Introducing G2.ai, the future of software buying.Try now

Best Multi-Factor Authentication (MFA) Software - Page 8

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Multi-factor authentication (MFA) software secures users’ accounts by requiring them to prove their identity in two or more ways before granting access to accounts, sensitive information, systems, or applications. In addition to a single authentication factor, such as inputting a username and password, users are prompted to provide a second authentication factor to validate who the user says they are. Examples of authentication factors include one-time passcodes (OTPs) for SMS, email, or phone call, software tokens, hardware tokens, which are commonly small thumb drives or keycards, mobile-push on a software application to a mobile device, biometric factors, and contextual or risk-based authentication.

Businesses use MFA tools for security purposes to confirm a user is who they say they are prior to accessing privileged information or applications. This software can help companies prevent internal theft or data loss, as well as external access from unapproved parties. MFA tools are traditionally used by businesses, but they can also be used by individuals hoping to improve security on their personal devices or online accounts.

Risk-based authentication software is a form of MFA, but achieves authentication through different means by taking into account factors such as the user’s geolocation, IP address, IP address reputation, time since last authentication, device posture, device management, and other factors to determine the user’s authentication and risk. Passwordless authentication software is a form of MFA as well, which eliminates passwords as an authentication factor, instead relying on additional factors to authenticate a user.

MFA software can be sold as a point solution, where it can be integrated with a business’ user accounts, or it can be sold as part of a compound solution, typically in identity products, such as workforce-based identity and access management (IAM) software or customer-based customer identity and access management (CIAM) solutions.

To qualify for inclusion in the Multi-Factor Authentication (MFA) category, a product must:

Utilize a secondary authentication method such as OTPs, mobile push, software token, hardware token, biometric factors, or more
Prompt authentication from a user
Allow for triggered MFA for new users and devices
Show More
Show Less

Featured Multi-Factor Authentication (MFA) Software At A Glance

Free Plan Available:
ManageEngine ADSelfService Plus
Sponsored
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Multi-Factor Authentication (MFA) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
259 Listings in Multi-Factor Authentication (MFA) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The HID Authentication Service provides a secure and scalable authentication platform for trusted identity, along with HID’s mobile authentication solution, HID Approve™. The Authentication Service of

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HID Authentication Service features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    6.7
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1991
    HQ Location
    Austin, TX
    Twitter
    @HIDGlobal
    12,044 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,816 employees on LinkedIn®
    Phone
    (800) 237-7769
Product Description
How are these determined?Information
This description is provided by the seller.

The HID Authentication Service provides a secure and scalable authentication platform for trusted identity, along with HID’s mobile authentication solution, HID Approve™. The Authentication Service of

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
HID Authentication Service features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
6.7
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Year Founded
1991
HQ Location
Austin, TX
Twitter
@HIDGlobal
12,044 Twitter followers
LinkedIn® Page
www.linkedin.com
3,816 employees on LinkedIn®
Phone
(800) 237-7769
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Infisign is a pioneering Identity and Access Management (IAM) platform that empowers organizations to securely manage digital and customer identities (CIAM) across diverse environments. By leveraging

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Infisign Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    5
    Easy Integrations
    4
    Single Sign-On
    4
    SSO (Single Sign-On)
    4
    Automation
    3
    Cons
    Complex Pricing
    1
    Confusing Interface
    1
    Cost Issues
    1
    Expensive
    1
    Insufficient Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Infisign features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Entrans
    Year Founded
    2020
    HQ Location
    Branchburg, New Jersey
    Twitter
    @InfisignInc
    27 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    298 employees on LinkedIn®
    Phone
    +1 (862) 386 8165
Product Description
How are these determined?Information
This description is provided by the seller.

Infisign is a pioneering Identity and Access Management (IAM) platform that empowers organizations to securely manage digital and customer identities (CIAM) across diverse environments. By leveraging

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Infisign Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
5
Easy Integrations
4
Single Sign-On
4
SSO (Single Sign-On)
4
Automation
3
Cons
Complex Pricing
1
Confusing Interface
1
Cost Issues
1
Expensive
1
Insufficient Information
1
Infisign features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Entrans
Year Founded
2020
HQ Location
Branchburg, New Jersey
Twitter
@InfisignInc
27 Twitter followers
LinkedIn® Page
www.linkedin.com
298 employees on LinkedIn®
Phone
+1 (862) 386 8165

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    🔐 Mirket MFA – Unified Identity Protection Beyond Just Authentication Mirket MFA is more than just multi-factor authentication. It’s a comprehensive identity security platform designed to protect use

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Mirket Multi Factor Authentication Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    2
    2FA Security
    1
    Automation
    1
    Ease of Management
    1
    Flexibility
    1
    Cons
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mirket Multi Factor Authentication features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    London, GB
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

🔐 Mirket MFA – Unified Identity Protection Beyond Just Authentication Mirket MFA is more than just multi-factor authentication. It’s a comprehensive identity security platform designed to protect use

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
Mirket Multi Factor Authentication Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
2
2FA Security
1
Automation
1
Ease of Management
1
Flexibility
1
Cons
Slow Performance
1
Mirket Multi Factor Authentication features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
10.0
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Year Founded
2020
HQ Location
London, GB
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OnlyKey is an open source alternative to YubiKey. Like a swiss army knife of authentication, OnlyKey natively supports: a hardware password manager, multiple two-factor methods (FIDO2 / U2F, TOTP, and

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • onlykey Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Automation
    1
    Easy Access
    1
    Flexibility
    1
    Security
    1
    Cons
    Missing Features
    1
    Product Issues
    1
    Setup Difficulties
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • onlykey features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OnlyKey is an open source alternative to YubiKey. Like a swiss army knife of authentication, OnlyKey natively supports: a hardware password manager, multiple two-factor methods (FIDO2 / U2F, TOTP, and

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
onlykey Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Automation
1
Easy Access
1
Flexibility
1
Security
1
Cons
Missing Features
1
Product Issues
1
Setup Difficulties
1
onlykey features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SAASPASS is your key to the world. By providing a comprehensive and frictionless solution fully-secured with dynamic passcodes and multi-factor authentication, SAASPASS is the only identity and access

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SAASPASS features and usability ratings that predict user satisfaction
    3.3
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SAASPASS
    Year Founded
    2013
    HQ Location
    San Francisco, US
    Twitter
    @saaspass
    529 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SAASPASS is your key to the world. By providing a comprehensive and frictionless solution fully-secured with dynamic passcodes and multi-factor authentication, SAASPASS is the only identity and access

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
SAASPASS features and usability ratings that predict user satisfaction
3.3
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
SAASPASS
Year Founded
2013
HQ Location
San Francisco, US
Twitter
@saaspass
529 Twitter followers
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Smart Eye Technology protects businesses that share highly sensitive files such as financials, legal contracts, wiring instructions, employee information, new innovative ideas, and more. Whether shar

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Smart Eye Technology features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Atlanta, US
    Twitter
    @GetSmartEye
    39 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Smart Eye Technology protects businesses that share highly sensitive files such as financials, legal contracts, wiring instructions, employee information, new innovative ideas, and more. Whether shar

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Smart Eye Technology features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2018
HQ Location
Atlanta, US
Twitter
@GetSmartEye
39 Twitter followers
LinkedIn® Page
www.linkedin.com
8 employees on LinkedIn®
Entry Level Price:Starting at $99.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SSOJet: Streamlined Enterprise SSO Integration for B2B SaaS SSOJet eliminates the engineering nightmare of building custom SSO integrations for enterprise customers. Instead of spending weeks or mo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SSOJet Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Setup
    1
    Onboarding
    1
    Single Sign-On
    1
    SSO (Single Sign-On)
    1
    Cons
    Customization Difficulties
    1
    Small Business Challenges
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SSOJet features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SSOJet
    Year Founded
    2025
    HQ Location
    San Francisco, US
    Twitter
    @sso_jet
    60 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SSOJet: Streamlined Enterprise SSO Integration for B2B SaaS SSOJet eliminates the engineering nightmare of building custom SSO integrations for enterprise customers. Instead of spending weeks or mo

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
SSOJet Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Setup
1
Onboarding
1
Single Sign-On
1
SSO (Single Sign-On)
1
Cons
Customization Difficulties
1
Small Business Challenges
1
SSOJet features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
8.3
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Seller
SSOJet
Year Founded
2025
HQ Location
San Francisco, US
Twitter
@sso_jet
60 Twitter followers
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Transmit Security CIAM Platform helps cybersecurity leaders, identity professionals and digital product teams provide strong account protection and a seamless user experience across the entire custome

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Transmit Security CIAM Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Multi-Device Sync
    Average: 8.9
    6.7
    Easy Setup
    Average: 9.0
    6.7
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Tel Aviv-Yafo, Tel Aviv District, Israel
    Twitter
    @TransmitSec
    721 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    311 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Transmit Security CIAM Platform helps cybersecurity leaders, identity professionals and digital product teams provide strong account protection and a seamless user experience across the entire custome

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 25% Enterprise
Transmit Security CIAM Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
8.3
Multi-Device Sync
Average: 8.9
6.7
Easy Setup
Average: 9.0
6.7
Backup
Average: 8.7
Seller Details
Year Founded
2014
HQ Location
Tel Aviv-Yafo, Tel Aviv District, Israel
Twitter
@TransmitSec
721 Twitter followers
LinkedIn® Page
www.linkedin.com
311 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    TrustBuilder is your reliable partner in cybersecurity. We go beyond the traditional software firm role, focusing on delivering robust and secure solutions that foster trust among enterprises. Our com

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TrustBuilder features and usability ratings that predict user satisfaction
    0.0
    No information available
    6.7
    Multi-Device Sync
    Average: 8.9
    8.3
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    Paris, FR
    LinkedIn® Page
    www.linkedin.com
    60 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

TrustBuilder is your reliable partner in cybersecurity. We go beyond the traditional software firm role, focusing on delivering robust and secure solutions that foster trust among enterprises. Our com

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Enterprise
TrustBuilder features and usability ratings that predict user satisfaction
0.0
No information available
6.7
Multi-Device Sync
Average: 8.9
8.3
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Year Founded
2010
HQ Location
Paris, FR
LinkedIn® Page
www.linkedin.com
60 employees on LinkedIn®
(4)3.7 out of 5
View top Consulting Services for Web3Auth
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Web3Auth is a leading Wallet-as-a-Service (WaaS provider that simplifies the integration of non-custodial wallets into applications, enabling users to manage their digital assets seamlessly. By levera

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Web3Auth Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Easy Integrations
    2
    Integrations
    1
    Password Management
    1
    Single Sign-On
    1
    Cons
    Compatibility Issues
    1
    Configuration Issues
    1
    Difficult Learning
    1
    Difficult Learning Process
    1
    Limited Compatibility
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Web3Auth features and usability ratings that predict user satisfaction
    5.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Multi-Device Sync
    Average: 8.9
    6.7
    Easy Setup
    Average: 9.0
    8.3
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Web3Auth
    Year Founded
    2018
    HQ Location
    Singapore, SG
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Web3Auth is a leading Wallet-as-a-Service (WaaS provider that simplifies the integration of non-custodial wallets into applications, enabling users to manage their digital assets seamlessly. By levera

Users
No information available
Industries
No information available
Market Segment
  • 75% Small-Business
  • 25% Mid-Market
Web3Auth Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Easy Integrations
2
Integrations
1
Password Management
1
Single Sign-On
1
Cons
Compatibility Issues
1
Configuration Issues
1
Difficult Learning
1
Difficult Learning Process
1
Limited Compatibility
1
Web3Auth features and usability ratings that predict user satisfaction
5.0
Has the product been a good partner in doing business?
Average: 9.0
8.3
Multi-Device Sync
Average: 8.9
6.7
Easy Setup
Average: 9.0
8.3
Backup
Average: 8.7
Seller Details
Seller
Web3Auth
Year Founded
2018
HQ Location
Singapore, SG
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Today, enterprises are going through rapid transformation with their workforce becoming hybrid, applications moving to cloud and personal devices being allowed. Organizations expose themselves to cybe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zaperon Identity-centric SSE Platform features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Multi-Device Sync
    Average: 8.9
    0.0
    No information available
    8.3
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zaperon
    Year Founded
    2021
    HQ Location
    Delhi, IN
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Today, enterprises are going through rapid transformation with their workforce becoming hybrid, applications moving to cloud and personal devices being allowed. Organizations expose themselves to cybe

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
Zaperon Identity-centric SSE Platform features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.0
8.3
Multi-Device Sync
Average: 8.9
0.0
No information available
8.3
Backup
Average: 8.7
Seller Details
Seller
Zaperon
Year Founded
2021
HQ Location
Delhi, IN
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    𝗧𝗵𝗲 𝗖𝗼𝗺𝗽𝗮𝗻𝘆 Admin By Request is a leading vendor of SaaS-based enterprise security solutions delivered via our award-winning Admin By Request Zero Trust Platform. Our global team can be found in offi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 44% Mid-Market
    • 38% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Admin By Request Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Customer Support
    3
    Easy Integrations
    3
    Easy Management
    3
    Easy Setup
    3
    Cons
    Setup Difficulties
    2
    Access Control
    1
    Access Restrictions
    1
    Admin Limitations
    1
    Authentication Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Admin By Request features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    San Francisco, California
    Twitter
    @AdminByRequest
    2,401 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    125 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

𝗧𝗵𝗲 𝗖𝗼𝗺𝗽𝗮𝗻𝘆 Admin By Request is a leading vendor of SaaS-based enterprise security solutions delivered via our award-winning Admin By Request Zero Trust Platform. Our global team can be found in offi

Users
No information available
Industries
No information available
Market Segment
  • 44% Mid-Market
  • 38% Enterprise
Admin By Request Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Customer Support
3
Easy Integrations
3
Easy Management
3
Easy Setup
3
Cons
Setup Difficulties
2
Access Control
1
Access Restrictions
1
Admin Limitations
1
Authentication Issues
1
Admin By Request features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 9.0
10.0
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
HQ Location
San Francisco, California
Twitter
@AdminByRequest
2,401 Twitter followers
LinkedIn® Page
www.linkedin.com
125 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AShield provides the zero phishing and Fraud Protection with the world's strongest device-binding solution across devises. AShield's founders possess deep domain expertise in the field of telecom and

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AShield Digital Identity as a Service Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Use
    1
    Easy Integrations
    1
    Implementation Ease
    1
    Cons
    Missing Features
    1
    Poor UI Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AShield Digital Identity as a Service features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Singapore, SG
    Twitter
    @AShieldCo
    19 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    39 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AShield provides the zero phishing and Fraud Protection with the world's strongest device-binding solution across devises. AShield's founders possess deep domain expertise in the field of telecom and

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
AShield Digital Identity as a Service Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Use
1
Easy Integrations
1
Implementation Ease
1
Cons
Missing Features
1
Poor UI Design
1
AShield Digital Identity as a Service features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Year Founded
2018
HQ Location
Singapore, SG
Twitter
@AShieldCo
19 Twitter followers
LinkedIn® Page
www.linkedin.com
39 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Unlike all competing multi-factor authentication solutions, the unique AuthLite technology teaches your Active Directory how to natively understand two-factor authentication.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AuthLite Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Setup
    1
    Single Sign-On
    1
    SSO Security
    1
    Cons
    Limited Customization
    1
    Poor Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AuthLite features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AuthLite
    Twitter
    @AuthLite
    62 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Unlike all competing multi-factor authentication solutions, the unique AuthLite technology teaches your Active Directory how to natively understand two-factor authentication.

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
AuthLite Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Setup
1
Single Sign-On
1
SSO Security
1
Cons
Limited Customization
1
Poor Reporting
1
AuthLite features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
AuthLite
Twitter
@AuthLite
62 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Authyo makes authentication simple and secure. Use passwordless login, OTPs, and multi-factor authentication via SMS, Email, Voice, WhatsApp, or QR—all in one platform. With easy-to-use APIs and

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Authyo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    CRM Quality
    1
    Ease of Use
    1
    Easy Integrations
    1
    Integrations
    1
    Cons
    Complexity
    1
    Difficult Learning Process
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Authyo features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    10.0
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Authyo.io
    Year Founded
    2008
    HQ Location
    Ahmedabad, IN
    LinkedIn® Page
    www.linkedin.com
    48 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Authyo makes authentication simple and secure. Use passwordless login, OTPs, and multi-factor authentication via SMS, Email, Voice, WhatsApp, or QR—all in one platform. With easy-to-use APIs and

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Authyo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
CRM Quality
1
Ease of Use
1
Easy Integrations
1
Integrations
1
Cons
Complexity
1
Difficult Learning Process
1
Learning Curve
1
Authyo features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
10.0
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Seller
Authyo.io
Year Founded
2008
HQ Location
Ahmedabad, IN
LinkedIn® Page
www.linkedin.com
48 employees on LinkedIn®