Introducing G2.ai, the future of software buying.Try now

Best Risk-Based Authentication Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Risk-based authentication (RBA) solutions are identity management products that weigh user variables to determine and identify threats. Companies use RBA software to increase the effectiveness of user governance and authentication procedures. Users who are determined to be riskier are required to provide additional authentication information. These analyze IP addresses, devices, behaviors and identities to set customized authentication methods for each individual user attempting to access the network. Non-suspicious users accessing applications from known devices, locations, and networks may be automatically signed in. Suspicious users may be required to prompted to provide SMS code, biometric verification, or email confirmation actions to properly verify their identity.

Risk-based authentication products often contain multi-factor authentication features, but set unique requirements based the administrators configuration. RBA tools may work in sync with cloud identity and access management products, but typically only provide the authentication component, rather than the application access and governance components.

To qualify for inclusion in the Risk-Based Authentication category, a product must:

Assess a user’s unique network, device, and behavior to determine risk
Prompt authentication measures after assessment
Utilize authentication methods such as SMS, questioning, or email confirmation
Periodically store and update suspicious networks, devices, and behaviors
Show More
Show Less

Best Risk-Based Authentication Software At A Glance

Leader:
Highest Performer:
Easiest to Use:
Top Trending:
Best Free Software:
Show LessShow More
Easiest to Use:
Top Trending:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Risk-Based Authentication (RBA) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
100 Listings in Risk-Based Authentication (RBA) Available
(565)4.6 out of 5
Optimized for quick response
1st Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sift is the leading fraud prevention platform delivering digital trust to 700+ global brands, allowing them to grow confidently by stopping fraud while enabling excellence in customer experience. Back

    Users
    • Risk Investigator
    • Fraud Analyst
    Industries
    • Financial Services
    • Consumer Services
    Market Segment
    • 57% Mid-Market
    • 28% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Sift is a user-friendly tool that provides valuable insights into user behavior over time, aiding in real-time decision making and fraud detection.
    • Users frequently mention the ease of use, the ability to customize workflows, and the detailed insights provided by Sift as key benefits, contributing to efficient and informed decision-making.
    • Users mentioned issues with the scoring system feeling like a black box, difficulties in finding specific parameters in the activity tab, and a decrease in account management quality over time as negative aspects of Sift.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sift Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    105
    Fraud Prevention
    99
    Data Analysis
    67
    Features
    61
    Fraud Detection
    61
    Cons
    Inaccuracy
    39
    Complexity
    25
    Not User-Friendly
    25
    False Positives
    22
    Lack of Clarity
    22
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sift features and usability ratings that predict user satisfaction
    8.4
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.9
    Policy Management
    Average: 9.0
    8.9
    Ease of Use
    Average: 9.0
    8.1
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    San Francisco, CA
    Twitter
    @GetSift
    9,534 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    318 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sift is the leading fraud prevention platform delivering digital trust to 700+ global brands, allowing them to grow confidently by stopping fraud while enabling excellence in customer experience. Back

Users
  • Risk Investigator
  • Fraud Analyst
Industries
  • Financial Services
  • Consumer Services
Market Segment
  • 57% Mid-Market
  • 28% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Sift is a user-friendly tool that provides valuable insights into user behavior over time, aiding in real-time decision making and fraud detection.
  • Users frequently mention the ease of use, the ability to customize workflows, and the detailed insights provided by Sift as key benefits, contributing to efficient and informed decision-making.
  • Users mentioned issues with the scoring system feeling like a black box, difficulties in finding specific parameters in the activity tab, and a decrease in account management quality over time as negative aspects of Sift.
Sift Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
105
Fraud Prevention
99
Data Analysis
67
Features
61
Fraud Detection
61
Cons
Inaccuracy
39
Complexity
25
Not User-Friendly
25
False Positives
22
Lack of Clarity
22
Sift features and usability ratings that predict user satisfaction
8.4
Bi-Directional Identity Synchronization
Average: 8.9
8.9
Policy Management
Average: 9.0
8.9
Ease of Use
Average: 9.0
8.1
Cloud Directory
Average: 8.6
Seller Details
Company Website
Year Founded
2011
HQ Location
San Francisco, CA
Twitter
@GetSift
9,534 Twitter followers
LinkedIn® Page
www.linkedin.com
318 employees on LinkedIn®
(229)4.3 out of 5
4th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and se

    Users
    • Software Engineer
    • Software Developer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 48% Small-Business
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Auth0 Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    30
    Security
    30
    Authentication
    23
    Integrations
    23
    Easy Integrations
    22
    Cons
    Expensive
    15
    Cost
    10
    Pricing Issues
    9
    Difficult Learning
    8
    Expensive Pricing
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Auth0 features and usability ratings that predict user satisfaction
    9.2
    Bi-Directional Identity Synchronization
    Average: 8.9
    9.2
    Policy Management
    Average: 9.0
    8.5
    Ease of Use
    Average: 9.0
    9.2
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okta
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @okta
    42,545 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,381 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and se

Users
  • Software Engineer
  • Software Developer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 48% Small-Business
  • 30% Mid-Market
Auth0 Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
30
Security
30
Authentication
23
Integrations
23
Easy Integrations
22
Cons
Expensive
15
Cost
10
Pricing Issues
9
Difficult Learning
8
Expensive Pricing
8
Auth0 features and usability ratings that predict user satisfaction
9.2
Bi-Directional Identity Synchronization
Average: 8.9
9.2
Policy Management
Average: 9.0
8.5
Ease of Use
Average: 9.0
9.2
Cloud Directory
Average: 8.6
Seller Details
Seller
Okta
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@okta
42,545 Twitter followers
LinkedIn® Page
www.linkedin.com
6,381 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(428)4.5 out of 5
Optimized for quick response
3rd Easiest To Use in Risk-Based Authentication (RBA) software
View top Consulting Services for Cisco Duo
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

    Users
    • Software Engineer
    • Consultant
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 44% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Duo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    23
    Ease of Use
    21
    Authentication
    15
    Authentication Ease
    13
    Reliability
    11
    Cons
    Authentication Issues
    8
    Access Limitations
    7
    Expensive
    7
    Internet Dependency
    6
    Complexity
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Duo features and usability ratings that predict user satisfaction
    9.4
    Bi-Directional Identity Synchronization
    Average: 8.9
    9.1
    Policy Management
    Average: 9.0
    9.3
    Ease of Use
    Average: 9.0
    9.1
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Company Website
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    723,927 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,148 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

Users
  • Software Engineer
  • Consultant
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 44% Enterprise
  • 38% Mid-Market
Cisco Duo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
23
Ease of Use
21
Authentication
15
Authentication Ease
13
Reliability
11
Cons
Authentication Issues
8
Access Limitations
7
Expensive
7
Internet Dependency
6
Complexity
5
Cisco Duo features and usability ratings that predict user satisfaction
9.4
Bi-Directional Identity Synchronization
Average: 8.9
9.1
Policy Management
Average: 9.0
9.3
Ease of Use
Average: 9.0
9.1
Cloud Directory
Average: 8.6
Seller Details
Seller
Cisco
Company Website
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
723,927 Twitter followers
LinkedIn® Page
www.linkedin.com
95,148 employees on LinkedIn®
(1,540)4.6 out of 5
7th Easiest To Use in Risk-Based Authentication (RBA) software
View top Consulting Services for 1Password
Save to My Lists
100% Off: 0
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Most Used Enterprise Password Manager, trusted by over 175,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secu

    Users
    • Software Engineer
    • CEO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 57% Small-Business
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • 1Password Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    196
    Security
    166
    Password Management
    86
    Intuitive
    77
    Easy Access
    66
    Cons
    Password Management
    67
    Expensive
    58
    Login Issues
    34
    Cost
    33
    Learning Curve
    31
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 1Password features and usability ratings that predict user satisfaction
    9.2
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.9
    Policy Management
    Average: 9.0
    9.0
    Ease of Use
    Average: 9.0
    8.9
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    1Password
    Company Website
    Year Founded
    2005
    HQ Location
    Ontario
    Twitter
    @1Password
    139,776 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,604 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Most Used Enterprise Password Manager, trusted by over 175,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secu

Users
  • Software Engineer
  • CEO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 57% Small-Business
  • 31% Mid-Market
1Password Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
196
Security
166
Password Management
86
Intuitive
77
Easy Access
66
Cons
Password Management
67
Expensive
58
Login Issues
34
Cost
33
Learning Curve
31
1Password features and usability ratings that predict user satisfaction
9.2
Bi-Directional Identity Synchronization
Average: 8.9
8.9
Policy Management
Average: 9.0
9.0
Ease of Use
Average: 9.0
8.9
Cloud Directory
Average: 8.6
Seller Details
Seller
1Password
Company Website
Year Founded
2005
HQ Location
Ontario
Twitter
@1Password
139,776 Twitter followers
LinkedIn® Page
www.linkedin.com
2,604 employees on LinkedIn®
(1,915)4.4 out of 5
Optimized for quick response
6th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:$4.25
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LastPass is a secure, cloud-based password manager that takes the hassle out of remembering and managing passwords. It works across all your devices, so you can log in faster and stay protected everyw

    Users
    • Owner
    • CEO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 63% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • LastPass Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    238
    Password Management
    175
    Security
    160
    Easy Access
    106
    Autofill Feature
    105
    Cons
    Password Management
    89
    Autofill Issues
    83
    Login Issues
    67
    Password Issues
    50
    Browser Extension Issues
    36
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LastPass features and usability ratings that predict user satisfaction
    9.3
    Bi-Directional Identity Synchronization
    Average: 8.9
    9.0
    Policy Management
    Average: 9.0
    8.7
    Ease of Use
    Average: 9.0
    8.9
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LastPass
    Company Website
    Year Founded
    2008
    HQ Location
    Boston, Massachusetts
    Twitter
    @LastPass
    46,521 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    794 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LastPass is a secure, cloud-based password manager that takes the hassle out of remembering and managing passwords. It works across all your devices, so you can log in faster and stay protected everyw

Users
  • Owner
  • CEO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 63% Small-Business
  • 25% Mid-Market
LastPass Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
238
Password Management
175
Security
160
Easy Access
106
Autofill Feature
105
Cons
Password Management
89
Autofill Issues
83
Login Issues
67
Password Issues
50
Browser Extension Issues
36
LastPass features and usability ratings that predict user satisfaction
9.3
Bi-Directional Identity Synchronization
Average: 8.9
9.0
Policy Management
Average: 9.0
8.7
Ease of Use
Average: 9.0
8.9
Cloud Directory
Average: 8.6
Seller Details
Seller
LastPass
Company Website
Year Founded
2008
HQ Location
Boston, Massachusetts
Twitter
@LastPass
46,521 Twitter followers
LinkedIn® Page
www.linkedin.com
794 employees on LinkedIn®
(161)4.3 out of 5
Optimized for quick response
15th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:$1.71 / user, per month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 59% Enterprise
    • 42% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • IBM Verify CIAM is a product that centralizes user access, tracks consent, and logs activity, providing secure authentication and compliance reporting.
    • Users like the product's scalability and flexibility in managing a large user base, its robust authentication mechanisms, and its detailed monitoring and analytics for auditing and compliance.
    • Users reported that the initial setup can be complex, the admin dashboard is sometimes slow, and the documentation can be too technical for new users.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Verify CIAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    47
    Ease of Use
    33
    Authentication
    28
    Single Sign-On
    23
    Features
    22
    Cons
    Complex Setup
    23
    Difficult Learning
    21
    Complexity
    20
    Complex Administration
    18
    Difficult Setup
    15
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Verify CIAM features and usability ratings that predict user satisfaction
    8.8
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.0
    Policy Management
    Average: 9.0
    8.4
    Ease of Use
    Average: 9.0
    8.2
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Company Website
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    710,904 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    322,159 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 59% Enterprise
  • 42% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • IBM Verify CIAM is a product that centralizes user access, tracks consent, and logs activity, providing secure authentication and compliance reporting.
  • Users like the product's scalability and flexibility in managing a large user base, its robust authentication mechanisms, and its detailed monitoring and analytics for auditing and compliance.
  • Users reported that the initial setup can be complex, the admin dashboard is sometimes slow, and the documentation can be too technical for new users.
IBM Verify CIAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
47
Ease of Use
33
Authentication
28
Single Sign-On
23
Features
22
Cons
Complex Setup
23
Difficult Learning
21
Complexity
20
Complex Administration
18
Difficult Setup
15
IBM Verify CIAM features and usability ratings that predict user satisfaction
8.8
Bi-Directional Identity Synchronization
Average: 8.9
8.0
Policy Management
Average: 9.0
8.4
Ease of Use
Average: 9.0
8.2
Cloud Directory
Average: 8.6
Seller Details
Seller
IBM
Company Website
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
710,904 Twitter followers
LinkedIn® Page
www.linkedin.com
322,159 employees on LinkedIn®
(288)4.4 out of 5
5th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:$6 /User /Month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin e

    Users
    • Account Manager
    Industries
    • Computer Software
    • Education Management
    Market Segment
    • 49% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OneLogin Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Single Sign-On
    8
    SSO (Single Sign-On)
    8
    Easy Access
    5
    Security
    5
    Cons
    Service Interruptions
    4
    Bugs
    3
    Connection Issues
    3
    Error Handling
    3
    Login Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OneLogin features and usability ratings that predict user satisfaction
    8.8
    Bi-Directional Identity Synchronization
    Average: 8.9
    9.0
    Policy Management
    Average: 9.0
    9.1
    Ease of Use
    Average: 9.0
    9.5
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Aliso Viejo, CA
    Twitter
    @OneIdentity
    7,919 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    632 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin e

Users
  • Account Manager
Industries
  • Computer Software
  • Education Management
Market Segment
  • 49% Mid-Market
  • 40% Enterprise
OneLogin Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Single Sign-On
8
SSO (Single Sign-On)
8
Easy Access
5
Security
5
Cons
Service Interruptions
4
Bugs
3
Connection Issues
3
Error Handling
3
Login Issues
3
OneLogin features and usability ratings that predict user satisfaction
8.8
Bi-Directional Identity Synchronization
Average: 8.9
9.0
Policy Management
Average: 9.0
9.1
Ease of Use
Average: 9.0
9.5
Cloud Directory
Average: 8.6
Seller Details
HQ Location
Aliso Viejo, CA
Twitter
@OneIdentity
7,919 Twitter followers
LinkedIn® Page
www.linkedin.com
632 employees on LinkedIn®
(106)4.4 out of 5
12th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:$3 Per User Per Month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The P

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 67% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ping Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Management
    1
    Customer Support
    1
    Ease of Use
    1
    Identity Management
    1
    Integrations
    1
    Cons
    Authentication Issues
    1
    Complex Administration
    1
    Complex Setup
    1
    Confusing Interface
    1
    Confusing Options
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ping Identity features and usability ratings that predict user satisfaction
    9.2
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.7
    Policy Management
    Average: 9.0
    8.7
    Ease of Use
    Average: 9.0
    9.2
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,266 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,214 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The P

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 67% Enterprise
  • 25% Mid-Market
Ping Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Management
1
Customer Support
1
Ease of Use
1
Identity Management
1
Integrations
1
Cons
Authentication Issues
1
Complex Administration
1
Complex Setup
1
Confusing Interface
1
Confusing Options
1
Ping Identity features and usability ratings that predict user satisfaction
9.2
Bi-Directional Identity Synchronization
Average: 8.9
8.7
Policy Management
Average: 9.0
8.7
Ease of Use
Average: 9.0
9.2
Cloud Directory
Average: 8.6
Seller Details
Company Website
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,266 Twitter followers
LinkedIn® Page
www.linkedin.com
2,214 employees on LinkedIn®
(120)4.8 out of 5
Optimized for quick response
13th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kount is trust and safety technology. Businesses pick the solutions that are relevant to their unique challenges, and we help them grow with confidence — no matter the industry. We use data-driven

    Users
    No information available
    Industries
    • Retail
    • Apparel & Fashion
    Market Segment
    • 48% Mid-Market
    • 34% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kount Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Fraud Prevention
    4
    Ease of Use
    3
    Features
    3
    Customization
    2
    Detection Efficiency
    2
    Cons
    Inaccuracy
    3
    Lack of Clarity
    2
    Scoring Transparency
    2
    Unclear Rules
    2
    Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kount features and usability ratings that predict user satisfaction
    9.2
    Bi-Directional Identity Synchronization
    Average: 8.9
    9.3
    Policy Management
    Average: 9.0
    9.2
    Ease of Use
    Average: 9.0
    9.2
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2007
    HQ Location
    Boise, ID
    Twitter
    @KountInc
    2,432 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    200 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kount is trust and safety technology. Businesses pick the solutions that are relevant to their unique challenges, and we help them grow with confidence — no matter the industry. We use data-driven

Users
No information available
Industries
  • Retail
  • Apparel & Fashion
Market Segment
  • 48% Mid-Market
  • 34% Small-Business
Kount Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Fraud Prevention
4
Ease of Use
3
Features
3
Customization
2
Detection Efficiency
2
Cons
Inaccuracy
3
Lack of Clarity
2
Scoring Transparency
2
Unclear Rules
2
Complexity
1
Kount features and usability ratings that predict user satisfaction
9.2
Bi-Directional Identity Synchronization
Average: 8.9
9.3
Policy Management
Average: 9.0
9.2
Ease of Use
Average: 9.0
9.2
Cloud Directory
Average: 8.6
Seller Details
Company Website
Year Founded
2007
HQ Location
Boise, ID
Twitter
@KountInc
2,432 Twitter followers
LinkedIn® Page
www.linkedin.com
200 employees on LinkedIn®
(127)4.5 out of 5
10th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:Starting at $2.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 49% Enterprise
    • 49% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Workforce Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    14
    Access Management
    6
    Intuitive
    6
    Customer Support
    5
    Access Control
    4
    Cons
    Missing Features
    4
    Integration Issues
    2
    Lack of Automation
    2
    Lack of Features
    2
    Browser Extension Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Workforce Identity features and usability ratings that predict user satisfaction
    8.3
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.3
    Policy Management
    Average: 9.0
    8.8
    Ease of Use
    Average: 9.0
    10.0
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,659 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,895 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 49% Enterprise
  • 49% Mid-Market
CyberArk Workforce Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
14
Access Management
6
Intuitive
6
Customer Support
5
Access Control
4
Cons
Missing Features
4
Integration Issues
2
Lack of Automation
2
Lack of Features
2
Browser Extension Issues
1
CyberArk Workforce Identity features and usability ratings that predict user satisfaction
8.3
Bi-Directional Identity Synchronization
Average: 8.9
8.3
Policy Management
Average: 9.0
8.8
Ease of Use
Average: 9.0
10.0
Cloud Directory
Average: 8.6
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,659 Twitter followers
LinkedIn® Page
www.linkedin.com
4,895 employees on LinkedIn®
Ownership
NASDAQ:CYBR
(18)4.8 out of 5
8th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative age

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 44% Small-Business
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Silverfort Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Ease of Use
    2
    MFA Security
    2
    Setup Ease
    2
    Time-Saving
    2
    Cons
    Poor Customer Support
    2
    Account Management
    1
    Complexity
    1
    Difficulty Locating
    1
    Implementation Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Silverfort features and usability ratings that predict user satisfaction
    6.7
    Bi-Directional Identity Synchronization
    Average: 8.9
    6.7
    Policy Management
    Average: 9.0
    9.9
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Tel Aviv, Israel
    Twitter
    @silverfort
    644 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    535 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative age

Users
No information available
Industries
No information available
Market Segment
  • 44% Small-Business
  • 39% Mid-Market
Silverfort Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Ease of Use
2
MFA Security
2
Setup Ease
2
Time-Saving
2
Cons
Poor Customer Support
2
Account Management
1
Complexity
1
Difficulty Locating
1
Implementation Difficulty
1
Silverfort features and usability ratings that predict user satisfaction
6.7
Bi-Directional Identity Synchronization
Average: 8.9
6.7
Policy Management
Average: 9.0
9.9
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
Year Founded
2016
HQ Location
Tel Aviv, Israel
Twitter
@silverfort
644 Twitter followers
LinkedIn® Page
www.linkedin.com
535 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Thales’ SafeNet Trusted Access is a cloud-based Access Management and Authentication Service. It ensures that no user is a target by allowing you to expand authentication to all users and apps with di

    Users
    No information available
    Industries
    • Computer Networking
    Market Segment
    • 68% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Thales SafeNet Trusted Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Administration Management
    1
    Customer Support
    1
    Customizability
    1
    Customization
    1
    Features
    1
    Cons
    Integration Issues
    1
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Thales SafeNet Trusted Access features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    9.8
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin, Texas
    Twitter
    @ThalesCloudSec
    6,874 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,279 employees on LinkedIn®
    Ownership
    EPA:HO
    Total Revenue (USD mm)
    $15,854
Product Description
How are these determined?Information
This description is provided by the seller.

Thales’ SafeNet Trusted Access is a cloud-based Access Management and Authentication Service. It ensures that no user is a target by allowing you to expand authentication to all users and apps with di

Users
No information available
Industries
  • Computer Networking
Market Segment
  • 68% Enterprise
  • 25% Mid-Market
Thales SafeNet Trusted Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Administration Management
1
Customer Support
1
Customizability
1
Customization
1
Features
1
Cons
Integration Issues
1
Poor Customer Support
1
Thales SafeNet Trusted Access features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
9.8
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
HQ Location
Austin, Texas
Twitter
@ThalesCloudSec
6,874 Twitter followers
LinkedIn® Page
www.linkedin.com
1,279 employees on LinkedIn®
Ownership
EPA:HO
Total Revenue (USD mm)
$15,854
(42)4.9 out of 5
2nd Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:$3.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proximity MFA for shared workstations. MFA for Shared Computers is a cutting-edge security solution designed to enhance user authentication and access control in environments where multiple users shar

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Electrical/Electronic Manufacturing
    Market Segment
    • 40% Small-Business
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • GateKeeper Proximity Authentication Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    13
    Security
    12
    Implementation Ease
    8
    Customer Support
    7
    Secure Sharing
    7
    Cons
    Authentication Issues
    2
    Difficult Learning
    2
    Limited Compatibility
    2
    App Issues
    1
    Data Security
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GateKeeper Proximity Authentication features and usability ratings that predict user satisfaction
    10.0
    Bi-Directional Identity Synchronization
    Average: 8.9
    10.0
    Policy Management
    Average: 9.0
    9.8
    Ease of Use
    Average: 9.0
    10.0
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    College Park, Maryland
    Twitter
    @gkaccess
    2,019 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    21 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Proximity MFA for shared workstations. MFA for Shared Computers is a cutting-edge security solution designed to enhance user authentication and access control in environments where multiple users shar

Users
No information available
Industries
  • Hospital & Health Care
  • Electrical/Electronic Manufacturing
Market Segment
  • 40% Small-Business
  • 36% Mid-Market
GateKeeper Proximity Authentication Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
13
Security
12
Implementation Ease
8
Customer Support
7
Secure Sharing
7
Cons
Authentication Issues
2
Difficult Learning
2
Limited Compatibility
2
App Issues
1
Data Security
1
GateKeeper Proximity Authentication features and usability ratings that predict user satisfaction
10.0
Bi-Directional Identity Synchronization
Average: 8.9
10.0
Policy Management
Average: 9.0
9.8
Ease of Use
Average: 9.0
10.0
Cloud Directory
Average: 8.6
Seller Details
Company Website
Year Founded
2015
HQ Location
College Park, Maryland
Twitter
@gkaccess
2,019 Twitter followers
LinkedIn® Page
www.linkedin.com
21 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Telesign's Verification products allow businesses to secure their ecosystem by having users prove they are in possession of their mobile device. Telesign Verification provides companies with the optio

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Small-Business
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Telesign Verification Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    8
    Fraud Prevention
    5
    Features
    3
    Implementation Ease
    3
    Integrations
    3
    Cons
    Expensive
    6
    Inaccuracy
    2
    Login Issues
    2
    Slow Performance
    2
    Software Bugs
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Telesign Verification features and usability ratings that predict user satisfaction
    7.9
    Bi-Directional Identity Synchronization
    Average: 8.9
    7.9
    Policy Management
    Average: 9.0
    9.3
    Ease of Use
    Average: 9.0
    6.7
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Telesign
    Company Website
    Year Founded
    2005
    HQ Location
    Marina del Rey, US
    Twitter
    @TeleSign
    1,876 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    548 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Telesign's Verification products allow businesses to secure their ecosystem by having users prove they are in possession of their mobile device. Telesign Verification provides companies with the optio

Users
No information available
Industries
No information available
Market Segment
  • 55% Small-Business
  • 40% Mid-Market
Telesign Verification Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
8
Fraud Prevention
5
Features
3
Implementation Ease
3
Integrations
3
Cons
Expensive
6
Inaccuracy
2
Login Issues
2
Slow Performance
2
Software Bugs
2
Telesign Verification features and usability ratings that predict user satisfaction
7.9
Bi-Directional Identity Synchronization
Average: 8.9
7.9
Policy Management
Average: 9.0
9.3
Ease of Use
Average: 9.0
6.7
Cloud Directory
Average: 8.6
Seller Details
Seller
Telesign
Company Website
Year Founded
2005
HQ Location
Marina del Rey, US
Twitter
@TeleSign
1,876 Twitter followers
LinkedIn® Page
www.linkedin.com
548 employees on LinkedIn®
(29)4.4 out of 5
11th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

    Users
    No information available
    Industries
    • Hospital & Health Care
    Market Segment
    • 141% Mid-Market
    • 66% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureAuth: Workforce IAM features and usability ratings that predict user satisfaction
    9.7
    Bi-Directional Identity Synchronization
    Average: 8.9
    9.7
    Policy Management
    Average: 9.0
    8.9
    Ease of Use
    Average: 9.0
    9.5
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Irvine, CA
    Twitter
    @SecureAuth
    8,646 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    145 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

Users
No information available
Industries
  • Hospital & Health Care
Market Segment
  • 141% Mid-Market
  • 66% Small-Business
SecureAuth: Workforce IAM features and usability ratings that predict user satisfaction
9.7
Bi-Directional Identity Synchronization
Average: 8.9
9.7
Policy Management
Average: 9.0
8.9
Ease of Use
Average: 9.0
9.5
Cloud Directory
Average: 8.6
Seller Details
Company Website
Year Founded
2005
HQ Location
Irvine, CA
Twitter
@SecureAuth
8,646 Twitter followers
LinkedIn® Page
www.linkedin.com
145 employees on LinkedIn®