Clef's identity solutions combine cutting-edge design research, and security to protect businesses and customers from fraud.

Work for Clef?

Learning about Clef?

We can help you find the solution that fits you best.

Clef Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
Company Size
User Role
Showing 1 Clef review
LinkedIn Connections
Clef review by User
Validated Reviewer
Review Source

"Easy-to-Use Security Solution "

What do you like best?

Clef is so simple to use, cost-effective, and peace-of-mind for people who like me and those at my company who value security.

What do you dislike?

Clef has crashed a few times and acted up when my phone has been slow. However, ultimately, I've found Clef to be reliable.

Recommendations to others considering the product:

Consider whether or not your company required a package or if you get by on the free version of Clef. My company uses Clef for a couple of different things, and because we're so small we've found that we can save a lot on our security costs with Clef, while still achieving that peace of mind we sought out to get by implementing two-factor authentication for our company. I've even expanded my use of Clef beyond the scope of my work because I liked it so much. Highly recommended.

What problems are you solving with the product? What benefits have you realized?

As security becomes easier for people to compromise, it's important to keep up to date with simple measures that increase security. Two-factor is a great way to increase security and Clef makes it easy and cheap.

Sign in to G2 to see what your connections have to say about Clef

What Multi-Factor Authentication solution do you use?

Thanks for letting us know!

There are not enough reviews of Clef for G2 to provide buying insight. Below are some alternatives with more reviews:

Duo Security Logo
Duo Security
Cloud-based user authentication vendor: authenticate with your phone, Duo mobile app, landline, or tokens with or without an internet connection
Google Authenticator Logo
Google Authenticator
Google Authenticator is a multifactor app for mobile devices.
RSA SecurID® Access Logo
RSA SecurID® Access
Establish an enterprise-wide authentication policy that protects your most valuable applications, resources, and information.
Ping Intelligent Identity Platform Logo
Ping Intelligent Identity Platform
Ping Intelligent Identity Platform is a multi-factor authentication solution.
Authy Logo
Two-Factor Authentication smartphone app for consumers, simplest 2fa Rest API for developers and a strong authentication platform for the enterprise.
AWS Certificate Manager Logo
AWS Certificate Manager
AWS Certificate Manager is a service that lets you easily provision, manage, and deploy Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services to secure network communications and establish the identity of websites.
Google Security Key Enforcement Logo
Google Security Key Enforcement
Google Security Key Enforcement is an enhanced protection against phishing.
Azure Multi-Factor Authentication Logo
Azure Multi-Factor Authentication
Azure Multi-Factor Authentication reduces organizational risk and helps enable regulatory compliance by providing an extra level of authentication, in addition to a user’s account credentials, to secure employee, customer, and partner access.
Symantec VIP Access Manager Logo
Symantec VIP Access Manager
Create a single access point to protect your cloud and on-premise web apps via Single Sign-On (SSO) with Symantec VIP two-factor authentication.
AuthPoint Multi-Factor Authentication Logo
AuthPoint Multi-Factor Authentication
WatchGuard AuthPoint is the right solution at the right time to make MFA a reality for the businesses who desperately need it to block attacks. Multi-factor authentication (MFA) solution not only helps to reduce the likelihood of network disruptions and data breaches arising from lost or stolen credentials, but we deliver this important capability entirely from the Cloud for easy set-up and management. AuthPoint goes beyond traditional 2-Factor Authentication (2FA) by considering innovative ways to positively identify users, and our large ecosystem of 3rd party integrations means that you can use MFA to protect access to the network, VPNs, and Cloud applications.
Show more
Kate from G2

Learning about Clef?

I can help.
* We monitor all Clef reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.