor authentication solution designed to enhance security while maintaining user convenience. It enables organizations to implement strong authentication meas

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 72% Enterprise
  • 19% Small-Business
PingID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
11
Security
8
Biometric Authentication
6
Implementation Ease
3
Reliability
3
Cons
Authentication Issues
3
Login Issues
3
Notification Issues
3
Complex Setup
2
Delay Issues
2
PingID features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.0
9.2
Multi-Device Sync
Average: 8.9
9.3
Easy Setup
Average: 9.0
8.5
Backup
Average: 8.7
Seller Details
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,247 Twitter followers
LinkedIn® Page
www.linkedin.com
2,223 employees on LinkedIn®
Phone
1.303.468.2900
Entry Level Price:$2.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The OptimalCloud from Optimal IdM is a scalable and affordable Identity and Access Management (IAM) solution built for the security and usability needs of small, mid-sized and enterprise organizations

    Users
    No information available
    Industries
    • Consumer Goods
    • Information Technology and Services
    Market Segment
    • 48% Mid-Market
    • 39% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OptimalCloud features and usability ratings that predict user satisfaction
    8.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    8.3
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Lutz, FL
    Twitter
    @Optimal_IdM
    457 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The OptimalCloud from Optimal IdM is a scalable and affordable Identity and Access Management (IAM) solution built for the security and usability needs of small, mid-sized and enterprise organizations

Users
No information available
Industries
  • Consumer Goods
  • Information Technology and Services
Market Segment
  • 48% Mid-Market
  • 39% Small-Business
OptimalCloud features and usability ratings that predict user satisfaction
8.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
8.3
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Year Founded
2005
HQ Location
Lutz, FL
Twitter
@Optimal_IdM
457 Twitter followers
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stytch is the most powerful identity platform built for developers. With advanced features like device fingerprinting and account takeover-resistant authentication, Stytch provides the infrastructure

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 81% Small-Business
    • 16% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Stytch features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    8.9
    Multi-Device Sync
    Average: 8.9
    9.5
    Easy Setup
    Average: 9.0
    8.7
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Stytch
    Year Founded
    2020
    HQ Location
    San Francisco, CA
    Twitter
    @stytchauth
    3,085 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    50 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Stytch is the most powerful identity platform built for developers. With advanced features like device fingerprinting and account takeover-resistant authentication, Stytch provides the infrastructure

Users
No information available
Industries
  • Computer Software
Market Segment
  • 81% Small-Business
  • 16% Mid-Market
Stytch features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
8.9
Multi-Device Sync
Average: 8.9
9.5
Easy Setup
Average: 9.0
8.7
Backup
Average: 8.7
Seller Details
Seller
Stytch
Year Founded
2020
HQ Location
San Francisco, CA
Twitter
@stytchauth
3,085 Twitter followers
LinkedIn® Page
www.linkedin.com
50 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Enabling your organization to comply with cybersecurity regulations and strengthen IBM i security by controlling access to systems and data, enforcing data privacy, monitoring for compliance, and asse

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Assure Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Assure Security features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Multi-Device Sync
    Average: 8.9
    9.2
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Precisely
    HQ Location
    Burlington, Massachusetts
    Twitter
    @PreciselyData
    3,993 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,938 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Enabling your organization to comply with cybersecurity regulations and strengthen IBM i security by controlling access to systems and data, enforcing data privacy, monitoring for compliance, and asse

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 33% Enterprise
Assure Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
1
Cons
This product has not yet received any negative sentiments.
Assure Security features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
9.2
Multi-Device Sync
Average: 8.9
9.2
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Seller
Precisely
HQ Location
Burlington, Massachusetts
Twitter
@PreciselyData
3,993 Twitter followers
LinkedIn® Page
www.linkedin.com
2,938 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entrust Identity as a Service is a cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). En

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 36% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Entrust Identity as a Service features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    6.7
    Multi-Device Sync
    Average: 8.9
    6.7
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1969
    HQ Location
    Minneapolis, MN
    Twitter
    @Entrust_Corp
    6,404 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,732 employees on LinkedIn®
    Phone
    1-888-690-2424
Product Description
How are these determined?Information
This description is provided by the seller.

Entrust Identity as a Service is a cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). En

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 36% Mid-Market
Entrust Identity as a Service features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
6.7
Multi-Device Sync
Average: 8.9
6.7
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Year Founded
1969
HQ Location
Minneapolis, MN
Twitter
@Entrust_Corp
6,404 Twitter followers
LinkedIn® Page
www.linkedin.com
3,732 employees on LinkedIn®
Phone
1-888-690-2424
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Weak, lost or stolen passwords are the leading cause of data breaches. Protect your data, systems and resources by ensuring that only authorized users are given access to applications and information,

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 63% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Passly features and usability ratings that predict user satisfaction
    8.0
    Has the product been a good partner in doing business?
    Average: 9.0
    1.7
    Multi-Device Sync
    Average: 8.9
    6.7
    Easy Setup
    Average: 9.0
    6.7
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,498 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,388 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Weak, lost or stolen passwords are the leading cause of data breaches. Protect your data, systems and resources by ensuring that only authorized users are given access to applications and information,

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 63% Small-Business
  • 33% Mid-Market
Passly features and usability ratings that predict user satisfaction
8.0
Has the product been a good partner in doing business?
Average: 9.0
1.7
Multi-Device Sync
Average: 8.9
6.7
Easy Setup
Average: 9.0
6.7
Backup
Average: 8.7
Seller Details
Seller
Kaseya
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,498 Twitter followers
LinkedIn® Page
www.linkedin.com
5,388 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    cidaas, the European cloud identity and access management system from Widas ID GmbH, delivers an out-of-the-box solution for federated identities, single sign-on and multi-factor authentication. With

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • cidaas features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    8.3
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1997
    HQ Location
    Wimsheim, DE
    Twitter
    @WidasGroup
    131 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    93 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

cidaas, the European cloud identity and access management system from Widas ID GmbH, delivers an out-of-the-box solution for federated identities, single sign-on and multi-factor authentication. With

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
cidaas features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
8.3
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
8.3
Backup
Average: 8.7
Seller Details
Year Founded
1997
HQ Location
Wimsheim, DE
Twitter
@WidasGroup
131 Twitter followers
LinkedIn® Page
www.linkedin.com
93 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The HID DigitalPersona software offers a new way to provide authentication services to users. Whereas traditional 2FA/MFA solutions are stuck on “what you have/what you know”, DigitalPersona leverages

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HID DigitalPersona features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1991
    HQ Location
    Austin, TX
    Twitter
    @HIDGlobal
    12,044 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,816 employees on LinkedIn®
    Phone
    (800) 237-7769
Product Description
How are these determined?Information
This description is provided by the seller.

The HID DigitalPersona software offers a new way to provide authentication services to users. Whereas traditional 2FA/MFA solutions are stuck on “what you have/what you know”, DigitalPersona leverages

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 25% Mid-Market
HID DigitalPersona features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1991
HQ Location
Austin, TX
Twitter
@HIDGlobal
12,044 Twitter followers
LinkedIn® Page
www.linkedin.com
3,816 employees on LinkedIn®
Phone
(800) 237-7769
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetIQ Advanced Authentication is a standards-based framework built to meet today’s authentication challenges. Its open architecture is designed to enable organizations to protect their applications an

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText NetIQ Advanced Authentication features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.0
    5.0
    Multi-Device Sync
    Average: 8.9
    8.3
    Easy Setup
    Average: 9.0
    5.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,628 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    23,200 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

NetIQ Advanced Authentication is a standards-based framework built to meet today’s authentication challenges. Its open architecture is designed to enable organizations to protect their applications an

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Small-Business
OpenText NetIQ Advanced Authentication features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.0
5.0
Multi-Device Sync
Average: 8.9
8.3
Easy Setup
Average: 9.0
5.0
Backup
Average: 8.7
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,628 Twitter followers
LinkedIn® Page
www.linkedin.com
23,200 employees on LinkedIn®
Ownership
NASDAQ:OTEX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The HID Authentication Service provides a secure and scalable authentication platform for trusted identity, along with HID’s mobile authentication solution, HID Approve™. The Authentication Service of

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HID Authentication Service features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    6.7
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1991
    HQ Location
    Austin, TX
    Twitter
    @HIDGlobal
    12,044 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,816 employees on LinkedIn®
    Phone
    (800) 237-7769
Product Description
How are these determined?Information
This description is provided by the seller.

The HID Authentication Service provides a secure and scalable authentication platform for trusted identity, along with HID’s mobile authentication solution, HID Approve™. The Authentication Service of

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
HID Authentication Service features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
6.7
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Year Founded
1991
HQ Location
Austin, TX
Twitter
@HIDGlobal
12,044 Twitter followers
LinkedIn® Page
www.linkedin.com
3,816 employees on LinkedIn®
Phone
(800) 237-7769