Introducing G2.ai, the future of software buying.Try now

Best Multi-Factor Authentication (MFA) Software - Page 9

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Multi-factor authentication (MFA) software secures users’ accounts by requiring them to prove their identity in two or more ways before granting access to accounts, sensitive information, systems, or applications. In addition to a single authentication factor, such as inputting a username and password, users are prompted to provide a second authentication factor to validate who the user says they are. Examples of authentication factors include one-time passcodes (OTPs) for SMS, email, or phone call, software tokens, hardware tokens, which are commonly small thumb drives or keycards, mobile-push on a software application to a mobile device, biometric factors, and contextual or risk-based authentication.

Businesses use MFA tools for security purposes to confirm a user is who they say they are prior to accessing privileged information or applications. This software can help companies prevent internal theft or data loss, as well as external access from unapproved parties. MFA tools are traditionally used by businesses, but they can also be used by individuals hoping to improve security on their personal devices or online accounts.

Risk-based authentication software is a form of MFA, but achieves authentication through different means by taking into account factors such as the user’s geolocation, IP address, IP address reputation, time since last authentication, device posture, device management, and other factors to determine the user’s authentication and risk. Passwordless authentication software is a form of MFA as well, which eliminates passwords as an authentication factor, instead relying on additional factors to authenticate a user.

MFA software can be sold as a point solution, where it can be integrated with a business’ user accounts, or it can be sold as part of a compound solution, typically in identity products, such as workforce-based identity and access management (IAM) software or customer-based customer identity and access management (CIAM) solutions.

To qualify for inclusion in the Multi-Factor Authentication (MFA) category, a product must:

Utilize a secondary authentication method such as OTPs, mobile push, software token, hardware token, biometric factors, or more
Prompt authentication from a user
Allow for triggered MFA for new users and devices
Show More
Show Less

Featured Multi-Factor Authentication (MFA) Software At A Glance

Free Plan Available:
FusionAuth
Sponsored
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
266 Listings in Multi-Factor Authentication (MFA) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AShield provides the zero phishing and Fraud Protection with the world's strongest device-binding solution across devises. AShield's founders possess deep domain expertise in the field of telecom and

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AShield Digital Identity as a Service Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Use
    1
    Easy Integrations
    1
    Implementation Ease
    1
    Cons
    Missing Features
    1
    Poor UI Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AShield Digital Identity as a Service features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Multi-Device Sync
    Average: 8.8
    10.0
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Singapore, SG
    Twitter
    @AShieldCo
    19 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    39 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AShield provides the zero phishing and Fraud Protection with the world's strongest device-binding solution across devises. AShield's founders possess deep domain expertise in the field of telecom and

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
AShield Digital Identity as a Service Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Use
1
Easy Integrations
1
Implementation Ease
1
Cons
Missing Features
1
Poor UI Design
1
AShield Digital Identity as a Service features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Multi-Device Sync
Average: 8.8
10.0
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Year Founded
2018
HQ Location
Singapore, SG
Twitter
@AShieldCo
19 Twitter followers
LinkedIn® Page
www.linkedin.com
39 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Unlike all competing multi-factor authentication solutions, the unique AuthLite technology teaches your Active Directory how to natively understand two-factor authentication.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AuthLite Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Setup
    1
    Single Sign-On
    1
    SSO Security
    1
    Cons
    Limited Customization
    1
    Poor Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AuthLite features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AuthLite
    Twitter
    @AuthLite
    60 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Unlike all competing multi-factor authentication solutions, the unique AuthLite technology teaches your Active Directory how to natively understand two-factor authentication.

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
AuthLite Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Setup
1
Single Sign-On
1
SSO Security
1
Cons
Limited Customization
1
Poor Reporting
1
AuthLite features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
AuthLite
Twitter
@AuthLite
60 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Authyo makes authentication simple and secure. Use passwordless login, OTPs, and multi-factor authentication via SMS, Email, Voice, WhatsApp, or QR—all in one platform. With easy-to-use APIs and

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Authyo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    CRM Quality
    1
    Ease of Use
    1
    Easy Integrations
    1
    Integrations
    1
    Cons
    Complexity
    1
    Difficult Learning Process
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Authyo features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    10.0
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Authyo.io
    Year Founded
    2008
    HQ Location
    Ahmedabad, IN
    LinkedIn® Page
    www.linkedin.com
    48 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Authyo makes authentication simple and secure. Use passwordless login, OTPs, and multi-factor authentication via SMS, Email, Voice, WhatsApp, or QR—all in one platform. With easy-to-use APIs and

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Authyo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
CRM Quality
1
Ease of Use
1
Easy Integrations
1
Integrations
1
Cons
Complexity
1
Difficult Learning Process
1
Learning Curve
1
Authyo features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
10.0
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Seller
Authyo.io
Year Founded
2008
HQ Location
Ahmedabad, IN
LinkedIn® Page
www.linkedin.com
48 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With Clerk, you can add beautiful, high-converting authentication to your React application in minutes. After signing in, Clerk empowers your users to take control of their account security with mult

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Clerk.dev Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Easy Integrations
    1
    Login Ease
    1
    Cons
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Clerk.dev features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Multi-Device Sync
    Average: 8.8
    8.3
    Easy Setup
    Average: 9.0
    8.3
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Clerk.dev
    Year Founded
    2019
    HQ Location
    San Francisco, US
    LinkedIn® Page
    www.linkedin.com
    167 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

With Clerk, you can add beautiful, high-converting authentication to your React application in minutes. After signing in, Clerk empowers your users to take control of their account security with mult

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Clerk.dev Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Easy Integrations
1
Login Ease
1
Cons
Poor Customer Support
1
Clerk.dev features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
10.0
Multi-Device Sync
Average: 8.8
8.3
Easy Setup
Average: 9.0
8.3
Backup
Average: 8.7
Seller Details
Seller
Clerk.dev
Year Founded
2019
HQ Location
San Francisco, US
LinkedIn® Page
www.linkedin.com
167 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Curity is a leading provider of IAM and API security technology that enables user authentication and authorization for a wide range of digital services. The Curity Identity Server is highly scalable,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Curity Identity Server Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Authentication
    1
    Easy Setup
    1
    Implementation Ease
    1
    Process Automation
    1
    User Management
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Curity Identity Server features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Curity
    Year Founded
    2015
    HQ Location
    Stockholm, Stockholm County, Sweden
    LinkedIn® Page
    www.linkedin.com
    49 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Curity is a leading provider of IAM and API security technology that enables user authentication and authorization for a wide range of digital services. The Curity Identity Server is highly scalable,

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Curity Identity Server Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Authentication
1
Easy Setup
1
Implementation Ease
1
Process Automation
1
User Management
1
Cons
Expensive
1
Curity Identity Server features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Curity
Year Founded
2015
HQ Location
Stockholm, Stockholm County, Sweden
LinkedIn® Page
www.linkedin.com
49 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Datawiza Identity Modernization is an identity access management (IAM) and access security solution that enables organizations to add multi-factor authentication (MFA) and single sign-on (SSO) to lega

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Datawiza Identity Modernization features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    California, US
    LinkedIn® Page
    www.linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Datawiza Identity Modernization is an identity access management (IAM) and access security solution that enables organizations to add multi-factor authentication (MFA) and single sign-on (SSO) to lega

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Datawiza Identity Modernization features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2021
HQ Location
California, US
LinkedIn® Page
www.linkedin.com
8 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entrust Identity Essentials is a cost-effective, easy-to-deploy on-premises multi-factor authentication (MFA) solution that lets Windows-based organizations realize a Zero Trust approach to security.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Entrust Identity Essentials features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    10.0
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1969
    HQ Location
    Minneapolis, MN
    Twitter
    @Entrust_Corp
    6,411 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,732 employees on LinkedIn®
    Phone
    1-888-690-2424
Product Description
How are these determined?Information
This description is provided by the seller.

Entrust Identity Essentials is a cost-effective, easy-to-deploy on-premises multi-factor authentication (MFA) solution that lets Windows-based organizations realize a Zero Trust approach to security.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Entrust Identity Essentials features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
10.0
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Year Founded
1969
HQ Location
Minneapolis, MN
Twitter
@Entrust_Corp
6,411 Twitter followers
LinkedIn® Page
www.linkedin.com
3,732 employees on LinkedIn®
Phone
1-888-690-2424
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure Identity Authentication & Lifecycle Management. Enhance security, simplify access and manage identities efficiently. Whether it’s using biometrics to authenticate into a network, managing

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • HID Identity and Access Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    1
    Integration Capabilities
    1
    Integrations
    1
    Reliability
    1
    Cons
    Limited Customization
    1
    Missing Features
    1
    Outdated Features
    1
    Outdated Interface
    1
    Poor Interface Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HID Identity and Access Management features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1991
    HQ Location
    Austin, TX
    Twitter
    @HIDGlobal
    12,036 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,900 employees on LinkedIn®
    Phone
    (800) 237-7769
Product Description
How are these determined?Information
This description is provided by the seller.

Secure Identity Authentication & Lifecycle Management. Enhance security, simplify access and manage identities efficiently. Whether it’s using biometrics to authenticate into a network, managing

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
HID Identity and Access Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
1
Integration Capabilities
1
Integrations
1
Reliability
1
Cons
Limited Customization
1
Missing Features
1
Outdated Features
1
Outdated Interface
1
Poor Interface Design
1
HID Identity and Access Management features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1991
HQ Location
Austin, TX
Twitter
@HIDGlobal
12,036 Twitter followers
LinkedIn® Page
www.linkedin.com
3,900 employees on LinkedIn®
Phone
(800) 237-7769
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Hydra is a twelve factor authentication, authorization and account management service.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hydra Identity Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hydra
    Year Founded
    2019
    HQ Location
    Scottsdale, US
    Twitter
    @HydraHead
    15,194 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    33 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Hydra is a twelve factor authentication, authorization and account management service.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Hydra Identity Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Hydra
Year Founded
2019
HQ Location
Scottsdale, US
Twitter
@HydraHead
15,194 Twitter followers
LinkedIn® Page
www.linkedin.com
33 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Keeper’s patented PAM platform enables organizations to achieve complete visibility, security, control and reporting across every user on every device. KeeperPAM is cloud-based, enables zero-trust and

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • KeeperPAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Flexibility
    4
    Secure Access
    4
    Security
    4
    Access Control
    3
    Cons
    Complexity
    2
    Complex Setup
    2
    Difficult Learning
    2
    Difficult Learning Process
    2
    Access Control
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • KeeperPAM features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Multi-Device Sync
    Average: 8.8
    8.3
    Easy Setup
    Average: 9.0
    8.3
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    Chicago, IL
    Twitter
    @keepersecurity
    18,972 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    723 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Keeper’s patented PAM platform enables organizations to achieve complete visibility, security, control and reporting across every user on every device. KeeperPAM is cloud-based, enables zero-trust and

Users
No information available
Industries
No information available
Market Segment
  • 64% Mid-Market
  • 36% Enterprise
KeeperPAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Flexibility
4
Secure Access
4
Security
4
Access Control
3
Cons
Complexity
2
Complex Setup
2
Difficult Learning
2
Difficult Learning Process
2
Access Control
1
KeeperPAM features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.0
8.3
Multi-Device Sync
Average: 8.8
8.3
Easy Setup
Average: 9.0
8.3
Backup
Average: 8.7
Seller Details
Company Website
Year Founded
2011
HQ Location
Chicago, IL
Twitter
@keepersecurity
18,972 Twitter followers
LinkedIn® Page
www.linkedin.com
723 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    nextAuth provides a patented mobile passwordless multi-factor authentication solution and e-signature solution. Organisations looking to fend off phishing, brute-forcing, and other password-based att

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • nextAuth features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    6.7
    Multi-Device Sync
    Average: 8.8
    6.7
    Easy Setup
    Average: 9.0
    6.7
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    nextAuth
    HQ Location
    Leuven, BE
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

nextAuth provides a patented mobile passwordless multi-factor authentication solution and e-signature solution. Organisations looking to fend off phishing, brute-forcing, and other password-based att

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
nextAuth features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
6.7
Multi-Device Sync
Average: 8.8
6.7
Easy Setup
Average: 9.0
6.7
Backup
Average: 8.7
Seller Details
Seller
nextAuth
HQ Location
Leuven, BE
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OwnID is reinventing authentication for digital commerce. We help leading consumer brands elevate the digital experience and convert more website visitors into loyal customers by turning authenticat

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OwnID features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OwnID
    Year Founded
    2021
    HQ Location
    San Francisco, US
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OwnID is reinventing authentication for digital commerce. We help leading consumer brands elevate the digital experience and convert more website visitors into loyal customers by turning authenticat

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
OwnID features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
OwnID
Year Founded
2021
HQ Location
San Francisco, US
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BlokSec provides Immutable Authentication™ service to support next generation security features to stop password-based attacks, account takeovers, phishing attacks, online fraud and identify theft.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Passwordless Authentication features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Multi-Device Sync
    Average: 8.8
    10.0
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Toronto, CA
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BlokSec provides Immutable Authentication™ service to support next generation security features to stop password-based attacks, account takeovers, phishing attacks, online fraud and identify theft.

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Passwordless Authentication features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Multi-Device Sync
Average: 8.8
10.0
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.7
Seller Details
Year Founded
2019
HQ Location
Toronto, CA
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PixelPin is a non-biometric, non-password, software solution that enables users to login using a personal picture and selecting 4 points in a sequence on the image. PixelPin’s innovative solution uses

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PixelPin features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Atlanta, US
    Twitter
    @PixelPin
    1,333 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    64 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PixelPin is a non-biometric, non-password, software solution that enables users to login using a personal picture and selecting 4 points in a sequence on the image. PixelPin’s innovative solution uses

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
PixelPin features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2015
HQ Location
Atlanta, US
Twitter
@PixelPin
1,333 Twitter followers
LinkedIn® Page
www.linkedin.com
64 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proton Pass for Business is a cloud‑based business password management solution that helps small and medium‑sized businesses (SMBs) securely store, share, and manage login credentials, sensitive data,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Proton Pass For Business Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Easy Setup
    2
    Fast Performance
    2
    Cross-platform Compatibility
    1
    Customer Support
    1
    Cons
    Folder Management
    1
    Learning Curve
    1
    Login Issues
    1
    Poor UI
    1
    Unfriendly Interface
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proton Pass For Business features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Proton AG
    Company Website
    Year Founded
    2014
    HQ Location
    Plan-les-Ouates, Geneva, Switzerland
    Twitter
    @ProtonPrivacy
    353,968 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    844 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Proton Pass for Business is a cloud‑based business password management solution that helps small and medium‑sized businesses (SMBs) securely store, share, and manage login credentials, sensitive data,

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Proton Pass For Business Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Easy Setup
2
Fast Performance
2
Cross-platform Compatibility
1
Customer Support
1
Cons
Folder Management
1
Learning Curve
1
Login Issues
1
Poor UI
1
Unfriendly Interface
1
Proton Pass For Business features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Proton AG
Company Website
Year Founded
2014
HQ Location
Plan-les-Ouates, Geneva, Switzerland
Twitter
@ProtonPrivacy
353,968 Twitter followers
LinkedIn® Page
www.linkedin.com
844 employees on LinkedIn®