Introducing G2.ai, the future of software buying.Try now
Product Avatar Image
2AB iLock Security Services

By 2AB

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at 2AB iLock Security Services, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
4.5 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with 2AB iLock Security Services?

It's been two months since this profile received a new review
Leave a Review

2AB iLock Security Services Reviews & Product Details

Product Avatar Image

Have you used 2AB iLock Security Services before?

Answer a few questions to help the 2AB iLock Security Services community

2AB iLock Security Services Reviews (1)

Reviews

2AB iLock Security Services Reviews (1)

4.5
1 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
BA
System Engineer
Small-Business (50 or fewer emp.)
"a practical security provider for your web applications"
What do you like best about 2AB iLock Security Services?

library is very simple to use and communication between interfaces is quite understandable.The uses of manages group user and policy are very effective. The uses of manages group user and policy are quite understandable and effective. Review collected by and hosted on G2.com.

What do you dislike about 2AB iLock Security Services?

It could be a little more customizable and allows override, but it's really effective within Java libraries.perhaps a c# support could have been added to this product. Review collected by and hosted on G2.com.

There are not enough reviews of 2AB iLock Security Services for G2 to provide buying insight. Below are some alternatives with more reviews:

1
JumpCloud Logo
JumpCloud
4.5
(3,772)
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
2
Salesforce Platform Logo
Salesforce Platform
4.5
(3,866)
Platform as a Service (PaaS) eliminates the expense and complexity of evaluating, buying, configuring, and managing all the hardware and software needed for custom-built applications.
3
Microsoft Entra ID Logo
Microsoft Entra ID
4.5
(853)
Entra ID is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.
4
BetterCloud Logo
BetterCloud
4.4
(476)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
5
BeyondTrust Remote Support Logo
BeyondTrust Remote Support
4.7
(369)
The #1 solution for leading enterprises to accelerate and secure your service desk with centralized, efficient, and secure access for servicing and monitoring any endpoint, anywhere, attended or not.
6
Devolutions Remote Desktop Manager Logo
Devolutions Remote Desktop Manager
4.7
(194)
Remote Desktop Manager lets you centralize all your remote connections and passwords into a unique platform.
7
Teleport Logo
Teleport
4.4
(107)
Teleport is purpose-built for infrastructure use cases and implements trusted computing at scale, with unified cryptographic identities for humans, machines and workloads, endpoints, infrastructure assets, and AI agents. Our identity-everywhere approach vertically integrates access management, zero trust networking, identity governance, and identity security into a single platform, eliminating overhead and operational silos.
8
Ping Identity Logo
Ping Identity
4.4
(106)
Ping Identity (NYSE: PING) offers intelligent identity capabilities such as single sign-on and multi-factor authentication for workforce, customer and partner use cases.'
9
StrongDM Logo
StrongDM
4.6
(96)
strongDM’s People-First Access platform gives businesses confidence in their access and audit controls at scale. It combines authentication, authorization, networking, and observability to simplify workflows and make it easier for technical staff to access the tools they need without compromising security and compliance requirements.
10
CloudEagle Logo
CloudEagle
4.7
(92)
CloudEagle is an all-in-one SaaS research, management and procurement platform
Show More
Discussions related to 2AB iLock Security Services

Discussions for this product are not available at this time. Be the first one to Start a discussion

Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
2AB iLock Security Services
View Alternatives