  # Best Enterprise Passwordless Authentication Software

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Products classified in the overall Passwordless Authentication category are similar in many regards and help companies of all sizes solve their business problems. However, enterprise business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Enterprise Business Passwordless Authentication to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2&#39;s buying advisors to find the right solutions within the Enterprise Business Passwordless Authentication category.

In addition to qualifying for inclusion in the Passwordless Authentication Software category, to qualify for inclusion in the Enterprise Business Passwordless Authentication Software category, a product must have at least 10 reviews left by a reviewer from an enterprise business.




  
## How Many Passwordless Authentication Software Products Does G2 Track?
**Total Products under this Category:** 114

### Category Stats (May 2026)
- **Average Rating**: 4.46/5
- **New Reviews This Quarter**: 33
- **Buyer Segments**: Small-Business 47% │ Mid-Market 27% │ Enterprise 27%
- **Top Trending Product**: Ping Identity (+0.01)
*Last updated: May 18, 2026*

  
## How Does G2 Rank Passwordless Authentication Software Products?

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 8,900+ Authentic Reviews
- 114+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.

  
  
---

**Sponsored**

### GateKeeper Proximity Authentication

Proximity MFA for shared workstations. MFA for Shared Computers is a cutting-edge security solution designed to enhance user authentication and access control in environments where multiple users share computing resources. This innovative approach allows individuals to log in using their physical presence rather than traditional passwords, creating a seamless and secure experience across computers, VPNs, websites, and desktop applications. Patented and designed for rugged environments including law enforcement, healthcare, manufacturing (ICS/OT cybersecurity), and compliance. Targeted primarily at organizations that require stringent security measures, such as healthcare providers, financial institutions, and government agencies, this solution addresses common challenges associated with password management. By eliminating the need for users to remember or type passwords, it significantly reduces the risk of forgotten credentials, password resets, and the chaos that often accompanies password management. The continuous authentication feature ensures that users remain securely logged in as long as they are present, while automatically locking the system when they step away, thus preventing unauthorized access. Key features of MFA for Shared Computers include passwordless proximity login, which utilizes a wireless key to authenticate users effortlessly. This technology allows passwords to auto-fill across various platforms, including electronic health records (EHRs) like Allscripts PM and eClinicalWorks, as well as web applications such as Office365 and banking sites. The solution integrates seamlessly with existing systems such as Active Directory, Okta, and RADIUS, ensuring that organizations can maintain their current infrastructure while enhancing security protocols. The benefits of adopting this solution extend beyond mere convenience. Organizations can automate access control and ensure compliance with various regulatory standards, including CMMC, CJIS, HIPAA, and NIS2. By streamlining user authentication processes, businesses can improve productivity while maintaining a high level of security. The ability to manage passwords efficiently across shared computers not only enhances user experience but also fortifies overall organizational security, making it an essential tool for any entity looking to safeguard sensitive information in a shared computing environment.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=2267&amp;secure%5Bdisplayable_resource_id%5D=2267&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=2267&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=117202&amp;secure%5Bresource_id%5D=2267&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fpasswordless-authentication%2Fenterprise&amp;secure%5Btoken%5D=996756f22d496e901fb9b99f337ee5f88c2f55d2c4e6cbc700d402c5fd9bf64d&amp;secure%5Burl%5D=https%3A%2F%2Fwww.gkaccess.com&amp;secure%5Burl_type%5D=company_website)

---

  ## What Are the Top-Rated Passwordless Authentication Software Products in 2026?
### 1. [Microsoft Entra ID](https://www.g2.com/products/microsoft-entra-id/reviews)
  Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID, you get: • Secure adaptive access with multi-factor authentication and Conditional Access policies • Seamless user experience with single sign-on, passwordless and user portal • Unified identity management that connect all internal and external users to all apps and devices. • Simplified Identity Governance with provisioning, access packages, and access reviews. Microsoft Entra is our new product family that encompasses all of Microsoft’s identity and access capabilities. The Entra family includes Microsoft Entra ID, as well as two new product categories: Cloud Infrastructure Entitlement Management (CIEM) and decentralized identity. The products in the Entra family will help provide secure access to everything for everyone, by providing identity and access management, cloud infrastructure entitlement management, and identity verification.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 868
**How Do G2 Users Rate Microsoft Entra ID?**

- **Works with hardware security keys:** 8.8/10 (Category avg: 8.8/10)
- **FIDO2-compliant:** 8.7/10 (Category avg: 8.8/10)
- **Quality of Support:** 8.7/10 (Category avg: 8.9/10)
- **Multiple authentication methods:** 9.1/10 (Category avg: 9.0/10)

**Who Is the Company Behind Microsoft Entra ID?**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,115,342 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Who Uses This Product?**
  - **Who Uses This:** Software Engineer, System Engineer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 39% Mid-Market, 36% Enterprise


#### What Are Microsoft Entra ID's Pros and Cons?

**Pros:**

- Ease of Use (129 reviews)
- Security (122 reviews)
- Single Sign-On (90 reviews)
- Identity Management (89 reviews)
- Integrations (80 reviews)

**Cons:**

- Complexity (56 reviews)
- Expensive (53 reviews)
- Complex Administration (42 reviews)
- Difficult Learning (38 reviews)
- Complex Setup (37 reviews)

### 2. [1Password](https://www.g2.com/products/1password/reviews)
  The Most Used Enterprise Password Manager, trusted by over 180,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure every sign-in by integrating 1Password with your existing IAM infrastructure. Enforce strong, integrated security policies at scale, be proactive about cybersecurity threats to reduce risk, and quickly and easily generate detailed reports on password security posture.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 1,768
**How Do G2 Users Rate 1Password?**

- **Works with hardware security keys:** 8.5/10 (Category avg: 8.8/10)
- **FIDO2-compliant:** 8.6/10 (Category avg: 8.8/10)
- **Quality of Support:** 8.9/10 (Category avg: 8.9/10)
- **Multiple authentication methods:** 9.0/10 (Category avg: 9.0/10)

**Who Is the Company Behind 1Password?**

- **Seller:** [1Password](https://www.g2.com/sellers/1password)
- **Company Website:** https://1password.com/
- **Year Founded:** 2005
- **HQ Location:** Ontario
- **Twitter:** @1Password (139,650 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1password/ (2,911 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** Software Engineer, CEO
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 54% Small-Business, 32% Mid-Market


#### What Are 1Password's Pros and Cons?

**Pros:**

- Ease of Use (333 reviews)
- Security (271 reviews)
- Password Management (182 reviews)
- Intuitive (144 reviews)
- Easy Access (134 reviews)

**Cons:**

- Password Management (95 reviews)
- Expensive (91 reviews)
- Login Issues (69 reviews)
- Autofill Issues (64 reviews)
- Cost (60 reviews)

### 3. [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews)
  Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications while incorporating identity visibility and context from multiple identity sources.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 496
**How Do G2 Users Rate Cisco Duo?**

- **Works with hardware security keys:** 8.8/10 (Category avg: 8.8/10)
- **FIDO2-compliant:** 9.0/10 (Category avg: 8.8/10)
- **Quality of Support:** 8.9/10 (Category avg: 8.9/10)
- **Multiple authentication methods:** 9.2/10 (Category avg: 9.0/10)

**Who Is the Company Behind Cisco Duo?**

- **Seller:** [Cisco](https://www.g2.com/sellers/cisco)
- **Company Website:** https://www.cisco.com
- **Year Founded:** 1984
- **HQ Location:** San Jose, CA
- **Twitter:** @Cisco (721,440 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cisco/ (95,742 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** Software Engineer, Network Administrator
  - **Top Industries:** Information Technology and Services, Higher Education
  - **Company Size:** 41% Enterprise, 37% Mid-Market


#### What Are Cisco Duo's Pros and Cons?

**Pros:**

- Ease of Use (71 reviews)
- Security (67 reviews)
- Authentication (46 reviews)
- Easy Access (46 reviews)
- Authentication Ease (40 reviews)

**Cons:**

- Authentication Issues (24 reviews)
- Login Issues (16 reviews)
- Complexity (15 reviews)
- Notification Issues (15 reviews)
- Delay Issues (14 reviews)

### 4. [Keeper Password Manager](https://www.g2.com/products/keeper-password-manager/reviews)
  Keeper Security is transforming cybersecurity for millions of individuals and thousands of organizations globally. Built with end-to-end encryption, Keeper&#39;s intuitive cybersecurity platform is trusted by Fortune 100 companies to protect every user, on every device, in every location. Our patented zero-trust and zero-knowledge privileged access management solution unifies enterprise password, secrets and connections management with zero-trust network access and endpoint privilege mangement. By combining these critical identity and access management components into a single cloud-based solution, Keeper delivers unparalleled visibility, security and control while ensuring compliance and audit requirements are met. Learn how Keeper can defend your organization against today’s cyber threats at KeeperSecurity.com.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 1,187
**How Do G2 Users Rate Keeper Password Manager?**

- **Works with hardware security keys:** 8.8/10 (Category avg: 8.8/10)
- **FIDO2-compliant:** 8.7/10 (Category avg: 8.8/10)
- **Quality of Support:** 8.9/10 (Category avg: 8.9/10)
- **Multiple authentication methods:** 9.0/10 (Category avg: 9.0/10)

**Who Is the Company Behind Keeper Password Manager?**

- **Seller:** [Keeper Security](https://www.g2.com/sellers/keeper-security)
- **Company Website:** https://www.keepersecurity.com/
- **Year Founded:** 2011
- **HQ Location:** Chicago, IL
- **Twitter:** @keepersecurity (18,944 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3554342/ (756 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** IT Manager, Owner
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 42% Small-Business, 42% Mid-Market


#### What Are Keeper Password Manager's Pros and Cons?

**Pros:**

- Ease of Use (168 reviews)
- Security (128 reviews)
- Secure Sharing (88 reviews)
- Password Management (87 reviews)
- Features (74 reviews)

**Cons:**

- Password Management (71 reviews)
- Autofill Issues (49 reviews)
- Login Issues (39 reviews)
- Password Issues (34 reviews)
- Learning Curve (33 reviews)

### 5. [Ping Identity](https://www.g2.com/products/ping-identity/reviews)
  Ping Identity is a type of identity management solution designed to help organizations implement Zero Trust security frameworks while enhancing user experiences across various platforms. With a focus on intelligent identity solutions, Ping Identity empowers enterprises to securely manage access to cloud, mobile, Software as a Service (SaaS), and on-premises applications, facilitating a seamless integration of identity management into their digital business strategies. The target audience for Ping Identity primarily includes large enterprises and organizations that require robust security measures and streamlined access management for their workforce, customers, and partners. This solution is particularly beneficial for businesses operating in hybrid environments, where applications and data are spread across multiple platforms and locations. By adopting Ping Identity, organizations can ensure that their security protocols are not only effective but also user-friendly, thereby improving overall productivity and satisfaction. Key features of the PingOne Cloud Platform include single sign-on (SSO), multi-factor authentication (MFA), and adaptive authentication, which collectively enhance security while simplifying the user experience. The platform&#39;s SSO capability allows users to access multiple applications with a single set of credentials, reducing password fatigue and improving user compliance. MFA adds an extra layer of security by requiring additional verification steps, which is crucial in today’s threat landscape. Adaptive authentication further strengthens security by assessing user behavior and context, enabling organizations to respond dynamically to potential risks. Ping Identity stands out in the identity management category through its commitment to open standards and strategic partnerships with industry leaders such as Microsoft and Amazon. This approach not only enhances interoperability with existing systems but also ensures that organizations can leverage the latest technologies and innovations in identity management. By providing flexible solutions tailored to meet the unique needs of each enterprise, Ping Identity accelerates digital transformation initiatives, enhances customer engagement, and fortifies security measures, making it a valuable asset for any organization looking to navigate the complexities of modern identity management.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 108
**How Do G2 Users Rate Ping Identity?**

- **Works with hardware security keys:** 9.4/10 (Category avg: 8.8/10)
- **FIDO2-compliant:** 9.2/10 (Category avg: 8.8/10)
- **Quality of Support:** 8.5/10 (Category avg: 8.9/10)
- **Multiple authentication methods:** 8.3/10 (Category avg: 9.0/10)

**Who Is the Company Behind Ping Identity?**

- **Seller:** [Ping Identity](https://www.g2.com/sellers/ping-identity)
- **Company Website:** https://www.PingIdentity.com
- **Year Founded:** 2002
- **HQ Location:** Denver, CO
- **Twitter:** @pingidentity (42,103 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/21870/ (2,319 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 68% Enterprise, 24% Mid-Market


#### What Are Ping Identity's Pros and Cons?

**Pros:**

- Customer Management (1 reviews)
- Customer Support (1 reviews)
- Ease of Use (1 reviews)
- Identity Management (1 reviews)
- Integrations (1 reviews)

**Cons:**

- Authentication Issues (1 reviews)
- Complex Administration (1 reviews)
- Complex Setup (1 reviews)
- Confusing Interface (1 reviews)
- Confusing Options (1 reviews)

### 6. [AuthX](https://www.g2.com/products/authx/reviews)
  AuthX is a cloud-based IAM platform offering Passwordless Authentication with SSO, MFA, Passkeys, Badge Tap &amp; Go, and Biometrics. It streamlines secure access across Workstations, Web, Network, and Mobile endpoints with advanced authentication workflows. Enabling Zero Trust Security, AuthX unifies credentials, apps, and devices while proactively managing risks.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 66
**How Do G2 Users Rate AuthX?**

- **Works with hardware security keys:** 9.9/10 (Category avg: 8.8/10)
- **FIDO2-compliant:** 9.8/10 (Category avg: 8.8/10)
- **Quality of Support:** 9.8/10 (Category avg: 8.9/10)
- **Multiple authentication methods:** 9.9/10 (Category avg: 9.0/10)

**Who Is the Company Behind AuthX?**

- **Seller:** [AuthX](https://www.g2.com/sellers/authx)
- **Year Founded:** 2019
- **HQ Location:** Gaithersburg, Maryland, United States
- **Twitter:** @auth_x (229 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/authx1 (38 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 88% Mid-Market, 17% Enterprise


#### What Are AuthX's Pros and Cons?

**Pros:**

- Ease of Use (43 reviews)
- Security (41 reviews)
- Single Sign-On (30 reviews)
- Easy Access (25 reviews)
- Easy Integrations (20 reviews)

**Cons:**

- Difficult Learning (2 reviews)
- Difficult Learning Process (2 reviews)
- High Learning Curve (2 reviews)
- Learning Curve (2 reviews)
- API Difficulty (1 reviews)

### 7. [1Kosmos Verify](https://www.g2.com/products/1kosmos-verify/reviews)
  Contact-Free Authentication Powered by Advanced Biometrics and Blockchain 1Kosmos BlockID leverages advanced biometrics authentication and Blockchain technology to verify the identity of anyone who needs to access any of your systems and applications. Make sure your employees and customers are who they say they are... Always. 1Kosmos BlockID biometric-based identity solutions are extremely easy to implement and use. They’re fully-cloud based, so there’s no software for you to install (of course, hybrid and on-site versions are also available). And they require nothing more of users than their own mobile phone and the IDs they already have — no technology for them to buy, no fobs or dongles to carry, no codes or pins to type, no forms to fill out, no CAPTCHA puzzles to solve, no passwords to remember — ever. The BlockID platform is designed to ensure identity is our number one focus at all times. The use of Blockchain technology makes your BlockID-powered ecosystem unhackable. 1Kosmos BlockID is fully IAL3 and AAL3 compliant per the NIST SP-800 63-3 guidelines.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 37
**How Do G2 Users Rate 1Kosmos Verify?**

- **Works with hardware security keys:** 8.0/10 (Category avg: 8.8/10)
- **FIDO2-compliant:** 9.3/10 (Category avg: 8.8/10)
- **Quality of Support:** 8.4/10 (Category avg: 8.9/10)
- **Multiple authentication methods:** 8.9/10 (Category avg: 9.0/10)

**Who Is the Company Behind 1Kosmos Verify?**

- **Seller:** [1Kosmos](https://www.g2.com/sellers/1kosmos)
- **Year Founded:** 2018
- **HQ Location:** Somerset, New Jersey
- **Twitter:** @1KosmosBlockID (4,398 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1Kosmos (117 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 41% Enterprise, 35% Mid-Market


#### What Are 1Kosmos Verify's Pros and Cons?

**Pros:**

- Authentication (3 reviews)
- Biometric Authentication (3 reviews)
- Face Recognition (3 reviews)
- Ease of Use (2 reviews)
- Features (2 reviews)

**Cons:**

- Complexity (3 reviews)
- Complex Setup (3 reviews)
- Complex UI Design (3 reviews)
- Difficult Learning Process (3 reviews)
- Difficult Setup (3 reviews)

### 8. [IBM Verify CIAM](https://www.g2.com/products/ibm-verify-ciam/reviews)
  A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access, and lifecycle and consent management. IBM Verify is a single-stack cloud-based, on premises, or hybrid-cloud solution for all identity and access needs listed above. Other advantages it presents are a way to integrate with legacy access and CRM applications, reverse proxies to help increase performance, reliability, and security, and a way to migrate from on-premises to cloud, not only from an application standpoint, but also in unifying directories. IBM Verify is available on AWS Marketplace. If data residency is a top concern, when combined with AWS, the vendor states that IBM Verify has the broadest tenancy, and can be delivered using a rapid deployment model that has already been put to the test in several critical situations. IBM further states they continue to invest in achieving and maintaining all the pertinent certifications such as SOC 2, ISO 27001, and PCI DSS, plus full FedRAMP authorization. IBM Verify is not just a solution IBM provides to clients for identity and access, but it is used it to establish a zero-trust posture for over 25 million of the company&#39;s own internal and external end-users, supporting 5,000 applications, more than 600 federated client companies and their workforces, and over 150,000 authorization groups, plus Mac, iOS, Android, Windows, Linux, and Z (mainframe) operating systems, which they state includes one of the world’s largest Apple deployments, and one of the largest Linux deployments.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 169
**How Do G2 Users Rate IBM Verify CIAM?**

- **Works with hardware security keys:** 8.8/10 (Category avg: 8.8/10)
- **FIDO2-compliant:** 7.8/10 (Category avg: 8.8/10)
- **Quality of Support:** 8.6/10 (Category avg: 8.9/10)
- **Multiple authentication methods:** 8.8/10 (Category avg: 9.0/10)

**Who Is the Company Behind IBM Verify CIAM?**

- **Seller:** [IBM](https://www.g2.com/sellers/ibm)
- **Company Website:** https://www.ibm.com/us-en
- **Year Founded:** 1911
- **HQ Location:** Armonk, NY
- **Twitter:** @IBM (709,223 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1009/ (324,553 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 54% Enterprise, 38% Mid-Market


#### What Are IBM Verify CIAM's Pros and Cons?

**Pros:**

- Security (61 reviews)
- Ease of Use (48 reviews)
- Authentication (38 reviews)
- Features (29 reviews)
- MFA Authentication (29 reviews)

**Cons:**

- Complex Setup (38 reviews)
- Complexity (35 reviews)
- Difficult Learning (33 reviews)
- Difficult Setup (31 reviews)
- Complex Administration (30 reviews)

### 9. [LastPass](https://www.g2.com/products/lastpass/reviews)
  LastPass delivers Secure Access Essentials, helping individuals and organizations manage and protect access to AI, applications, and credentials straight from the browser. Trusted by more than 100,000 businesses and millions of users worldwide, LastPass combines strong security with everyday simplicity. For individuals, LastPass makes online life easier by securely storing credentials, generating strong passwords, and autofilling logins when needed. That means less friction, fewer resets, and safer access wherever work and life happens. For businesses, LastPass helps lean IT teams secure AI‑driven work by reducing risk by controlling access to unapproved apps, while storing and managing employee credentials and integrating with identity providers to fill gaps left by SSO. It’s simpler access, better visibility, and stronger security without added complexity.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 2,023
**How Do G2 Users Rate LastPass?**

- **Works with hardware security keys:** 7.8/10 (Category avg: 8.8/10)
- **FIDO2-compliant:** 7.7/10 (Category avg: 8.8/10)
- **Quality of Support:** 8.3/10 (Category avg: 8.9/10)
- **Multiple authentication methods:** 8.8/10 (Category avg: 9.0/10)

**Who Is the Company Behind LastPass?**

- **Seller:** [LastPass](https://www.g2.com/sellers/lastpass)
- **Company Website:** https://www.lastpass.com/
- **Year Founded:** 2008
- **HQ Location:** Boston, Massachusetts
- **Twitter:** @LastPass (45,972 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/lastpass/ (772 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** Owner, CEO
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 63% Small-Business, 25% Mid-Market


#### What Are LastPass's Pros and Cons?

**Pros:**

- Ease of Use (227 reviews)
- Password Management (170 reviews)
- Security (155 reviews)
- Autofill Feature (107 reviews)
- Password Security (99 reviews)

**Cons:**

- Autofill Issues (83 reviews)
- Password Management (78 reviews)
- Login Issues (66 reviews)
- Password Issues (44 reviews)
- Browser Extension Issues (43 reviews)

### 10. [AuthN by IDEE](https://www.g2.com/products/authn-by-idee/reviews)
  Traditional MFA (OTP, PUSH) is a nightmare to deploy enterprise-wide, despised by users for requiring a second device (phone or token), and powerless against credential phishing &amp; MFA bypass attacks – the #1 global attack vectors. This is why IDEE built AuthN. Next generation MFA. We call it MFA 2.0. Our next-generation Zero-trust architecture is fully decentralised, which means we have no central credentials database - the single point of failure that hackers seek to exploit. This architecture is based on public-key cryptography. The same tech underlying crypto-currencies. And to ensure that the user’s details are never exposed to us, any of IDEE’s servers, or anyone else, IDEE is zero knowledge and zero PII and never stores any private information. Additionally, we make sure that the chain of trust is unbroken throughout the user lifecycle with transitive trust - from registration, to authentication, to authorization, to adding devices. This is why we are proud to say we are better than phishing resistant; we are phishing proof. The bottom line is we prevent account takeover. We deliver peace of mind!


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 51
**How Do G2 Users Rate AuthN by IDEE?**

- **Works with hardware security keys:** 8.9/10 (Category avg: 8.8/10)
- **FIDO2-compliant:** 9.9/10 (Category avg: 8.8/10)
- **Quality of Support:** 9.7/10 (Category avg: 8.9/10)
- **Multiple authentication methods:** 9.3/10 (Category avg: 9.0/10)

**Who Is the Company Behind AuthN by IDEE?**

- **Seller:** [IDEE GmbH](https://www.g2.com/sellers/idee-gmbh)
- **Year Founded:** 2015
- **HQ Location:** München, Bayern
- **LinkedIn® Page:** https://www.linkedin.com/company/10601927/ (20 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 44% Small-Business, 33% Mid-Market


#### What Are AuthN by IDEE's Pros and Cons?

**Pros:**

- Ease of Use (3 reviews)
- Easy Integrations (3 reviews)
- Security (3 reviews)
- Customer Support (2 reviews)
- 2FA Security (1 reviews)


### 11. [CyberArk Workforce Identity](https://www.g2.com/products/cyberark-workforce-identity/reviews)
  CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security, and credential management. Identity Management capabilities include lifecycle management, identity orchestration, and identity governance. With CyberArk Identity, organizations can secure workforce access to applications, endpoints, and infrastructure and protect themselves from the leading cause of data breaches – compromised credentials. CyberArk Identity is part of the CyberArk Identity Security Platform. Built for the dynamic enterprise, CyberArk Identity Security Platform secures access for any identity to any resource or environment from anywhere using any device. The CyberArk Identity Security Platform enables operational efficiencies with a single admin portal, streamlines meeting compliance requirements with unified audit capabilities, and delivers Identity Security Intelligence for continuous identity threat detection and protection. Workforce Access solutions: • CyberArk Single Sign-On (SSO) is an easy-to-manage solution for one-click access to your cloud, mobile, and legacy apps. CyberArk SSO enables a secure and frictionless sign-in experience for both internal and external users that adjusts based on risk. • CyberArk App Gateway is an add-on to our Single Sign-On solution that enables VPN-less access to legacy applications. It allows companies to set up per-application, per-user access to individual legacy applications hosted on-premises. • CyberArk Adaptive Multi-Factor Authentication (MFA) helps strengthen security and prevent attacks involving compromised credentials by requiring users to present multiple forms of evidence to gain access to your applications. Unlike traditional MFA solutions, CyberArk Adaptive MFA uses AI-powered behavioral analytics and contextual information to determine which authentication factors to apply to a particular user in a specific situation. • CyberArk Secure Web Sessions is a cloud-based service that enables organizations to monitor, record, and audit end-user activity within high-risk and high-value web applications. Security and compliance specialists can use Secure Web Sessions to search recorded sessions using free text input and quickly filter events by users, dates, and actions. • CyberArk Workforce Password Management is an enterprise-focused password manager providing a user-friendly solution to store business application credentials in a centralized vault and securely share them with other users in the organization. Identity Management Services: • CyberArk Identity Lifecycle Management provides an easy way to route application access requests, create application accounts, manage entitlements for those accounts, and revoke access when necessary. • CyberArk Identity Flows is an identity orchestration solution that improves security, efficiency, and productivity by automating identity data and events. With Identity Flows, organizations can orchestrate complex identity management processes and synchronize identity data across diverse applications, directory stores, and repositories. • CyberArk Identity Compliance solution continuously discovers access, streamlines access certifications, and provides comprehensive identity analytics. Identity Compliance automates manually intensive, error-prone administrative processes, ensuring all workforce and privileged access rights are properly assigned and continually certified across enterprises.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 126
**How Do G2 Users Rate CyberArk Workforce Identity?**

- **Quality of Support:** 9.0/10 (Category avg: 8.9/10)

**Who Is the Company Behind CyberArk Workforce Identity?**

- **Seller:** [CyberArk](https://www.g2.com/sellers/cyberark)
- **Year Founded:** 1999
- **HQ Location:** Newton, MA
- **Twitter:** @CyberArk (17,747 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/26630/ (2,893 employees on LinkedIn®)
- **Ownership:** NASDAQ:CYBR

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 48% Enterprise, 48% Mid-Market


#### What Are CyberArk Workforce Identity's Pros and Cons?

**Pros:**

- Ease of Use (14 reviews)
- Access Management (6 reviews)
- Intuitive (6 reviews)
- Customer Support (5 reviews)
- Access Control (4 reviews)

**Cons:**

- Missing Features (4 reviews)
- Integration Issues (2 reviews)
- Lack of Automation (2 reviews)
- Lack of Features (2 reviews)
- Browser Extension Issues (1 reviews)

### 12. [LoginID Authentication Platform](https://www.g2.com/products/loginid-authentication-platform/reviews)
  With only a few lines of code, LoginID enables websites and apps to provide FIDO/FIDO2 certified strong customer authentication. Our open SaaS product is both easy to integrate and free to try. LoginID’s multi-factor authentication platform utilizes the existing biometrics on the user&#39;s device to create a private key, public key pair. There is no app for the user to download and the private key is stored securely on the end user&#39;s device, never leaving. We also offer a Transaction Confirmation with Digital Signature service which provides online merchants with a payment authentication tool. A transaction can be cryptographically signed providing proof of the user’s confirmation of that specific transaction. Additionally, via our partner AuthID, LoginID offers online identity verification and eKYC services. LoginID is aligned with PSD2, GDPR, CCPA, and HIPPA. We offer easy to integrate SDKs and APIs for Web, iOS, Android, React Native, Node.js, Python, and Java as well as a plug for Wordpress with Big Commerce and Woo Commerce Plugins coming soon.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 29
**How Do G2 Users Rate LoginID Authentication Platform?**

- **Works with hardware security keys:** 9.2/10 (Category avg: 8.8/10)
- **FIDO2-compliant:** 9.2/10 (Category avg: 8.8/10)
- **Quality of Support:** 9.0/10 (Category avg: 8.9/10)
- **Multiple authentication methods:** 9.3/10 (Category avg: 9.0/10)

**Who Is the Company Behind LoginID Authentication Platform?**

- **Seller:** [LoginID](https://www.g2.com/sellers/loginid)
- **Year Founded:** 2019
- **HQ Location:** San Mateo, US
- **Twitter:** @loginid_io (243 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/40786559 (37 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Computer Software
  - **Company Size:** 41% Mid-Market, 38% Enterprise



    ## What Is Passwordless Authentication Software?
  [Identity Management Software](https://www.g2.com/categories/identity-management)
  ## What Software Categories Are Similar to Passwordless Authentication Software?
    - [Single Sign-On (SSO) Solutions](https://www.g2.com/categories/single-sign-on-sso)
    - [Multi-Factor Authentication (MFA) Software](https://www.g2.com/categories/multi-factor-authentication-mfa)
    - [Biometric Authentication Software](https://www.g2.com/categories/biometric-authentication)

  
    
