# Best Single Sign-On (SSO) Software

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Single sign-on (SSO) solutions are authentication tools that allows users to sign into multiple applications or databases with a single set of credentials. Federation is the linking of IT systems, organizations, and personal identities with credentials and repositories. The [best SSO solutions](https://learn.g2.com/best-sso-software) serve to simplify identification processes and create an uninhibited feel when working to access applications, portals, and servers. The software is designed to provide users with access to multiple applications or datasets without requiring multiple logins.

The goal of SSO software is not only to improve ease of use while navigating across applications but also to minimize work for IT administrators and developers by centralizing access management. SSO products effectively join the desired applications and route logins through an SSO server. These solutions often include features such as dashboards for simplified navigation, application clouds, directory integration, and mobile applications for remote access.

There is some crossover between SSO software and solution types such as [cloud identity and access management software](https://www.g2.com/categories/cloud-identity-and-access-management), [password management software](https://www.g2.com/categories/password-management), and [user provisioning/governance software](https://www.g2.com/categories/user-provisioning-governance), but single sign-on products focus mainly on secure enterprise access to servers, applications, and databases rather than the management of data or passwords.

To qualify for inclusion in the SSO category, a product must:

- Allow users access to multiple applications or databases through one portal
- Automate authentication to prevent multiple logins
- Centralize authentication servers across applications
- Provide secure access to applications and data
- Integrate login access to business applications





## Category Overview

**Total Products under this Category:** 171


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 17,400+ Authentic Reviews
- 171+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.


## Best Single Sign-On (SSO) Solutions At A Glance

- **Leader:** [Okta](https://www.g2.com/products/okta/reviews)
- **Highest Performer:** [Descope](https://www.g2.com/products/descope/reviews)
- **Easiest to Use:** [Rippling IT](https://www.g2.com/products/rippling-it/reviews)
- **Top Trending:** [Rippling IT](https://www.g2.com/products/rippling-it/reviews)
- **Best Free Software:** [JumpCloud](https://www.g2.com/products/jumpcloud/reviews)


---

**Sponsored**

### FusionAuth

FusionAuth is a customer identity and access management (CIAM) platform specifically engineered to address the challenges of security, scalability, and developer efficiency. This solution is designed for organizations seeking to enhance their identity management processes while ensuring compliance with stringent regulatory standards such as GDPR and SOC2. By offering a flexible deployment model, FusionAuth allows users to maintain control over their data residency, whether in the cloud, on-premises, or in hybrid environments. Targeted towards developers and organizations that require robust identity solutions, FusionAuth is particularly beneficial for businesses experiencing rapid growth or those that need to streamline their authentication processes. Its API-first architecture enables organizations to embed identity management directly into their existing workflows, reducing the operational burden associated with traditional identity providers. This capability is especially valuable for companies that wish to eliminate the complexities and costs associated with maintaining homegrown authentication systems. Key features of FusionAuth include its flexible deployment options, which empower organizations to choose how and where they host their identity management solution. This flexibility is complemented by an API-driven architecture, where every feature is accessible through APIs, allowing for seamless integration and management of identity as part of the overall infrastructure. This approach not only enhances developer velocity but also ensures that organizations can adapt their identity solutions to meet evolving business needs without being locked into a single vendor&#39;s cloud. Additionally, FusionAuth offers predictable pricing models that help organizations avoid unexpected costs commonly associated with monthly active user (MAU) surges. This transparency in pricing is a significant advantage for businesses looking to scale without incurring excessive expenses. The platform has demonstrated its effectiveness across various industries, with notable success stories highlighting its ability to handle massive traffic surges, reduce operational bottlenecks, and lower engineering burdens. For instance, Bilt leveraged FusionAuth to manage high traffic volumes while ensuring compliance with data residency requirements. Similarly, Vatix transitioned from a cumbersome homegrown system to FusionAuth, enabling their Customer Success team to onboard clients quickly and efficiently. UrbanSitter&#39;s implementation of FusionAuth significantly reduced their authentication development time, allowing them to focus on core product innovation. These examples illustrate how FusionAuth not only enhances security and compliance but also drives operational efficiency and cost savings for organizations across diverse sectors.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=254&amp;secure%5Bdisplayable_resource_id%5D=254&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=254&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=68712&amp;secure%5Bresource_id%5D=254&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fsingle-sign-on-sso&amp;secure%5Btoken%5D=353fd13f36a5725b45844ba74b3aeea90429caee2cbc6c0b487122626dcb7bab&amp;secure%5Burl%5D=https%3A%2F%2Ffusionauth.link%2F4a1rPlR&amp;secure%5Burl_type%5D=book_demo)

---

## Top-Rated Products (Ranked by G2 Score)
### 1. [Okta](https://www.g2.com/products/okta/reviews)
  Okta, Inc. is The World’s Identity Company™. We secure AI, machine, and human identity so everyone is free to safely use any technology. Our customer and workforce solutions empower businesses and developers to protect their AI agents, users, employees, and partners while driving security, efficiencies, and innovation. Learn why the world’s leading brands trust Okta for authentication, authorization, and more at okta.com.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 1,196

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.9/10)
- **Partner Access:** 9.0/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 9.1/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 9.0/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Okta](https://www.g2.com/sellers/okta)
- **Company Website:** https://okta.com
- **Year Founded:** 2009
- **HQ Location:** San Francisco, California
- **Twitter:** @okta (42,783 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/926041/ (7,230 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, Account Executive
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 51% Mid-Market, 39% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (205 reviews)
- Security (156 reviews)
- Authentication Security (151 reviews)
- Single Sign-On (141 reviews)
- Easy Access (138 reviews)

**Cons:**

- Authentication Issues (77 reviews)
- Login Issues (64 reviews)
- Expensive (46 reviews)
- Complex Setup (44 reviews)
- Frequent Authentication (39 reviews)

### 2. [Rippling IT](https://www.g2.com/products/rippling-it/reviews)
  Transform your organization’s IT operations with Rippling’s unified platform for identity, device, access, and security management. Centralize every IT workflow, from provisioning apps and laptops to enforcing security policies, in a single dashboard. Seamlessly manage the entire employee lifecycle, automatically granting and revoking app access, configuring devices, and maintaining least-privilege controls. Enforce compliance with real-time monitoring, automated patching, and integrated endpoint protection. Streamline offboarding with instant lockouts and secure device recovery. Gain full visibility across hardware, software, and user risk without the complexity of multiple tools. Rippling helps your business cut costs, eliminate manual work, and strengthen security, so your team can move faster. Experience the power of unified IT management with Rippling today.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 1,012

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.9/10)
- **Partner Access:** 9.1/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 9.3/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 9.1/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Rippling](https://www.g2.com/sellers/rippling)
- **Company Website:** https://www.rippling.com
- **Year Founded:** 2016
- **HQ Location:** San Francisco, CA
- **Twitter:** @Rippling (12,230 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/17988315/ (6,941 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, CEO
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 60% Mid-Market, 27% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (670 reviews)
- Intuitive (467 reviews)
- Simple (413 reviews)
- Easy Access (374 reviews)
- User Interface (361 reviews)

**Cons:**

- Missing Features (165 reviews)
- Limited Features (112 reviews)
- Improvement Needed (89 reviews)
- Learning Curve (75 reviews)
- Poor Customer Support (73 reviews)

### 3. [JumpCloud](https://www.g2.com/products/jumpcloud/reviews)
  JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 3,817

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 8.9/10)
- **Partner Access:** 8.4/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.7/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 8.4/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [JumpCloud Inc.](https://www.g2.com/sellers/jumpcloud-inc)
- **Company Website:** https://jumpcloud.com/
- **Year Founded:** 2012
- **HQ Location:** Louisville, CO
- **Twitter:** @JumpCloud (36,469 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/jumpcloud/ (959 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, System Administrator
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 53% Mid-Market, 36% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (878 reviews)
- Device Management (662 reviews)
- Security (518 reviews)
- Integrations (481 reviews)
- Features (429 reviews)

**Cons:**

- Missing Features (380 reviews)
- Improvement Needed (301 reviews)
- Limited Features (234 reviews)
- Limitations (177 reviews)
- Learning Curve (155 reviews)

### 4. [Microsoft Entra ID](https://www.g2.com/products/microsoft-entra-id/reviews)
  Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID, you get: • Secure adaptive access with multi-factor authentication and Conditional Access policies • Seamless user experience with single sign-on, passwordless and user portal • Unified identity management that connect all internal and external users to all apps and devices. • Simplified Identity Governance with provisioning, access packages, and access reviews. Microsoft Entra is our new product family that encompasses all of Microsoft’s identity and access capabilities. The Entra family includes Microsoft Entra ID, as well as two new product categories: Cloud Infrastructure Entitlement Management (CIEM) and decentralized identity. The products in the Entra family will help provide secure access to everything for everyone, by providing identity and access management, cloud infrastructure entitlement management, and identity verification.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 865

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 8.9/10)
- **Partner Access:** 8.8/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.7/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 8.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,105,638 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, System Engineer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 39% Mid-Market, 37% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (129 reviews)
- Security (122 reviews)
- Single Sign-On (90 reviews)
- Identity Management (89 reviews)
- Integrations (80 reviews)

**Cons:**

- Complexity (56 reviews)
- Expensive (53 reviews)
- Complex Administration (42 reviews)
- Difficult Learning (38 reviews)
- Complex Setup (37 reviews)

### 5. [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews)
  Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications while incorporating identity visibility and context from multiple identity sources.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 491

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 8.9/10)
- **Partner Access:** 9.1/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 9.3/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 9.2/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Cisco](https://www.g2.com/sellers/cisco)
- **Company Website:** https://www.cisco.com
- **Year Founded:** 1984
- **HQ Location:** San Jose, CA
- **Twitter:** @Cisco (721,419 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cisco/ (95,742 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, Network Administrator
  - **Top Industries:** Information Technology and Services, Higher Education
  - **Company Size:** 41% Enterprise, 37% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (70 reviews)
- Security (67 reviews)
- Authentication (45 reviews)
- Easy Access (45 reviews)
- Authentication Ease (39 reviews)

**Cons:**

- Authentication Issues (24 reviews)
- Login Issues (16 reviews)
- Complexity (15 reviews)
- Notification Issues (15 reviews)
- Delay Issues (14 reviews)

### 6. [1Password](https://www.g2.com/products/1password/reviews)
  The Most Used Enterprise Password Manager, trusted by over 180,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure every sign-in by integrating 1Password with your existing IAM infrastructure. Enforce strong, integrated security policies at scale, be proactive about cybersecurity threats to reduce risk, and quickly and easily generate detailed reports on password security posture.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 1,762

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 8.9/10)
- **Partner Access:** 8.0/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.6/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 8.5/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [1Password](https://www.g2.com/sellers/1password)
- **Company Website:** https://1password.com/
- **Year Founded:** 2005
- **HQ Location:** Ontario
- **Twitter:** @1Password (139,665 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1password/ (2,911 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, CEO
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 54% Small-Business, 32% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (331 reviews)
- Security (270 reviews)
- Password Management (181 reviews)
- Intuitive (143 reviews)
- Easy Access (134 reviews)

**Cons:**

- Password Management (95 reviews)
- Expensive (91 reviews)
- Login Issues (69 reviews)
- Autofill Issues (63 reviews)
- Cost (60 reviews)

### 7. [LastPass](https://www.g2.com/products/lastpass/reviews)
  LastPass delivers Secure Access Essentials, helping individuals and organizations manage and protect access to AI, applications, and credentials straight from the browser. Trusted by more than 100,000 businesses and millions of users worldwide, LastPass combines strong security with everyday simplicity. For individuals, LastPass makes online life easier by securely storing credentials, generating strong passwords, and autofilling logins when needed. That means less friction, fewer resets, and safer access wherever work and life happens. For businesses, LastPass helps lean IT teams secure AI‑driven work by reducing risk by controlling access to unapproved apps, while storing and managing employee credentials and integrating with identity providers to fill gaps left by SSO. It’s simpler access, better visibility, and stronger security without added complexity.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 2,021

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.6/10 (Category avg: 8.9/10)
- **Partner Access:** 8.6/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.7/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 8.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [LastPass](https://www.g2.com/sellers/lastpass)
- **Company Website:** https://www.lastpass.com/
- **Year Founded:** 2008
- **HQ Location:** Boston, Massachusetts
- **Twitter:** @LastPass (45,997 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/lastpass/ (772 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Owner, CEO
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 63% Small-Business, 25% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (227 reviews)
- Password Management (170 reviews)
- Security (155 reviews)
- Autofill Feature (107 reviews)
- Password Security (99 reviews)

**Cons:**

- Autofill Issues (83 reviews)
- Password Management (78 reviews)
- Login Issues (66 reviews)
- Password Issues (44 reviews)
- Browser Extension Issues (43 reviews)

### 8. [Auth0](https://www.g2.com/products/auth0/reviews)
  Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while also enabling SSO.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 251

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 8.9/10)
- **Partner Access:** 8.9/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 9.1/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 8.9/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Okta](https://www.g2.com/sellers/okta)
- **Company Website:** https://okta.com
- **Year Founded:** 2009
- **HQ Location:** San Francisco, California
- **Twitter:** @okta (42,783 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/926041/ (7,230 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, Software Developer
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 49% Small-Business, 30% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (54 reviews)
- Security (47 reviews)
- Authentication (39 reviews)
- Integrations (34 reviews)
- Easy Integrations (33 reviews)

**Cons:**

- Expensive (27 reviews)
- Cost (20 reviews)
- Expensive Pricing (17 reviews)
- Difficult Learning (15 reviews)
- Complexity (12 reviews)

### 9. [Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews)
  Zscaler Private Access (ZPA) is a cloud-based zero trust solution that securely connects users to private applications hosted in public clouds, data centers, or on-premises environments without relying on traditional VPNs or exposing them to the internet. Built on the principles of zero trust, ZPA ensures that users are authenticated and authorized before granting access, providing application-specific access rather than exposing the network. With AI-powered segmentation and identity-based policies, ZPA minimizes the attack surface, makes applications invisible to the internet, and prevents lateral movement. By simplifying access, reducing IT complexity, and improving user experience, ZPA supports modern hybrid work while delivering unmatched scalability and performance. Key Features and Benefits: • Minimize the Attack Surface: Private applications are hidden behind the Zero Trust Exchange, making them invisible and unreachable. Users connect to apps, not the network. • Eliminate Lateral Movement: Least-privileged access allows one-to-one user-to-application connections, avoiding network-wide exposure. • Deliver Exceptional User Experience &amp; Boost Hybrid Workforce Productivity: Fast, direct access to apps via 160+ global points of presence ensures low latency and no backhauling, boosting productivity. • Accelerate Zero Trust Journey with AI-powered User-to-app Segmentation: AI/ML generates custom app segmentation recommendations, simplifying user-to-app segmentation. • Prevent Compromised Users, Insider Threats &amp; Advanced Attackers: Comprehensive protection for private apps with OWASP Top 10 prevention, inline inspection, advanced threat protection, and data loss prevention. • Extend Zero Trust to All Applications: Enable secure remote access for legacy network connected applications such as VOIP and server-to-client applications, and extranet applications hosted in business partner or vendor networks. • Ensure Business Continuity and High Availability: ZPA Private Service Edge caches policies for zero trust access during internet outages, allowing for secure connectivity and business continuity. • Reduce Cost &amp; Operational Complexity: Replaces legacy VPNs, simplifying management and cutting hardware and operational costs. Accelerate M&amp;A time-to-value without having to integrate networks.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 132

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 8.9/10)
- **Partner Access:** 8.0/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.9/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 7.9/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Zscaler](https://www.g2.com/sellers/zscaler)
- **Company Website:** https://www.zscaler.com/
- **Year Founded:** 2008
- **HQ Location:** San Jose, California
- **Twitter:** @zscaler (17,540 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/234625/ (8,743 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 44% Enterprise, 29% Mid-Market


#### Pros & Cons

**Pros:**

- Security (64 reviews)
- Ease of Use (53 reviews)
- Secure Access (49 reviews)
- VPN Efficiency (30 reviews)
- Reliability (25 reviews)

**Cons:**

- Connection Issues (24 reviews)
- Error Handling (21 reviews)
- Slow Loading (20 reviews)
- Expensive (18 reviews)
- Slow Internet (16 reviews)

### 10. [Citrix Secure Private Access](https://www.g2.com/products/citrix-citrix-secure-private-access/reviews)
  Citrix Secure Workspace Access provides a comprehensive, zero-trust approach to deliver secure and contextual access to the corporate internal web apps, SaaS, and virtual applications. It enables the consolidation of traditional security products like VPN, single sign-on, and browser isolation technologies and provides advanced security controls for managed, unmanaged, and BYO devices. Citrix Secure Workspace Access provides a holistic security approach based on zero-trust principles, protecting users, applications, and corporate data against internet web threats and data exfiltration.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 69

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.9/10)
- **Partner Access:** 9.1/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 9.0/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 9.1/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Citrix](https://www.g2.com/sellers/citrix)
- **Year Founded:** 1989
- **HQ Location:** Fort Lauderdale, FL
- **Twitter:** @citrix (198,334 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2641/ (4,262 employees on LinkedIn®)
- **Ownership:** NASDAQ:CTXS

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 59% Enterprise, 26% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (2 reviews)
- Easy Access (1 reviews)
- Intuitive (1 reviews)
- Login Efficiency (1 reviews)
- Simple (1 reviews)

**Cons:**

- Connection Issues (1 reviews)
- Delay Issues (1 reviews)
- Login Issues (1 reviews)
- Slow Internet (1 reviews)

### 11. [IBM Verify CIAM](https://www.g2.com/products/ibm-verify-ciam/reviews)
  A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access, and lifecycle and consent management. IBM Verify is a single-stack cloud-based, on premises, or hybrid-cloud solution for all identity and access needs listed above. Other advantages it presents are a way to integrate with legacy access and CRM applications, reverse proxies to help increase performance, reliability, and security, and a way to migrate from on-premises to cloud, not only from an application standpoint, but also in unifying directories. IBM Verify is available on AWS Marketplace. If data residency is a top concern, when combined with AWS, the vendor states that IBM Verify has the broadest tenancy, and can be delivered using a rapid deployment model that has already been put to the test in several critical situations. IBM further states they continue to invest in achieving and maintaining all the pertinent certifications such as SOC 2, ISO 27001, and PCI DSS, plus full FedRAMP authorization. IBM Verify is not just a solution IBM provides to clients for identity and access, but it is used it to establish a zero-trust posture for over 25 million of the company&#39;s own internal and external end-users, supporting 5,000 applications, more than 600 federated client companies and their workforces, and over 150,000 authorization groups, plus Mac, iOS, Android, Windows, Linux, and Z (mainframe) operating systems, which they state includes one of the world’s largest Apple deployments, and one of the largest Linux deployments.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 171

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 8.9/10)
- **Partner Access:** 8.0/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 7.9/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 7.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [IBM](https://www.g2.com/sellers/ibm)
- **Company Website:** https://www.ibm.com/us-en
- **Year Founded:** 1911
- **HQ Location:** Armonk, NY
- **Twitter:** @IBM (709,298 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1009/ (324,553 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 53% Enterprise, 40% Mid-Market


#### Pros & Cons

**Pros:**

- Security (61 reviews)
- Ease of Use (48 reviews)
- Authentication (38 reviews)
- Features (29 reviews)
- MFA Authentication (29 reviews)

**Cons:**

- Complex Setup (38 reviews)
- Complexity (35 reviews)
- Difficult Learning (33 reviews)
- Difficult Setup (31 reviews)
- Complex Administration (30 reviews)

### 12. [Keeper Password Manager](https://www.g2.com/products/keeper-password-manager/reviews)
  Keeper Security is transforming cybersecurity for millions of individuals and thousands of organizations globally. Built with end-to-end encryption, Keeper&#39;s intuitive cybersecurity platform is trusted by Fortune 100 companies to protect every user, on every device, in every location. Our patented zero-trust and zero-knowledge privileged access management solution unifies enterprise password, secrets and connections management with zero-trust network access and endpoint privilege mangement. By combining these critical identity and access management components into a single cloud-based solution, Keeper delivers unparalleled visibility, security and control while ensuring compliance and audit requirements are met. Learn how Keeper can defend your organization against today’s cyber threats at KeeperSecurity.com.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 1,187

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 8.9/10)
- **Partner Access:** 8.3/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.8/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 8.7/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Keeper Security](https://www.g2.com/sellers/keeper-security)
- **Company Website:** https://www.keepersecurity.com/
- **Year Founded:** 2011
- **HQ Location:** Chicago, IL
- **Twitter:** @keepersecurity (18,949 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3554342/ (756 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Owner
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 42% Small-Business, 42% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (168 reviews)
- Security (128 reviews)
- Secure Sharing (88 reviews)
- Password Management (87 reviews)
- Features (74 reviews)

**Cons:**

- Password Management (71 reviews)
- Autofill Issues (49 reviews)
- Login Issues (39 reviews)
- Password Issues (34 reviews)
- Learning Curve (33 reviews)

### 13. [Citrix Workspace](https://www.g2.com/products/citrix-workspace-2024-10-30/reviews)
  Citrix Workspace Essentials provides a comprehensive, zero-trust approach to deliver secure and contextual access to corporate internal web apps, SaaS, and virtual applications. With Citrix Workspace Essentials, IT can consolidate traditional security products such as VPN, single-sign on, multi-factor authentication, and provide usage analytics for Web and SaaS apps. Citrix Workspace Essentials provides end-users with simplified, secure, and VPN-less access to Web apps, SaaS, virtualized apps, and data.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 63

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 8.9/10)
- **Partner Access:** 8.7/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.6/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 8.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Citrix](https://www.g2.com/sellers/citrix)
- **Year Founded:** 1989
- **HQ Location:** Fort Lauderdale, FL
- **Twitter:** @citrix (198,334 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2641/ (4,262 employees on LinkedIn®)
- **Ownership:** NASDAQ:CTXS

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 65% Enterprise, 30% Mid-Market


#### Pros & Cons

**Pros:**

- Security (7 reviews)
- Ease of Use (5 reviews)
- Internet Security (4 reviews)
- Remote Work (4 reviews)
- Secure Access (4 reviews)

**Cons:**

- Connection Issues (3 reviews)
- Slow Loading (3 reviews)
- Slow Performance (3 reviews)
- Complex Configuration (2 reviews)
- Complex Setup (2 reviews)

### 14. [NordPass Business](https://www.g2.com/products/nordpass-business/reviews)
  Trusted by more than 9,000 businesses worldwide, NordPass is a password management tool that upholds the finest privacy and security standards for businesses. Unlock the ease of cybersecurity and bring peace to your team&#39;s digital world. Its intuitive interface ensures seamless adoption for your teams. Optimize daily operations by enabling straightforward account access, secure password sharing, and setting company-wide password policies. Encrypted with the industry-leading XChaCha20 algorithm, NordPass allows companies to manage and monitor access to the company&#39;s resources and prevent unwanted credential exposure. In case of an issue, best-in-class 24/7 tech support is always available, with no hidden costs. \_\_\_\_\_\_\_\_\_\_\_\_\_ Start your NordPass Business Free Trial The 14-day free trial gives you full access to all NordPass features. No credit card required. https://nordpass.com/business-free-trial/


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 640

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 8.9/10)
- **Partner Access:** 8.4/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.5/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 8.1/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Nord Security](https://www.g2.com/sellers/nord-security)
- **Company Website:** https://nordsecurity.com/
- **Year Founded:** 2012
- **HQ Location:** Global
- **Twitter:** @NordPass (9,506 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/nordsecurity/ (1,883 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CEO, CTO
  - **Top Industries:** Information Technology and Services, Marketing and Advertising
  - **Company Size:** 72% Small-Business, 25% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (198 reviews)
- Security (158 reviews)
- Password Management (131 reviews)
- Intuitive (121 reviews)
- Sharing Ease (118 reviews)

**Cons:**

- Password Management (92 reviews)
- Password Issues (68 reviews)
- Login Issues (55 reviews)
- Autofill Issues (50 reviews)
- Browser Extension Issues (44 reviews)

### 15. [Dashlane Password Manager](https://www.g2.com/products/dashlane-password-manager/reviews)
  Dashlane provides complete credential security, protecting businesses against the threat of human risk. Our intelligent Omnix™ platform unifies credential protection and password management, equipping security teams with proactive intelligence, real-time response, and protected access to secure every employee. Over 25,000 brands worldwide trust Dashlane for industry-leading innovations, patented zero-knowledge security, and an unmatched user experience. What are the features of Dashlane Password Manager? - Passkeys, passwords, and payment storage - Admin Console - Granular sharing controls and security policies - Proactive Credential Risk Detection - Smart, in-context employee alerts - Integration with communication tools, such as Slack - AI phishing alerts - SIEM integration - SCIM integration - Password Health score - Activity Logs - Dark Web Monitoring &amp; Insights - VPN for Wi-Fi protection - Zero-knowledge security architecture


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 622

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 8.9/10)
- **Partner Access:** 9.0/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.9/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 9.2/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Dashlane](https://www.g2.com/sellers/dashlane)
- **Company Website:** https://www.dashlane.com
- **Year Founded:** 2009
- **HQ Location:** New York
- **Twitter:** @dashlane (28,360 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2049626/ (307 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CEO, Owner
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 64% Small-Business, 32% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (126 reviews)
- Security (96 reviews)
- Sharing Ease (92 reviews)
- Intuitive (74 reviews)
- Secure Storage (71 reviews)

**Cons:**

- Autofill Issues (59 reviews)
- Password Issues (57 reviews)
- Login Issues (46 reviews)
- Password Management (29 reviews)
- Expensive (23 reviews)

### 16. [Oracle SSO](https://www.g2.com/products/oracle-sso/reviews)
  A suite that simplifies enterprise single sign-on deployments for system administrators and extends the benefits of ESSO to remote and mobile users.


  **Average Rating:** 3.8/5.0
  **Total Reviews:** 14

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 7.7/10 (Category avg: 8.9/10)
- **Partner Access:** 8.9/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.6/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 7.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Oracle](https://www.g2.com/sellers/oracle)
- **Year Founded:** 1977
- **HQ Location:** Austin, TX
- **Twitter:** @Oracle (827,981 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1028/ (199,301 employees on LinkedIn®)
- **Ownership:** NYSE:ORCL

**Reviewer Demographics:**
  - **Company Size:** 82% Enterprise, 29% Mid-Market


### 17. [Citrix Gateway](https://www.g2.com/products/citrix-gateway/reviews)
  Citrix Gateway is a customer-managed solution that can be deployed on premises or on any public cloud, such as AWS, Azure, or Google Cloud Platform.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 67

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 8.9/10)
- **Partner Access:** 8.6/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.2/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 6.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Citrix](https://www.g2.com/sellers/citrix)
- **Year Founded:** 1989
- **HQ Location:** Fort Lauderdale, FL
- **Twitter:** @citrix (198,334 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2641/ (4,262 employees on LinkedIn®)
- **Ownership:** NASDAQ:CTXS

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Hospital &amp; Health Care
  - **Company Size:** 56% Enterprise, 37% Mid-Market


#### Pros & Cons

**Pros:**

- Easy to Access (1 reviews)
- Security Focus (1 reviews)

**Cons:**

- Setup Difficulties (1 reviews)

### 18. [RSA SecureID](https://www.g2.com/products/rsa-secureid/reviews)
  Ensure users have convenient, secure access—from any device, anywhere—to the applications they need, whether in the cloud or on-premises. RSA SecurID Access is an enterprise-grade multi-factor authentication and access management solution that lets organizations consistently and centrally enforce dynamic risk-driven access policies aimed at providing continuous, seamless authentication. It protects all of your resources with a wide range of authentication methods, including push notification, biometrics, OTP, SMS, and traditional hardware and software tokens. Visit us at https://www.rsa.com/


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 104

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 8.9/10)
- **Partner Access:** 8.6/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.6/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 8.9/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [RSA Security](https://www.g2.com/sellers/rsa-security-520d10cb-0052-4033-b6ef-85c594df8c8b)
- **HQ Location:** Bedford, MA
- **Twitter:** @RSAsecurity (110,476 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/rsasecurity/ (2,735 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 67% Enterprise, 27% Mid-Market


#### Pros & Cons

**Pros:**

- Data Security (3 reviews)
- Security (3 reviews)
- Risk Assessment (2 reviews)
- 2FA Security (1 reviews)
- Access Control (1 reviews)

**Cons:**

- Expensive (2 reviews)
- 2FA Issues (1 reviews)
- Complex Administration (1 reviews)
- Complexity (1 reviews)
- Complex Setup (1 reviews)

### 19. [AWS Single Sign-On](https://www.g2.com/products/aws-single-sign-on/reviews)
  AWS Single Sign-On (SSO) is a cloud SSO service that makes it easy to centrally manage SSO access to multiple AWS accounts and business applications. It enables users to sign in to a user portal with their existing corporate credentials and access all of their assigned accounts and applications from one place.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 20

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 8.9/10)
- **Partner Access:** 9.0/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.9/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 9.6/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Amazon Web Services (AWS)](https://www.g2.com/sellers/amazon-web-services-aws-3e93cc28-2e9b-4961-b258-c6ce0feec7dd)
- **Year Founded:** 2006
- **HQ Location:** Seattle, WA
- **Twitter:** @awscloud (2,226,638 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/amazon-web-services/ (156,424 employees on LinkedIn®)
- **Ownership:** NASDAQ: AMZN

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 40% Enterprise, 32% Small-Business


#### Pros & Cons

**Pros:**

- Learning (1 reviews)
- Security Protection (1 reviews)

**Cons:**

- Integration Issues (1 reviews)
- Not User-Friendly (1 reviews)
- Poor Interface Design (1 reviews)

### 20. [Descope](https://www.g2.com/products/descope/reviews)
  Descope is a drag &amp; drop customer authentication and identity management platform. Our no / low code CIAM solution helps organizations easily create and customize their entire user journey using visual workflows – from authentication and authorization to MFA and federated SSO. Hundreds of customers including GoFundMe, Navan, You.com, and Branch use Descope to reduce user friction, prevent account takeover, and get a unified view of their customer journey. Descope was named a Momentum Leader in the G2 Fall Reports for the CIAM and Passwordless categories. Descope also provides a connector ecosystem with dozens of third-party services for use cases such as identity verification, fraud prevention, risk-based authentication, and identity orchestration. Descope is built on a scalable multi-tenant architecture with high availability that can support advanced enterprise requirements. Founded in 2022, Descope is backed by Lightspeed and Notable Capital (previously GGV Capital) and is a member of the FIDO Alliance.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 85

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.8/10 (Category avg: 8.9/10)
- **Partner Access:** 9.7/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 9.6/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 10.0/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Descope](https://www.g2.com/sellers/descope)
- **Company Website:** https://www.descope.com/
- **Year Founded:** 2022
- **HQ Location:** Los Altos, California
- **Twitter:** @descopeinc (639 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/descope/ (100 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CTO
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 84% Small-Business, 15% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (19 reviews)
- Customer Support (17 reviews)
- Authentication (15 reviews)
- Implementation Ease (14 reviews)
- Easy Setup (13 reviews)

**Cons:**

- Complex Setup (6 reviews)
- Difficult Learning (5 reviews)
- Outdated Documentation (4 reviews)
- Complexity (3 reviews)
- Difficult Learning Process (3 reviews)

### 21. [PingID](https://www.g2.com/products/ping-identity-pingid/reviews)
  PingID is a cloud-based, adaptive multi-factor authentication (MFA) solution designed to enhance security while maintaining user convenience. It enables organizations to implement robust authentication measures across various applications and services, ensuring that only authorized users gain access. By integrating seamlessly with existing identity systems, PingID supports a range of authentication methods, including mobile apps, biometrics, security keys, and more, catering to diverse user preferences and security requirements. Key Features and Functionality: - Versatile Authentication Methods: Supports multiple authentication options such as mobile push notifications, biometrics (fingerprint and facial recognition), SMS, email, voice calls, and hardware tokens, allowing users to choose their preferred method. - Adaptive Authentication: Evaluates contextual factors like device posture, geolocation, and IP address to adjust authentication requirements dynamically, enhancing security without compromising user experience. - Seamless Integration: Integrates with various platforms, including PingOne, PingFederate, VPNs, Microsoft Azure AD, and Active Directory Federation Services (AD FS), facilitating easy deployment within existing IT infrastructures. - User Self-Service Portal: Empowers users to manage their authentication devices and methods, reducing the burden on IT support and improving overall productivity. - Comprehensive Administrative Insights: Provides dashboards for monitoring MFA usage and associated costs, enabling administrators to make informed decisions regarding security policies and resource allocation. Primary Value and Problem Solved: PingID addresses the critical need for enhanced security in an era where cyber threats are increasingly sophisticated. By implementing adaptive MFA, it ensures that access to sensitive applications and data is granted only to verified users, thereby mitigating the risk of unauthorized access and potential data breaches. Simultaneously, PingID maintains a user-friendly experience by offering flexible authentication methods and minimizing disruptions, striking a balance between stringent security measures and operational efficiency.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 34

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.9/10)
- **Partner Access:** 9.2/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 10.0/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 9.2/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Ping Identity](https://www.g2.com/sellers/ping-identity)
- **Year Founded:** 2002
- **HQ Location:** Denver, CO
- **Twitter:** @pingidentity (42,117 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/21870/ (2,319 employees on LinkedIn®)
- **Phone:** 1.303.468.2900

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 73% Enterprise, 19% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (3 reviews)
- Reliability (3 reviews)
- Seamless Experience (3 reviews)
- Security (3 reviews)
- Intuitive (2 reviews)

**Cons:**

- Complex Setup (2 reviews)
- Setup Difficulties (2 reviews)
- API Issues (1 reviews)
- Configuration Difficulty (1 reviews)
- Connectivity Issues (1 reviews)

### 22. [Akamai Enterprise Application Access](https://www.g2.com/products/akamai-akamai-enterprise-application-access/reviews)
  Enterprise Application Access is a unique cloud architecture that closes all inbound firewall ports, while ensuring that only authorized users and devices have access to the internal applications they need, and not the entire network. No one can access applications directly because they are hidden from the Internet and public exposure. Enterprise Application Access integrates data path protection, single sign-on, identity access, application security, and management visibility and control into a single service.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 27

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 8.9/10)
- **Partner Access:** 9.3/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 9.7/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 9.3/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Akamai Technologies](https://www.g2.com/sellers/akamai-technologies)
- **Year Founded:** 1998
- **HQ Location:** Cambridge, MA
- **Twitter:** @Akamai (115,423 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3925/ (10,444 employees on LinkedIn®)
- **Ownership:** NASDAQ:AKAM

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 37% Enterprise, 33% Small-Business


#### Pros & Cons

**Pros:**

- Customer Support (1 reviews)
- Ease of Use (1 reviews)
- Easy Access (1 reviews)
- Features (1 reviews)
- Security (1 reviews)


### 23. [Symantec VIP](https://www.g2.com/products/symantec-symantec-vip/reviews)
  Symantec Validation and ID Protection (VIP) is a cloud-based, multi-factor authentication (MFA) service designed to secure access to sensitive data and applications across various devices and locations. By combining traditional username and password credentials with additional authentication factors, such as one-time passwords (OTPs), biometrics, or hardware tokens, VIP enhances security without compromising user productivity. Its scalable infrastructure allows organizations to implement robust authentication measures without the need for dedicated on-premises hardware. Key Features and Functionality: - Cloud-Based Infrastructure: Delivers secure, reliable, and scalable authentication services without requiring on-premises hardware. - Risk-Based Authentication: Utilizes device and behavior profiling to assess login attempts, blocking potentially risky access while maintaining a seamless experience for legitimate users. - Diverse Authentication Methods: Supports a wide range of authentication options, including hardware tokens, software-based OTPs, SMS or voice-based OTPs, biometrics, and push notifications, catering to various user preferences and security requirements. - Passwordless and Push Login Options: Offers user-friendly authentication experiences by eliminating the need for passwords through biometric verification or push notifications. - Self-Service Credential Provisioning: Enables users to register and manage their authentication credentials independently, reducing the administrative burden on IT departments. - Comprehensive Integration Support: Seamlessly integrates with popular VPNs, webmail services, single sign-on (SSO) applications, and user directories, facilitating broad compatibility across enterprise environments. Primary Value and User Benefits: Symantec VIP addresses the critical need for enhanced security in an era where sophisticated cyber threats and data breaches are prevalent. By implementing multi-factor authentication, organizations can significantly reduce the risk of unauthorized access, even if primary credentials are compromised. The service&#39;s flexibility in authentication methods ensures that security measures can be tailored to meet diverse user needs and compliance requirements. Additionally, its cloud-based nature offers scalability and reliability, allowing businesses to adapt to evolving security challenges without substantial infrastructure investments. Ultimately, Symantec VIP empowers organizations to protect sensitive information effectively while maintaining operational efficiency and user satisfaction.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 43

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 8.9/10)
- **Partner Access:** 8.7/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 9.2/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 9.0/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (63,400 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Hospital &amp; Health Care
  - **Company Size:** 75% Enterprise, 16% Small-Business


#### Pros & Cons

**Pros:**

- Cloud Services (2 reviews)
- Ease of Use (2 reviews)
- Security (2 reviews)
- 2FA Security (1 reviews)
- Cross-platform (1 reviews)

**Cons:**

- Delay Issues (1 reviews)
- Limited Customization (1 reviews)
- Missing Features (1 reviews)
- Notification Issues (1 reviews)
- Poor Interface Design (1 reviews)

### 24. [Ping Identity](https://www.g2.com/products/ping-identity/reviews)
  Ping Identity is a type of identity management solution designed to help organizations implement Zero Trust security frameworks while enhancing user experiences across various platforms. With a focus on intelligent identity solutions, Ping Identity empowers enterprises to securely manage access to cloud, mobile, Software as a Service (SaaS), and on-premises applications, facilitating a seamless integration of identity management into their digital business strategies. The target audience for Ping Identity primarily includes large enterprises and organizations that require robust security measures and streamlined access management for their workforce, customers, and partners. This solution is particularly beneficial for businesses operating in hybrid environments, where applications and data are spread across multiple platforms and locations. By adopting Ping Identity, organizations can ensure that their security protocols are not only effective but also user-friendly, thereby improving overall productivity and satisfaction. Key features of the PingOne Cloud Platform include single sign-on (SSO), multi-factor authentication (MFA), and adaptive authentication, which collectively enhance security while simplifying the user experience. The platform&#39;s SSO capability allows users to access multiple applications with a single set of credentials, reducing password fatigue and improving user compliance. MFA adds an extra layer of security by requiring additional verification steps, which is crucial in today’s threat landscape. Adaptive authentication further strengthens security by assessing user behavior and context, enabling organizations to respond dynamically to potential risks. Ping Identity stands out in the identity management category through its commitment to open standards and strategic partnerships with industry leaders such as Microsoft and Amazon. This approach not only enhances interoperability with existing systems but also ensures that organizations can leverage the latest technologies and innovations in identity management. By providing flexible solutions tailored to meet the unique needs of each enterprise, Ping Identity accelerates digital transformation initiatives, enhances customer engagement, and fortifies security measures, making it a valuable asset for any organization looking to navigate the complexities of modern identity management.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 105

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.6/10 (Category avg: 8.9/10)
- **Partner Access:** 8.5/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 8.5/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 9.0/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Ping Identity](https://www.g2.com/sellers/ping-identity)
- **Company Website:** https://www.PingIdentity.com
- **Year Founded:** 2002
- **HQ Location:** Denver, CO
- **Twitter:** @pingidentity (42,117 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/21870/ (2,319 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 68% Enterprise, 24% Mid-Market


#### Pros & Cons

**Pros:**

- Customer Management (1 reviews)
- Customer Support (1 reviews)
- Ease of Use (1 reviews)
- Identity Management (1 reviews)
- Integrations (1 reviews)

**Cons:**

- Authentication Issues (1 reviews)
- Complex Administration (1 reviews)
- Complex Setup (1 reviews)
- Confusing Interface (1 reviews)
- Confusing Options (1 reviews)

### 25. [AuthX](https://www.g2.com/products/authx/reviews)
  AuthX is a cloud-based IAM platform offering Passwordless Authentication with SSO, MFA, Passkeys, Badge Tap &amp; Go, and Biometrics. It streamlines secure access across Workstations, Web, Network, and Mobile endpoints with advanced authentication workflows. Enabling Zero Trust Security, AuthX unifies credentials, apps, and devices while proactively managing risks.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 66

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 8.9/10)
- **Partner Access:** 9.8/10 (Category avg: 8.8/10)
- **Ease of connecting applications:** 9.7/10 (Category avg: 8.6/10)
- **Supports BYOD users:** 9.9/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [AuthX](https://www.g2.com/sellers/authx)
- **Year Founded:** 2019
- **HQ Location:** Gaithersburg, Maryland, United States
- **Twitter:** @auth_x (229 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/authx1 (38 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 88% Mid-Market, 17% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (43 reviews)
- Security (41 reviews)
- Single Sign-On (30 reviews)
- Easy Access (25 reviews)
- Easy Integrations (20 reviews)

**Cons:**

- Difficult Learning (2 reviews)
- Difficult Learning Process (2 reviews)
- High Learning Curve (2 reviews)
- Learning Curve (2 reviews)
- API Difficulty (1 reviews)



## Parent Category

[Identity Management Software](https://www.g2.com/categories/identity-management)



## Related Categories

- [User Provisioning and Governance Tools](https://www.g2.com/categories/user-provisioning-and-governance-tools)
- [Identity and Access Management (IAM) Software](https://www.g2.com/categories/identity-and-access-management-iam)
- [Multi-Factor Authentication (MFA) Software](https://www.g2.com/categories/multi-factor-authentication-mfa)
- [Risk-Based Authentication Software](https://www.g2.com/categories/risk-based-authentication-rba)
- [Customer Identity and Access Management (CIAM) Software](https://www.g2.com/categories/customer-identity-and-access-management-ciam)
- [Biometric Authentication Software](https://www.g2.com/categories/biometric-authentication)
- [Passwordless Authentication Software](https://www.g2.com/categories/passwordless-authentication)



---

## Buyer Guide

### What You Should Know About Single Sign-On Solutions

### What are Single Sign-On (SSO) Solutions?

Single sign-on (SSO) solutions are user authentication solution that helps companies secure access to business applications and assets. It does so while also providing end users with a convenient, easy-to-use portal that requires them only to sign in and authenticate once to access multiple corporate applications and resources.&amp;nbsp;

SSO solutions share authentication sessions between a trusted identity provider, which manages digital identities and applications. In practice, commonly, an identity provider requires the user to log in and authenticate; the identity provider then shares this authentication session with other applications by passing digitally signed tokens for the receiving application to verify that it is coming from a trusted provider before granting the user with access to the application. If the user identity token is accepted, the user is automatically granted access to the application.

Companies use SSO software mainly to improve security and enhance the end-user sign-on experience, whether that be internal employees, end customers, or corporate business partners. SSO solutions also centralizes user access management, thus reducing the security management burden on administrators. Using an SSO solution, IT administrators can reduce or eliminate common time-consuming tasks like password resets. SSO products contain features that benefit both end users and administrators. For end users, this includes an easy-to-use user portal, intuitive authentication, and often a mobile application. For administrators, these solutions often include an identity directory or directory integrations, multiple multi-factor authentication (MFA) methods, audit features, and prebuilt application integrations.&amp;nbsp;

**What Does SSO Stand For?**

SSO most commonly stands for single sign-on. The acronym SSO is less frequently used to describe same sign-on, which is different from single sign-on; same sign-on does not rely on trusted tokens, but rather credential sharing. Rarely, the acronym SSO is used to describe single sign-out.

Other common acronyms people may encounter regarding SSO products include:

FIM: federated identity management, of which SSO is a part

IAM: identity and access management

IdP: identity provider

JWT: JSON Web Token, a protocol commonly used in business-to-consumer (B2C) SSO applications

LDAP: lightweight directory access protocol, an open protocol used for directory services authentication

MFA: multi-factor authentication

OIDC: OpenID Connect, an authentication protocol

OAuth: an open standard authentication protocol

SAML: Security Assertion Markup Language, an open standard used for SSO solutions

#### What Types of Single Sign-On (SSO) Solutions Exist?

**Business to employee (B2E)**

Companies use B2E SSO solutions to securely manage their employees’ access to corporate accounts, provide an easy-to-use user experience, and reduce user need for IT administrators services.

**Business to business (B2B)**

Companies use B2B SSO solutions to enable their business partners and corporate customers to best utilize the company’s services, using the partner or corporate customer’s preferred identity providers.

**Business to consumer (B2C) or customer identity and access management (CIAM)**

In B2C or CIAM use cases, customers are able to sign into other accounts and connect them to the business’ app to provide an SSO experience. Most commonly, customers authenticate using social media identity providers like Facebook or Google enabling them access to connected accounts. **&amp;nbsp;**

### What are the Common Features of Single Sign-On (SSO) Solutions?

The following are some core features within SSO solutions that can help users and administrators.

**User portal:** User portals provide an intuitive, easy-to-use end-user interface.

**Mobile app:** Many SSO solutions offer a mobile app for end users to both authenticate and access the SSO solution from their mobile devices.

**MFA methods:** Most SSO providers offer multiple authentication methods to end users, from software or hardware token-based authentication, to mobile push, passwordless authentication, biometric authentication, or one-time passcodes (OTPs).&amp;nbsp;

**Adaptive or contextual access:** Some SSO software offers advanced authentication tools, such as adaptive or contextual access. Using machine learning to understand a user’s contextual use of the SSO product, such as location, IP address, time, and other real-time factors to create a user baseline profile. This profile is then used to determine anomalous access activity to prevent access when risk is deemed too high.

**Directory or integration:** To assist with user provisioning and management, SSO solutions either integrate with standard directories, such as Microsoft Active Directory, LDAP-based directories, or Google Cloud Directory or offer their own cloud directories built into the SSO software.

**Prebuilt integration application catalog:** SSO solutions commonly provide prebuilt integrations to widely used SaaS applications, which are available on an application catalog.

**Role management:** SSO solutions assist administrators with user provisioning and assigning permissions based on user role for access control.

**Audit features** : Audit features provide administrators audit logs to monitor user access.

### What are the Benefits of Single Sign-On (SSO) Solutions?

**Increases security:** The main benefit of using an SSO solution is for securing user access to company applications and other resources through user authentication.

**Reduces password authentication risk:** Since users must only sign in and authenticate once to access multiple applications, SSO solutions reduce the risks associated with poor password management and using only a single factor for authentication.

**Saves users time and frustration:** SSO solutions reduce the number of logins end users such as employees or customers must remember and SSO solutions reduce user frustration when switching between multiple applications once authenticated.

**Saves administrators time and money:** Users can access their accounts in one centralized location, reducing the number of calls to administrators for password resets, saving time and, therefore money on labor costs.

**Seamless experience across assets:** SSO solutions reduce login friction for end users once authenticated and give them access to multiple accounts.&amp;nbsp;

**Centralizes consumer profiles:** SSO software consolidates end-user experiences in one tool to provide a centralized view of end-user or customer data.

### Who Uses Single Sign-On (SSO) Solutions?

**Systems administrators:** Systems administrators are responsible for deploying and managing a company’s SSO solutions.

**Employees:** Employees are end users of SSO solutions in a B2E use case to sign on and authenticate with the user portal to access their corporate accounts.

**Customers:** Customers are end users of SSO solutions in a B2C use case and sign in and authenticate using an identity provider, often a social media account, to access a business’ applications.

**Business contacts:** Companies may use SSO software to enable their business partners and corporate customers to securely authenticate and access the company’s assets, often with multiple identity providers.

#### Software Related to Single Sign-On (SSO) Solutions

Related solutions that can be used together with SSO software include:

[Identity and access management (IAM) software](https://www.g2.com/categories/identity-and-access-management-iam) **:** For employee use cases, IAM software offers broader identity solutions, of which SSO is often a part. IAM software authenticates users, provides access to systems and data based on company policies, tracks user activity, and provides reporting tools to ensure employees comply with company policies and regulations.

[Customer identity and access management (CIAM) software](https://www.g2.com/categories/customer-identity-and-access-management-ciam) **:** For customer use cases, CIAM software provides robust identity functionality. CIAM software enables businesses to centralize and manage customer identities, preferences, and profile information at scale while offering customers self-registration options.

[Password manager software](https://www.g2.com/categories/password-manager) **:** Password managers are secure repositories that store individual user passwords, much like a vault. SSO solutions differs from password managers because SSO software provides authentication before granting a trusted token, not an actual password, for access to an application.&amp;nbsp;

[SaaS operations management software](https://www.g2.com/categories/saas-operations-management) **:** SaaS operations management software tools enable businesses to manage, govern, and secure their SaaS product portfolios; many of these tools integrate with SSO solutions to manage user permissions. **&amp;nbsp;&amp;nbsp;&amp;nbsp;**

[SaaS spend management software](https://www.g2.com/categories/saas-spend-management) **:** This software enables companies to manage SaaS utilization to identify cost savings. Many of these tools integrate with SSO software to manage end-user utilization of SaaS subscriptions.

### Challenges with Single Sign-On (SSO) Solutions

Software solutions can come with their own set of challenges. Issues to consider include:&amp;nbsp;

**Legacy applications** : SSO tools may not integrate with legacy applications; a solution to overcome this may include password vaulting tools within the SSO software to provide the end user with ease of use, despite not technically functioning as SSO regarding authentication.&amp;nbsp;

**High availability:** It is important that the SSO provider has high availability to avoid users being locked out of their systems; with applications managed centrally with an SSO solution, any downtime can prevent end users from accessing their applications and resources. If a company has mission-critical applications that must be available 24/7, many companies will not integrate these tools with SSO providers and instead log in and authenticate separately.

### Which Companies Should Buy Single Sign-On (SSO) Solutions?

All companies can benefit from securing their login process to corporate assets.

**Companies securing employees:** Companies of all sizes that want to secure their employees’ access to corporate applications use SSO solutions.

**Companies securing customers:** Companies that want to enable their customers to provide self service to securely authenticate and login to applications use SSO solutions.

**Companies securing partners:** Companies that want to secure their partners and contractors access to corporate applications use SSO solutions.

### How to Buy Single Sign-On (SSO) Solutions

#### Requirements Gathering (RFI/RFP) for Single Sign-On (SSO) Software

Prior to selecting an SSO software service provider or solution, buyers must consider what factors are important to the company, which may include:

**End-user use case:** Buyers must determine their end users—whether employees, customers, or business partners—to determine what kind of SSO solution works best for these constituencies.

**Cloud vs. on-premises application support:** The buyer should determine what applications and company resources will be connected to the SSO software. For applications that need high availability (24/7), they may not wish to connect those in case of downtime with the SSO provider. Many SSO providers offer prebuilt integrations with the most popular business software. If the business has applications that are custom-built, legacy, or on-premises, those may need integrations built to connect with the SSO. Another workaround would be to use a password vault within an SSO solution for legacy applications that are difficult to connect.

**Federation protocols** : If the organization needs to integrate with multiple identity providers outside of the organization, especially for authenticating business partners, FIM can achieve this. Federation protocols include SAML 1.1, SAML2, WS-Federation, OAuth2, OpenID Connect, WS-Trust, and other protocols.

**Authentication type** : The company should ensure that the authentication types its employees, customers, or partners will use are supported by the SSO solution of choice. This may include software or hardware-token-based authentication for employees and OTPs via email, SMS, or phone for customers, among many other authentication methods. Many SSO solutions now offer contextual or risk-based authentication measures to learn user behaviors, identify patterns, and thus provide risk-based assessments when the authentication process does not meet typical patterns.&amp;nbsp;

**Mobile app** : If end users will access corporate applications from mobile devices, ensure the SSO software provider’s mobile app meets particular business needs.&amp;nbsp;

**Developer support** : Buyers must ensure the SSO provider has the developer support the team requires, including software development kits (SDKs) and application programming interface (API) lifecycle management functions, particularly for B2C SSO use cases.&amp;nbsp;

**Meets security standards** : SSO is a security tool providing users with authenticated access to their company resources. It is important that the SSO service provider meet security standards that are important to the company, which may include ISO 27017, ISO 27018, ISO 27001, SOC 2 Type 2, and others.&amp;nbsp;

#### Compare Single Sign-On Software (SSO) Products

**Create a long list**

Buyers should create a long list of software solutions by researching on g2.com, by reading real-user reviews, seeing how vendors compare on G2 Grid® reports, and saving the software selections to “My List” to reference them in the future. Using g2.com, users can learn about which solutions are most often used in the geographic market and which ones are best for every business segment size—whether that is for small, medium, and enterprise businesses.

**Create a short list**

After creating a long list of vendors, buyers must do further research to narrow down the selections. Using g2.com’s compare feature, they can stack specific software up side by side to learn about how real users of the software rate their functionality. G2 also has quarterly reports showcasing users’ perception of return on investment (in months),&amp;nbsp;the software provider’s average implementation time in months, usability scores, and many other factors.

**Conduct demos**

Up next is time to demo the products. Many vendors enable buyers to contact them directly from g2’s website by clicking the “Get a quote” button on their product profile. Buyers must prepare for each demo by having a standard list of questions and clarifications to ask each vendor.&amp;nbsp;

#### Selection of Single Sign-On (SSO) Solutions&amp;nbsp;

**Choose a selection team**

Single sign-on solutions impact users across the business—from employees, customers, business partners, IT teams, infosec teams, and more. The company’s software selection team should include people representative of these groups. They must start with three to five people to join the selection committee and clearly define project roles.&amp;nbsp;

**Negotiation**

It is important to know how many licenses are needed, as pricing often depends on the number of licenses the buyer purchases and the length of time they purchase it for. Often buyers can get discounts if they purchase large blocks of licenses for a longer duration. They must be sure to negotiate not just on price, but also implementation. Companies may be able to get free or reduced implementation services or ongoing support, as well.

**Final decision**

Before making a final choice, buyers should check if they can get a trial run of the product to test adoption with a small sample size of users. If the tool is well used and well received, the buyer can be confident that the selection was correct.




