# Best Enterprise Single Sign-On (SSO) Solutions

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Products classified in the overall Single Sign-On (SSO) category are similar in many regards and help companies of all sizes solve their business problems. However, enterprise business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Enterprise Business Single Sign-On (SSO) to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2&#39;s buying advisors to find the right solutions within the Enterprise Business Single Sign-On (SSO) category.

In addition to qualifying for inclusion in the Single Sign-On (SSO) Solutions category, to qualify for inclusion in the Enterprise Business Single Sign-On (SSO) Solutions category, a product must have at least 10 reviews left by a reviewer from an enterprise business.





## Category Overview

**Total Products under this Category:** 171


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 17,400+ Authentic Reviews
- 171+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.



---

**Sponsored**

### Rippling IT

Transform your organization’s IT operations with Rippling’s unified platform for identity, device, access, and security management. Centralize every IT workflow, from provisioning apps and laptops to enforcing security policies, in a single dashboard. Seamlessly manage the entire employee lifecycle, automatically granting and revoking app access, configuring devices, and maintaining least-privilege controls. Enforce compliance with real-time monitoring, automated patching, and integrated endpoint protection. Streamline offboarding with instant lockouts and secure device recovery. Gain full visibility across hardware, software, and user risk without the complexity of multiple tools. Rippling helps your business cut costs, eliminate manual work, and strengthen security, so your team can move faster. Experience the power of unified IT management with Rippling today.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=254&amp;secure%5Bdisplayable_resource_id%5D=254&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=254&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=1640029&amp;secure%5Bresource_id%5D=254&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fsingle-sign-on-sso&amp;secure%5Btoken%5D=28d244e5bfc0c25c793f9e2828945b62f21eed5f66646277d92d0318255e3a4f&amp;secure%5Burl%5D=https%3A%2F%2Fwww.rippling.com%2Fpaid-sso-provisioning%3Futm_source%3Dg2crowd_cpc%26utm_medium%3Daffiliate%26utm_program%3Devergreen-conversion%26utm_term%3DSSO%26utm_campaign%3DUS-G2-PPC-IT%26utm_product%3Dit&amp;secure%5Burl_type%5D=custom_url)

---

## Top-Rated Products (Ranked by G2 Score)
### 1. [Okta](https://www.g2.com/products/okta/reviews)
  Okta, Inc. is The World’s Identity Company™. We secure AI, machine, and human identity so everyone is free to safely use any technology. Our customer and workforce solutions empower businesses and developers to protect their AI agents, users, employees, and partners while driving security, efficiencies, and innovation. Learn why the world’s leading brands trust Okta for authentication, authorization, and more at okta.com.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 1,193

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.9/10)
- **Partner Access:** 9.0/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 9.1/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 9.0/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Okta](https://www.g2.com/sellers/okta)
- **Company Website:** https://okta.com
- **Year Founded:** 2009
- **HQ Location:** San Francisco, California
- **Twitter:** @okta (42,734 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/926041/ (7,230 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, Account Executive
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 51% Mid-Market, 39% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (205 reviews)
- Security (156 reviews)
- Authentication Security (151 reviews)
- Single Sign-On (141 reviews)
- Easy Access (138 reviews)

**Cons:**

- Authentication Issues (77 reviews)
- Login Issues (64 reviews)
- Expensive (46 reviews)
- Complex Setup (44 reviews)
- Frequent Authentication (39 reviews)

### 2. [Microsoft Entra ID](https://www.g2.com/products/microsoft-entra-id/reviews)
  Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID, you get: • Secure adaptive access with multi-factor authentication and Conditional Access policies • Seamless user experience with single sign-on, passwordless and user portal • Unified identity management that connect all internal and external users to all apps and devices. • Simplified Identity Governance with provisioning, access packages, and access reviews. Microsoft Entra is our new product family that encompasses all of Microsoft’s identity and access capabilities. The Entra family includes Microsoft Entra ID, as well as two new product categories: Cloud Infrastructure Entitlement Management (CIEM) and decentralized identity. The products in the Entra family will help provide secure access to everything for everyone, by providing identity and access management, cloud infrastructure entitlement management, and identity verification.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 865

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 8.9/10)
- **Partner Access:** 8.8/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.7/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 8.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,114,353 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, System Engineer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 39% Mid-Market, 37% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (129 reviews)
- Security (122 reviews)
- Single Sign-On (90 reviews)
- Identity Management (89 reviews)
- Integrations (80 reviews)

**Cons:**

- Complexity (56 reviews)
- Expensive (53 reviews)
- Complex Administration (42 reviews)
- Difficult Learning (38 reviews)
- Complex Setup (37 reviews)

### 3. [JumpCloud](https://www.g2.com/products/jumpcloud/reviews)
  JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 3,815

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 8.9/10)
- **Partner Access:** 8.4/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.7/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 8.4/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [JumpCloud Inc.](https://www.g2.com/sellers/jumpcloud-inc)
- **Company Website:** https://jumpcloud.com/
- **Year Founded:** 2012
- **HQ Location:** Louisville, CO
- **Twitter:** @JumpCloud (36,482 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/jumpcloud/ (959 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, System Administrator
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 53% Mid-Market, 36% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (878 reviews)
- Device Management (662 reviews)
- Security (518 reviews)
- Integrations (481 reviews)
- Features (429 reviews)

**Cons:**

- Missing Features (380 reviews)
- Improvement Needed (301 reviews)
- Limited Features (234 reviews)
- Limitations (177 reviews)
- Learning Curve (155 reviews)

### 4. [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews)
  Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications while incorporating identity visibility and context from multiple identity sources.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 491

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 8.9/10)
- **Partner Access:** 9.1/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 9.3/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 9.2/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Cisco](https://www.g2.com/sellers/cisco)
- **Company Website:** https://www.cisco.com
- **Year Founded:** 1984
- **HQ Location:** San Jose, CA
- **Twitter:** @Cisco (721,495 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cisco/ (95,742 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, Network Administrator
  - **Top Industries:** Information Technology and Services, Higher Education
  - **Company Size:** 41% Enterprise, 37% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (70 reviews)
- Security (67 reviews)
- Authentication (45 reviews)
- Easy Access (45 reviews)
- Authentication Ease (39 reviews)

**Cons:**

- Authentication Issues (24 reviews)
- Login Issues (16 reviews)
- Complexity (15 reviews)
- Notification Issues (15 reviews)
- Delay Issues (14 reviews)

### 5. [Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews)
  Zscaler Private Access (ZPA) is a cloud-based zero trust solution that securely connects users to private applications hosted in public clouds, data centers, or on-premises environments without relying on traditional VPNs or exposing them to the internet. Built on the principles of zero trust, ZPA ensures that users are authenticated and authorized before granting access, providing application-specific access rather than exposing the network. With AI-powered segmentation and identity-based policies, ZPA minimizes the attack surface, makes applications invisible to the internet, and prevents lateral movement. By simplifying access, reducing IT complexity, and improving user experience, ZPA supports modern hybrid work while delivering unmatched scalability and performance. Key Features and Benefits: • Minimize the Attack Surface: Private applications are hidden behind the Zero Trust Exchange, making them invisible and unreachable. Users connect to apps, not the network. • Eliminate Lateral Movement: Least-privileged access allows one-to-one user-to-application connections, avoiding network-wide exposure. • Deliver Exceptional User Experience &amp; Boost Hybrid Workforce Productivity: Fast, direct access to apps via 160+ global points of presence ensures low latency and no backhauling, boosting productivity. • Accelerate Zero Trust Journey with AI-powered User-to-app Segmentation: AI/ML generates custom app segmentation recommendations, simplifying user-to-app segmentation. • Prevent Compromised Users, Insider Threats &amp; Advanced Attackers: Comprehensive protection for private apps with OWASP Top 10 prevention, inline inspection, advanced threat protection, and data loss prevention. • Extend Zero Trust to All Applications: Enable secure remote access for legacy network connected applications such as VOIP and server-to-client applications, and extranet applications hosted in business partner or vendor networks. • Ensure Business Continuity and High Availability: ZPA Private Service Edge caches policies for zero trust access during internet outages, allowing for secure connectivity and business continuity. • Reduce Cost &amp; Operational Complexity: Replaces legacy VPNs, simplifying management and cutting hardware and operational costs. Accelerate M&amp;A time-to-value without having to integrate networks.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 132

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 8.9/10)
- **Partner Access:** 8.0/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.9/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 7.9/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Zscaler](https://www.g2.com/sellers/zscaler)
- **Company Website:** https://www.zscaler.com/
- **Year Founded:** 2008
- **HQ Location:** San Jose, California
- **Twitter:** @zscaler (17,530 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/234625/ (8,743 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 44% Enterprise, 29% Mid-Market


#### Pros & Cons

**Pros:**

- Security (64 reviews)
- Ease of Use (53 reviews)
- Secure Access (49 reviews)
- VPN Efficiency (30 reviews)
- Reliability (25 reviews)

**Cons:**

- Connection Issues (24 reviews)
- Error Handling (21 reviews)
- Slow Loading (20 reviews)
- Expensive (18 reviews)
- Slow Internet (16 reviews)

### 6. [Rippling IT](https://www.g2.com/products/rippling-it/reviews)
  Transform your organization’s IT operations with Rippling’s unified platform for identity, device, access, and security management. Centralize every IT workflow, from provisioning apps and laptops to enforcing security policies, in a single dashboard. Seamlessly manage the entire employee lifecycle, automatically granting and revoking app access, configuring devices, and maintaining least-privilege controls. Enforce compliance with real-time monitoring, automated patching, and integrated endpoint protection. Streamline offboarding with instant lockouts and secure device recovery. Gain full visibility across hardware, software, and user risk without the complexity of multiple tools. Rippling helps your business cut costs, eliminate manual work, and strengthen security, so your team can move faster. Experience the power of unified IT management with Rippling today.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 1,012

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.9/10)
- **Partner Access:** 9.1/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 9.3/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 9.1/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Rippling](https://www.g2.com/sellers/rippling)
- **Company Website:** https://www.rippling.com
- **Year Founded:** 2016
- **HQ Location:** San Francisco, CA
- **Twitter:** @Rippling (12,205 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/17988315/ (6,941 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, CEO
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 60% Mid-Market, 27% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (670 reviews)
- Intuitive (467 reviews)
- Simple (413 reviews)
- Easy Access (374 reviews)
- User Interface (361 reviews)

**Cons:**

- Missing Features (165 reviews)
- Limited Features (112 reviews)
- Improvement Needed (89 reviews)
- Learning Curve (75 reviews)
- Poor Customer Support (73 reviews)

### 7. [Citrix Secure Private Access](https://www.g2.com/products/citrix-citrix-secure-private-access/reviews)
  Citrix Secure Workspace Access provides a comprehensive, zero-trust approach to deliver secure and contextual access to the corporate internal web apps, SaaS, and virtual applications. It enables the consolidation of traditional security products like VPN, single sign-on, and browser isolation technologies and provides advanced security controls for managed, unmanaged, and BYO devices. Citrix Secure Workspace Access provides a holistic security approach based on zero-trust principles, protecting users, applications, and corporate data against internet web threats and data exfiltration.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 69

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.9/10)
- **Partner Access:** 9.1/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 9.0/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 9.1/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Citrix](https://www.g2.com/sellers/citrix)
- **Year Founded:** 1989
- **HQ Location:** Fort Lauderdale, FL
- **Twitter:** @citrix (198,389 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2641/ (4,262 employees on LinkedIn®)
- **Ownership:** NASDAQ:CTXS

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 59% Enterprise, 26% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (2 reviews)
- Easy Access (1 reviews)
- Intuitive (1 reviews)
- Login Efficiency (1 reviews)
- Simple (1 reviews)

**Cons:**

- Connection Issues (1 reviews)
- Delay Issues (1 reviews)
- Login Issues (1 reviews)
- Slow Internet (1 reviews)

### 8. [1Password](https://www.g2.com/products/1password/reviews)
  The Most Used Enterprise Password Manager, trusted by over 180,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure every sign-in by integrating 1Password with your existing IAM infrastructure. Enforce strong, integrated security policies at scale, be proactive about cybersecurity threats to reduce risk, and quickly and easily generate detailed reports on password security posture.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 1,756

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 8.9/10)
- **Partner Access:** 8.0/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.6/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 8.5/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [1Password](https://www.g2.com/sellers/1password)
- **Company Website:** https://1password.com/
- **Year Founded:** 2005
- **HQ Location:** Ontario
- **Twitter:** @1Password (139,685 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1password/ (2,911 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, CEO
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 54% Small-Business, 32% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (331 reviews)
- Security (270 reviews)
- Password Management (181 reviews)
- Intuitive (143 reviews)
- Easy Access (134 reviews)

**Cons:**

- Password Management (95 reviews)
- Expensive (91 reviews)
- Login Issues (69 reviews)
- Autofill Issues (63 reviews)
- Cost (60 reviews)

### 9. [Auth0](https://www.g2.com/products/auth0/reviews)
  Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while also enabling SSO.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 250

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 8.9/10)
- **Partner Access:** 8.9/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 9.1/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 8.9/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Okta](https://www.g2.com/sellers/okta)
- **Company Website:** https://okta.com
- **Year Founded:** 2009
- **HQ Location:** San Francisco, California
- **Twitter:** @okta (42,734 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/926041/ (7,230 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, Software Developer
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 49% Small-Business, 30% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (54 reviews)
- Security (47 reviews)
- Authentication (39 reviews)
- Integrations (34 reviews)
- Easy Integrations (33 reviews)

**Cons:**

- Expensive (27 reviews)
- Cost (20 reviews)
- Expensive Pricing (17 reviews)
- Difficult Learning (15 reviews)
- Complexity (12 reviews)

### 10. [IBM Verify CIAM](https://www.g2.com/products/ibm-verify-ciam/reviews)
  A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access, and lifecycle and consent management. IBM Verify is a single-stack cloud-based, on premises, or hybrid-cloud solution for all identity and access needs listed above. Other advantages it presents are a way to integrate with legacy access and CRM applications, reverse proxies to help increase performance, reliability, and security, and a way to migrate from on-premises to cloud, not only from an application standpoint, but also in unifying directories. IBM Verify is available on AWS Marketplace. If data residency is a top concern, when combined with AWS, the vendor states that IBM Verify has the broadest tenancy, and can be delivered using a rapid deployment model that has already been put to the test in several critical situations. IBM further states they continue to invest in achieving and maintaining all the pertinent certifications such as SOC 2, ISO 27001, and PCI DSS, plus full FedRAMP authorization. IBM Verify is not just a solution IBM provides to clients for identity and access, but it is used it to establish a zero-trust posture for over 25 million of the company&#39;s own internal and external end-users, supporting 5,000 applications, more than 600 federated client companies and their workforces, and over 150,000 authorization groups, plus Mac, iOS, Android, Windows, Linux, and Z (mainframe) operating systems, which they state includes one of the world’s largest Apple deployments, and one of the largest Linux deployments.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 171

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 8.9/10)
- **Partner Access:** 8.0/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 7.9/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 7.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [IBM](https://www.g2.com/sellers/ibm)
- **Company Website:** https://www.ibm.com/us-en
- **Year Founded:** 1911
- **HQ Location:** Armonk, NY
- **Twitter:** @IBM (709,390 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1009/ (324,553 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 53% Enterprise, 40% Mid-Market


#### Pros & Cons

**Pros:**

- Security (61 reviews)
- Ease of Use (48 reviews)
- Authentication (38 reviews)
- Features (29 reviews)
- MFA Authentication (29 reviews)

**Cons:**

- Complex Setup (38 reviews)
- Complexity (35 reviews)
- Difficult Learning (33 reviews)
- Difficult Setup (31 reviews)
- Complex Administration (30 reviews)

### 11. [RSA SecureID](https://www.g2.com/products/rsa-secureid/reviews)
  Ensure users have convenient, secure access—from any device, anywhere—to the applications they need, whether in the cloud or on-premises. RSA SecurID Access is an enterprise-grade multi-factor authentication and access management solution that lets organizations consistently and centrally enforce dynamic risk-driven access policies aimed at providing continuous, seamless authentication. It protects all of your resources with a wide range of authentication methods, including push notification, biometrics, OTP, SMS, and traditional hardware and software tokens. Visit us at https://www.rsa.com/


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 104

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 8.9/10)
- **Partner Access:** 8.6/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.6/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 8.9/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [RSA Security](https://www.g2.com/sellers/rsa-security-520d10cb-0052-4033-b6ef-85c594df8c8b)
- **HQ Location:** Bedford, MA
- **Twitter:** @RSAsecurity (110,501 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/rsasecurity/ (2,735 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 67% Enterprise, 27% Mid-Market


#### Pros & Cons

**Pros:**

- Data Security (3 reviews)
- Security (3 reviews)
- Risk Assessment (2 reviews)
- 2FA Security (1 reviews)
- Access Control (1 reviews)

**Cons:**

- Expensive (2 reviews)
- 2FA Issues (1 reviews)
- Complex Administration (1 reviews)
- Complexity (1 reviews)
- Complex Setup (1 reviews)

### 12. [Keeper Password Manager](https://www.g2.com/products/keeper-password-manager/reviews)
  Keeper Security is transforming cybersecurity for millions of individuals and thousands of organizations globally. Built with end-to-end encryption, Keeper&#39;s intuitive cybersecurity platform is trusted by Fortune 100 companies to protect every user, on every device, in every location. Our patented zero-trust and zero-knowledge privileged access management solution unifies enterprise password, secrets and connections management with zero-trust network access and endpoint privilege mangement. By combining these critical identity and access management components into a single cloud-based solution, Keeper delivers unparalleled visibility, security and control while ensuring compliance and audit requirements are met. Learn how Keeper can defend your organization against today’s cyber threats at KeeperSecurity.com.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 1,186

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 8.9/10)
- **Partner Access:** 8.3/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.8/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 8.7/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Keeper Security](https://www.g2.com/sellers/keeper-security)
- **Company Website:** https://www.keepersecurity.com/
- **Year Founded:** 2011
- **HQ Location:** Chicago, IL
- **Twitter:** @keepersecurity (18,953 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3554342/ (756 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Owner
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 42% Small-Business, 42% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (168 reviews)
- Security (128 reviews)
- Secure Sharing (88 reviews)
- Password Management (87 reviews)
- Features (74 reviews)

**Cons:**

- Password Management (71 reviews)
- Autofill Issues (49 reviews)
- Login Issues (39 reviews)
- Password Issues (34 reviews)
- Learning Curve (33 reviews)

### 13. [Ping Identity](https://www.g2.com/products/ping-identity/reviews)
  Ping Identity is a type of identity management solution designed to help organizations implement Zero Trust security frameworks while enhancing user experiences across various platforms. With a focus on intelligent identity solutions, Ping Identity empowers enterprises to securely manage access to cloud, mobile, Software as a Service (SaaS), and on-premises applications, facilitating a seamless integration of identity management into their digital business strategies. The target audience for Ping Identity primarily includes large enterprises and organizations that require robust security measures and streamlined access management for their workforce, customers, and partners. This solution is particularly beneficial for businesses operating in hybrid environments, where applications and data are spread across multiple platforms and locations. By adopting Ping Identity, organizations can ensure that their security protocols are not only effective but also user-friendly, thereby improving overall productivity and satisfaction. Key features of the PingOne Cloud Platform include single sign-on (SSO), multi-factor authentication (MFA), and adaptive authentication, which collectively enhance security while simplifying the user experience. The platform&#39;s SSO capability allows users to access multiple applications with a single set of credentials, reducing password fatigue and improving user compliance. MFA adds an extra layer of security by requiring additional verification steps, which is crucial in today’s threat landscape. Adaptive authentication further strengthens security by assessing user behavior and context, enabling organizations to respond dynamically to potential risks. Ping Identity stands out in the identity management category through its commitment to open standards and strategic partnerships with industry leaders such as Microsoft and Amazon. This approach not only enhances interoperability with existing systems but also ensures that organizations can leverage the latest technologies and innovations in identity management. By providing flexible solutions tailored to meet the unique needs of each enterprise, Ping Identity accelerates digital transformation initiatives, enhances customer engagement, and fortifies security measures, making it a valuable asset for any organization looking to navigate the complexities of modern identity management.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 106

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.6/10 (Category avg: 8.9/10)
- **Partner Access:** 8.5/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.5/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 9.0/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Ping Identity](https://www.g2.com/sellers/ping-identity)
- **Company Website:** https://www.PingIdentity.com
- **Year Founded:** 2002
- **HQ Location:** Denver, CO
- **Twitter:** @pingidentity (42,120 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/21870/ (2,319 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 68% Enterprise, 24% Mid-Market


#### Pros & Cons

**Pros:**

- Customer Management (1 reviews)
- Customer Support (1 reviews)
- Ease of Use (1 reviews)
- Identity Management (1 reviews)
- Integrations (1 reviews)

**Cons:**

- Authentication Issues (1 reviews)
- Complex Administration (1 reviews)
- Complex Setup (1 reviews)
- Confusing Interface (1 reviews)
- Confusing Options (1 reviews)

### 14. [Citrix Gateway](https://www.g2.com/products/citrix-gateway/reviews)
  Citrix Gateway is a customer-managed solution that can be deployed on premises or on any public cloud, such as AWS, Azure, or Google Cloud Platform.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 67

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 8.9/10)
- **Partner Access:** 8.6/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.2/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 6.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Citrix](https://www.g2.com/sellers/citrix)
- **Year Founded:** 1989
- **HQ Location:** Fort Lauderdale, FL
- **Twitter:** @citrix (198,389 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2641/ (4,262 employees on LinkedIn®)
- **Ownership:** NASDAQ:CTXS

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Hospital &amp; Health Care
  - **Company Size:** 56% Enterprise, 37% Mid-Market


#### Pros & Cons

**Pros:**

- Easy to Access (1 reviews)
- Security Focus (1 reviews)

**Cons:**

- Setup Difficulties (1 reviews)

### 15. [OneLogin](https://www.g2.com/products/onelogin/reviews)
  OneLogin simpliﬁes identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin enables IT identity policy enforcement and instantly disables app access for employees who leave or change roles in real-time by removing them from Active Directory. Take control over application access, quickly on- and off-board team members, and provide end-users with easy access to all their applications on every device. Extend your on-premises security model to the cloud in minutes. Eliminate the pain and expense of extensive identity policy management. OneLogin reduces identity infrastructure costs and complex integration projects for each new app and efficiently extends identity policies to the cloud. OneLogin eliminates the need for lengthy integration and provisioning projects, manual de-provisioning, protracted on- and off-boarding processes, username and password resets, and Shadow IT.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 272

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 8.9/10)
- **Partner Access:** 8.8/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 9.1/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 9.0/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [One Identity](https://www.g2.com/sellers/one-identity)
- **HQ Location:** Aliso Viejo, CA
- **Twitter:** @OneIdentity (7,868 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/one-identity (667 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Account Manager
  - **Top Industries:** Computer Software, Education Management
  - **Company Size:** 49% Mid-Market, 40% Enterprise


#### Pros & Cons

**Pros:**

- Single Sign-On (8 reviews)
- SSO (Single Sign-On) (8 reviews)
- Ease of Use (7 reviews)
- SSO (6 reviews)
- Security (5 reviews)

**Cons:**

- Service Interruptions (5 reviews)
- Connection Issues (4 reviews)
- Bugs (3 reviews)
- Error Handling (3 reviews)
- Limited Features (3 reviews)

### 16. [LastPass](https://www.g2.com/products/lastpass/reviews)
  LastPass delivers Secure Access Essentials, helping individuals and organizations manage and protect access to AI, applications, and credentials straight from the browser. Trusted by more than 100,000 businesses and millions of users worldwide, LastPass combines strong security with everyday simplicity. For individuals, LastPass makes online life easier by securely storing credentials, generating strong passwords, and autofilling logins when needed. That means less friction, fewer resets, and safer access wherever work and life happens. For businesses, LastPass helps lean IT teams secure AI‑driven work by reducing risk by controlling access to unapproved apps, while storing and managing employee credentials and integrating with identity providers to fill gaps left by SSO. It’s simpler access, better visibility, and stronger security without added complexity.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 2,016

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.6/10 (Category avg: 8.9/10)
- **Partner Access:** 8.6/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.7/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 8.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [LastPass](https://www.g2.com/sellers/lastpass)
- **Company Website:** https://www.lastpass.com/
- **Year Founded:** 2008
- **HQ Location:** Boston, Massachusetts
- **Twitter:** @LastPass (46,021 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/lastpass/ (772 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Owner, CEO
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 63% Small-Business, 25% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (227 reviews)
- Password Management (170 reviews)
- Security (155 reviews)
- Autofill Feature (107 reviews)
- Password Security (99 reviews)

**Cons:**

- Autofill Issues (83 reviews)
- Password Management (78 reviews)
- Login Issues (66 reviews)
- Password Issues (44 reviews)
- Browser Extension Issues (43 reviews)

### 17. [Citrix Workspace](https://www.g2.com/products/citrix-workspace-2024-10-30/reviews)
  Citrix Workspace Essentials provides a comprehensive, zero-trust approach to deliver secure and contextual access to corporate internal web apps, SaaS, and virtual applications. With Citrix Workspace Essentials, IT can consolidate traditional security products such as VPN, single-sign on, multi-factor authentication, and provide usage analytics for Web and SaaS apps. Citrix Workspace Essentials provides end-users with simplified, secure, and VPN-less access to Web apps, SaaS, virtualized apps, and data.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 62

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 8.9/10)
- **Partner Access:** 8.7/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.6/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 8.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Citrix](https://www.g2.com/sellers/citrix)
- **Year Founded:** 1989
- **HQ Location:** Fort Lauderdale, FL
- **Twitter:** @citrix (198,389 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2641/ (4,262 employees on LinkedIn®)
- **Ownership:** NASDAQ:CTXS

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 65% Enterprise, 31% Mid-Market


#### Pros & Cons

**Pros:**

- Security (7 reviews)
- Ease of Use (5 reviews)
- Internet Security (4 reviews)
- Remote Work (4 reviews)
- Secure Access (4 reviews)

**Cons:**

- Connection Issues (3 reviews)
- Slow Loading (3 reviews)
- Slow Performance (3 reviews)
- Complex Configuration (2 reviews)
- Complex Setup (2 reviews)

### 18. [WSO2 Identity Platform](https://www.g2.com/products/wso2-identity-platform/reviews)
  What is WSO2 Identity Platform? WSO2 Identity Platform is a unified, API-first suite designed to orchestrate identity for humans, applications, and autonomous AI agents. It provides a modular fabric for modern identity, allowing organizations to deploy the full platform or select specific capabilities to enhance their existing IAM stack. Managed identities within the suite now exceed one billion for more than 250 customers across global industries including financial services, healthcare, and government. Comprehensive capabilities WSO2 Identity Platform serves as a strategic foundation for modern identity by offering: - Developer-first design with extreme extensibility: Use an API-first approach to customize every stage of the user journey. Avoid proprietary black boxes with a platform built for deep technical integration. - Open source freedom without hidden vendor lock-in: Retain full control of your identity data and logic. Benefit from a transparent, community-vetted codebase that ensures long-term agility and security. - Deploy anywhere across hybrid and cloud environments: Run WSO2 Access Manager on-premises, in private clouds, or as a containerized solution. Maintain consistency across your infrastructure with ease. - Scale to millions of users with proven reliability: Effortlessly manage complex B2B and B2C requirements. From progressive profiling to delegated administration, handle massive growth without performance loss. - Future-proof security for humans and AI agents: Secure the next generation of digital interactions. Use AI-powered flows and branding to protect both human users and autonomous AI agents seamlessly. - Meet global standards with built-in compliance: Simplify adherence to GDPR, FAPI, and OIDC. WSO2 Access Manager provides the granular consent and security protocols required for highly regulated industries. Value proposition: How do you position yourself against your competitors? - WSO2 Identity Platform is designed for deep technical integration and absolute deployment freedom. - Total deployment freedom: Maintain control with options for self-managed software for privacy or managed SaaS for speed. - Agentic enterprise strategy: WSO2 is a pioneer in treating AI agents as first-class citizens, providing the identity layer required to secure and govern autonomous AI interactions. - Extreme extensibility: Service extensions and an API-first approach allow developers to modify flow behaviors to meet unique requirements without being locked into a &quot;proprietary black box&quot;. - Lower TCO &amp; high ROI: Proven to provide a 332% ROI over three years, with pricing that allows for scaling to over 100 million users without exponential cost increases. - Open source transparency: A community-vetted codebase ensures long-term agility, security, and the elimination of hidden vendor lock-in.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 104

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 8.9/10)
- **Partner Access:** 8.9/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.4/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 8.5/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [WSO2](https://www.g2.com/sellers/wso2)
- **Company Website:** https://wso2.com
- **Year Founded:** 2005
- **HQ Location:** Mountain View, CA
- **Twitter:** @wso2 (12,727 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/66028/ (1,218 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 46% Mid-Market, 38% Enterprise


#### Pros & Cons

**Pros:**

- Authentication (31 reviews)
- Security (26 reviews)
- Ease of Use (24 reviews)
- Identity Management (24 reviews)
- Single Sign-On (22 reviews)

**Cons:**

- Difficult Learning (14 reviews)
- Complexity (11 reviews)
- Complex Setup (11 reviews)
- Learning Curve (10 reviews)
- Poor Documentation (10 reviews)

### 19. [PingID](https://www.g2.com/products/ping-identity-pingid/reviews)
  PingID is a cloud-based, adaptive multi-factor authentication (MFA) solution designed to enhance security while maintaining user convenience. It enables organizations to implement robust authentication measures across various applications and services, ensuring that only authorized users gain access. By integrating seamlessly with existing identity systems, PingID supports a range of authentication methods, including mobile apps, biometrics, security keys, and more, catering to diverse user preferences and security requirements. Key Features and Functionality: - Versatile Authentication Methods: Supports multiple authentication options such as mobile push notifications, biometrics (fingerprint and facial recognition), SMS, email, voice calls, and hardware tokens, allowing users to choose their preferred method. - Adaptive Authentication: Evaluates contextual factors like device posture, geolocation, and IP address to adjust authentication requirements dynamically, enhancing security without compromising user experience. - Seamless Integration: Integrates with various platforms, including PingOne, PingFederate, VPNs, Microsoft Azure AD, and Active Directory Federation Services (AD FS), facilitating easy deployment within existing IT infrastructures. - User Self-Service Portal: Empowers users to manage their authentication devices and methods, reducing the burden on IT support and improving overall productivity. - Comprehensive Administrative Insights: Provides dashboards for monitoring MFA usage and associated costs, enabling administrators to make informed decisions regarding security policies and resource allocation. Primary Value and Problem Solved: PingID addresses the critical need for enhanced security in an era where cyber threats are increasingly sophisticated. By implementing adaptive MFA, it ensures that access to sensitive applications and data is granted only to verified users, thereby mitigating the risk of unauthorized access and potential data breaches. Simultaneously, PingID maintains a user-friendly experience by offering flexible authentication methods and minimizing disruptions, striking a balance between stringent security measures and operational efficiency.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 34

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.9/10)
- **Partner Access:** 9.2/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 10.0/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 9.2/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Ping Identity](https://www.g2.com/sellers/ping-identity)
- **Year Founded:** 2002
- **HQ Location:** Denver, CO
- **Twitter:** @pingidentity (42,120 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/21870/ (2,319 employees on LinkedIn®)
- **Phone:** 1.303.468.2900

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 73% Enterprise, 19% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (3 reviews)
- Reliability (3 reviews)
- Seamless Experience (3 reviews)
- Security (3 reviews)
- Intuitive (2 reviews)

**Cons:**

- Complex Setup (2 reviews)
- Setup Difficulties (2 reviews)
- API Issues (1 reviews)
- Configuration Difficulty (1 reviews)
- Connectivity Issues (1 reviews)

### 20. [Symantec SiteMinder](https://www.g2.com/products/symantec-siteminder/reviews)
  Symantec SiteMinder is designed to secure the modern enterprise through a unified access management platform that applies the appropriate authentication mechanism to positively identify users; provides single sign-on and identity federation for seamless access to any application; enforces granular security policies to stop unauthorized access to sensitive resources; and monitors and manages the entire user session to prevent session hijacking.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 15

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 8.9/10)
- **Partner Access:** 8.5/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.2/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 7.6/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (63,196 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 71% Enterprise, 13% Mid-Market


### 21. [Thales SafeNet Trusted Access](https://www.g2.com/products/thales-safenet-trusted-access/reviews)
  Thales’ SafeNet Trusted Access is a cloud-based Access Management and Authentication Service. It ensures that no user is a target by allowing you to expand authentication to all users and apps with diverse identity access management capabilities. And it gives you the power to protect all apps with the right access control policy that enforces the right authentication method for the right user. Users may authenticate just once, leveraging smart single sign-on (SSO) or provide additional authentication as configured in the policy. With its broad and powerful authentication capabilities, SafeNet Trusted Access is an identity and access management (IAM) solution that meets the specific needs of diverse users by providing the appropriate multi-factor authentication (MFA) method for each use case. Offering contextual/adaptive and modern user authentication capabilities through high assurance FIDO devices, as well as Push and pattern-based authentication, SafeNet Trusted Access allows you to expand zero-trust security to any app, enabling all your users to authenticate anywhere, on any device or end-point. SafeNet Trusted Access fits into organizational IT environments smoothly. With no infrastructure needed, and delivered as SaaS, it can be deployed rapidly and flexibly. Automated workflows and user-initiated authentication enrollment ensure that you can remotely support thousands of users wherever they are. Diverse integration methods ensure you can integrate seamlessly with any application – offering a zero-trust security model both in the cloud and on-premises.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 28

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 8.9/10)
- **Partner Access:** 9.0/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 7.5/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 9.5/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Thales Group](https://www.g2.com/sellers/thales-group)
- **HQ Location:** Austin, Texas
- **Twitter:** @ThalesCloudSec (6,946 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/22579/ (1,448 employees on LinkedIn®)
- **Ownership:** EPA:HO
- **Total Revenue (USD mm):** $15,854

**Reviewer Demographics:**
  - **Top Industries:** Computer Networking
  - **Company Size:** 66% Enterprise, 28% Mid-Market


#### Pros & Cons

**Pros:**

- 2FA Security (1 reviews)
- Access Control (1 reviews)
- Cloud Services (1 reviews)
- Cross-platform (1 reviews)
- Data Analysis (1 reviews)

**Cons:**

- Admin Limitations (1 reviews)
- Complex Administration (1 reviews)
- Complexity (1 reviews)
- Complex Setup (1 reviews)
- Difficult Learning Process (1 reviews)

### 22. [CyberArk Workforce Identity](https://www.g2.com/products/cyberark-workforce-identity/reviews)
  CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security, and credential management. Identity Management capabilities include lifecycle management, identity orchestration, and identity governance. With CyberArk Identity, organizations can secure workforce access to applications, endpoints, and infrastructure and protect themselves from the leading cause of data breaches – compromised credentials. CyberArk Identity is part of the CyberArk Identity Security Platform. Built for the dynamic enterprise, CyberArk Identity Security Platform secures access for any identity to any resource or environment from anywhere using any device. The CyberArk Identity Security Platform enables operational efficiencies with a single admin portal, streamlines meeting compliance requirements with unified audit capabilities, and delivers Identity Security Intelligence for continuous identity threat detection and protection. Workforce Access solutions: • CyberArk Single Sign-On (SSO) is an easy-to-manage solution for one-click access to your cloud, mobile, and legacy apps. CyberArk SSO enables a secure and frictionless sign-in experience for both internal and external users that adjusts based on risk. • CyberArk App Gateway is an add-on to our Single Sign-On solution that enables VPN-less access to legacy applications. It allows companies to set up per-application, per-user access to individual legacy applications hosted on-premises. • CyberArk Adaptive Multi-Factor Authentication (MFA) helps strengthen security and prevent attacks involving compromised credentials by requiring users to present multiple forms of evidence to gain access to your applications. Unlike traditional MFA solutions, CyberArk Adaptive MFA uses AI-powered behavioral analytics and contextual information to determine which authentication factors to apply to a particular user in a specific situation. • CyberArk Secure Web Sessions is a cloud-based service that enables organizations to monitor, record, and audit end-user activity within high-risk and high-value web applications. Security and compliance specialists can use Secure Web Sessions to search recorded sessions using free text input and quickly filter events by users, dates, and actions. • CyberArk Workforce Password Management is an enterprise-focused password manager providing a user-friendly solution to store business application credentials in a centralized vault and securely share them with other users in the organization. Identity Management Services: • CyberArk Identity Lifecycle Management provides an easy way to route application access requests, create application accounts, manage entitlements for those accounts, and revoke access when necessary. • CyberArk Identity Flows is an identity orchestration solution that improves security, efficiency, and productivity by automating identity data and events. With Identity Flows, organizations can orchestrate complex identity management processes and synchronize identity data across diverse applications, directory stores, and repositories. • CyberArk Identity Compliance solution continuously discovers access, streamlines access certifications, and provides comprehensive identity analytics. Identity Compliance automates manually intensive, error-prone administrative processes, ensuring all workforce and privileged access rights are properly assigned and continually certified across enterprises.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 126

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 8.9/10)
- **Partner Access:** 9.2/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 9.0/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 8.9/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [CyberArk](https://www.g2.com/sellers/cyberark)
- **Year Founded:** 1999
- **HQ Location:** Newton, MA
- **Twitter:** @CyberArk (17,749 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/26630/ (2,893 employees on LinkedIn®)
- **Ownership:** NASDAQ:CYBR

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 48% Enterprise, 48% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (14 reviews)
- Access Management (6 reviews)
- Intuitive (6 reviews)
- Customer Support (5 reviews)
- Access Control (4 reviews)

**Cons:**

- Missing Features (4 reviews)
- Integration Issues (2 reviews)
- Lack of Automation (2 reviews)
- Lack of Features (2 reviews)
- Browser Extension Issues (1 reviews)

### 23. [Symantec VIP](https://www.g2.com/products/symantec-symantec-vip/reviews)
  Symantec Validation and ID Protection (VIP) is a cloud-based, multi-factor authentication (MFA) service designed to secure access to sensitive data and applications across various devices and locations. By combining traditional username and password credentials with additional authentication factors, such as one-time passwords (OTPs), biometrics, or hardware tokens, VIP enhances security without compromising user productivity. Its scalable infrastructure allows organizations to implement robust authentication measures without the need for dedicated on-premises hardware. Key Features and Functionality: - Cloud-Based Infrastructure: Delivers secure, reliable, and scalable authentication services without requiring on-premises hardware. - Risk-Based Authentication: Utilizes device and behavior profiling to assess login attempts, blocking potentially risky access while maintaining a seamless experience for legitimate users. - Diverse Authentication Methods: Supports a wide range of authentication options, including hardware tokens, software-based OTPs, SMS or voice-based OTPs, biometrics, and push notifications, catering to various user preferences and security requirements. - Passwordless and Push Login Options: Offers user-friendly authentication experiences by eliminating the need for passwords through biometric verification or push notifications. - Self-Service Credential Provisioning: Enables users to register and manage their authentication credentials independently, reducing the administrative burden on IT departments. - Comprehensive Integration Support: Seamlessly integrates with popular VPNs, webmail services, single sign-on (SSO) applications, and user directories, facilitating broad compatibility across enterprise environments. Primary Value and User Benefits: Symantec VIP addresses the critical need for enhanced security in an era where sophisticated cyber threats and data breaches are prevalent. By implementing multi-factor authentication, organizations can significantly reduce the risk of unauthorized access, even if primary credentials are compromised. The service&#39;s flexibility in authentication methods ensures that security measures can be tailored to meet diverse user needs and compliance requirements. Additionally, its cloud-based nature offers scalability and reliability, allowing businesses to adapt to evolving security challenges without substantial infrastructure investments. Ultimately, Symantec VIP empowers organizations to protect sensitive information effectively while maintaining operational efficiency and user satisfaction.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 43

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 8.9/10)
- **Partner Access:** 8.7/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 9.2/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 9.0/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (63,196 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Hospital &amp; Health Care
  - **Company Size:** 75% Enterprise, 16% Small-Business


#### Pros & Cons

**Pros:**

- Cloud Services (2 reviews)
- Ease of Use (2 reviews)
- Security (2 reviews)
- 2FA Security (1 reviews)
- Cross-platform (1 reviews)

**Cons:**

- Delay Issues (1 reviews)
- Limited Customization (1 reviews)
- Missing Features (1 reviews)
- Notification Issues (1 reviews)
- Poor Interface Design (1 reviews)

### 24. [PingFederate](https://www.g2.com/products/ping-identity-pingfederate/reviews)
  PingFederate is an enterprise federation server that enables secure user authentication and single sign-on (SSO) across various applications and services. It acts as a centralized authentication authority, facilitating seamless access for customers, employees, and partners without the need for multiple sign-ons or passwords. By supporting a wide range of identity protocols, PingFederate ensures interoperability and enhances both security and user experience. Key Features and Functionality: - Single Sign-On (SSO): Provides users with one-click access to multiple applications, reducing password fatigue and improving productivity. - Multi-Protocol Support: Supports industry-standard protocols such as SAML, WS-Federation, WS-Trust, OAuth, and SCIM, ensuring compatibility with various systems and applications. - Multi-Factor Authentication (MFA): Integrates with PingID to offer enhanced security through additional authentication factors. - Automated Provisioning: Streamlines user management by automating the provisioning and de-provisioning of user accounts. - Customizable Integration Kits: Offers SDKs and integration kits for custom applications, enabling tailored authentication solutions. - Extensive Audit and Logging: Provides comprehensive auditing and logging capabilities to meet compliance and service-level requirements. Primary Value and Solutions Provided: PingFederate addresses the challenges of managing secure and efficient access to applications in complex environments. By eliminating the need for multiple passwords and sign-ons, it enhances user experience and productivity. Its support for various identity protocols ensures seamless integration with existing systems, while features like MFA and automated provisioning bolster security and simplify user management. Overall, PingFederate empowers organizations to balance robust security measures with a frictionless user experience.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 27

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 8.9/10)
- **Partner Access:** 8.7/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.4/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 8.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Ping Identity](https://www.g2.com/sellers/ping-identity)
- **Year Founded:** 2002
- **HQ Location:** Denver, CO
- **Twitter:** @pingidentity (42,120 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/21870/ (2,319 employees on LinkedIn®)
- **Phone:** 1.303.468.2900

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 79% Enterprise, 12% Mid-Market


#### Pros & Cons

**Pros:**

- Customer Support (1 reviews)
- Ease of Implementation (1 reviews)
- Implementation Ease (1 reviews)
- Onboarding (1 reviews)

**Cons:**

- Missing Features (1 reviews)
- Security Concerns (1 reviews)

### 25. [Oracle SSO](https://www.g2.com/products/oracle-sso/reviews)
  A suite that simplifies enterprise single sign-on deployments for system administrators and extends the benefits of ESSO to remote and mobile users.


  **Average Rating:** 3.8/5.0
  **Total Reviews:** 14

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 7.7/10 (Category avg: 8.9/10)
- **Partner Access:** 8.9/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.6/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 7.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Oracle](https://www.g2.com/sellers/oracle)
- **Year Founded:** 1977
- **HQ Location:** Austin, TX
- **Twitter:** @Oracle (827,868 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1028/ (199,301 employees on LinkedIn®)
- **Ownership:** NYSE:ORCL

**Reviewer Demographics:**
  - **Company Size:** 82% Enterprise, 29% Mid-Market




## Parent Category

[Identity Management Software](https://www.g2.com/categories/identity-management)



## Related Categories

- [User Provisioning and Governance Tools](https://www.g2.com/categories/user-provisioning-and-governance-tools)
- [Identity and Access Management (IAM) Software](https://www.g2.com/categories/identity-and-access-management-iam)
- [Multi-Factor Authentication (MFA) Software](https://www.g2.com/categories/multi-factor-authentication-mfa)
- [Risk-Based Authentication Software](https://www.g2.com/categories/risk-based-authentication-rba)
- [Customer Identity and Access Management (CIAM) Software](https://www.g2.com/categories/customer-identity-and-access-management-ciam)
- [Biometric Authentication Software](https://www.g2.com/categories/biometric-authentication)
- [Passwordless Authentication Software](https://www.g2.com/categories/passwordless-authentication)



---

## Buyer Guide

### What You Should Know About Single Sign-On Solutions

### What are Single Sign-On (SSO) Solutions?

Single sign-on (SSO) solutions are user authentication solution that helps companies secure access to business applications and assets. It does so while also providing end users with a convenient, easy-to-use portal that requires them only to sign in and authenticate once to access multiple corporate applications and resources.&amp;nbsp;

SSO solutions share authentication sessions between a trusted identity provider, which manages digital identities and applications. In practice, commonly, an identity provider requires the user to log in and authenticate; the identity provider then shares this authentication session with other applications by passing digitally signed tokens for the receiving application to verify that it is coming from a trusted provider before granting the user with access to the application. If the user identity token is accepted, the user is automatically granted access to the application.

Companies use SSO software mainly to improve security and enhance the end-user sign-on experience, whether that be internal employees, end customers, or corporate business partners. SSO solutions also centralizes user access management, thus reducing the security management burden on administrators. Using an SSO solution, IT administrators can reduce or eliminate common time-consuming tasks like password resets. SSO products contain features that benefit both end users and administrators. For end users, this includes an easy-to-use user portal, intuitive authentication, and often a mobile application. For administrators, these solutions often include an identity directory or directory integrations, multiple multi-factor authentication (MFA) methods, audit features, and prebuilt application integrations.&amp;nbsp;

**What Does SSO Stand For?**

SSO most commonly stands for single sign-on. The acronym SSO is less frequently used to describe same sign-on, which is different from single sign-on; same sign-on does not rely on trusted tokens, but rather credential sharing. Rarely, the acronym SSO is used to describe single sign-out.

Other common acronyms people may encounter regarding SSO products include:

FIM: federated identity management, of which SSO is a part

IAM: identity and access management

IdP: identity provider

JWT: JSON Web Token, a protocol commonly used in business-to-consumer (B2C) SSO applications

LDAP: lightweight directory access protocol, an open protocol used for directory services authentication

MFA: multi-factor authentication

OIDC: OpenID Connect, an authentication protocol

OAuth: an open standard authentication protocol

SAML: Security Assertion Markup Language, an open standard used for SSO solutions

#### What Types of Single Sign-On (SSO) Solutions Exist?

**Business to employee (B2E)**

Companies use B2E SSO solutions to securely manage their employees’ access to corporate accounts, provide an easy-to-use user experience, and reduce user need for IT administrators services.

**Business to business (B2B)**

Companies use B2B SSO solutions to enable their business partners and corporate customers to best utilize the company’s services, using the partner or corporate customer’s preferred identity providers.

**Business to consumer (B2C) or customer identity and access management (CIAM)**

In B2C or CIAM use cases, customers are able to sign into other accounts and connect them to the business’ app to provide an SSO experience. Most commonly, customers authenticate using social media identity providers like Facebook or Google enabling them access to connected accounts. **&amp;nbsp;**

### What are the Common Features of Single Sign-On (SSO) Solutions?

The following are some core features within SSO solutions that can help users and administrators.

**User portal:** User portals provide an intuitive, easy-to-use end-user interface.

**Mobile app:** Many SSO solutions offer a mobile app for end users to both authenticate and access the SSO solution from their mobile devices.

**MFA methods:** Most SSO providers offer multiple authentication methods to end users, from software or hardware token-based authentication, to mobile push, passwordless authentication, biometric authentication, or one-time passcodes (OTPs).&amp;nbsp;

**Adaptive or contextual access:** Some SSO software offers advanced authentication tools, such as adaptive or contextual access. Using machine learning to understand a user’s contextual use of the SSO product, such as location, IP address, time, and other real-time factors to create a user baseline profile. This profile is then used to determine anomalous access activity to prevent access when risk is deemed too high.

**Directory or integration:** To assist with user provisioning and management, SSO solutions either integrate with standard directories, such as Microsoft Active Directory, LDAP-based directories, or Google Cloud Directory or offer their own cloud directories built into the SSO software.

**Prebuilt integration application catalog:** SSO solutions commonly provide prebuilt integrations to widely used SaaS applications, which are available on an application catalog.

**Role management:** SSO solutions assist administrators with user provisioning and assigning permissions based on user role for access control.

**Audit features** : Audit features provide administrators audit logs to monitor user access.

### What are the Benefits of Single Sign-On (SSO) Solutions?

**Increases security:** The main benefit of using an SSO solution is for securing user access to company applications and other resources through user authentication.

**Reduces password authentication risk:** Since users must only sign in and authenticate once to access multiple applications, SSO solutions reduce the risks associated with poor password management and using only a single factor for authentication.

**Saves users time and frustration:** SSO solutions reduce the number of logins end users such as employees or customers must remember and SSO solutions reduce user frustration when switching between multiple applications once authenticated.

**Saves administrators time and money:** Users can access their accounts in one centralized location, reducing the number of calls to administrators for password resets, saving time and, therefore money on labor costs.

**Seamless experience across assets:** SSO solutions reduce login friction for end users once authenticated and give them access to multiple accounts.&amp;nbsp;

**Centralizes consumer profiles:** SSO software consolidates end-user experiences in one tool to provide a centralized view of end-user or customer data.

### Who Uses Single Sign-On (SSO) Solutions?

**Systems administrators:** Systems administrators are responsible for deploying and managing a company’s SSO solutions.

**Employees:** Employees are end users of SSO solutions in a B2E use case to sign on and authenticate with the user portal to access their corporate accounts.

**Customers:** Customers are end users of SSO solutions in a B2C use case and sign in and authenticate using an identity provider, often a social media account, to access a business’ applications.

**Business contacts:** Companies may use SSO software to enable their business partners and corporate customers to securely authenticate and access the company’s assets, often with multiple identity providers.

#### Software Related to Single Sign-On (SSO) Solutions

Related solutions that can be used together with SSO software include:

[Identity and access management (IAM) software](https://www.g2.com/categories/identity-and-access-management-iam) **:** For employee use cases, IAM software offers broader identity solutions, of which SSO is often a part. IAM software authenticates users, provides access to systems and data based on company policies, tracks user activity, and provides reporting tools to ensure employees comply with company policies and regulations.

[Customer identity and access management (CIAM) software](https://www.g2.com/categories/customer-identity-and-access-management-ciam) **:** For customer use cases, CIAM software provides robust identity functionality. CIAM software enables businesses to centralize and manage customer identities, preferences, and profile information at scale while offering customers self-registration options.

[Password manager software](https://www.g2.com/categories/password-manager) **:** Password managers are secure repositories that store individual user passwords, much like a vault. SSO solutions differs from password managers because SSO software provides authentication before granting a trusted token, not an actual password, for access to an application.&amp;nbsp;

[SaaS operations management software](https://www.g2.com/categories/saas-operations-management) **:** SaaS operations management software tools enable businesses to manage, govern, and secure their SaaS product portfolios; many of these tools integrate with SSO solutions to manage user permissions. **&amp;nbsp;&amp;nbsp;&amp;nbsp;**

[SaaS spend management software](https://www.g2.com/categories/saas-spend-management) **:** This software enables companies to manage SaaS utilization to identify cost savings. Many of these tools integrate with SSO software to manage end-user utilization of SaaS subscriptions.

### Challenges with Single Sign-On (SSO) Solutions

Software solutions can come with their own set of challenges. Issues to consider include:&amp;nbsp;

**Legacy applications** : SSO tools may not integrate with legacy applications; a solution to overcome this may include password vaulting tools within the SSO software to provide the end user with ease of use, despite not technically functioning as SSO regarding authentication.&amp;nbsp;

**High availability:** It is important that the SSO provider has high availability to avoid users being locked out of their systems; with applications managed centrally with an SSO solution, any downtime can prevent end users from accessing their applications and resources. If a company has mission-critical applications that must be available 24/7, many companies will not integrate these tools with SSO providers and instead log in and authenticate separately.

### Which Companies Should Buy Single Sign-On (SSO) Solutions?

All companies can benefit from securing their login process to corporate assets.

**Companies securing employees:** Companies of all sizes that want to secure their employees’ access to corporate applications use SSO solutions.

**Companies securing customers:** Companies that want to enable their customers to provide self service to securely authenticate and login to applications use SSO solutions.

**Companies securing partners:** Companies that want to secure their partners and contractors access to corporate applications use SSO solutions.

### How to Buy Single Sign-On (SSO) Solutions

#### Requirements Gathering (RFI/RFP) for Single Sign-On (SSO) Software

Prior to selecting an SSO software service provider or solution, buyers must consider what factors are important to the company, which may include:

**End-user use case:** Buyers must determine their end users—whether employees, customers, or business partners—to determine what kind of SSO solution works best for these constituencies.

**Cloud vs. on-premises application support:** The buyer should determine what applications and company resources will be connected to the SSO software. For applications that need high availability (24/7), they may not wish to connect those in case of downtime with the SSO provider. Many SSO providers offer prebuilt integrations with the most popular business software. If the business has applications that are custom-built, legacy, or on-premises, those may need integrations built to connect with the SSO. Another workaround would be to use a password vault within an SSO solution for legacy applications that are difficult to connect.

**Federation protocols** : If the organization needs to integrate with multiple identity providers outside of the organization, especially for authenticating business partners, FIM can achieve this. Federation protocols include SAML 1.1, SAML2, WS-Federation, OAuth2, OpenID Connect, WS-Trust, and other protocols.

**Authentication type** : The company should ensure that the authentication types its employees, customers, or partners will use are supported by the SSO solution of choice. This may include software or hardware-token-based authentication for employees and OTPs via email, SMS, or phone for customers, among many other authentication methods. Many SSO solutions now offer contextual or risk-based authentication measures to learn user behaviors, identify patterns, and thus provide risk-based assessments when the authentication process does not meet typical patterns.&amp;nbsp;

**Mobile app** : If end users will access corporate applications from mobile devices, ensure the SSO software provider’s mobile app meets particular business needs.&amp;nbsp;

**Developer support** : Buyers must ensure the SSO provider has the developer support the team requires, including software development kits (SDKs) and application programming interface (API) lifecycle management functions, particularly for B2C SSO use cases.&amp;nbsp;

**Meets security standards** : SSO is a security tool providing users with authenticated access to their company resources. It is important that the SSO service provider meet security standards that are important to the company, which may include ISO 27017, ISO 27018, ISO 27001, SOC 2 Type 2, and others.&amp;nbsp;

#### Compare Single Sign-On Software (SSO) Products

**Create a long list**

Buyers should create a long list of software solutions by researching on g2.com, by reading real-user reviews, seeing how vendors compare on G2 Grid® reports, and saving the software selections to “My List” to reference them in the future. Using g2.com, users can learn about which solutions are most often used in the geographic market and which ones are best for every business segment size—whether that is for small, medium, and enterprise businesses.

**Create a short list**

After creating a long list of vendors, buyers must do further research to narrow down the selections. Using g2.com’s compare feature, they can stack specific software up side by side to learn about how real users of the software rate their functionality. G2 also has quarterly reports showcasing users’ perception of return on investment (in months),&amp;nbsp;the software provider’s average implementation time in months, usability scores, and many other factors.

**Conduct demos**

Up next is time to demo the products. Many vendors enable buyers to contact them directly from g2’s website by clicking the “Get a quote” button on their product profile. Buyers must prepare for each demo by having a standard list of questions and clarifications to ask each vendor.&amp;nbsp;

#### Selection of Single Sign-On (SSO) Solutions&amp;nbsp;

**Choose a selection team**

Single sign-on solutions impact users across the business—from employees, customers, business partners, IT teams, infosec teams, and more. The company’s software selection team should include people representative of these groups. They must start with three to five people to join the selection committee and clearly define project roles.&amp;nbsp;

**Negotiation**

It is important to know how many licenses are needed, as pricing often depends on the number of licenses the buyer purchases and the length of time they purchase it for. Often buyers can get discounts if they purchase large blocks of licenses for a longer duration. They must be sure to negotiate not just on price, but also implementation. Companies may be able to get free or reduced implementation services or ongoing support, as well.

**Final decision**

Before making a final choice, buyers should check if they can get a trial run of the product to test adoption with a small sample size of users. If the tool is well used and well received, the buyer can be confident that the selection was correct.




