Introducing G2.ai, the future of software buying.Try now

Best Multi-Factor Authentication (MFA) Software - Page 3

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Multi-factor authentication (MFA) software secures users’ accounts by requiring them to prove their identity in two or more ways before granting access to accounts, sensitive information, systems, or applications. In addition to a single authentication factor, such as inputting a username and password, users are prompted to provide a second authentication factor to validate who the user says they are. Examples of authentication factors include one-time passcodes (OTPs) for SMS, email, or phone call, software tokens, hardware tokens, which are commonly small thumb drives or keycards, mobile-push on a software application to a mobile device, biometric factors, and contextual or risk-based authentication.

Businesses use MFA tools for security purposes to confirm a user is who they say they are prior to accessing privileged information or applications. This software can help companies prevent internal theft or data loss, as well as external access from unapproved parties. MFA tools are traditionally used by businesses, but they can also be used by individuals hoping to improve security on their personal devices or online accounts.

Risk-based authentication software is a form of MFA, but achieves authentication through different means by taking into account factors such as the user’s geolocation, IP address, IP address reputation, time since last authentication, device posture, device management, and other factors to determine the user’s authentication and risk. Passwordless authentication software is a form of MFA as well, which eliminates passwords as an authentication factor, instead relying on additional factors to authenticate a user.

MFA software can be sold as a point solution, where it can be integrated with a business’ user accounts, or it can be sold as part of a compound solution, typically in identity products, such as workforce-based identity and access management (IAM) software or customer-based customer identity and access management (CIAM) solutions.

To qualify for inclusion in the Multi-Factor Authentication (MFA) category, a product must:

Utilize a secondary authentication method such as OTPs, mobile push, software token, hardware token, biometric factors, or more
Prompt authentication from a user
Allow for triggered MFA for new users and devices
Show More
Show Less

Featured Multi-Factor Authentication (MFA) Software At A Glance

Free Plan Available:
GateKeeper Proximity Authentication
Sponsored
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Multi-Factor Authentication (MFA) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
259 Listings in Multi-Factor Authentication (MFA) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Thales’ SafeNet Trusted Access is a cloud-based Access Management and Authentication Service. It ensures that no user is a target by allowing you to expand authentication to all users and apps with di

    Users
    No information available
    Industries
    • Computer Networking
    Market Segment
    • 68% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Thales SafeNet Trusted Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Administration Management
    1
    Customer Support
    1
    Customizability
    1
    Customization
    1
    Features
    1
    Cons
    Integration Issues
    1
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Thales SafeNet Trusted Access features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Multi-Device Sync
    Average: 8.9
    8.9
    Easy Setup
    Average: 9.0
    9.4
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin, Texas
    Twitter
    @ThalesCloudSec
    6,879 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,279 employees on LinkedIn®
    Ownership
    EPA:HO
    Total Revenue (USD mm)
    $15,854
Product Description
How are these determined?Information
This description is provided by the seller.

Thales’ SafeNet Trusted Access is a cloud-based Access Management and Authentication Service. It ensures that no user is a target by allowing you to expand authentication to all users and apps with di

Users
No information available
Industries
  • Computer Networking
Market Segment
  • 68% Enterprise
  • 25% Mid-Market
Thales SafeNet Trusted Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Administration Management
1
Customer Support
1
Customizability
1
Customization
1
Features
1
Cons
Integration Issues
1
Poor Customer Support
1
Thales SafeNet Trusted Access features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
9.2
Multi-Device Sync
Average: 8.9
8.9
Easy Setup
Average: 9.0
9.4
Backup
Average: 8.7
Seller Details
HQ Location
Austin, Texas
Twitter
@ThalesCloudSec
6,879 Twitter followers
LinkedIn® Page
www.linkedin.com
1,279 employees on LinkedIn®
Ownership
EPA:HO
Total Revenue (USD mm)
$15,854
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 49% Enterprise
    • 49% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Workforce Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    14
    Access Management
    6
    Intuitive
    6
    Customer Support
    5
    Access Control
    4
    Cons
    Missing Features
    4
    Integration Issues
    2
    Lack of Automation
    2
    Lack of Features
    2
    Browser Extension Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Workforce Identity features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    9.2
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,642 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,948 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 49% Enterprise
  • 49% Mid-Market
CyberArk Workforce Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
14
Access Management
6
Intuitive
6
Customer Support
5
Access Control
4
Cons
Missing Features
4
Integration Issues
2
Lack of Automation
2
Lack of Features
2
Browser Extension Issues
1
CyberArk Workforce Identity features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.0
8.3
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
9.2
Backup
Average: 8.7
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,642 Twitter followers
LinkedIn® Page
www.linkedin.com
4,948 employees on LinkedIn®
Ownership
NASDAQ:CYBR

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protectimus Limited creates reliable products for organizing multifactor authentication in companies of all sizes — from startups to large corporations. The Protectimus lineup includes plugins for q

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 76% Small-Business
    • 24% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Protectimus Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    2FA Security
    1
    Ease of Use
    1
    Easy Setup
    1
    Secure Sharing
    1
    Security
    1
    Cons
    Complexity
    1
    Poor Customer Support
    1
    Update Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Protectimus features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Multi-Device Sync
    Average: 8.9
    9.0
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Dublin, IE
    Twitter
    @Protectimus
    2,759 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    28 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Protectimus Limited creates reliable products for organizing multifactor authentication in companies of all sizes — from startups to large corporations. The Protectimus lineup includes plugins for q

Users
No information available
Industries
No information available
Market Segment
  • 76% Small-Business
  • 24% Mid-Market
Protectimus Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
2FA Security
1
Ease of Use
1
Easy Setup
1
Secure Sharing
1
Security
1
Cons
Complexity
1
Poor Customer Support
1
Update Issues
1
Protectimus features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
10.0
Multi-Device Sync
Average: 8.9
9.0
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Year Founded
2013
HQ Location
Dublin, IE
Twitter
@Protectimus
2,759 Twitter followers
LinkedIn® Page
www.linkedin.com
28 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Azure ExpressRoute lets you extend your on-premises networks into the Microsoft cloud over a private connection facilitated by a connectivity provider. ExpressRoute allows you to establish connections

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 43% Enterprise
    • 36% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Azure ExpressRoute features and usability ratings that predict user satisfaction
    7.5
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    13,133,301 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    220,934 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Azure ExpressRoute lets you extend your on-premises networks into the Microsoft cloud over a private connection facilitated by a connectivity provider. ExpressRoute allows you to establish connections

Users
No information available
Industries
No information available
Market Segment
  • 43% Enterprise
  • 36% Mid-Market
Azure ExpressRoute features and usability ratings that predict user satisfaction
7.5
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
13,133,301 Twitter followers
LinkedIn® Page
www.linkedin.com
220,934 employees on LinkedIn®
Ownership
MSFT
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Frontegg is the only solution that provides robust and scalable user management infrastructure for B2B SaaS, handling the full user journey, from signup to subscription. The platform is multi-tenant a

    Users
    • Software Engineer
    • CTO
    Industries
    • Computer Software
    • Computer & Network Security
    Market Segment
    • 54% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Frontegg Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    45
    Customer Support
    30
    Features
    28
    Integrations
    28
    Easy Integrations
    27
    Cons
    Poor Documentation
    13
    Missing Features
    12
    Integration Issues
    10
    Limited Customization
    10
    Lack of Information
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Frontegg features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.0
    9.3
    Multi-Device Sync
    Average: 8.9
    9.4
    Easy Setup
    Average: 9.0
    9.4
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Mountain View, California, United States
    Twitter
    @FronteggForSaaS
    476 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Frontegg is the only solution that provides robust and scalable user management infrastructure for B2B SaaS, handling the full user journey, from signup to subscription. The platform is multi-tenant a

Users
  • Software Engineer
  • CTO
Industries
  • Computer Software
  • Computer & Network Security
Market Segment
  • 54% Small-Business
  • 33% Mid-Market
Frontegg Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
45
Customer Support
30
Features
28
Integrations
28
Easy Integrations
27
Cons
Poor Documentation
13
Missing Features
12
Integration Issues
10
Limited Customization
10
Lack of Information
9
Frontegg features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.0
9.3
Multi-Device Sync
Average: 8.9
9.4
Easy Setup
Average: 9.0
9.4
Backup
Average: 8.7
Seller Details
Company Website
Year Founded
2019
HQ Location
Mountain View, California, United States
Twitter
@FronteggForSaaS
476 Twitter followers
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®
(58)4.4 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:$1.50
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PortalGuard is a single, unified Identity and Access Management (IAM) platform designed to help organizations streamline their security processes while enhancing user experience. This comprehensive so

    Users
    No information available
    Industries
    • Higher Education
    • Education Management
    Market Segment
    • 57% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PortalGuard Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    19
    Customer Support
    14
    Easy Setup
    11
    Reliability
    11
    Security
    11
    Cons
    Complexity
    4
    Limited Customization
    4
    Limited Features
    4
    Complex Setup
    3
    Delay Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PortalGuard features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    7.7
    Multi-Device Sync
    Average: 8.9
    8.5
    Easy Setup
    Average: 9.0
    7.4
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BIO-key
    Company Website
    Year Founded
    1993
    HQ Location
    Wall, NJ
    Twitter
    @BIOkeyIntl
    1,497 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    69 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PortalGuard is a single, unified Identity and Access Management (IAM) platform designed to help organizations streamline their security processes while enhancing user experience. This comprehensive so

Users
No information available
Industries
  • Higher Education
  • Education Management
Market Segment
  • 57% Mid-Market
  • 40% Enterprise
PortalGuard Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
19
Customer Support
14
Easy Setup
11
Reliability
11
Security
11
Cons
Complexity
4
Limited Customization
4
Limited Features
4
Complex Setup
3
Delay Issues
3
PortalGuard features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
7.7
Multi-Device Sync
Average: 8.9
8.5
Easy Setup
Average: 9.0
7.4
Backup
Average: 8.7
Seller Details
Seller
BIO-key
Company Website
Year Founded
1993
HQ Location
Wall, NJ
Twitter
@BIOkeyIntl
1,497 Twitter followers
LinkedIn® Page
www.linkedin.com
69 employees on LinkedIn®
Entry Level Price:$3.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PingID is a cloud-based, adaptive multi-factor authentication solution designed to enhance security while maintaining user convenience. It enables organizations to implement strong authentication meas

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 72% Enterprise
    • 19% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PingID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    11
    Security
    8
    Biometric Authentication
    6
    Implementation Ease
    3
    Reliability
    3
    Cons
    Authentication Issues
    3
    Login Issues
    3
    Notification Issues
    3
    Complex Setup
    2
    Delay Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PingID features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Multi-Device Sync
    Average: 8.9
    9.3
    Easy Setup
    Average: 9.0
    8.5
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,247 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,223 employees on LinkedIn®
    Phone
    1.303.468.2900
Product Description
How are these determined?Information
This description is provided by the seller.

PingID is a cloud-based, adaptive multi-factor authentication solution designed to enhance security while maintaining user convenience. It enables organizations to implement strong authentication meas

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 72% Enterprise
  • 19% Small-Business
PingID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
11
Security
8
Biometric Authentication
6
Implementation Ease
3
Reliability
3
Cons
Authentication Issues
3
Login Issues
3
Notification Issues
3
Complex Setup
2
Delay Issues
2
PingID features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.0
9.2
Multi-Device Sync
Average: 8.9
9.3
Easy Setup
Average: 9.0
8.5
Backup
Average: 8.7
Seller Details
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,247 Twitter followers
LinkedIn® Page
www.linkedin.com
2,223 employees on LinkedIn®
Phone
1.303.468.2900
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Socure’s patented machine learning platform powers an elevated standard for seamless CIP/KYC compliance, fraud detection, ID document verification, and bank account ownership validation through a purp

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 52% Mid-Market
    • 32% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Socure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Customer Support
    1
    Documentation
    1
    Ease of Setup
    1
    Easy Setup
    1
    Cons
    Account Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Socure features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Socure
    Year Founded
    2012
    HQ Location
    Incline Village, Nevada
    LinkedIn® Page
    www.linkedin.com
    478 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Socure’s patented machine learning platform powers an elevated standard for seamless CIP/KYC compliance, fraud detection, ID document verification, and bank account ownership validation through a purp

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 52% Mid-Market
  • 32% Small-Business
Socure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Customer Support
1
Documentation
1
Ease of Setup
1
Easy Setup
1
Cons
Account Management
1
Socure features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Socure
Year Founded
2012
HQ Location
Incline Village, Nevada
LinkedIn® Page
www.linkedin.com
478 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secret Double Octopus is the passwordless authentication solution for the enterprise. We liberate end-users and security teams from the burden of passwords with the simplicity and security of strong p

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 68% Small-Business
    • 18% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Secret Double Octopus features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    9.3
    Multi-Device Sync
    Average: 8.9
    8.1
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Tel-Aviv, Tel-Aviv
    Twitter
    @double_octopus
    958 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    38 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secret Double Octopus is the passwordless authentication solution for the enterprise. We liberate end-users and security teams from the burden of passwords with the simplicity and security of strong p

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 68% Small-Business
  • 18% Mid-Market
Secret Double Octopus features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
9.3
Multi-Device Sync
Average: 8.9
8.1
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Year Founded
2015
HQ Location
Tel-Aviv, Tel-Aviv
Twitter
@double_octopus
958 Twitter followers
LinkedIn® Page
www.linkedin.com
38 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    InstaSafe is redefining the challenge of secure access to modern networks by leveraging Zero Trust principles with its security solutions, that ensure seamless access to cloud applications, SAP applic

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 53% Mid-Market
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Instasafe ZTAA features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Multi-Device Sync
    Average: 8.9
    8.8
    Easy Setup
    Average: 9.0
    8.6
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    San Francisco, Walnut, CA
    Twitter
    @InstaSafe
    728 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    74 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

InstaSafe is redefining the challenge of secure access to modern networks by leveraging Zero Trust principles with its security solutions, that ensure seamless access to cloud applications, SAP applic

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 53% Mid-Market
  • 31% Enterprise
Instasafe ZTAA features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.0
9.2
Multi-Device Sync
Average: 8.9
8.8
Easy Setup
Average: 9.0
8.6
Backup
Average: 8.7
Seller Details
Year Founded
2012
HQ Location
San Francisco, Walnut, CA
Twitter
@InstaSafe
728 Twitter followers
LinkedIn® Page
www.linkedin.com
74 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BlackBerry UEM is a suite of solutions that all rely on the same foundation of security to secure the digital workplace. It keeps employees productive on any device, anywhere, while allowing your secu

    Users
    • Consultant
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 55% Enterprise
    • 27% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BlackBerry UEM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Security
    5
    Easy Access
    4
    File Sharing
    4
    Intuitive
    4
    Cons
    Expensive
    4
    Missing Features
    3
    Outdated Technology
    3
    Poor Interface Design
    3
    Poor UI
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlackBerry UEM features and usability ratings that predict user satisfaction
    7.8
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1984
    HQ Location
    Waterloo, Ontario
    Twitter
    @BlackBerry
    2,781,226 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,098 employees on LinkedIn®
    Ownership
    NYSE:BB
Product Description
How are these determined?Information
This description is provided by the seller.

BlackBerry UEM is a suite of solutions that all rely on the same foundation of security to secure the digital workplace. It keeps employees productive on any device, anywhere, while allowing your secu

Users
  • Consultant
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 55% Enterprise
  • 27% Small-Business
BlackBerry UEM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Security
5
Easy Access
4
File Sharing
4
Intuitive
4
Cons
Expensive
4
Missing Features
3
Outdated Technology
3
Poor Interface Design
3
Poor UI
3
BlackBerry UEM features and usability ratings that predict user satisfaction
7.8
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1984
HQ Location
Waterloo, Ontario
Twitter
@BlackBerry
2,781,226 Twitter followers
LinkedIn® Page
www.linkedin.com
2,098 employees on LinkedIn®
Ownership
NYSE:BB
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

    Users
    No information available
    Industries
    • Hospital & Health Care
    Market Segment
    • 141% Mid-Market
    • 66% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureAuth: Workforce IAM features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Multi-Device Sync
    Average: 8.9
    8.3
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Irvine, CA
    Twitter
    @SecureAuth
    8,633 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    151 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

Users
No information available
Industries
  • Hospital & Health Care
Market Segment
  • 141% Mid-Market
  • 66% Small-Business
SecureAuth: Workforce IAM features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.0
10.0
Multi-Device Sync
Average: 8.9
8.3
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Company Website
Year Founded
2005
HQ Location
Irvine, CA
Twitter
@SecureAuth
8,633 Twitter followers
LinkedIn® Page
www.linkedin.com
151 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Uniqkey: Protect every login. Access with confidence. Uniqkey is Europe’s trusted password and access management platform - purpose-built for companies that demand security, simplicity, and control

    Users
    No information available
    Industries
    • Marketing and Advertising
    • Accounting
    Market Segment
    • 61% Small-Business
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Uniqkey Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Customer Support
    4
    Easy Setup
    4
    Password Generation
    4
    Security
    4
    Cons
    Login Issues
    3
    Password Issues
    3
    Slow Performance
    3
    Password Management
    2
    Biometric Recognition Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Uniqkey features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.0
    8.7
    Multi-Device Sync
    Average: 8.9
    8.7
    Easy Setup
    Average: 9.0
    7.9
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Uniqkey
    Year Founded
    2017
    HQ Location
    Herlev, Hovedstaden
    Twitter
    @uniqkeyofficial
    248 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Uniqkey: Protect every login. Access with confidence. Uniqkey is Europe’s trusted password and access management platform - purpose-built for companies that demand security, simplicity, and control

Users
No information available
Industries
  • Marketing and Advertising
  • Accounting
Market Segment
  • 61% Small-Business
  • 39% Mid-Market
Uniqkey Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Customer Support
4
Easy Setup
4
Password Generation
4
Security
4
Cons
Login Issues
3
Password Issues
3
Slow Performance
3
Password Management
2
Biometric Recognition Issues
1
Uniqkey features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.0
8.7
Multi-Device Sync
Average: 8.9
8.7
Easy Setup
Average: 9.0
7.9
Backup
Average: 8.7
Seller Details
Seller
Uniqkey
Year Founded
2017
HQ Location
Herlev, Hovedstaden
Twitter
@uniqkeyofficial
248 Twitter followers
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OLOID is a passwordless authentication platform designed to secure access to both digital systems and physical facilities without requiring passwords, usernames, mobile phones, or hardware tokens. It

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Mid-Market
    • 28% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OLOID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    24
    Customer Support
    9
    Setup Ease
    8
    Easy Integrations
    7
    Easy Setup
    7
    Cons
    Performance Issues
    5
    Storage Limitations
    4
    Lagging Performance
    3
    Size Issues
    3
    Data Inaccuracy
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OLOID features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oloid
    Year Founded
    2018
    HQ Location
    Sunnyvale, US
    Twitter
    @oloid_ai
    65 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    81 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OLOID is a passwordless authentication platform designed to secure access to both digital systems and physical facilities without requiring passwords, usernames, mobile phones, or hardware tokens. It

Users
No information available
Industries
No information available
Market Segment
  • 47% Mid-Market
  • 28% Enterprise
OLOID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
24
Customer Support
9
Setup Ease
8
Easy Integrations
7
Easy Setup
7
Cons
Performance Issues
5
Storage Limitations
4
Lagging Performance
3
Size Issues
3
Data Inaccuracy
2
OLOID features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Oloid
Year Founded
2018
HQ Location
Sunnyvale, US
Twitter
@oloid_ai
65 Twitter followers
LinkedIn® Page
www.linkedin.com
81 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RingCaptcha offers phone 2FA, OTP, SMS, voice API to help companies verify, engage, and retain end-users - 'Real Users, Real Contact'. With RingCaptcha, you integrate once with us and gain access to t

    Users
    No information available
    Industries
    • Internet
    Market Segment
    • 66% Small-Business
    • 23% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RingCaptcha features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    10.0
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    San Francisco, CA
    Twitter
    @ringcaptcha
    224 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RingCaptcha offers phone 2FA, OTP, SMS, voice API to help companies verify, engage, and retain end-users - 'Real Users, Real Contact'. With RingCaptcha, you integrate once with us and gain access to t

Users
No information available
Industries
  • Internet
Market Segment
  • 66% Small-Business
  • 23% Mid-Market
RingCaptcha features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
10.0
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Year Founded
2012
HQ Location
San Francisco, CA
Twitter
@ringcaptcha
224 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®