Google Titan Security Key Reviews & Product Details

Google Titan Security Key Overview

What is Google Titan Security Key?

Titan Security Keys are phishing-resistant two-factor authentication (2FA) devices that help protect high-value users such as IT admins. Titan Security Keys work with popular browsers and a growing ecosystem of services that support FIDO standards.

Google Titan Security Key Details
Product Description

Titan Security Keys are phishing-resistant two-factor authentication (2FA) devices that help protect high-value users such as IT admins. Titan Security Keys work with popular browsers and a growing ecosystem of services that support FIDO standards.


Seller Details
Seller
Google
Ownership
NASDAQ:GOOG
Company Website
Phone
+1 (650) 253-0000
Year Founded
1998
HQ Location
Mountain View, CA
Total Revenue (USD mm)
$161,857
Twitter
@google
22,793,389 Twitter followers
LinkedIn® Page
www.linkedin.com
226,485 employees on LinkedIn®
Description

Organize the world’s information and make it universally accessible and useful.

Show More
Answer a few questions to help the Google Titan Security Key community
Have you used Google Titan Security Key before?
Yes

Google Titan Security Key Reviews

Write a Review
Filter reviews
LinkedIn®
Connections
Showing 2 Google Titan Security Key reviews
Showing 2 reviews
Filter Reviews
Filter Reviews
Sort by
Ratings
Company Size
User Role
All Industries
Region
Already have Google Titan Security Key?
Write a Review
AA
Small-Business(50 or fewer emp.)
Validated Reviewer
Review source: Invitation from G2
What do you like best?

The design, durability, and ease of use of this product are top notch! Review collected by and hosted on G2.com.

What do you dislike?

Not yet accepted with many other vendors or Authenticators outside of Google. Review collected by and hosted on G2.com.

What problems are you solving with the product? What benefits have you realized?

Device security that’s easier and faster to use than regular Two Step Auth or MFA, while also providing a greater level of security. Review collected by and hosted on G2.com.

Show More
Show Less
UD
Mid-Market(51-1000 emp.)
Validated Reviewer
Review source: Invitation from G2
What do you like best?

this is such a helpful product to be able to have in a business and to have security Review collected by and hosted on G2.com.

What do you dislike?

sometimes this does lag or crash but no major issues Review collected by and hosted on G2.com.

What problems are you solving with the product? What benefits have you realized?

i am solving security issues and i realized this comes with great relief Review collected by and hosted on G2.com.

Show More
Show Less

There are not enough reviews of Google Titan Security Key for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Egnyte Logo
Egnyte
4.3
(632)
Egnyte delivers the only modern content platform that is purpose-built for businesses. Egnyte gives IT centralized control and protection over their files, and users fast access to their content, no matter how or where work happens.
2
OpenSSH Logo
OpenSSH
4.7
(39)
OpenSSH provides tools that allows you to encrypt all traffic to help manage eavesdropping, connection hijacking, and other attacks to your Internet while providing secure tunneling capabilities and more.
3
AWS Key Management Service (KMS) Logo
AWS Key Management Service (KMS)
4.3
(27)
AWS Key Management Service (KMS) is a service that help to create and control the encryption keys used to encrypt data, and uses Hardware Security Modules (HSMs) to protect the security of keys.
4
HashiCorp Vault Logo
HashiCorp Vault
4.3
(30)
HashiCorp Vault is a tool that secure user applications and infrastructure to limit the surface area and attack time in the event of a breach
5
Azure Key Vault Logo
Azure Key Vault
4.2
(29)
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys.
6
Keyfactor Command Logo
Keyfactor Command
4.5
(21)
Keyfactor Command, formerly Certified Security Solutions (CSS), is a leading provider of secure digital identity management solutions that enables organizations to confirm authenticity, and ensure the right things are interacting in the right ways in our connected world.
7
TokenEx Logo
TokenEx
4.6
(17)
TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store, and secure data. TokenEx extends flexibility by working with multiple data acceptance channels and by maintaining a processor-agnostic approach. Moreover, TokenEx is able to tokenize and secure almost any data type your company works with, including PCI, PII, PHI, and even unstructured data formats.
8
AWS CloudHSM Logo
AWS CloudHSM
4.3
(12)
AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud.
9
GnuPG Logo
GnuPG
4.2
(11)
GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.
10
Akeyless Vault Logo
Akeyless Vault
4.7
(6)
Unified secrets management vault platform is built to secure DevOps secrets and access to production resources, made for hybrid cloud as well as legacy environments
Show More