Best Multi-Factor Authentication (MFA) Software with Mobile-Push Capabilities

Benefits of Multi-Factor Authentication (MFA) Software with Mobile-Push capabilities include: Offers mobile push authentication, which is a user-friendly method that does not require a user to copy a code, but rather accept or deny an authentication using a mobile application. Mobile push authentication only works when a user is connected to the internet.
Below are the top-rated Multi-Factor Authentication (MFA) Software with Mobile-Push capabilities, as verified by G2’s Research team. Real users have identified Mobile-Push as an important function of Multi-Factor Authentication (MFA) Software. Compare different products that offer this feature so you can decide which is best for your business needs.
Show More
Show Less

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

1 filter applied
Clear All
10 Listings in Multi-Factor Authentication (MFA) Available
(540)4.6 out of 5
2nd Easiest To Use in Multi-Factor Authentication (MFA) software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Google Authenticator is a mobile application developed by Google that enhances the security of online accounts through two-factor authentication (2FA). By generating time-based one-time passwords (TOT

    Users
    • Software Engineer
    • Owner
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 45% Small-Business
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Google Authenticator Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    40
    Security
    24
    Time-Saving
    12
    2FA Security
    11
    Easy Setup
    11
    Cons
    Missing Features
    7
    Inadequate Security
    6
    Password Management
    6
    Authentication Issues
    5
    Limited Features
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Authenticator features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Multi-Device Sync
    Average: 8.9
    9.5
    Easy Setup
    Average: 9.0
    8.4
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    31,755,640 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    325,935 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Google Authenticator is a mobile application developed by Google that enhances the security of online accounts through two-factor authentication (2FA). By generating time-based one-time passwords (TOT

Users
  • Software Engineer
  • Owner
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 45% Small-Business
  • 36% Mid-Market
Google Authenticator Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
40
Security
24
Time-Saving
12
2FA Security
11
Easy Setup
11
Cons
Missing Features
7
Inadequate Security
6
Password Management
6
Authentication Issues
5
Limited Features
5
Google Authenticator features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
8.8
Multi-Device Sync
Average: 8.9
9.5
Easy Setup
Average: 9.0
8.4
Backup
Average: 8.7
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
31,755,640 Twitter followers
LinkedIn® Page
www.linkedin.com
325,935 employees on LinkedIn®
Ownership
NASDAQ:GOOG
(495)4.5 out of 5
Optimized for quick response
1st Easiest To Use in Multi-Factor Authentication (MFA) software
View top Consulting Services for Cisco Duo
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

    Users
    • Software Engineer
    • Consultant
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 41% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Duo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    71
    Security
    67
    Authentication
    46
    Easy Access
    46
    Authentication Ease
    40
    Cons
    Authentication Issues
    24
    Login Issues
    16
    Complexity
    15
    Notification Issues
    15
    Delay Issues
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Duo features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Multi-Device Sync
    Average: 8.9
    9.0
    Easy Setup
    Average: 9.0
    8.1
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Company Website
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    721,514 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,386 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

Users
  • Software Engineer
  • Consultant
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 41% Enterprise
  • 37% Mid-Market
Cisco Duo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
71
Security
67
Authentication
46
Easy Access
46
Authentication Ease
40
Cons
Authentication Issues
24
Login Issues
16
Complexity
15
Notification Issues
15
Delay Issues
14
Cisco Duo features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
8.8
Multi-Device Sync
Average: 8.9
9.0
Easy Setup
Average: 9.0
8.1
Backup
Average: 8.7
Seller Details
Seller
Cisco
Company Website
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
721,514 Twitter followers
LinkedIn® Page
www.linkedin.com
95,386 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
(182)4.3 out of 5
Optimized for quick response
Entry Level Price:$1.71 / user, per month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 53% Enterprise
    • 40% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • IBM Verify CIAM is a customer identity and access management solution that manages customer accounts, handles identity verification, and ensures secure logins across various platforms.
    • Reviewers like the strong security features of IBM Verify CIAM, including single sign-on and multi-factor authentication, which reduce login problems and protect user data.
    • Users experienced complexity during the initial setup and configuration, and suggested improvements such as a more visual dashboard and step-by-step tutorial features.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Verify CIAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    61
    Ease of Use
    48
    Authentication
    38
    Features
    29
    MFA Authentication
    29
    Cons
    Complex Setup
    38
    Complexity
    35
    Difficult Learning
    33
    Difficult Setup
    31
    Complex Administration
    30
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Verify CIAM features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    8.2
    Multi-Device Sync
    Average: 8.9
    7.8
    Easy Setup
    Average: 9.0
    8.6
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Company Website
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    708,798 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    339,241 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 53% Enterprise
  • 40% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • IBM Verify CIAM is a customer identity and access management solution that manages customer accounts, handles identity verification, and ensures secure logins across various platforms.
  • Reviewers like the strong security features of IBM Verify CIAM, including single sign-on and multi-factor authentication, which reduce login problems and protect user data.
  • Users experienced complexity during the initial setup and configuration, and suggested improvements such as a more visual dashboard and step-by-step tutorial features.
IBM Verify CIAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
61
Ease of Use
48
Authentication
38
Features
29
MFA Authentication
29
Cons
Complex Setup
38
Complexity
35
Difficult Learning
33
Difficult Setup
31
Complex Administration
30
IBM Verify CIAM features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
8.2
Multi-Device Sync
Average: 8.9
7.8
Easy Setup
Average: 9.0
8.6
Backup
Average: 8.7
Seller Details
Seller
IBM
Company Website
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
708,798 Twitter followers
LinkedIn® Page
www.linkedin.com
339,241 employees on LinkedIn®
(253)4.3 out of 5
11th Easiest To Use in Multi-Factor Authentication (MFA) software
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and se

    Users
    • Software Engineer
    • Software Developer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 47% Small-Business
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Auth0 Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    54
    Security
    47
    Authentication
    39
    Integrations
    34
    Easy Integrations
    33
    Cons
    Expensive
    27
    Cost
    20
    Expensive Pricing
    17
    Difficult Learning
    15
    Complexity
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Auth0 features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    8.7
    Multi-Device Sync
    Average: 8.9
    9.2
    Easy Setup
    Average: 9.0
    9.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okta
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @okta
    42,638 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,230 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and se

Users
  • Software Engineer
  • Software Developer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 47% Small-Business
  • 30% Mid-Market
Auth0 Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
54
Security
47
Authentication
39
Integrations
34
Easy Integrations
33
Cons
Expensive
27
Cost
20
Expensive Pricing
17
Difficult Learning
15
Complexity
12
Auth0 features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
8.7
Multi-Device Sync
Average: 8.9
9.2
Easy Setup
Average: 9.0
9.0
Backup
Average: 8.7
Seller Details
Seller
Okta
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@okta
42,638 Twitter followers
LinkedIn® Page
www.linkedin.com
7,230 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ensure users have convenient, secure access—from any device, anywhere—to the applications they need, whether in the cloud or on-premises. RSA SecurID Access is an enterprise-grade multi-factor authent

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 67% Enterprise
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RSA SecureID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Security
    3
    Security
    3
    Risk Assessment
    2
    2FA Security
    1
    Access Control
    1
    Cons
    Expensive
    2
    2FA Issues
    1
    Complex Administration
    1
    Complexity
    1
    Complex Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RSA SecureID features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    8.6
    Multi-Device Sync
    Average: 8.9
    9.1
    Easy Setup
    Average: 9.0
    7.7
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Bedford, MA
    Twitter
    @RSAsecurity
    110,673 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,735 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ensure users have convenient, secure access—from any device, anywhere—to the applications they need, whether in the cloud or on-premises. RSA SecurID Access is an enterprise-grade multi-factor authent

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 67% Enterprise
  • 27% Mid-Market
RSA SecureID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Security
3
Security
3
Risk Assessment
2
2FA Security
1
Access Control
1
Cons
Expensive
2
2FA Issues
1
Complex Administration
1
Complexity
1
Complex Setup
1
RSA SecureID features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
8.6
Multi-Device Sync
Average: 8.9
9.1
Easy Setup
Average: 9.0
7.7
Backup
Average: 8.7
Seller Details
HQ Location
Bedford, MA
Twitter
@RSAsecurity
110,673 Twitter followers
LinkedIn® Page
www.linkedin.com
2,735 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Two-Factor Authentication smartphone app for consumers, simplest 2fa Rest API for developers and a strong authentication platform for the enterprise.

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 62% Small-Business
    • 32% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Twilio Verify features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Multi-Device Sync
    Average: 8.9
    9.5
    Easy Setup
    Average: 9.0
    9.3
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Twilio
    Year Founded
    2008
    HQ Location
    San Francisco, CA
    Twitter
    @twilio
    81,558 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,627 employees on LinkedIn®
    Ownership
    NYSE: TWLO
Product Description
How are these determined?Information
This description is provided by the seller.

Two-Factor Authentication smartphone app for consumers, simplest 2fa Rest API for developers and a strong authentication platform for the enterprise.

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 62% Small-Business
  • 32% Mid-Market
Twilio Verify features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
9.4
Multi-Device Sync
Average: 8.9
9.5
Easy Setup
Average: 9.0
9.3
Backup
Average: 8.7
Seller Details
Seller
Twilio
Year Founded
2008
HQ Location
San Francisco, CA
Twitter
@twilio
81,558 Twitter followers
LinkedIn® Page
www.linkedin.com
6,627 employees on LinkedIn®
Ownership
NYSE: TWLO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AuthPoint MFA: designed to be fatigue-resistant with features like the phishing toggle that prevent a faulty user experience. With offline and online authentication methods available, you can easily e

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 50% Small-Business
    • 46% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WatchGuard AuthPoint features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Multi-Device Sync
    Average: 8.9
    8.8
    Easy Setup
    Average: 9.0
    8.8
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1996
    HQ Location
    Seatle, WA
    Twitter
    @watchguard
    19,500 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,217 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AuthPoint MFA: designed to be fatigue-resistant with features like the phishing toggle that prevent a faulty user experience. With offline and online authentication methods available, you can easily e

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 50% Small-Business
  • 46% Mid-Market
WatchGuard AuthPoint features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.0
9.4
Multi-Device Sync
Average: 8.9
8.8
Easy Setup
Average: 9.0
8.8
Backup
Average: 8.7
Seller Details
Year Founded
1996
HQ Location
Seatle, WA
Twitter
@watchguard
19,500 Twitter followers
LinkedIn® Page
www.linkedin.com
1,217 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The P

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 67% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ping Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Management
    1
    Customer Support
    1
    Ease of Use
    1
    Identity Management
    1
    Integrations
    1
    Cons
    Authentication Issues
    1
    Complex Administration
    1
    Complex Setup
    1
    Confusing Interface
    1
    Confusing Options
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ping Identity features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.0
    7.7
    Multi-Device Sync
    Average: 8.9
    7.8
    Easy Setup
    Average: 9.0
    7.1
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,171 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,311 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The P

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 67% Enterprise
  • 25% Mid-Market
Ping Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Management
1
Customer Support
1
Ease of Use
1
Identity Management
1
Integrations
1
Cons
Authentication Issues
1
Complex Administration
1
Complex Setup
1
Confusing Interface
1
Confusing Options
1
Ping Identity features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.0
7.7
Multi-Device Sync
Average: 8.9
7.8
Easy Setup
Average: 9.0
7.1
Backup
Average: 8.7
Seller Details
Company Website
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,171 Twitter followers
LinkedIn® Page
www.linkedin.com
2,311 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin e

    Users
    • Account Manager
    Industries
    • Computer Software
    • Education Management
    Market Segment
    • 49% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OneLogin Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Single Sign-On
    8
    SSO (Single Sign-On)
    8
    Ease of Use
    7
    SSO
    6
    Security
    5
    Cons
    Service Interruptions
    5
    Connection Issues
    4
    Bugs
    3
    Error Handling
    3
    Limited Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OneLogin features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Multi-Device Sync
    Average: 8.9
    9.0
    Easy Setup
    Average: 9.0
    9.3
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Aliso Viejo, CA
    Twitter
    @OneIdentity
    7,873 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    667 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin e

Users
  • Account Manager
Industries
  • Computer Software
  • Education Management
Market Segment
  • 49% Mid-Market
  • 40% Enterprise
OneLogin Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Single Sign-On
8
SSO (Single Sign-On)
8
Ease of Use
7
SSO
6
Security
5
Cons
Service Interruptions
5
Connection Issues
4
Bugs
3
Error Handling
3
Limited Features
3
OneLogin features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.0
9.4
Multi-Device Sync
Average: 8.9
9.0
Easy Setup
Average: 9.0
9.3
Backup
Average: 8.7
Seller Details
HQ Location
Aliso Viejo, CA
Twitter
@OneIdentity
7,873 Twitter followers
LinkedIn® Page
www.linkedin.com
667 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

    Users
    No information available
    Industries
    • Hospital & Health Care
    Market Segment
    • 141% Mid-Market
    • 66% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureAuth: Workforce IAM features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Multi-Device Sync
    Average: 8.9
    8.3
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Irvine, CA
    Twitter
    @SecureAuth
    8,599 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    150 employees on LinkedIn®
    Phone
    949-777-6959
Product Description
How are these determined?Information
This description is provided by the seller.

More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

Users
No information available
Industries
  • Hospital & Health Care
Market Segment
  • 141% Mid-Market
  • 66% Small-Business
SecureAuth: Workforce IAM features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.0
10.0
Multi-Device Sync
Average: 8.9
8.3
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Year Founded
2005
HQ Location
Irvine, CA
Twitter
@SecureAuth
8,599 Twitter followers
LinkedIn® Page
www.linkedin.com
150 employees on LinkedIn®
Phone
949-777-6959