Introducing G2.ai, the future of software buying.Try now

Top Free Passwordless Authentication Software

Check out our list of free Passwordless Authentication Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Passwordless Authentication Software to ensure you get the right product.

View Free Passwordless Authentication Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
42 Passwordless Authentication Products Available
(794)4.5 out of 5
8th Easiest To Use in Passwordless Authentication software
View top Consulting Services for Microsoft Entra ID
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

    Users
    • Software Engineer
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 39% Enterprise
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Entra ID features and usability ratings that predict user satisfaction
    8.8
    Works with hardware security keys
    Average: 8.8
    8.6
    FIDO2-compliant
    Average: 8.8
    8.7
    Quality of Support
    Average: 8.8
    9.1
    Multiple authentication methods
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Ankita A.
    AA
    It's really good for organisation's security, it provides best secure identities for hybrid cloud also. Best part is integration with hybrid cloud... Read review
    Bhupender N.
    BN
    It has a robust set of security features like multi-factor authentication, conditional access, and threat intelligence to protect identities and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    13,085,929 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    226,132 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

Users
  • Software Engineer
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 39% Enterprise
  • 38% Mid-Market
Microsoft Entra ID features and usability ratings that predict user satisfaction
8.8
Works with hardware security keys
Average: 8.8
8.6
FIDO2-compliant
Average: 8.8
8.7
Quality of Support
Average: 8.8
9.1
Multiple authentication methods
Average: 9.0
Ankita A.
AA
It's really good for organisation's security, it provides best secure identities for hybrid cloud also. Best part is integration with hybrid cloud... Read review
Bhupender N.
BN
It has a robust set of security features like multi-factor authentication, conditional access, and threat intelligence to protect identities and... Read review
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
13,085,929 Twitter followers
LinkedIn® Page
www.linkedin.com
226,132 employees on LinkedIn®
Ownership
MSFT
(1,935)4.4 out of 5
Optimized for quick response
2nd Easiest To Use in Passwordless Authentication software
View top Consulting Services for LastPass
Save to My Lists
Entry Level Price:$4.25
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LastPass is a secure, cloud-based password manager that takes the hassle out of remembering and managing passwords. It works across all your devices, so you can log in faster and stay protected everyw

    Users
    • Owner
    • CEO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 63% Small-Business
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LastPass features and usability ratings that predict user satisfaction
    7.8
    Works with hardware security keys
    Average: 8.8
    7.7
    FIDO2-compliant
    Average: 8.8
    8.2
    Quality of Support
    Average: 8.8
    8.8
    Multiple authentication methods
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    UI
    The software was very good and something I used for all services every day — easy to use and it worked well. I also appreciated that there is a... Read review
    Md H.
    MH
    LastPass makes managing passwords incredibly easy and secure. I love how it automatically saves and fills passwords across all my devices, saving... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LastPass
    Company Website
    Year Founded
    2008
    HQ Location
    Boston, Massachusetts
    Twitter
    @LastPass
    46,408 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    794 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LastPass is a secure, cloud-based password manager that takes the hassle out of remembering and managing passwords. It works across all your devices, so you can log in faster and stay protected everyw

Users
  • Owner
  • CEO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 63% Small-Business
  • 25% Mid-Market
LastPass features and usability ratings that predict user satisfaction
7.8
Works with hardware security keys
Average: 8.8
7.7
FIDO2-compliant
Average: 8.8
8.2
Quality of Support
Average: 8.8
8.8
Multiple authentication methods
Average: 9.0
Verified User in Information Technology and Services
UI
The software was very good and something I used for all services every day — easy to use and it worked well. I also appreciated that there is a... Read review
Md H.
MH
LastPass makes managing passwords incredibly easy and secure. I love how it automatically saves and fills passwords across all my devices, saving... Read review
Seller Details
Seller
LastPass
Company Website
Year Founded
2008
HQ Location
Boston, Massachusetts
Twitter
@LastPass
46,408 Twitter followers
LinkedIn® Page
www.linkedin.com
794 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(434)4.5 out of 5
Optimized for quick response
5th Easiest To Use in Passwordless Authentication software
View top Consulting Services for Cisco Duo
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

    Users
    • Software Engineer
    • Consultant
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 44% Enterprise
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Duo features and usability ratings that predict user satisfaction
    8.8
    Works with hardware security keys
    Average: 8.8
    9.0
    FIDO2-compliant
    Average: 8.8
    8.9
    Quality of Support
    Average: 8.8
    9.2
    Multiple authentication methods
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Surendra T.
    ST
    Implementing Duo within our organization has really helped us become more confident about the security of accessing our data. A few of the many... Read review
    Mahipal S.
    MS
    It help us to secure the data by adding an addition authentication process where user need to approve the authentication by accepting notification... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Company Website
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    721,801 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,386 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

Users
  • Software Engineer
  • Consultant
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 44% Enterprise
  • 38% Mid-Market
Cisco Duo features and usability ratings that predict user satisfaction
8.8
Works with hardware security keys
Average: 8.8
9.0
FIDO2-compliant
Average: 8.8
8.9
Quality of Support
Average: 8.8
9.2
Multiple authentication methods
Average: 9.0
Surendra T.
ST
Implementing Duo within our organization has really helped us become more confident about the security of accessing our data. A few of the many... Read review
Mahipal S.
MS
It help us to secure the data by adding an addition authentication process where user need to approve the authentication by accepting notification... Read review
Seller Details
Seller
Cisco
Company Website
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
721,801 Twitter followers
LinkedIn® Page
www.linkedin.com
95,386 employees on LinkedIn®
(1,563)4.6 out of 5
4th Easiest To Use in Passwordless Authentication software
View top Consulting Services for 1Password
Save to My Lists
Entry Level Price:$7.99
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Most Used Enterprise Password Manager, trusted by over 180,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secu

    Users
    • Software Engineer
    • CEO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 57% Small-Business
    • 32% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 1Password features and usability ratings that predict user satisfaction
    8.5
    Works with hardware security keys
    Average: 8.8
    8.5
    FIDO2-compliant
    Average: 8.8
    9.0
    Quality of Support
    Average: 8.8
    9.0
    Multiple authentication methods
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Francisco P.
    FP
    I really appreciate the ease of being secure without needing to memorize thousands of passwords, thanks to 1Password. It allows me to store... Read review
    Alex H.
    AH
    Great way to access multiple accounts through one application Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    1Password
    Company Website
    Year Founded
    2005
    HQ Location
    Ontario
    Twitter
    @1Password
    139,584 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,604 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Most Used Enterprise Password Manager, trusted by over 180,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secu

Users
  • Software Engineer
  • CEO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 57% Small-Business
  • 32% Mid-Market
1Password features and usability ratings that predict user satisfaction
8.5
Works with hardware security keys
Average: 8.8
8.5
FIDO2-compliant
Average: 8.8
9.0
Quality of Support
Average: 8.8
9.0
Multiple authentication methods
Average: 9.0
Francisco P.
FP
I really appreciate the ease of being secure without needing to memorize thousands of passwords, thanks to 1Password. It allows me to store... Read review
Alex H.
AH
Great way to access multiple accounts through one application Read review
Seller Details
Seller
1Password
Company Website
Year Founded
2005
HQ Location
Ontario
Twitter
@1Password
139,584 Twitter followers
LinkedIn® Page
www.linkedin.com
2,604 employees on LinkedIn®
(1,179)4.6 out of 5
Optimized for quick response
1st Easiest To Use in Passwordless Authentication software
Save to My Lists
Entry Level Price:Starting at $2.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Keeper Security is transforming cybersecurity for millions of individuals and thousands of organizations globally. Built with end-to-end encryption, Keeper's intuitive cybersecurity platform is truste

    Users
    • IT Manager
    • Owner
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 42% Small-Business
    • 42% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Keeper Password Manager features and usability ratings that predict user satisfaction
    8.8
    Works with hardware security keys
    Average: 8.8
    8.7
    FIDO2-compliant
    Average: 8.8
    8.9
    Quality of Support
    Average: 8.8
    9.0
    Multiple authentication methods
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Oren A.
    OA
    Secure password management, biometric authentication support, two-factor authentication, secure password sharing, efficient auto-fill, and data... Read review
    DO
    Keeper securely keeps our organization’s passwords safe and backed up. It also lets group passwords get shared securely. Having a family account... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    Chicago, IL
    Twitter
    @keepersecurity
    18,986 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    723 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Keeper Security is transforming cybersecurity for millions of individuals and thousands of organizations globally. Built with end-to-end encryption, Keeper's intuitive cybersecurity platform is truste

Users
  • IT Manager
  • Owner
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 42% Small-Business
  • 42% Mid-Market
Keeper Password Manager features and usability ratings that predict user satisfaction
8.8
Works with hardware security keys
Average: 8.8
8.7
FIDO2-compliant
Average: 8.8
8.9
Quality of Support
Average: 8.8
9.0
Multiple authentication methods
Average: 9.0
Oren A.
OA
Secure password management, biometric authentication support, two-factor authentication, secure password sharing, efficient auto-fill, and data... Read review
DO
Keeper securely keeps our organization’s passwords safe and backed up. It also lets group passwords get shared securely. Having a family account... Read review
Seller Details
Company Website
Year Founded
2011
HQ Location
Chicago, IL
Twitter
@keepersecurity
18,986 Twitter followers
LinkedIn® Page
www.linkedin.com
723 employees on LinkedIn®
(629)4.5 out of 5
Optimized for quick response
3rd Easiest To Use in Passwordless Authentication software
Save to My Lists
Entry Level Price:Starting at $1.79
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trusted by more than 9,000 businesses worldwide, NordPass is a password management tool that upholds the finest privacy and security standards for businesses. Unlock the ease of cybersecurity and b

    Users
    • CEO
    • CTO
    Industries
    • Information Technology and Services
    • Marketing and Advertising
    Market Segment
    • 72% Small-Business
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NordPass Business features and usability ratings that predict user satisfaction
    7.8
    Works with hardware security keys
    Average: 8.8
    7.5
    FIDO2-compliant
    Average: 8.8
    8.7
    Quality of Support
    Average: 8.8
    8.4
    Multiple authentication methods
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Dejan T.
    DT
    Easy integration across devices, easy to use, easy to impliment for personal or business use Read review
    Gabriela R.
    GR
    NordPass offers a sleek, intuitive password management experience backed by the security of zero-knowledge architecture and encryption standards... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2012
    HQ Location
    Global
    Twitter
    @NordPass
    9,500 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,798 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trusted by more than 9,000 businesses worldwide, NordPass is a password management tool that upholds the finest privacy and security standards for businesses. Unlock the ease of cybersecurity and b

Users
  • CEO
  • CTO
Industries
  • Information Technology and Services
  • Marketing and Advertising
Market Segment
  • 72% Small-Business
  • 25% Mid-Market
NordPass Business features and usability ratings that predict user satisfaction
7.8
Works with hardware security keys
Average: 8.8
7.5
FIDO2-compliant
Average: 8.8
8.7
Quality of Support
Average: 8.8
8.4
Multiple authentication methods
Average: 9.0
Dejan T.
DT
Easy integration across devices, easy to use, easy to impliment for personal or business use Read review
Gabriela R.
GR
NordPass offers a sleek, intuitive password management experience backed by the security of zero-knowledge architecture and encryption standards... Read review
Seller Details
Company Website
Year Founded
2012
HQ Location
Global
Twitter
@NordPass
9,500 Twitter followers
LinkedIn® Page
www.linkedin.com
1,798 employees on LinkedIn®
(175)4.3 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:$1.71 / user, per month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 54% Enterprise
    • 40% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • IBM Verify CIAM is an enterprise-grade customer identity and access management solution that provides a range of built-in authenticators and supports external authenticators for secure access management.
    • Reviewers appreciate the strong security features of IBM Verify CIAM, including its adaptive authentication, multi-factor authentication, and fine-grained access controls, as well as its scalability for large user bases and seamless integration with other IBM security products.
    • Reviewers noted that the initial setup and configuration of IBM Verify CIAM can be complex, especially for teams without prior IAM or IBM ecosystem experience, and that the user interface feels outdated and lacks modern integrations.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Verify CIAM features and usability ratings that predict user satisfaction
    8.8
    Works with hardware security keys
    Average: 8.8
    7.7
    FIDO2-compliant
    Average: 8.8
    8.6
    Quality of Support
    Average: 8.8
    8.7
    Multiple authentication methods
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Company Website
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    708,987 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    339,241 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 54% Enterprise
  • 40% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • IBM Verify CIAM is an enterprise-grade customer identity and access management solution that provides a range of built-in authenticators and supports external authenticators for secure access management.
  • Reviewers appreciate the strong security features of IBM Verify CIAM, including its adaptive authentication, multi-factor authentication, and fine-grained access controls, as well as its scalability for large user bases and seamless integration with other IBM security products.
  • Reviewers noted that the initial setup and configuration of IBM Verify CIAM can be complex, especially for teams without prior IAM or IBM ecosystem experience, and that the user interface feels outdated and lacks modern integrations.
IBM Verify CIAM features and usability ratings that predict user satisfaction
8.8
Works with hardware security keys
Average: 8.8
7.7
FIDO2-compliant
Average: 8.8
8.6
Quality of Support
Average: 8.8
8.7
Multiple authentication methods
Average: 9.0
Seller Details
Seller
IBM
Company Website
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
708,987 Twitter followers
LinkedIn® Page
www.linkedin.com
339,241 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Teleport is the Infrastructure Identity Company, modernizing identity, access, and policy for infrastructure, improving engineering velocity and infrastructure resiliency against human factors and com

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 44% Mid-Market
    • 36% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Teleport features and usability ratings that predict user satisfaction
    8.5
    Works with hardware security keys
    Average: 8.8
    8.0
    FIDO2-compliant
    Average: 8.8
    8.6
    Quality of Support
    Average: 8.8
    8.2
    Multiple authentication methods
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • RJ
    Teleport helped me to connect from anywhere and one can connect to remote devices on different networks. it also helped me to identify any security... Read review
    Verified User in Transportation/Trucking/Railroad
    CT
    Teleport is the single source of truth. Manage secure access from a single source, with great audit logs for the security team. Reduces... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Teleport
    Year Founded
    2015
    HQ Location
    Oakland, California
    Twitter
    @goteleport
    3,773 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    247 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Teleport is the Infrastructure Identity Company, modernizing identity, access, and policy for infrastructure, improving engineering velocity and infrastructure resiliency against human factors and com

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 44% Mid-Market
  • 36% Small-Business
Teleport features and usability ratings that predict user satisfaction
8.5
Works with hardware security keys
Average: 8.8
8.0
FIDO2-compliant
Average: 8.8
8.6
Quality of Support
Average: 8.8
8.2
Multiple authentication methods
Average: 9.0
RJ
Teleport helped me to connect from anywhere and one can connect to remote devices on different networks. it also helped me to identify any security... Read review
Verified User in Transportation/Trucking/Railroad
CT
Teleport is the single source of truth. Manage secure access from a single source, with great audit logs for the security team. Reduces... Read review
Seller Details
Seller
Teleport
Year Founded
2015
HQ Location
Oakland, California
Twitter
@goteleport
3,773 Twitter followers
LinkedIn® Page
www.linkedin.com
247 employees on LinkedIn®
(80)4.8 out of 5
Optimized for quick response
7th Easiest To Use in Passwordless Authentication software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Descope is a drag & drop customer authentication and identity management platform. Our no / low code CIAM solution helps organizations easily create and customize their entire user journey using v

    Users
    • CTO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 85% Small-Business
    • 15% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Descope features and usability ratings that predict user satisfaction
    9.3
    Works with hardware security keys
    Average: 8.8
    9.4
    FIDO2-compliant
    Average: 8.8
    9.8
    Quality of Support
    Average: 8.8
    9.9
    Multiple authentication methods
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Heather W.
    HW
    Having been a customer identity specialist for years, I knew I wanted a solution to handle the authentication for my new application. I previously... Read review
    Sagi H.
    SH
    1. Customers can roll out SSO on their own—no Customer Success or Solutions Engineering support required. 2. Sophisticated authentication flows... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Descope
    Company Website
    Year Founded
    2022
    HQ Location
    Los Altos, California
    Twitter
    @descopeinc
    568 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    96 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Descope is a drag & drop customer authentication and identity management platform. Our no / low code CIAM solution helps organizations easily create and customize their entire user journey using v

Users
  • CTO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 85% Small-Business
  • 15% Mid-Market
Descope features and usability ratings that predict user satisfaction
9.3
Works with hardware security keys
Average: 8.8
9.4
FIDO2-compliant
Average: 8.8
9.8
Quality of Support
Average: 8.8
9.9
Multiple authentication methods
Average: 9.0
Heather W.
HW
Having been a customer identity specialist for years, I knew I wanted a solution to handle the authentication for my new application. I previously... Read review
Sagi H.
SH
1. Customers can roll out SSO on their own—no Customer Success or Solutions Engineering support required. 2. Sophisticated authentication flows... Read review
Seller Details
Seller
Descope
Company Website
Year Founded
2022
HQ Location
Los Altos, California
Twitter
@descopeinc
568 Twitter followers
LinkedIn® Page
www.linkedin.com
96 employees on LinkedIn®
(54)4.8 out of 5
9th Easiest To Use in Passwordless Authentication software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Traditional MFA (OTP, PUSH) is a nightmare to deploy enterprise-wide, despised by users for requiring a second device (phone or token), and powerless against credential phishing & MFA bypass attac

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 43% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AuthN by IDEE features and usability ratings that predict user satisfaction
    8.9
    Works with hardware security keys
    Average: 8.8
    9.9
    FIDO2-compliant
    Average: 8.8
    9.7
    Quality of Support
    Average: 8.8
    9.3
    Multiple authentication methods
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Business Supplies and Equipment
    AB
    I found it very easy to deploy the solution, love the fact that the product doesn't hold any PII data, and the most amazing is I don't need to... Read review
    David T.
    DT
    The product is very fast when used, the integration was high-speed indeed, and it has much integration uses. I like the fact that a second device... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IDEE GmbH
    Year Founded
    2015
    HQ Location
    München, Bayern
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Traditional MFA (OTP, PUSH) is a nightmare to deploy enterprise-wide, despised by users for requiring a second device (phone or token), and powerless against credential phishing & MFA bypass attac

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 43% Small-Business
  • 33% Mid-Market
AuthN by IDEE features and usability ratings that predict user satisfaction
8.9
Works with hardware security keys
Average: 8.8
9.9
FIDO2-compliant
Average: 8.8
9.7
Quality of Support
Average: 8.8
9.3
Multiple authentication methods
Average: 9.0
Verified User in Business Supplies and Equipment
AB
I found it very easy to deploy the solution, love the fact that the product doesn't hold any PII data, and the most amazing is I don't need to... Read review
David T.
DT
The product is very fast when used, the integration was high-speed indeed, and it has much integration uses. I like the fact that a second device... Read review
Seller Details
Seller
IDEE GmbH
Year Founded
2015
HQ Location
München, Bayern
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 49% Enterprise
    • 49% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Workforce Identity features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    9.0
    Quality of Support
    Average: 8.8
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Jacob T.
    JT
    Works more or less as expected. Had an implementation meeting and got mostly set up Read review
    Verified User in Food Production
    AF
    Easy to set up, easy integration with AD, a great user experience. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,654 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,022 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 49% Enterprise
  • 49% Mid-Market
CyberArk Workforce Identity features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
9.0
Quality of Support
Average: 8.8
0.0
No information available
Jacob T.
JT
Works more or less as expected. Had an implementation meeting and got mostly set up Read review
Verified User in Food Production
AF
Easy to set up, easy integration with AD, a great user experience. Read review
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,654 Twitter followers
LinkedIn® Page
www.linkedin.com
5,022 employees on LinkedIn®
Ownership
NASDAQ:CYBR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The P

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 67% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ping Identity features and usability ratings that predict user satisfaction
    9.4
    Works with hardware security keys
    Average: 8.8
    9.2
    FIDO2-compliant
    Average: 8.8
    8.4
    Quality of Support
    Average: 8.8
    8.3
    Multiple authentication methods
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • JL
    The best part of using Ping products is the time to deploy. We were able to download a version of Ping Federate and have it working by EOD. The... Read review
    Dan J.
    DJ
    Support for their products is amazing. Break/fix tickets get the utmost attention with their support team but even when I just needed some guidance... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,226 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,259 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The P

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 67% Enterprise
  • 25% Mid-Market
Ping Identity features and usability ratings that predict user satisfaction
9.4
Works with hardware security keys
Average: 8.8
9.2
FIDO2-compliant
Average: 8.8
8.4
Quality of Support
Average: 8.8
8.3
Multiple authentication methods
Average: 9.0
JL
The best part of using Ping products is the time to deploy. We were able to download a version of Ping Federate and have it working by EOD. The... Read review
Dan J.
DJ
Support for their products is amazing. Break/fix tickets get the utmost attention with their support team but even when I just needed some guidance... Read review
Seller Details
Company Website
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,226 Twitter followers
LinkedIn® Page
www.linkedin.com
2,259 employees on LinkedIn®
(32)4.7 out of 5
14th Easiest To Use in Passwordless Authentication software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OLOID is a passwordless authentication platform designed to secure access to both digital systems and physical facilities without requiring passwords, usernames, mobile phones, or hardware tokens. It

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Mid-Market
    • 28% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OLOID features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    9.3
    Quality of Support
    Average: 8.8
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Food Production
    AF
    Oloid has been very accomodating in developing and delivering what we are asking without extensive back and forth ticketing processes and costly... Read review
    Verified User in Food Production
    AF
    The people. Everyone is friendly and easy to work with. They have always gone above and beyond to help us accomplish our goals no matter how hard... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oloid
    Year Founded
    2018
    HQ Location
    Sunnyvale, US
    Twitter
    @oloid_ai
    64 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    81 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OLOID is a passwordless authentication platform designed to secure access to both digital systems and physical facilities without requiring passwords, usernames, mobile phones, or hardware tokens. It

Users
No information available
Industries
No information available
Market Segment
  • 47% Mid-Market
  • 28% Enterprise
OLOID features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
9.3
Quality of Support
Average: 8.8
0.0
No information available
Verified User in Food Production
AF
Oloid has been very accomodating in developing and delivering what we are asking without extensive back and forth ticketing processes and costly... Read review
Verified User in Food Production
AF
The people. Everyone is friendly and easy to work with. They have always gone above and beyond to help us accomplish our goals no matter how hard... Read review
Seller Details
Seller
Oloid
Year Founded
2018
HQ Location
Sunnyvale, US
Twitter
@oloid_ai
64 Twitter followers
LinkedIn® Page
www.linkedin.com
81 employees on LinkedIn®
(121)4.5 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FusionAuth is a powerful customer identity and access management (CIAM) platform designed for developers, by developers. Headquartered in Denver, Colorado, FusionAuth was founded in 2016 to provide se

    Users
    • CEO
    • CTO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 46% Small-Business
    • 44% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FusionAuth features and usability ratings that predict user satisfaction
    6.7
    Works with hardware security keys
    Average: 8.8
    6.0
    FIDO2-compliant
    Average: 8.8
    9.0
    Quality of Support
    Average: 8.8
    8.1
    Multiple authentication methods
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Dev P.
    DP
    I love how FusionAuth is so developer-centric and flexible. It took me just days to integrate it into our SaaS platform, rather than the weeks of... Read review
    Verified User in Information Technology and Services
    AI
    What I like most about FusionAuth is its flexibility. It’s really intuitive to set up. I’m not a full-time developer, but I’m pretty sure I can... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    Broomfield, US
    Twitter
    @FusionAuth
    1,948 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FusionAuth is a powerful customer identity and access management (CIAM) platform designed for developers, by developers. Headquartered in Denver, Colorado, FusionAuth was founded in 2016 to provide se

Users
  • CEO
  • CTO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 46% Small-Business
  • 44% Mid-Market
FusionAuth features and usability ratings that predict user satisfaction
6.7
Works with hardware security keys
Average: 8.8
6.0
FIDO2-compliant
Average: 8.8
9.0
Quality of Support
Average: 8.8
8.1
Multiple authentication methods
Average: 9.0
Dev P.
DP
I love how FusionAuth is so developer-centric and flexible. It took me just days to integrate it into our SaaS platform, rather than the weeks of... Read review
Verified User in Information Technology and Services
AI
What I like most about FusionAuth is its flexibility. It’s really intuitive to set up. I’m not a full-time developer, but I’m pretty sure I can... Read review
Seller Details
Company Website
Year Founded
2009
HQ Location
Broomfield, US
Twitter
@FusionAuth
1,948 Twitter followers
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
(58)4.4 out of 5
Optimized for quick response
11th Easiest To Use in Passwordless Authentication software
Save to My Lists
Entry Level Price:$1.50
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PortalGuard is a single, unified Identity and Access Management (IAM) platform designed to help organizations streamline their security processes while enhancing user experience. This comprehensive so

    Users
    No information available
    Industries
    • Higher Education
    • Education Management
    Market Segment
    • 57% Mid-Market
    • 40% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PortalGuard features and usability ratings that predict user satisfaction
    10.0
    Works with hardware security keys
    Average: 8.8
    9.2
    FIDO2-compliant
    Average: 8.8
    9.2
    Quality of Support
    Average: 8.8
    9.2
    Multiple authentication methods
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Higher Education
    AH
    The flexibility for any type of SP setup. CAS, Forms-based, SAML. Read review
    Verified User in Higher Education
    UH
    PortalGuard works like a champ! I've been using it for about five years without any complaints. The login screen works perfectly with LastPass, and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BIO-key
    Company Website
    Year Founded
    1993
    HQ Location
    Wall, NJ
    Twitter
    @BIOkeyIntl
    1,493 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    69 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PortalGuard is a single, unified Identity and Access Management (IAM) platform designed to help organizations streamline their security processes while enhancing user experience. This comprehensive so

Users
No information available
Industries
  • Higher Education
  • Education Management
Market Segment
  • 57% Mid-Market
  • 40% Enterprise
PortalGuard features and usability ratings that predict user satisfaction
10.0
Works with hardware security keys
Average: 8.8
9.2
FIDO2-compliant
Average: 8.8
9.2
Quality of Support
Average: 8.8
9.2
Multiple authentication methods
Average: 9.0
Verified User in Higher Education
AH
The flexibility for any type of SP setup. CAS, Forms-based, SAML. Read review
Verified User in Higher Education
UH
PortalGuard works like a champ! I've been using it for about five years without any complaints. The login screen works perfectly with LastPass, and... Read review
Seller Details
Seller
BIO-key
Company Website
Year Founded
1993
HQ Location
Wall, NJ
Twitter
@BIOkeyIntl
1,493 Twitter followers
LinkedIn® Page
www.linkedin.com
69 employees on LinkedIn®