Multi-factor authentication (MFA) software helps improve security across a company by requiring additional authentication measures for access to sensitive information, systems, or applications. Instead of a simple username and password input, users are prompted to provide SMS code, biometric verification, or email confirmation actions to properly verify their identity. Businesses use these tools to add a secondary confirmation that individuals accessing privileged information are who they say they are. This can help companies prevent internal theft or data loss, as well as external access from unapproved parties. MFA tools are traditionally used by businesses, but they can also be used by individuals hoping to improve security on their personal devices or online accounts.
Risk-based authentication software tools offer a similar solution, but through a different means. RBA software consistently monitors permissions, behaviors, and dozens of other factors to determine when an individual should be prompted for MFA. New devices, locations, or suspicious activity will be documented and prompt additional authentication measures. MFA tools may also work in sync with cloud identity and access management software products, but typically only provide the authentication component rather than both application access and governance components.
To qualify for inclusion in the Multi-Factor Authentication category, a product must:
Multi-Factor Authentication reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.
Duo Security's frictionless Trusted Access platform protects users, data and applications from malicious hackers and data breaches. Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based Trusted Access platform addresses security threats before they become a problem. We do this by verifying the identity of your users and the health of their devices before they connect to the apps you want them to access.
Silverfort delivers strong authentication and adaptive Multi-Factor Authentication (MFA) across corporate systems including on-premise, cloud and hybrid environments, from a unified platform, without deploying any software agents or gateways and without modifications to endpoint or servers.
WatchGuard's AuthPoint is an easy-to-use multi-factor authentication (MFA) service that helps companies keep their assets, information, and user identities secure. It closes a security gap that leaves companies vulnerable to breaches by adding a layer of security beyond just a username and password – without creating a disruptive user experience. AuthPoint’s mobile app makes it easy for users to approve or deny login attempts with just a single touch right from their smartphone. WatchGuard’s AuthPoint solution is a Cloud service, so there’s no expensive hardware to deploy, and it can be managed from anywhere using WatchGuard Cloud’s intuitive interface.
SecureAuth, the secure identity company, is leveraged by leading organizations to secure all workforce and customer identities everywhere: cloud, hybrid and on premises. As a leader in identity and access management, the company enables secure access to systems, applications and data for organizations and their customers. SecureAuth provides the most flexible and adaptable identity and access management solution to exponentially reduce the threat surface, enable user adoption and meet business demands with frictionless user experience driving engagement and productivity.
Protectimus is an OATH-certified two-factor authentication solution that supports all standard algorithms of one-time passwords generation (HOTP, TOTP, and OCRA) and a wide range of hardware and software tokens, including absolutely new reprogrammable NFC tokens, convenient iOS and Android applications, and OTP delivery via SMS and Email.
BKF Repair is a tool that repair and restore damaged backup or BKF file, it perform easy recovery of all damaged backup files which has been created by Windows NT- Backup and Symantec Backup Exec. Backup utility software smartly works and provides simple, secure process for recovery of lost and corrupted BKF file data.
Idaptive Services secures enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. Idaptive helps protect against the leading point of attack used in data breaches ― compromised credentials — through it’s Next Gen Access, which uniquely unifies single single-on (SSO), adaptive multi-factor authentication (MFA), enterprise mobility management (EMM) and user behavior analytics (UBA) into an integrated solution. Idaptive Services include the following: Single Sign-On Services – Adaptive single-sign on and one-click access to your cloud, mobile and on-premises apps. No more forgotten passwords, no more user confusion. MFA Services – A common sense approach to multi-factor authentication with risk-based policy that does not hinder end-user productivity. Lifecycle Management Services – Automatically route application requests, create accounts, manage entitlements within those accounts, and revoke access when necessary. Provision users across apps, all from a central control point. Mobility Management Services– Manage mobile devices, secure native mobile apps and provide context for smarter access decisions. Endpoint Management Services - Designed to help control access to corporate resources through a zero trust security approach. Bolster endpoint security with cross-platform policy enforcement and leading device security management capabilities.
OAuth.io handles identity infrastructure, maintenance, and security overhead with Social Login, Token Authentication, Multi-Factor Authentication, and more. OAuth.io allows you to choose identity providers, add custom attributes, customize your login page or use OAuth's widget and integrate with its app in minutes.
Ping Identity envisions a digital world powered by intelligent identity. We help enterprises achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The Ping Intelligent Identity Platform provides customers, employees and partners with access to cloud, mobile, SaaS and on-premises applications and APIs, while also managing identity and profile data at scale. Over half of the Fortune 100 choose us for our identity expertise, open standards leadership, and partnership with companies including Microsoft, Amazon and Google. We provide flexible options to extend hybrid IT environments and accelerate digital business initiatives with multi-factor authentication, single sign-on, access management, intelligent API security, directory and data governance capabilities. Visit www.pingidentity.com.
HyID enables strong multi-factor authentication based on One-Time-Password, Bio-metrics parameters validations, Device Hardware ID & PKI. HyID protects the corporate resources from unchecked access by privileged users and provides detailed audit logs about who accessed what, from where and what time. The system can generate alerts based when an access by a user invalidates the set risk thresholds, enabling organizations to detect and prevent identity thefts and privilege rights misuse.
SMS PASSCODE leverages the one thing users always carry with them – their mobile phone. The solution provides a superior user experience by taking full advantage of contextual information such as login behavior patterns, geo-location, and type of login system being accessed.
Akku is an Identity and Access Management (IAM) solution that is packed with features including single sign-on, password policy enforcement, IP- and device-based restrictions, multi-factor authentication and YouTube filtering. It provides enterprises with complete control over data access and privacy on the cloud while ensuring that they stay compliant to statutory industry standards. Akku also offers a dedicated deployment support service, without the need for a third-party system integrator, along with round-the-clock support for operations, maintenance, and troubleshooting. With this, Akku enables the seamless integration of on-premise legacy applications with that of a company’s cloud environment.
Authentify pioneered the use of the telephone as an authentication tool by synchronizing the use of the telephone's voice channel to an online event at the 2001 RSA Conference. Since that introduction, phone-based two-factor authentication (2FA), sometimes called two-step verification (2SV), has become an industry standard. Authentify has continued the revolution, offering cloud-based advanced authentication services that transform mobile devices into strong authentication tools. Authentify's mobile multi-factor authentication platform, Authentify xFA™, enables any organization to rapidly and economically deploy powerful user authentication technologies including: • Digital Certificates • Voice Biometrics • Fingerprints • SMS OTP/PIN • Voice Channel OTP/PIN • Encrypted Messaging Channel OTP/PIN to an App • Transaction Verification • NFC capability • Geolocation • Gesture/pattern swipe • QR code scanning • SDKs for using authentication factor with native apps Authentify's global services can reach any user with any type of phone or smart device. In mobile and BYOD environments, all supported authentication factors, or "Authentifiers," can be invoked by an enterprise's own mobile app via the xFA Mobile SDK. The need to know with certainty who is on your network or Internet property has never been more critical. Certainty is power. Be certain with Authentify.
Our innovative Two Factor Authentication (2FA) technology permits users to be authenticated in a strong (2FA) sense without the hassles of OTPs/hardware tokens or additional Authenticator apps. When combined with our Single Sign-On technology, this extends the power of strong authentication to all web applications. Combined with Mobile wallets or payment gateways, this ensures simple, convenient and secure mobile payments.
Basis ID is a simple and trustworthy method of user authentication for your enterprise or governmental institution. BASIS ID users have access to their personal account for personal data control and enrichment. Using the Blockchain technology based on the Exonum solution from the Bitfury Group.
BioScriber is a complete biometric enrollment system with powerful identity management features. Its modular nature and customizable workflow make it the perfect solution for any project involving the capture and verification of biometric data. With BioScriber you can capture fingerprints, faces, irises, personal information as well as documents quickly and accurately.
CA Strong Authentication is a versatile multi-factor authentication system that can help you deploy and manage a wide range of authentication methods, from passwords and knowledge-based authentication (KBA) to two-factor software tokens or hardware credentials. It also can provide out-of-band authentication methods such as SMS, email or voice delivery of one-time passwords (OTP). CA Strong Authentication supports two-factor authentication to VPNs and can protect access and transactions from PCs, laptops, tablets and mobile phones so that organizations can build a cohesive and comprehensive authentication strategy. It also includes free mobile applications to facilitate the use of mobile devices for strong authentication and software development kits (SDKs) to help easily incorporate two-factor authentication into mobile applications
CA Strong Authentication for Payments is a mobile authentication solution that makes banks' and cardholders' lives easier and less frustrating by reducing friction when shopping online. It delivers two-factor authentication via a user-friendly mobile app, linking a card with a device and protecting that association with a credential.