Introducing G2.ai, the future of software buying.Try now
Product Avatar Image

SecureAuth

Show rating breakdown
40 reviews
  • 2 profiles
  • 7 categories
Average star rating
4.4
Serving customers since
2005
Profile Filters

All Products & Services

Profile Name

Star Rating

29
7
4
0
0

SecureAuth Reviews

Review Filters
Profile Name
Star Rating
29
7
4
0
0
PRASHANTH A.
PA
PRASHANTH A.
Data Engineer | 4+ Yrs Experience in ETL, Big Data & Cloud | Python, Spark, Kafka, Snowflake, AWS & Azure Certified
09/10/2025
Validated Reviewer
Review source: G2 invite
Incentivized Review

Customer Identity Access Management

What I like best about SecureAuth is its strong and flexible MFA capabilities. The platform allows us to implement multiple authentication methods tailored to different user groups, including biometrics, OTPs, and device recognition. The adaptive risk-based authentication helps us strengthen security without frustrating end users.
Ayaka I.
AI
Ayaka I.
08/15/2025
Validated Reviewer
Verified Current User
Review source: Seller invite
Incentivized Review

Good product

The admin console of the UI is fairly easy to navigate. Documentation is helpful
Verified User in Hospital & Health Care
AH
Verified User in Hospital & Health Care
08/12/2025
Validated Reviewer
Verified Current User
Review source: Seller invite
Incentivized Review

Customer support is perfect

Customer support always goes above and beyond. Implementation is simple but granular when necessary. I use this product daily and rarely run into any issues.

About

Contact

Phone:
949-777-6959
HQ Location:
Irvine, CA

Social

@SecureAuth

What is SecureAuth?

SecureAuth is a technology leader providing single secured access for mobile devices, cloud applications and networks that serves hundreds of customers and more than 10 million users worldwide. Its SecureAuth IdP products offer Global 5000 companies a uniquely extensible, enterprise-proven method of administering corporate identity governance on cloud-based applications, mobile devices, and networks. These all-in-one solutions provide IT departments with a simplified way of managing and enforcing access, authentication, approval and assertion based on existing user entitlements.

Details

Year Founded
2005