Introducing G2.ai, the future of software buying.Try now

Best Risk-Based Authentication Software - Page 4

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Risk-based authentication (RBA) solutions are identity management products that weigh user variables to determine and identify threats. Companies use RBA software to increase the effectiveness of user governance and authentication procedures. Users who are determined to be riskier are required to provide additional authentication information. These analyze IP addresses, devices, behaviors and identities to set customized authentication methods for each individual user attempting to access the network. Non-suspicious users accessing applications from known devices, locations, and networks may be automatically signed in. Suspicious users may be required to prompted to provide SMS code, biometric verification, or email confirmation actions to properly verify their identity.

Risk-based authentication products often contain multi-factor authentication features, but set unique requirements based the administrators configuration. RBA tools may work in sync with cloud identity and access management products, but typically only provide the authentication component, rather than the application access and governance components.

To qualify for inclusion in the Risk-Based Authentication category, a product must:

Assess a user’s unique network, device, and behavior to determine risk
Prompt authentication measures after assessment
Utilize authentication methods such as SMS, questioning, or email confirmation
Periodically store and update suspicious networks, devices, and behaviors
Show More
Show Less

Best Risk-Based Authentication Software At A Glance

Leader:
Highest Performer:
Easiest to Use:
Top Trending:
Best Free Software:
Show LessShow More
Easiest to Use:
Top Trending:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Risk-Based Authentication (RBA) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
99 Listings in Risk-Based Authentication (RBA) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Nok Nok S3 Authentication Suite is a digital authentication platform that delivers a modern user experience, protects customers, and engages users to drive more revenue. The Nok Nok S3 Authenticat

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 50% Small-Business
    • 30% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OneSpan S3 Authentication Suite Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Authentication
    1
    Biometric Authentication
    1
    Security Authentication
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OneSpan S3 Authentication Suite features and usability ratings that predict user satisfaction
    9.2
    Bi-Directional Identity Synchronization
    Average: 8.9
    10.0
    Policy Management
    Average: 9.0
    9.0
    Ease of Use
    Average: 9.0
    10.0
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OneSpan
    Year Founded
    1991
    HQ Location
    Boston, MA
    Twitter
    @OneSpan
    3,379 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    557 employees on LinkedIn®
    Ownership
    OSPN
Product Description
How are these determined?Information
This description is provided by the seller.

The Nok Nok S3 Authentication Suite is a digital authentication platform that delivers a modern user experience, protects customers, and engages users to drive more revenue. The Nok Nok S3 Authenticat

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 50% Small-Business
  • 30% Enterprise
OneSpan S3 Authentication Suite Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Authentication
1
Biometric Authentication
1
Security Authentication
1
Cons
This product has not yet received any negative sentiments.
OneSpan S3 Authentication Suite features and usability ratings that predict user satisfaction
9.2
Bi-Directional Identity Synchronization
Average: 8.9
10.0
Policy Management
Average: 9.0
9.0
Ease of Use
Average: 9.0
10.0
Cloud Directory
Average: 8.6
Seller Details
Seller
OneSpan
Year Founded
1991
HQ Location
Boston, MA
Twitter
@OneSpan
3,379 Twitter followers
LinkedIn® Page
www.linkedin.com
557 employees on LinkedIn®
Ownership
OSPN
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Smart Authentication (SA) is the ultimate solution for customer authentication and transaction signing, based on behavioural and risk based continuous evaluation, designed for innovative e-payment ser

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Smart Authentication Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Integrations
    1
    Setup Ease
    1
    User Interface
    1
    Cons
    Network Connectivity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Smart Authentication features and usability ratings that predict user satisfaction
    8.3
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.3
    Policy Management
    Average: 9.0
    9.2
    Ease of Use
    Average: 9.0
    8.3
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Padova, IT
    Twitter
    @XtnLab
    116 Twitter followers
    LinkedIn® Page
    it.linkedin.com
    33 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Smart Authentication (SA) is the ultimate solution for customer authentication and transaction signing, based on behavioural and risk based continuous evaluation, designed for innovative e-payment ser

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
Smart Authentication Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Integrations
1
Setup Ease
1
User Interface
1
Cons
Network Connectivity
1
Smart Authentication features and usability ratings that predict user satisfaction
8.3
Bi-Directional Identity Synchronization
Average: 8.9
8.3
Policy Management
Average: 9.0
9.2
Ease of Use
Average: 9.0
8.3
Cloud Directory
Average: 8.6
Seller Details
Year Founded
2014
HQ Location
Padova, IT
Twitter
@XtnLab
116 Twitter followers
LinkedIn® Page
it.linkedin.com
33 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Transmit Security CIAM Platform helps cybersecurity leaders, identity professionals and digital product teams provide strong account protection and a seamless user experience across the entire custome

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Transmit Security CIAM Platform features and usability ratings that predict user satisfaction
    7.5
    Bi-Directional Identity Synchronization
    Average: 8.9
    9.2
    Policy Management
    Average: 9.0
    10.0
    Ease of Use
    Average: 9.0
    8.3
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Tel Aviv-Yafo, Tel Aviv District, Israel
    Twitter
    @TransmitSec
    721 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    311 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Transmit Security CIAM Platform helps cybersecurity leaders, identity professionals and digital product teams provide strong account protection and a seamless user experience across the entire custome

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 25% Enterprise
Transmit Security CIAM Platform features and usability ratings that predict user satisfaction
7.5
Bi-Directional Identity Synchronization
Average: 8.9
9.2
Policy Management
Average: 9.0
10.0
Ease of Use
Average: 9.0
8.3
Cloud Directory
Average: 8.6
Seller Details
Year Founded
2014
HQ Location
Tel Aviv-Yafo, Tel Aviv District, Israel
Twitter
@TransmitSec
721 Twitter followers
LinkedIn® Page
www.linkedin.com
311 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Workspace ONE is a digital workspace platform that simply and securely delivers and manages any app on any device by integrating access control, application management and multi-platform endpoint mana

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Workspace ONE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    This product has not yet received any positive sentiments.
    Cons
    Access Issues
    1
    Account Setup Issues
    1
    Complex Setup
    1
    Confusing Interface
    1
    Delay Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Workspace ONE features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.1
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    61,454 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    56,584 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Workspace ONE is a digital workspace platform that simply and securely delivers and manages any app on any device by integrating access control, application management and multi-platform endpoint mana

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Mid-Market
  • 36% Enterprise
Workspace ONE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
This product has not yet received any positive sentiments.
Cons
Access Issues
1
Account Setup Issues
1
Complex Setup
1
Confusing Interface
1
Delay Issues
1
Workspace ONE features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.1
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
61,454 Twitter followers
LinkedIn® Page
www.linkedin.com
56,584 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Castle is an identity and fraud risk management platform. We help security and fraud teams discover, investigate, report on and ultimately stop fraud at signup, login, and during transactions. Our SDK

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Castle Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Bot Detection
    1
    Data Security
    1
    Detection Efficiency
    1
    Efficiency
    1
    Email Security
    1
    Cons
    Communication Issues
    1
    False Positives
    1
    Fraud Management
    1
    Inaccuracy
    1
    Ineffective Blocking
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Castle features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Castle
    Year Founded
    2015
    HQ Location
    Brooklyn, US
    Twitter
    @Castle_IO
    754 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    36 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Castle is an identity and fraud risk management platform. We help security and fraud teams discover, investigate, report on and ultimately stop fraud at signup, login, and during transactions. Our SDK

Users
No information available
Industries
No information available
Market Segment
  • 33% Enterprise
  • 33% Mid-Market
Castle Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Bot Detection
1
Data Security
1
Detection Efficiency
1
Efficiency
1
Email Security
1
Cons
Communication Issues
1
False Positives
1
Fraud Management
1
Inaccuracy
1
Ineffective Blocking
1
Castle features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.3
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
Seller
Castle
Year Founded
2015
HQ Location
Brooklyn, US
Twitter
@Castle_IO
754 Twitter followers
LinkedIn® Page
www.linkedin.com
36 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    cidaas, the European cloud identity and access management system from Widas ID GmbH, delivers an out-of-the-box solution for federated identities, single sign-on and multi-factor authentication. With

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • cidaas features and usability ratings that predict user satisfaction
    10.0
    Bi-Directional Identity Synchronization
    Average: 8.9
    10.0
    Policy Management
    Average: 9.0
    10.0
    Ease of Use
    Average: 9.0
    10.0
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1997
    HQ Location
    Wimsheim, DE
    Twitter
    @WidasGroup
    131 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    93 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

cidaas, the European cloud identity and access management system from Widas ID GmbH, delivers an out-of-the-box solution for federated identities, single sign-on and multi-factor authentication. With

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
cidaas features and usability ratings that predict user satisfaction
10.0
Bi-Directional Identity Synchronization
Average: 8.9
10.0
Policy Management
Average: 9.0
10.0
Ease of Use
Average: 9.0
10.0
Cloud Directory
Average: 8.6
Seller Details
Year Founded
1997
HQ Location
Wimsheim, DE
Twitter
@WidasGroup
131 Twitter followers
LinkedIn® Page
www.linkedin.com
93 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entsecure, a zero trust identity security platform, provides a unique blend of zero trust identity management with device health monitoring that can be deployed across entire organizations in minutes.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Entsecure features and usability ratings that predict user satisfaction
    10.0
    Bi-Directional Identity Synchronization
    Average: 8.9
    10.0
    Policy Management
    Average: 9.0
    10.0
    Ease of Use
    Average: 9.0
    10.0
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Entsecure
    Year Founded
    2020
    HQ Location
    Singapore, SG
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Entsecure, a zero trust identity security platform, provides a unique blend of zero trust identity management with device health monitoring that can be deployed across entire organizations in minutes.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Entsecure features and usability ratings that predict user satisfaction
10.0
Bi-Directional Identity Synchronization
Average: 8.9
10.0
Policy Management
Average: 9.0
10.0
Ease of Use
Average: 9.0
10.0
Cloud Directory
Average: 8.6
Seller Details
Seller
Entsecure
Year Founded
2020
HQ Location
Singapore, SG
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    miniOrange IAM trusted platform offers frictionless solutions like - Single Sign-On, Multi-Factor Authentication, User lifeCycle Management, Passwordless Authentication, and much more. miniOrange’s u

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 40% Small-Business
    • 32% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • miniOrange Identity & Access Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Management
    3
    Ease of Use
    3
    Single Sign-On
    3
    SSO
    3
    SSO (Single Sign-On)
    3
    Cons
    Active Directory Issues
    1
    Lacking Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • miniOrange Identity & Access Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    9.2
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Pune, India
    Twitter
    @miniOrange_it
    28 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    523 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

miniOrange IAM trusted platform offers frictionless solutions like - Single Sign-On, Multi-Factor Authentication, User lifeCycle Management, Passwordless Authentication, and much more. miniOrange’s u

Users
No information available
Industries
  • Computer Software
Market Segment
  • 40% Small-Business
  • 32% Enterprise
miniOrange Identity & Access Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Management
3
Ease of Use
3
Single Sign-On
3
SSO
3
SSO (Single Sign-On)
3
Cons
Active Directory Issues
1
Lacking Features
1
miniOrange Identity & Access Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
9.2
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
Year Founded
2012
HQ Location
Pune, India
Twitter
@miniOrange_it
28 Twitter followers
LinkedIn® Page
www.linkedin.com
523 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Next Caller, a Pindrop® Company, provides enterprise-grade ANI Validation and Spoof Detection for contact centers using VeriCall® Technology. VeriCall Technology analyzes the metadata on incoming call

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Next Caller Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Dashboard Usability
    1
    Ease of Use
    1
    Efficiency
    1
    Reliability
    1
    Speed
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Next Caller features and usability ratings that predict user satisfaction
    10.0
    Bi-Directional Identity Synchronization
    Average: 8.9
    10.0
    Policy Management
    Average: 9.0
    10.0
    Ease of Use
    Average: 9.0
    10.0
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    New York, US
    Twitter
    @nextcaller
    3,796 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Next Caller, a Pindrop® Company, provides enterprise-grade ANI Validation and Spoof Detection for contact centers using VeriCall® Technology. VeriCall Technology analyzes the metadata on incoming call

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 33% Enterprise
Next Caller Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Dashboard Usability
1
Ease of Use
1
Efficiency
1
Reliability
1
Speed
1
Cons
This product has not yet received any negative sentiments.
Next Caller features and usability ratings that predict user satisfaction
10.0
Bi-Directional Identity Synchronization
Average: 8.9
10.0
Policy Management
Average: 9.0
10.0
Ease of Use
Average: 9.0
10.0
Cloud Directory
Average: 8.6
Seller Details
Year Founded
2012
HQ Location
New York, US
Twitter
@nextcaller
3,796 Twitter followers
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetIQ Advanced Authentication is a standards-based framework built to meet today’s authentication challenges. Its open architecture is designed to enable organizations to protect their applications an

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText NetIQ Advanced Authentication features and usability ratings that predict user satisfaction
    5.0
    Bi-Directional Identity Synchronization
    Average: 8.9
    5.0
    Policy Management
    Average: 9.0
    7.5
    Ease of Use
    Average: 9.0
    5.0
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,628 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    23,200 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

NetIQ Advanced Authentication is a standards-based framework built to meet today’s authentication challenges. Its open architecture is designed to enable organizations to protect their applications an

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Small-Business
OpenText NetIQ Advanced Authentication features and usability ratings that predict user satisfaction
5.0
Bi-Directional Identity Synchronization
Average: 8.9
5.0
Policy Management
Average: 9.0
7.5
Ease of Use
Average: 9.0
5.0
Cloud Directory
Average: 8.6
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,628 Twitter followers
LinkedIn® Page
www.linkedin.com
23,200 employees on LinkedIn®
Ownership
NASDAQ:OTEX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mapping to the latest EMV® 3-D Secure protocol, Outseer 3-D Secure™ is a leading global ACS solution for issuers / issuer processors to fight CNP fraud: • 95% fraud stopped with only 5% intervention

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Outseer 3-D Secure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Analysis
    1
    Real-time Monitoring
    1
    Risk Assessment
    1
    Risk Management
    1
    Cons
    Delayed Updates
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Outseer 3-D Secure features and usability ratings that predict user satisfaction
    8.3
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.3
    Policy Management
    Average: 9.0
    10.0
    Ease of Use
    Average: 9.0
    8.3
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Outseer
    HQ Location
    Bedford, US
    Twitter
    @OutseerCo
    128 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    233 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Mapping to the latest EMV® 3-D Secure protocol, Outseer 3-D Secure™ is a leading global ACS solution for issuers / issuer processors to fight CNP fraud: • 95% fraud stopped with only 5% intervention

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Outseer 3-D Secure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Analysis
1
Real-time Monitoring
1
Risk Assessment
1
Risk Management
1
Cons
Delayed Updates
1
Outseer 3-D Secure features and usability ratings that predict user satisfaction
8.3
Bi-Directional Identity Synchronization
Average: 8.9
8.3
Policy Management
Average: 9.0
10.0
Ease of Use
Average: 9.0
8.3
Cloud Directory
Average: 8.6
Seller Details
Seller
Outseer
HQ Location
Bedford, US
Twitter
@OutseerCo
128 Twitter followers
LinkedIn® Page
www.linkedin.com
233 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Enterprise
    • 27% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SecureAuth: Customer Identity Access Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Authentication
    6
    Ease of Use
    5
    Security
    5
    Customer Support
    4
    Security Authentication
    4
    Cons
    Poor Interface Design
    5
    Complexity
    4
    Complex Setup
    4
    Missing Features
    4
    Complex Administration
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureAuth: Customer Identity Access Management features and usability ratings that predict user satisfaction
    10.0
    Bi-Directional Identity Synchronization
    Average: 8.9
    10.0
    Policy Management
    Average: 9.0
    7.9
    Ease of Use
    Average: 9.0
    10.0
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Irvine, CA
    Twitter
    @SecureAuth
    8,633 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    151 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

Users
No information available
Industries
No information available
Market Segment
  • 55% Enterprise
  • 27% Small-Business
SecureAuth: Customer Identity Access Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Authentication
6
Ease of Use
5
Security
5
Customer Support
4
Security Authentication
4
Cons
Poor Interface Design
5
Complexity
4
Complex Setup
4
Missing Features
4
Complex Administration
3
SecureAuth: Customer Identity Access Management features and usability ratings that predict user satisfaction
10.0
Bi-Directional Identity Synchronization
Average: 8.9
10.0
Policy Management
Average: 9.0
7.9
Ease of Use
Average: 9.0
10.0
Cloud Directory
Average: 8.6
Seller Details
Company Website
Year Founded
2005
HQ Location
Irvine, CA
Twitter
@SecureAuth
8,633 Twitter followers
LinkedIn® Page
www.linkedin.com
151 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SolidPass is a authentication solution that protects enterprises and their customers from fraud, digital attacks, and information theft through advanced security software.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Solidpass Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Solidpass features and usability ratings that predict user satisfaction
    8.3
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.3
    Policy Management
    Average: 9.0
    8.3
    Ease of Use
    Average: 9.0
    8.3
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Solidpass
    HQ Location
    N/A
    Twitter
    @solidpass
    145 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SolidPass is a authentication solution that protects enterprises and their customers from fraud, digital attacks, and information theft through advanced security software.

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Solidpass Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
1
Cons
Expensive
1
Solidpass features and usability ratings that predict user satisfaction
8.3
Bi-Directional Identity Synchronization
Average: 8.9
8.3
Policy Management
Average: 9.0
8.3
Ease of Use
Average: 9.0
8.3
Cloud Directory
Average: 8.6
Seller Details
Seller
Solidpass
HQ Location
N/A
Twitter
@solidpass
145 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CA Risk Authentication is a powerful risk-based, adaptive authentication solution that works in real time to evaluate context, calculate a risk score, recommend actions and provide alerts/case managem

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Symantec Advanced Authentication Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Convenience
    1
    Easy Access
    1
    Performance Reliability
    1
    Security
    1
    Cons
    Complex Setup
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Advanced Authentication features and usability ratings that predict user satisfaction
    10.0
    Bi-Directional Identity Synchronization
    Average: 8.9
    10.0
    Policy Management
    Average: 9.0
    10.0
    Ease of Use
    Average: 9.0
    10.0
    Cloud Directory
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    61,454 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    56,584 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

CA Risk Authentication is a powerful risk-based, adaptive authentication solution that works in real time to evaluate context, calculate a risk score, recommend actions and provide alerts/case managem

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Symantec Advanced Authentication Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Convenience
1
Easy Access
1
Performance Reliability
1
Security
1
Cons
Complex Setup
1
Slow Performance
1
Symantec Advanced Authentication features and usability ratings that predict user satisfaction
10.0
Bi-Directional Identity Synchronization
Average: 8.9
10.0
Policy Management
Average: 9.0
10.0
Ease of Use
Average: 9.0
10.0
Cloud Directory
Average: 8.6
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
61,454 Twitter followers
LinkedIn® Page
www.linkedin.com
56,584 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    UserLock delivers Identity & Access Management (IAM) for organizations built on Microsoft Active Directory. It protects logins to corporate networks and SaaS applications across hybrid, remote, an

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 63% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • UserLock Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Easy Setup
    2
    Setup Ease
    2
    2FA Security
    1
    Customer Support
    1
    Cons
    Access Issues
    1
    Authentication Issues
    1
    Lack of Customization
    1
    Limited Features
    1
    Limited OS Compatibility
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UserLock features and usability ratings that predict user satisfaction
    8.3
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.3
    Policy Management
    Average: 9.0
    9.4
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    BIDART, Aquitaine
    LinkedIn® Page
    www.linkedin.com
    31 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

UserLock delivers Identity & Access Management (IAM) for organizations built on Microsoft Active Directory. It protects logins to corporate networks and SaaS applications across hybrid, remote, an

Users
No information available
Industries
No information available
Market Segment
  • 63% Small-Business
  • 25% Mid-Market
UserLock Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Easy Setup
2
Setup Ease
2
2FA Security
1
Customer Support
1
Cons
Access Issues
1
Authentication Issues
1
Lack of Customization
1
Limited Features
1
Limited OS Compatibility
1
UserLock features and usability ratings that predict user satisfaction
8.3
Bi-Directional Identity Synchronization
Average: 8.9
8.3
Policy Management
Average: 9.0
9.4
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
Year Founded
2000
HQ Location
BIDART, Aquitaine
LinkedIn® Page
www.linkedin.com
31 employees on LinkedIn®