Best Risk-Based Authentication Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Risk-based authentication (RBA) solutions are identity management products that weigh user variables to determine and identify threats. Companies use RBA software to increase the effectiveness of user governance and authentication procedures. Users who are determined to be riskier are required to provide additional authentication information. These analyze IP addresses, devices, behaviors and identities to set customized authentication methods for each individual user attempting to access the network. Non-suspicious users accessing applications from known devices, locations, and networks may be automatically signed in. Suspicious users may be required to prompted to provide SMS code, biometric verification, or email confirmation actions to properly verify their identity.

Risk-based authentication products often contain multi-factor authentication features, but set unique requirements based the administrators configuration. RBA tools may work in sync with cloud identity and access management products, but typically only provide the authentication component, rather than the application access and governance components.

To qualify for inclusion in the Risk-Based Authentication category, a product must:

Assess a user’s unique network, device, and behavior to determine risk
Prompt authentication measures after assessment
Utilize authentication methods such as SMS, questioning, or email confirmation
Periodically store and update suspicious networks, devices, and behaviors
Show More
Show Less

Best Risk-Based Authentication Software At A Glance

Leader:
Highest Performer:
Easiest to Use:
Top Trending:
Best Free Software:
Show LessShow More
Easiest to Use:
Top Trending:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
101 Listings in Risk-Based Authentication (RBA) Available
(573)4.6 out of 5
Optimized for quick response
1st Easiest To Use in Risk-Based Authentication (RBA) software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sift is the leading fraud prevention platform delivering digital trust to 700+ global brands, allowing them to grow confidently by stopping fraud while enabling excellence in customer experience. Back

    Users
    • Risk Investigator
    • Fraud Analyst
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 57% Mid-Market
    • 28% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Sift is a fraud detection and prevention tool that uses machine learning to provide real-time analytics and reporting, helping businesses understand fraud patterns and improve strategies.
    • Reviewers like Sift's ability to accurately detect and prevent fraud in real time, its detailed analytics and reporting, and its user-friendly interface that makes navigation and decision-making easier.
    • Reviewers noted that Sift can sometimes be slow to load responses, the setup can feel manual and time-consuming, and it can generate false positives, flagging legitimate users for review.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sift Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Fraud Prevention
    80
    Ease of Use
    77
    Fraud Detection
    54
    Data Analysis
    50
    Features
    49
    Cons
    Inaccuracy
    30
    Lack of Clarity
    21
    Not User-Friendly
    20
    Complexity
    19
    False Positives
    19
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sift features and usability ratings that predict user satisfaction
    8.4
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.9
    Policy Management
    Average: 9.0
    9.0
    Ease of Use
    Average: 9.0
    8.1
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    San Francisco, CA
    Twitter
    @GetSift
    9,495 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    308 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sift is the leading fraud prevention platform delivering digital trust to 700+ global brands, allowing them to grow confidently by stopping fraud while enabling excellence in customer experience. Back

Users
  • Risk Investigator
  • Fraud Analyst
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 57% Mid-Market
  • 28% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Sift is a fraud detection and prevention tool that uses machine learning to provide real-time analytics and reporting, helping businesses understand fraud patterns and improve strategies.
  • Reviewers like Sift's ability to accurately detect and prevent fraud in real time, its detailed analytics and reporting, and its user-friendly interface that makes navigation and decision-making easier.
  • Reviewers noted that Sift can sometimes be slow to load responses, the setup can feel manual and time-consuming, and it can generate false positives, flagging legitimate users for review.
Sift Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Fraud Prevention
80
Ease of Use
77
Fraud Detection
54
Data Analysis
50
Features
49
Cons
Inaccuracy
30
Lack of Clarity
21
Not User-Friendly
20
Complexity
19
False Positives
19
Sift features and usability ratings that predict user satisfaction
8.4
Bi-Directional Identity Synchronization
Average: 8.9
8.9
Policy Management
Average: 9.0
9.0
Ease of Use
Average: 9.0
8.1
Cloud Directory
Average: 8.6
Seller Details
Company Website
Year Founded
2011
HQ Location
San Francisco, CA
Twitter
@GetSift
9,495 Twitter followers
LinkedIn® Page
www.linkedin.com
308 employees on LinkedIn®
(495)4.5 out of 5
Optimized for quick response
5th Easiest To Use in Risk-Based Authentication (RBA) software
View top Consulting Services for Cisco Duo
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

    Users
    • Software Engineer
    • Consultant
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 41% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Duo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    71
    Security
    67
    Authentication
    46
    Easy Access
    46
    Authentication Ease
    40
    Cons
    Authentication Issues
    24
    Login Issues
    16
    Complexity
    15
    Notification Issues
    15
    Delay Issues
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Duo features and usability ratings that predict user satisfaction
    9.4
    Bi-Directional Identity Synchronization
    Average: 8.9
    9.1
    Policy Management
    Average: 9.0
    9.3
    Ease of Use
    Average: 9.0
    9.1
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Company Website
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    721,498 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,386 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

Users
  • Software Engineer
  • Consultant
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 41% Enterprise
  • 37% Mid-Market
Cisco Duo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
71
Security
67
Authentication
46
Easy Access
46
Authentication Ease
40
Cons
Authentication Issues
24
Login Issues
16
Complexity
15
Notification Issues
15
Delay Issues
14
Cisco Duo features and usability ratings that predict user satisfaction
9.4
Bi-Directional Identity Synchronization
Average: 8.9
9.1
Policy Management
Average: 9.0
9.3
Ease of Use
Average: 9.0
9.1
Cloud Directory
Average: 8.6
Seller Details
Seller
Cisco
Company Website
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
721,498 Twitter followers
LinkedIn® Page
www.linkedin.com
95,386 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
(253)4.3 out of 5
3rd Easiest To Use in Risk-Based Authentication (RBA) software
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and se

    Users
    • Software Engineer
    • Software Developer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 47% Small-Business
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Auth0 Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    54
    Security
    47
    Authentication
    39
    Integrations
    34
    Easy Integrations
    33
    Cons
    Expensive
    27
    Cost
    20
    Expensive Pricing
    17
    Difficult Learning
    15
    Complexity
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Auth0 features and usability ratings that predict user satisfaction
    9.2
    Bi-Directional Identity Synchronization
    Average: 8.9
    9.1
    Policy Management
    Average: 9.0
    8.6
    Ease of Use
    Average: 9.0
    9.2
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okta
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @okta
    42,664 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,230 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and se

Users
  • Software Engineer
  • Software Developer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 47% Small-Business
  • 30% Mid-Market
Auth0 Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
54
Security
47
Authentication
39
Integrations
34
Easy Integrations
33
Cons
Expensive
27
Cost
20
Expensive Pricing
17
Difficult Learning
15
Complexity
12
Auth0 features and usability ratings that predict user satisfaction
9.2
Bi-Directional Identity Synchronization
Average: 8.9
9.1
Policy Management
Average: 9.0
8.6
Ease of Use
Average: 9.0
9.2
Cloud Directory
Average: 8.6
Seller Details
Seller
Okta
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@okta
42,664 Twitter followers
LinkedIn® Page
www.linkedin.com
7,230 employees on LinkedIn®
(1,726)4.6 out of 5
7th Easiest To Use in Risk-Based Authentication (RBA) software
View top Consulting Services for 1Password
100% Off: 0
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Most Used Enterprise Password Manager, trusted by over 180,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secu

    Users
    • Software Engineer
    • CEO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 54% Small-Business
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • 1Password Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    333
    Security
    271
    Password Management
    182
    Intuitive
    144
    Easy Access
    134
    Cons
    Password Management
    95
    Expensive
    91
    Login Issues
    69
    Autofill Issues
    64
    Cost
    60
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 1Password features and usability ratings that predict user satisfaction
    9.2
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.9
    Policy Management
    Average: 9.0
    9.0
    Ease of Use
    Average: 9.0
    8.9
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    1Password
    Company Website
    Year Founded
    2005
    HQ Location
    Ontario
    Twitter
    @1Password
    139,776 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,911 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Most Used Enterprise Password Manager, trusted by over 180,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secu

Users
  • Software Engineer
  • CEO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 54% Small-Business
  • 32% Mid-Market
1Password Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
333
Security
271
Password Management
182
Intuitive
144
Easy Access
134
Cons
Password Management
95
Expensive
91
Login Issues
69
Autofill Issues
64
Cost
60
1Password features and usability ratings that predict user satisfaction
9.2
Bi-Directional Identity Synchronization
Average: 8.9
8.9
Policy Management
Average: 9.0
9.0
Ease of Use
Average: 9.0
8.9
Cloud Directory
Average: 8.6
Seller Details
Seller
1Password
Company Website
Year Founded
2005
HQ Location
Ontario
Twitter
@1Password
139,776 Twitter followers
LinkedIn® Page
www.linkedin.com
2,911 employees on LinkedIn®
(1,990)4.5 out of 5
Optimized for quick response
6th Easiest To Use in Risk-Based Authentication (RBA) software
View top Consulting Services for LastPass
Entry Level Price:$4.25
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LastPass is a secure, cloud-based password manager that takes the hassle out of remembering and managing passwords. It works across all your devices, so you can log in faster and stay protected everyw

    Users
    • Owner
    • CEO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 63% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • LastPass Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    227
    Password Management
    170
    Security
    155
    Autofill Feature
    107
    Password Security
    99
    Cons
    Autofill Issues
    83
    Password Management
    78
    Login Issues
    66
    Password Issues
    44
    Browser Extension Issues
    43
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LastPass features and usability ratings that predict user satisfaction
    9.3
    Bi-Directional Identity Synchronization
    Average: 8.9
    9.0
    Policy Management
    Average: 9.0
    8.7
    Ease of Use
    Average: 9.0
    8.9
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LastPass
    Company Website
    Year Founded
    2008
    HQ Location
    Boston, Massachusetts
    Twitter
    @LastPass
    46,119 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    772 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LastPass is a secure, cloud-based password manager that takes the hassle out of remembering and managing passwords. It works across all your devices, so you can log in faster and stay protected everyw

Users
  • Owner
  • CEO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 63% Small-Business
  • 25% Mid-Market
LastPass Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
227
Password Management
170
Security
155
Autofill Feature
107
Password Security
99
Cons
Autofill Issues
83
Password Management
78
Login Issues
66
Password Issues
44
Browser Extension Issues
43
LastPass features and usability ratings that predict user satisfaction
9.3
Bi-Directional Identity Synchronization
Average: 8.9
9.0
Policy Management
Average: 9.0
8.7
Ease of Use
Average: 9.0
8.9
Cloud Directory
Average: 8.6
Seller Details
Seller
LastPass
Company Website
Year Founded
2008
HQ Location
Boston, Massachusetts
Twitter
@LastPass
46,119 Twitter followers
LinkedIn® Page
www.linkedin.com
772 employees on LinkedIn®
(182)4.3 out of 5
Optimized for quick response
15th Easiest To Use in Risk-Based Authentication (RBA) software
Entry Level Price:$1.71 / user, per month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 53% Enterprise
    • 40% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • IBM Verify CIAM is a customer identity and access management solution that manages customer accounts, handles identity verification, and ensures secure logins across various platforms.
    • Reviewers like the strong security features of IBM Verify CIAM, including single sign-on and multi-factor authentication, which reduce login problems and protect user data.
    • Users experienced complexity during the initial setup and configuration, and suggested improvements such as a more visual dashboard and step-by-step tutorial features.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Verify CIAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    61
    Ease of Use
    48
    Authentication
    38
    Features
    29
    MFA Authentication
    29
    Cons
    Complex Setup
    38
    Complexity
    35
    Difficult Learning
    33
    Difficult Setup
    31
    Complex Administration
    30
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Verify CIAM features and usability ratings that predict user satisfaction
    8.8
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.0
    Policy Management
    Average: 9.0
    8.3
    Ease of Use
    Average: 9.0
    8.2
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Company Website
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    708,744 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    339,241 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 53% Enterprise
  • 40% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • IBM Verify CIAM is a customer identity and access management solution that manages customer accounts, handles identity verification, and ensures secure logins across various platforms.
  • Reviewers like the strong security features of IBM Verify CIAM, including single sign-on and multi-factor authentication, which reduce login problems and protect user data.
  • Users experienced complexity during the initial setup and configuration, and suggested improvements such as a more visual dashboard and step-by-step tutorial features.
IBM Verify CIAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
61
Ease of Use
48
Authentication
38
Features
29
MFA Authentication
29
Cons
Complex Setup
38
Complexity
35
Difficult Learning
33
Difficult Setup
31
Complex Administration
30
IBM Verify CIAM features and usability ratings that predict user satisfaction
8.8
Bi-Directional Identity Synchronization
Average: 8.9
8.0
Policy Management
Average: 9.0
8.3
Ease of Use
Average: 9.0
8.2
Cloud Directory
Average: 8.6
Seller Details
Seller
IBM
Company Website
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
708,744 Twitter followers
LinkedIn® Page
www.linkedin.com
339,241 employees on LinkedIn®
(288)4.4 out of 5
4th Easiest To Use in Risk-Based Authentication (RBA) software
Entry Level Price:$6 /User /Month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin e

    Users
    • Account Manager
    Industries
    • Computer Software
    • Education Management
    Market Segment
    • 49% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OneLogin Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Single Sign-On
    8
    SSO (Single Sign-On)
    8
    Ease of Use
    7
    SSO
    6
    Security
    5
    Cons
    Service Interruptions
    5
    Connection Issues
    4
    Bugs
    3
    Error Handling
    3
    Limited Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OneLogin features and usability ratings that predict user satisfaction
    8.8
    Bi-Directional Identity Synchronization
    Average: 8.9
    9.0
    Policy Management
    Average: 9.0
    9.1
    Ease of Use
    Average: 9.0
    9.5
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Aliso Viejo, CA
    Twitter
    @OneIdentity
    7,872 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    667 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin e

Users
  • Account Manager
Industries
  • Computer Software
  • Education Management
Market Segment
  • 49% Mid-Market
  • 40% Enterprise
OneLogin Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Single Sign-On
8
SSO (Single Sign-On)
8
Ease of Use
7
SSO
6
Security
5
Cons
Service Interruptions
5
Connection Issues
4
Bugs
3
Error Handling
3
Limited Features
3
OneLogin features and usability ratings that predict user satisfaction
8.8
Bi-Directional Identity Synchronization
Average: 8.9
9.0
Policy Management
Average: 9.0
9.1
Ease of Use
Average: 9.0
9.5
Cloud Directory
Average: 8.6
Seller Details
HQ Location
Aliso Viejo, CA
Twitter
@OneIdentity
7,872 Twitter followers
LinkedIn® Page
www.linkedin.com
667 employees on LinkedIn®
(120)4.8 out of 5
Optimized for quick response
13th Easiest To Use in Risk-Based Authentication (RBA) software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kount is trust and safety technology. Businesses pick the solutions that are relevant to their unique challenges, and we help them grow with confidence — no matter the industry. We use data-driven

    Users
    No information available
    Industries
    • Retail
    • Apparel & Fashion
    Market Segment
    • 50% Mid-Market
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kount Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Fraud Prevention
    8
    Detection Efficiency
    7
    Protection
    7
    Efficiency
    6
    Fraud Detection
    6
    Cons
    Inaccuracy
    6
    False Positives
    5
    Expensive
    4
    False Alarms
    4
    Complexity
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kount features and usability ratings that predict user satisfaction
    9.2
    Bi-Directional Identity Synchronization
    Average: 8.9
    9.3
    Policy Management
    Average: 9.0
    9.2
    Ease of Use
    Average: 9.0
    9.2
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2007
    HQ Location
    Boise, ID
    LinkedIn® Page
    www.linkedin.com
    135 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kount is trust and safety technology. Businesses pick the solutions that are relevant to their unique challenges, and we help them grow with confidence — no matter the industry. We use data-driven

Users
No information available
Industries
  • Retail
  • Apparel & Fashion
Market Segment
  • 50% Mid-Market
  • 35% Small-Business
Kount Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Fraud Prevention
8
Detection Efficiency
7
Protection
7
Efficiency
6
Fraud Detection
6
Cons
Inaccuracy
6
False Positives
5
Expensive
4
False Alarms
4
Complexity
3
Kount features and usability ratings that predict user satisfaction
9.2
Bi-Directional Identity Synchronization
Average: 8.9
9.3
Policy Management
Average: 9.0
9.2
Ease of Use
Average: 9.0
9.2
Cloud Directory
Average: 8.6
Seller Details
Company Website
Year Founded
2007
HQ Location
Boise, ID
LinkedIn® Page
www.linkedin.com
135 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Incognia is the innovator of next-generation identity solutions that enable secure and seamless digital experiences. With its persistent device fingerprint solution, Incognia combines best-in-class de

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 61% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Incognia Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    6
    Fraud Prevention
    5
    Service Quality
    5
    Customer Focus
    4
    Reliability
    4
    Cons
    Admin Control Issues
    1
    Confusing Interface
    1
    Difficult Learning
    1
    Insufficient Information
    1
    Learning Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Incognia features and usability ratings that predict user satisfaction
    9.7
    Bi-Directional Identity Synchronization
    Average: 8.9
    9.4
    Policy Management
    Average: 9.0
    9.5
    Ease of Use
    Average: 9.0
    9.0
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Incognia
    Company Website
    Year Founded
    2020
    HQ Location
    Palo Alto, CA
    LinkedIn® Page
    www.linkedin.com
    239 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Incognia is the innovator of next-generation identity solutions that enable secure and seamless digital experiences. With its persistent device fingerprint solution, Incognia combines best-in-class de

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 61% Enterprise
  • 31% Mid-Market
Incognia Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
6
Fraud Prevention
5
Service Quality
5
Customer Focus
4
Reliability
4
Cons
Admin Control Issues
1
Confusing Interface
1
Difficult Learning
1
Insufficient Information
1
Learning Difficulty
1
Incognia features and usability ratings that predict user satisfaction
9.7
Bi-Directional Identity Synchronization
Average: 8.9
9.4
Policy Management
Average: 9.0
9.5
Ease of Use
Average: 9.0
9.0
Cloud Directory
Average: 8.6
Seller Details
Seller
Incognia
Company Website
Year Founded
2020
HQ Location
Palo Alto, CA
LinkedIn® Page
www.linkedin.com
239 employees on LinkedIn®
(18)4.8 out of 5
9th Easiest To Use in Risk-Based Authentication (RBA) software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative age

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 44% Small-Business
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Silverfort Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Ease of Use
    2
    MFA Security
    2
    Setup Ease
    2
    Time-Saving
    2
    Cons
    Poor Customer Support
    2
    Account Management
    1
    Complexity
    1
    Difficulty Locating
    1
    Implementation Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Silverfort features and usability ratings that predict user satisfaction
    6.7
    Bi-Directional Identity Synchronization
    Average: 8.9
    6.7
    Policy Management
    Average: 9.0
    9.9
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Tel Aviv, Israel
    Twitter
    @silverfort
    651 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    584 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative age

Users
No information available
Industries
No information available
Market Segment
  • 44% Small-Business
  • 39% Mid-Market
Silverfort Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Ease of Use
2
MFA Security
2
Setup Ease
2
Time-Saving
2
Cons
Poor Customer Support
2
Account Management
1
Complexity
1
Difficulty Locating
1
Implementation Difficulty
1
Silverfort features and usability ratings that predict user satisfaction
6.7
Bi-Directional Identity Synchronization
Average: 8.9
6.7
Policy Management
Average: 9.0
9.9
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
Year Founded
2016
HQ Location
Tel Aviv, Israel
Twitter
@silverfort
651 Twitter followers
LinkedIn® Page
www.linkedin.com
584 employees on LinkedIn®
(106)4.4 out of 5
12th Easiest To Use in Risk-Based Authentication (RBA) software
Entry Level Price:$3 Per User Per Month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The P

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 67% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ping Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Management
    1
    Customer Support
    1
    Ease of Use
    1
    Identity Management
    1
    Integrations
    1
    Cons
    Authentication Issues
    1
    Complex Administration
    1
    Complex Setup
    1
    Confusing Interface
    1
    Confusing Options
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ping Identity features and usability ratings that predict user satisfaction
    9.2
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.7
    Policy Management
    Average: 9.0
    8.7
    Ease of Use
    Average: 9.0
    9.2
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,161 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,311 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The P

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 67% Enterprise
  • 25% Mid-Market
Ping Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Management
1
Customer Support
1
Ease of Use
1
Identity Management
1
Integrations
1
Cons
Authentication Issues
1
Complex Administration
1
Complex Setup
1
Confusing Interface
1
Confusing Options
1
Ping Identity features and usability ratings that predict user satisfaction
9.2
Bi-Directional Identity Synchronization
Average: 8.9
8.7
Policy Management
Average: 9.0
8.7
Ease of Use
Average: 9.0
9.2
Cloud Directory
Average: 8.6
Seller Details
Company Website
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,161 Twitter followers
LinkedIn® Page
www.linkedin.com
2,311 employees on LinkedIn®
(127)4.5 out of 5
10th Easiest To Use in Risk-Based Authentication (RBA) software
Entry Level Price:Starting at $2.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 49% Enterprise
    • 49% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Workforce Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    14
    Access Management
    6
    Intuitive
    6
    Customer Support
    5
    Access Control
    4
    Cons
    Missing Features
    4
    Integration Issues
    2
    Lack of Automation
    2
    Lack of Features
    2
    Browser Extension Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Workforce Identity features and usability ratings that predict user satisfaction
    8.3
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.3
    Policy Management
    Average: 9.0
    8.8
    Ease of Use
    Average: 9.0
    10.0
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,726 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,022 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 49% Enterprise
  • 49% Mid-Market
CyberArk Workforce Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
14
Access Management
6
Intuitive
6
Customer Support
5
Access Control
4
Cons
Missing Features
4
Integration Issues
2
Lack of Automation
2
Lack of Features
2
Browser Extension Issues
1
CyberArk Workforce Identity features and usability ratings that predict user satisfaction
8.3
Bi-Directional Identity Synchronization
Average: 8.9
8.3
Policy Management
Average: 9.0
8.8
Ease of Use
Average: 9.0
10.0
Cloud Directory
Average: 8.6
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,726 Twitter followers
LinkedIn® Page
www.linkedin.com
5,022 employees on LinkedIn®
Ownership
NASDAQ:CYBR
Entry Level Price:$3.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proximity MFA for shared workstations. MFA for Shared Computers is a cutting-edge security solution designed to enhance user authentication and access control in environments where multiple users shar

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Electrical/Electronic Manufacturing
    Market Segment
    • 40% Small-Business
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • GateKeeper Proximity Authentication Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    13
    Security
    12
    Implementation Ease
    8
    Customer Support
    7
    Secure Sharing
    7
    Cons
    Authentication Issues
    2
    Difficult Learning
    2
    Limited Compatibility
    2
    App Issues
    1
    Data Security
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GateKeeper Proximity Authentication features and usability ratings that predict user satisfaction
    10.0
    Bi-Directional Identity Synchronization
    Average: 8.9
    10.0
    Policy Management
    Average: 9.0
    9.8
    Ease of Use
    Average: 9.0
    10.0
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    College Park, Maryland
    Twitter
    @gkaccess
    2,004 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    21 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Proximity MFA for shared workstations. MFA for Shared Computers is a cutting-edge security solution designed to enhance user authentication and access control in environments where multiple users shar

Users
No information available
Industries
  • Hospital & Health Care
  • Electrical/Electronic Manufacturing
Market Segment
  • 40% Small-Business
  • 36% Mid-Market
GateKeeper Proximity Authentication Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
13
Security
12
Implementation Ease
8
Customer Support
7
Secure Sharing
7
Cons
Authentication Issues
2
Difficult Learning
2
Limited Compatibility
2
App Issues
1
Data Security
1
GateKeeper Proximity Authentication features and usability ratings that predict user satisfaction
10.0
Bi-Directional Identity Synchronization
Average: 8.9
10.0
Policy Management
Average: 9.0
9.8
Ease of Use
Average: 9.0
10.0
Cloud Directory
Average: 8.6
Seller Details
Company Website
Year Founded
2015
HQ Location
College Park, Maryland
Twitter
@gkaccess
2,004 Twitter followers
LinkedIn® Page
www.linkedin.com
21 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Thales’ SafeNet Trusted Access is a cloud-based Access Management and Authentication Service. It ensures that no user is a target by allowing you to expand authentication to all users and apps with di

    Users
    No information available
    Industries
    • Computer Networking
    Market Segment
    • 66% Enterprise
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Thales SafeNet Trusted Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    2FA Security
    1
    Access Control
    1
    Cloud Services
    1
    Cross-platform
    1
    Data Analysis
    1
    Cons
    Admin Limitations
    1
    Complex Administration
    1
    Complexity
    1
    Complex Setup
    1
    Difficult Learning Process
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Thales SafeNet Trusted Access features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    9.6
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin, Texas
    Twitter
    @ThalesCloudSec
    6,950 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,369 employees on LinkedIn®
    Ownership
    EPA:HO
    Total Revenue (USD mm)
    $15,854
Product Description
How are these determined?Information
This description is provided by the seller.

Thales’ SafeNet Trusted Access is a cloud-based Access Management and Authentication Service. It ensures that no user is a target by allowing you to expand authentication to all users and apps with di

Users
No information available
Industries
  • Computer Networking
Market Segment
  • 66% Enterprise
  • 28% Mid-Market
Thales SafeNet Trusted Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
2FA Security
1
Access Control
1
Cloud Services
1
Cross-platform
1
Data Analysis
1
Cons
Admin Limitations
1
Complex Administration
1
Complexity
1
Complex Setup
1
Difficult Learning Process
1
Thales SafeNet Trusted Access features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
9.6
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
HQ Location
Austin, Texas
Twitter
@ThalesCloudSec
6,950 Twitter followers
LinkedIn® Page
www.linkedin.com
1,369 employees on LinkedIn®
Ownership
EPA:HO
Total Revenue (USD mm)
$15,854
(29)4.4 out of 5
11th Easiest To Use in Risk-Based Authentication (RBA) software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

    Users
    No information available
    Industries
    • Hospital & Health Care
    Market Segment
    • 141% Mid-Market
    • 66% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureAuth: Workforce IAM features and usability ratings that predict user satisfaction
    9.7
    Bi-Directional Identity Synchronization
    Average: 8.9
    9.7
    Policy Management
    Average: 9.0
    8.9
    Ease of Use
    Average: 9.0
    9.5
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Irvine, CA
    Twitter
    @SecureAuth
    8,593 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    150 employees on LinkedIn®
    Phone
    949-777-6959
Product Description
How are these determined?Information
This description is provided by the seller.

More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

Users
No information available
Industries
  • Hospital & Health Care
Market Segment
  • 141% Mid-Market
  • 66% Small-Business
SecureAuth: Workforce IAM features and usability ratings that predict user satisfaction
9.7
Bi-Directional Identity Synchronization
Average: 8.9
9.7
Policy Management
Average: 9.0
8.9
Ease of Use
Average: 9.0
9.5
Cloud Directory
Average: 8.6
Seller Details
Year Founded
2005
HQ Location
Irvine, CA
Twitter
@SecureAuth
8,593 Twitter followers
LinkedIn® Page
www.linkedin.com
150 employees on LinkedIn®
Phone
949-777-6959