Best Software for 2025 is now live!

Best Multi-Factor Authentication (MFA) Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Multi-factor authentication (MFA) software secures users’ accounts by requiring them to prove their identity in two or more ways before granting access to accounts, sensitive information, systems, or applications. In addition to a single authentication factor, such as inputting a username and password, users are prompted to provide a second authentication factor to validate who the user says they are. Examples of authentication factors include one-time passcodes (OTPs) for SMS, email, or phone call, software tokens, hardware tokens, which are commonly small thumb drives or keycards, mobile-push on a software application to a mobile device, biometric factors, and contextual or risk-based authentication.

Businesses use MFA tools for security purposes to confirm a user is who they say they are prior to accessing privileged information or applications. This software can help companies prevent internal theft or data loss, as well as external access from unapproved parties. MFA tools are traditionally used by businesses, but they can also be used by individuals hoping to improve security on their personal devices or online accounts.

Risk-based authentication software is a form of MFA, but achieves authentication through different means by taking into account factors such as the user’s geolocation, IP address, IP address reputation, time since last authentication, device posture, device management, and other factors to determine the user’s authentication and risk. Passwordless authentication software is a form of MFA as well, which eliminates passwords as an authentication factor, instead relying on additional factors to authenticate a user.

MFA software can be sold as a point solution, where it can be integrated with a business’ user accounts, or it can be sold as part of a compound solution, typically in identity products, such as workforce-based identity and access management (IAM) software or customer-based customer identity and access management (CIAM) solutions.

To qualify for inclusion in the Multi-Factor Authentication (MFA) category, a product must:

Utilize a secondary authentication method such as OTPs, mobile push, software token, hardware token, biometric factors, or more
Prompt authentication from a user
Allow for triggered MFA for new users and devices

Best Multi-Factor Authentication (MFA) Software At A Glance

Best for Small Businesses:
Best for Mid-Market:
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:
Show LessShow More
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
257 Listings in Multi-Factor Authentication (MFA) Available
(484)4.6 out of 5
2nd Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Google Authenticator is a multifactor app for mobile devices.

    Users
    • Software Engineer
    • Owner
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 45% Small-Business
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Google Authenticator Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    41
    Security
    30
    2FA Security
    18
    Time-Saving
    14
    Easy Setup
    12
    Cons
    Storage Limitations
    6
    Inadequate Security
    5
    Sync Issues
    5
    Login Issues
    4
    Slow Loading
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Authenticator features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Multi-Device Sync
    Average: 8.9
    9.5
    Easy Setup
    Average: 9.0
    8.6
    Backup
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • User Sentiment
    How are these determined?Information
    These insights are written by G2's Market Research team, using actual user reviews for Google Authenticator, left between November 2021 and May 2022.
    • Reviewers mention that they enjoy using Google Authenticator to improve their account security.
    • Reviewers mention that scanning the QR codes makes it easy to set up accounts.
    • Reviewers say they like how easy it is to integrate Google Authenticator with their business applications.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,520,271 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    301,875 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Google Authenticator is a multifactor app for mobile devices.

Users
  • Software Engineer
  • Owner
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 45% Small-Business
  • 36% Mid-Market
Google Authenticator Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
41
Security
30
2FA Security
18
Time-Saving
14
Easy Setup
12
Cons
Storage Limitations
6
Inadequate Security
5
Sync Issues
5
Login Issues
4
Slow Loading
4
Google Authenticator features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.0
8.8
Multi-Device Sync
Average: 8.9
9.5
Easy Setup
Average: 9.0
8.6
Backup
Average: 8.8
User Sentiment
How are these determined?Information
These insights are written by G2's Market Research team, using actual user reviews for Google Authenticator, left between November 2021 and May 2022.
  • Reviewers mention that they enjoy using Google Authenticator to improve their account security.
  • Reviewers mention that scanning the QR codes makes it easy to set up accounts.
  • Reviewers say they like how easy it is to integrate Google Authenticator with their business applications.
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,520,271 Twitter followers
LinkedIn® Page
www.linkedin.com
301,875 employees on LinkedIn®
Ownership
NASDAQ:GOOG
(788)4.5 out of 5
3rd Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

    Users
    • Software Engineer
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 38% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Entra ID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    199
    Security
    189
    Identity Management
    128
    Single Sign-On
    118
    SSO (Single Sign-On)
    101
    Cons
    Expensive
    65
    Authentication Issues
    45
    Complexity
    45
    Difficult Learning
    40
    Integration Issues
    40
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Entra ID features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.0
    8.9
    Multi-Device Sync
    Average: 8.9
    8.9
    Easy Setup
    Average: 9.0
    8.6
    Backup
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,031,499 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    238,990 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

Users
  • Software Engineer
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 38% Enterprise
  • 37% Mid-Market
Microsoft Entra ID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
199
Security
189
Identity Management
128
Single Sign-On
118
SSO (Single Sign-On)
101
Cons
Expensive
65
Authentication Issues
45
Complexity
45
Difficult Learning
40
Integration Issues
40
Microsoft Entra ID features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.0
8.9
Multi-Device Sync
Average: 8.9
8.9
Easy Setup
Average: 9.0
8.6
Backup
Average: 8.8
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,031,499 Twitter followers
LinkedIn® Page
www.linkedin.com
238,990 employees on LinkedIn®
Ownership
MSFT

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(1,748)4.5 out of 5
Optimized for quick response
5th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:$4.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LastPass is a cloud-based password manager solution designed to help users securely store, manage, and access their passwords across various devices and platforms. This innovative tool simplifies the

    Users
    • Owner
    • CEO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 63% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • LastPass Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    402
    Password Management
    245
    Security
    219
    Autofill Feature
    182
    Convenience
    166
    Cons
    Password Management
    171
    Autofill Issues
    138
    Login Issues
    101
    Security Issues
    53
    Password Issues
    51
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LastPass features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.0
    9.1
    Multi-Device Sync
    Average: 8.9
    9.1
    Easy Setup
    Average: 9.0
    8.7
    Backup
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • User Sentiment
    How are these determined?Information
    These insights are written by G2's Market Research team, using actual user reviews for LastPass, left between March 2018 and May 2022.
    • Reviewers mention that LastPass is a huge time saver for them.
    • Reviewers say that they like the simple user interface of LastPass.
    • Reviewers cite they’d like improved user experiences, however.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LastPass
    Company Website
    Year Founded
    2008
    HQ Location
    Boston, Massachusetts
    Twitter
    @LastPass
    47,851 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    846 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LastPass is a cloud-based password manager solution designed to help users securely store, manage, and access their passwords across various devices and platforms. This innovative tool simplifies the

Users
  • Owner
  • CEO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 63% Small-Business
  • 25% Mid-Market
LastPass Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
402
Password Management
245
Security
219
Autofill Feature
182
Convenience
166
Cons
Password Management
171
Autofill Issues
138
Login Issues
101
Security Issues
53
Password Issues
51
LastPass features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.0
9.1
Multi-Device Sync
Average: 8.9
9.1
Easy Setup
Average: 9.0
8.7
Backup
Average: 8.8
User Sentiment
How are these determined?Information
These insights are written by G2's Market Research team, using actual user reviews for LastPass, left between March 2018 and May 2022.
  • Reviewers mention that LastPass is a huge time saver for them.
  • Reviewers say that they like the simple user interface of LastPass.
  • Reviewers cite they’d like improved user experiences, however.
Seller Details
Seller
LastPass
Company Website
Year Founded
2008
HQ Location
Boston, Massachusetts
Twitter
@LastPass
47,851 Twitter followers
LinkedIn® Page
www.linkedin.com
846 employees on LinkedIn®
(2,939)4.5 out of 5
Optimized for quick response
6th Easiest To Use in Multi-Factor Authentication (MFA) software
View top Consulting Services for Salesforce Platform
Save to My Lists
Entry Level Price:$25 /user/month* (bil...
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Salesforce Platform is the leading low-code development platform that empowers your team to build and extend your Customer 360 with AI, automation, and data. With the Salesforce Platform, you can exec

    Users
    • Salesforce Developer
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Salesforce Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    884
    Features
    412
    Useful
    381
    Customizability
    379
    Customization
    353
    Cons
    Learning Curve
    281
    Complexity
    270
    Expensive
    237
    Missing Features
    237
    Limitations
    230
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Salesforce Platform features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.0
    8.9
    Multi-Device Sync
    Average: 8.9
    8.9
    Easy Setup
    Average: 9.0
    9.0
    Backup
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1999
    HQ Location
    San Francisco, CA
    Twitter
    @salesforce
    584,242 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    78,543 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Salesforce Platform is the leading low-code development platform that empowers your team to build and extend your Customer 360 with AI, automation, and data. With the Salesforce Platform, you can exec

Users
  • Salesforce Developer
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 36% Enterprise
Salesforce Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
884
Features
412
Useful
381
Customizability
379
Customization
353
Cons
Learning Curve
281
Complexity
270
Expensive
237
Missing Features
237
Limitations
230
Salesforce Platform features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.0
8.9
Multi-Device Sync
Average: 8.9
8.9
Easy Setup
Average: 9.0
9.0
Backup
Average: 8.8
Seller Details
Company Website
Year Founded
1999
HQ Location
San Francisco, CA
Twitter
@salesforce
584,242 Twitter followers
LinkedIn® Page
www.linkedin.com
78,543 employees on LinkedIn®
(393)4.5 out of 5
Optimized for quick response
1st Easiest To Use in Multi-Factor Authentication (MFA) software
View top Consulting Services for Cisco Duo
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cisco Duo is a cloud-based access management platform that secures access to all applications, for any user and device, from anywhere. It’s designed to be easy to use and deploy while providing identi

    Users
    • Software Engineer
    • Consultant
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 45% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Duo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    90
    Authentication Ease
    60
    Security
    60
    Authentication
    53
    Easy Access
    45
    Cons
    Authentication Issues
    32
    Access Limitations
    24
    Login Issues
    21
    Notification Issues
    15
    Poor Notifications
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Duo features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Multi-Device Sync
    Average: 8.9
    9.0
    Easy Setup
    Average: 9.0
    8.2
    Backup
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • User Sentiment
    How are these determined?Information
    These insights are written by G2's Market Research team, using actual user reviews for Cisco Duo, left between September 2020 and April 2022.
    • Reviewers of Duo Security frequently cite the push notifications as being a major benefit of this software, but some wish the push notifications were faster.
    • Reviewers mention that they use Duo security to improve the security of their login process, but sometimes the login request times out too quickly.
    • Reviewers of Duo Security mention that they like how easy setup and integration is for end users.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Company Website
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    733,873 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97,323 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cisco Duo is a cloud-based access management platform that secures access to all applications, for any user and device, from anywhere. It’s designed to be easy to use and deploy while providing identi

Users
  • Software Engineer
  • Consultant
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 45% Enterprise
  • 38% Mid-Market
Cisco Duo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
90
Authentication Ease
60
Security
60
Authentication
53
Easy Access
45
Cons
Authentication Issues
32
Access Limitations
24
Login Issues
21
Notification Issues
15
Poor Notifications
12
Cisco Duo features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.0
8.8
Multi-Device Sync
Average: 8.9
9.0
Easy Setup
Average: 9.0
8.2
Backup
Average: 8.8
User Sentiment
How are these determined?Information
These insights are written by G2's Market Research team, using actual user reviews for Cisco Duo, left between September 2020 and April 2022.
  • Reviewers of Duo Security frequently cite the push notifications as being a major benefit of this software, but some wish the push notifications were faster.
  • Reviewers mention that they use Duo security to improve the security of their login process, but sometimes the login request times out too quickly.
  • Reviewers of Duo Security mention that they like how easy setup and integration is for end users.
Seller Details
Seller
Cisco
Company Website
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
733,873 Twitter followers
LinkedIn® Page
www.linkedin.com
97,323 employees on LinkedIn®
(1,052)4.6 out of 5
Optimized for quick response
4th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
100% off
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Keeper Security is transforming cybersecurity for millions of individuals and thousands of organizations globally. Built with end-to-end encryption, Keeper's intuitive cybersecurity platform is truste

    Users
    • Owner
    • IT Manager
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 46% Small-Business
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Keeper Password Manager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    183
    Security
    123
    Password Management
    97
    Secure Sharing
    94
    Sharing Ease
    81
    Cons
    Password Management
    71
    Autofill Issues
    46
    Login Issues
    39
    Browser Extension Issues
    31
    Missing Features
    31
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Keeper Password Manager features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Multi-Device Sync
    Average: 8.9
    8.7
    Easy Setup
    Average: 9.0
    8.4
    Backup
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    Chicago, IL
    Twitter
    @keepersecurity
    19,015 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    437 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Keeper Security is transforming cybersecurity for millions of individuals and thousands of organizations globally. Built with end-to-end encryption, Keeper's intuitive cybersecurity platform is truste

Users
  • Owner
  • IT Manager
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 46% Small-Business
  • 39% Mid-Market
Keeper Password Manager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
183
Security
123
Password Management
97
Secure Sharing
94
Sharing Ease
81
Cons
Password Management
71
Autofill Issues
46
Login Issues
39
Browser Extension Issues
31
Missing Features
31
Keeper Password Manager features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.0
8.8
Multi-Device Sync
Average: 8.9
8.7
Easy Setup
Average: 9.0
8.4
Backup
Average: 8.8
Seller Details
Company Website
Year Founded
2011
HQ Location
Chicago, IL
Twitter
@keepersecurity
19,015 Twitter followers
LinkedIn® Page
www.linkedin.com
437 employees on LinkedIn®
(285)4.5 out of 5
Optimized for quick response
12th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
20% off: $2.87 user / month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trusted by more than 9,000 businesses worldwide, NordPass is a password management tool that upholds the finest privacy and security standards for businesses. Unlock the ease of cybersecurity and b

    Users
    • Video Editor
    Industries
    • Information Technology and Services
    • Marketing and Advertising
    Market Segment
    • 81% Small-Business
    • 18% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NordPass Business Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    216
    Security
    119
    Sharing Ease
    112
    Secure Sharing
    104
    Sharing
    87
    Cons
    Password Management
    69
    Password Issues
    61
    Authentication Issues
    41
    Autofill Issues
    41
    Browser Extension Issues
    40
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NordPass Business features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    8.7
    Multi-Device Sync
    Average: 8.9
    8.8
    Easy Setup
    Average: 9.0
    8.3
    Backup
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2012
    HQ Location
    Global
    Twitter
    @NordPass
    9,425 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,575 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trusted by more than 9,000 businesses worldwide, NordPass is a password management tool that upholds the finest privacy and security standards for businesses. Unlock the ease of cybersecurity and b

Users
  • Video Editor
Industries
  • Information Technology and Services
  • Marketing and Advertising
Market Segment
  • 81% Small-Business
  • 18% Mid-Market
NordPass Business Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
216
Security
119
Sharing Ease
112
Secure Sharing
104
Sharing
87
Cons
Password Management
69
Password Issues
61
Authentication Issues
41
Autofill Issues
41
Browser Extension Issues
40
NordPass Business features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
8.7
Multi-Device Sync
Average: 8.9
8.8
Easy Setup
Average: 9.0
8.3
Backup
Average: 8.8
Seller Details
Company Website
Year Founded
2012
HQ Location
Global
Twitter
@NordPass
9,425 Twitter followers
LinkedIn® Page
www.linkedin.com
1,575 employees on LinkedIn®
By IBM
(139)4.3 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:$1.71 / user, per month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 66% Enterprise
    • 38% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • IBM Verify is a tool for validating the identity of people, providing an additional layer of security and facilitating user access management.
    • Users like the advanced authentication methods, including MFA and adaptive measures, the streamlined user access through single SSO, and the ease of integration with other systems.
    • Users reported difficulties in monitoring access risks, a complex learning curve, and a high cost compared to other solutions in the market.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Verify Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    37
    Ease of Use
    27
    Authentication
    25
    Identity Management
    23
    Features
    21
    Cons
    Difficult Learning
    12
    Expensive
    12
    Complexity
    9
    Complex Setup
    9
    Cost
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Verify features and usability ratings that predict user satisfaction
    8.4
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Multi-Device Sync
    Average: 8.9
    8.3
    Easy Setup
    Average: 9.0
    8.6
    Backup
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Company Website
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    711,154 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    317,108 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 66% Enterprise
  • 38% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • IBM Verify is a tool for validating the identity of people, providing an additional layer of security and facilitating user access management.
  • Users like the advanced authentication methods, including MFA and adaptive measures, the streamlined user access through single SSO, and the ease of integration with other systems.
  • Users reported difficulties in monitoring access risks, a complex learning curve, and a high cost compared to other solutions in the market.
IBM Verify Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
37
Ease of Use
27
Authentication
25
Identity Management
23
Features
21
Cons
Difficult Learning
12
Expensive
12
Complexity
9
Complex Setup
9
Cost
9
IBM Verify features and usability ratings that predict user satisfaction
8.4
Has the product been a good partner in doing business?
Average: 9.0
8.3
Multi-Device Sync
Average: 8.9
8.3
Easy Setup
Average: 9.0
8.6
Backup
Average: 8.8
Seller Details
Seller
IBM
Company Website
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
711,154 Twitter followers
LinkedIn® Page
www.linkedin.com
317,108 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Help prevent account takeovers from phishing attacks.

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 44% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Google Security Key Enforcement Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    16
    2FA Security
    5
    Ease of Use
    5
    Cross-platform
    2
    Customer Support
    2
    Cons
    Compatibility Issues
    3
    Inadequate Security
    3
    Setup Difficulties
    3
    Product Issues
    2
    Security Risks
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Security Key Enforcement features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    8.6
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,520,271 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    301,875 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Help prevent account takeovers from phishing attacks.

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 44% Small-Business
  • 35% Mid-Market
Google Security Key Enforcement Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
16
2FA Security
5
Ease of Use
5
Cross-platform
2
Customer Support
2
Cons
Compatibility Issues
3
Inadequate Security
3
Setup Difficulties
3
Product Issues
2
Security Risks
2
Google Security Key Enforcement features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
8.6
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,520,271 Twitter followers
LinkedIn® Page
www.linkedin.com
301,875 employees on LinkedIn®
Ownership
NASDAQ:GOOG
(1,362)4.7 out of 5
View top Consulting Services for 1Password
Save to My Lists
100% off: 0
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Most Used Enterprise Password Manager, trusted by over 150,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure

    Users
    • Software Engineer
    • Owner
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 60% Small-Business
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • 1Password Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    102
    Security
    77
    Intuitive
    32
    Password Management
    31
    Secure Sharing
    31
    Cons
    Password Management
    43
    Authentication Issues
    27
    Login Issues
    22
    Process Complexity
    20
    Autofill Issues
    18
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 1Password features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    1Password
    Company Website
    Year Founded
    2005
    HQ Location
    Ontario
    Twitter
    @1Password
    142,100 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,449 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Most Used Enterprise Password Manager, trusted by over 150,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure

Users
  • Software Engineer
  • Owner
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 60% Small-Business
  • 30% Mid-Market
1Password Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
102
Security
77
Intuitive
32
Password Management
31
Secure Sharing
31
Cons
Password Management
43
Authentication Issues
27
Login Issues
22
Process Complexity
20
Autofill Issues
18
1Password features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
10.0
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.8
Seller Details
Seller
1Password
Company Website
Year Founded
2005
HQ Location
Ontario
Twitter
@1Password
142,100 Twitter followers
LinkedIn® Page
www.linkedin.com
2,449 employees on LinkedIn®
(21)4.7 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Yubico YubiKey is a small USB and NFC device that support multiple authentication and cryptographic protocols it protects access to computers, networks, and online services for the organizations.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Enterprise
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Yubico Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Security
    3
    2FA Security
    2
    Cross-platform
    2
    Daily Use
    2
    Cons
    Authentication Issues
    1
    Complex Setup
    1
    Difficult Setup
    1
    Expensive
    1
    Expertise Required
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Yubico features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    10.0
    Easy Setup
    Average: 9.0
    10.0
    Backup
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Yubico
    Company Website
    Year Founded
    2007
    HQ Location
    Palo Alto, CA
    Twitter
    @Yubico
    39,105 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    521 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Yubico YubiKey is a small USB and NFC device that support multiple authentication and cryptographic protocols it protects access to computers, networks, and online services for the organizations.

Users
No information available
Industries
No information available
Market Segment
  • 38% Enterprise
  • 33% Small-Business
Yubico Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Security
3
2FA Security
2
Cross-platform
2
Daily Use
2
Cons
Authentication Issues
1
Complex Setup
1
Difficult Setup
1
Expensive
1
Expertise Required
1
Yubico features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
10.0
Easy Setup
Average: 9.0
10.0
Backup
Average: 8.8
Seller Details
Seller
Yubico
Company Website
Year Founded
2007
HQ Location
Palo Alto, CA
Twitter
@Yubico
39,105 Twitter followers
LinkedIn® Page
www.linkedin.com
521 employees on LinkedIn®
(285)4.4 out of 5
9th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:$6 /User /Month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin e

    Users
    • Account Manager
    Industries
    • Computer Software
    • Education Management
    Market Segment
    • 49% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OneLogin Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Single Sign-On
    12
    SSO (Single Sign-On)
    10
    Easy Access
    7
    Easy Integrations
    6
    Cons
    Bugs
    4
    Connection Issues
    4
    Error Handling
    4
    Login Issues
    4
    Authentication Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OneLogin features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.5
    Multi-Device Sync
    Average: 8.9
    9.1
    Easy Setup
    Average: 9.0
    9.5
    Backup
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • User Sentiment
    How are these determined?Information
    These insights are written by G2's Market Research team, using actual user reviews for OneLogin, left between February 2021 and April 2022.
    • Reviewers commonly cite that they use OneLogin to improve their security.
    • Reviewers appreciate the single-tap and ease of access to apps.
    • Reviewers mention that OneLogin support is quick and professional.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OneLogin
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @OneLogin
    14,817 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    72 employees on LinkedIn®
    Phone
    (855) 426-7227
Product Description
How are these determined?Information
This description is provided by the seller.

OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin e

Users
  • Account Manager
Industries
  • Computer Software
  • Education Management
Market Segment
  • 49% Mid-Market
  • 40% Enterprise
OneLogin Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Single Sign-On
12
SSO (Single Sign-On)
10
Easy Access
7
Easy Integrations
6
Cons
Bugs
4
Connection Issues
4
Error Handling
4
Login Issues
4
Authentication Issues
3
OneLogin features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
9.5
Multi-Device Sync
Average: 8.9
9.1
Easy Setup
Average: 9.0
9.5
Backup
Average: 8.8
User Sentiment
How are these determined?Information
These insights are written by G2's Market Research team, using actual user reviews for OneLogin, left between February 2021 and April 2022.
  • Reviewers commonly cite that they use OneLogin to improve their security.
  • Reviewers appreciate the single-tap and ease of access to apps.
  • Reviewers mention that OneLogin support is quick and professional.
Seller Details
Seller
OneLogin
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@OneLogin
14,817 Twitter followers
LinkedIn® Page
www.linkedin.com
72 employees on LinkedIn®
Phone
(855) 426-7227
(328)4.9 out of 5
15th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Frontegg is the only solution that provides robust and scalable user management infrastructure for B2B SaaS, handling the full user journey, from signup to subscription. The platform is multi-tenant a

    Users
    • Software Engineer
    • CTO
    Industries
    • Computer Software
    • Computer & Network Security
    Market Segment
    • 56% Small-Business
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Frontegg Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    39
    Features
    26
    Easy Integrations
    22
    Customer Support
    21
    Integrations
    19
    Cons
    Missing Features
    13
    Poor Documentation
    10
    Lack of Information
    8
    Outdated Documentation
    8
    Integration Issues
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Frontegg features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    9.6
    Multi-Device Sync
    Average: 8.9
    9.5
    Easy Setup
    Average: 9.0
    9.5
    Backup
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Mountain View, California, United States
    Twitter
    @FronteggForSaaS
    423 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    78 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Frontegg is the only solution that provides robust and scalable user management infrastructure for B2B SaaS, handling the full user journey, from signup to subscription. The platform is multi-tenant a

Users
  • Software Engineer
  • CTO
Industries
  • Computer Software
  • Computer & Network Security
Market Segment
  • 56% Small-Business
  • 31% Mid-Market
Frontegg Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
39
Features
26
Easy Integrations
22
Customer Support
21
Integrations
19
Cons
Missing Features
13
Poor Documentation
10
Lack of Information
8
Outdated Documentation
8
Integration Issues
7
Frontegg features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
9.6
Multi-Device Sync
Average: 8.9
9.5
Easy Setup
Average: 9.0
9.5
Backup
Average: 8.8
Seller Details
Company Website
Year Founded
2019
HQ Location
Mountain View, California, United States
Twitter
@FronteggForSaaS
423 Twitter followers
LinkedIn® Page
www.linkedin.com
78 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Two-Factor Authentication smartphone app for consumers, simplest 2fa Rest API for developers and a strong authentication platform for the enterprise.

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 62% Small-Business
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Twilio Verify API Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    3
    Ease of Use
    3
    Security
    3
    Easy Integrations
    2
    Automation
    1
    Cons
    Expensive
    3
    Authentication Issues
    1
    Difficult Learning Process
    1
    Poor Documentation
    1
    Poor Navigation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Twilio Verify API features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Multi-Device Sync
    Average: 8.9
    9.5
    Easy Setup
    Average: 9.0
    9.3
    Backup
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • User Sentiment
    How are these determined?Information
    These insights are written by G2's Market Research team, using actual user reviews for Twilio Verify API, left between December 2020 and December 2021.
    • Reviewers like that they can use Authy for multi-factor authentication across multiple devices.
    • Reviewers of Authy enjoy that there is a desktop and mobile app of the product, but cite that text on the mobile widget is small and sometimes the mobile app crashes.
    • Reviewers like that codes are backed up to the cloud.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Twilio
    Year Founded
    2008
    HQ Location
    San Francisco, CA
    Twitter
    @twilio
    82,196 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,348 employees on LinkedIn®
    Ownership
    NYSE: TWLO
Product Description
How are these determined?Information
This description is provided by the seller.

Two-Factor Authentication smartphone app for consumers, simplest 2fa Rest API for developers and a strong authentication platform for the enterprise.

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 62% Small-Business
  • 32% Mid-Market
Twilio Verify API Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
3
Ease of Use
3
Security
3
Easy Integrations
2
Automation
1
Cons
Expensive
3
Authentication Issues
1
Difficult Learning Process
1
Poor Documentation
1
Poor Navigation
1
Twilio Verify API features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
9.4
Multi-Device Sync
Average: 8.9
9.5
Easy Setup
Average: 9.0
9.3
Backup
Average: 8.8
User Sentiment
How are these determined?Information
These insights are written by G2's Market Research team, using actual user reviews for Twilio Verify API, left between December 2020 and December 2021.
  • Reviewers like that they can use Authy for multi-factor authentication across multiple devices.
  • Reviewers of Authy enjoy that there is a desktop and mobile app of the product, but cite that text on the mobile widget is small and sometimes the mobile app crashes.
  • Reviewers like that codes are backed up to the cloud.
Seller Details
Seller
Twilio
Year Founded
2008
HQ Location
San Francisco, CA
Twitter
@twilio
82,196 Twitter followers
LinkedIn® Page
www.linkedin.com
6,348 employees on LinkedIn®
Ownership
NYSE: TWLO
(63)4.8 out of 5
Optimized for quick response
7th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Descope is a drag & drop customer authentication and identity management platform. Our no / low code CIAM solution helps organizations easily create and customize their entire user journey using v

    Users
    • CTO
    Industries
    • Computer Software
    • Computer & Network Security
    Market Segment
    • 87% Small-Business
    • 13% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Descope Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    41
    Customer Support
    36
    Easy Integrations
    27
    Implementation Ease
    22
    Authentication
    21
    Cons
    Missing Features
    13
    Poor Documentation
    7
    Learning Curve
    6
    Difficult Learning
    5
    Lack of Information
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Descope features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Multi-Device Sync
    Average: 8.9
    9.7
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Descope
    Company Website
    Year Founded
    2022
    HQ Location
    Los Altos, California
    Twitter
    @descopeinc
    477 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Descope is a drag & drop customer authentication and identity management platform. Our no / low code CIAM solution helps organizations easily create and customize their entire user journey using v

Users
  • CTO
Industries
  • Computer Software
  • Computer & Network Security
Market Segment
  • 87% Small-Business
  • 13% Mid-Market
Descope Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
41
Customer Support
36
Easy Integrations
27
Implementation Ease
22
Authentication
21
Cons
Missing Features
13
Poor Documentation
7
Learning Curve
6
Difficult Learning
5
Lack of Information
5
Descope features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 9.0
10.0
Multi-Device Sync
Average: 8.9
9.7
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Seller
Descope
Company Website
Year Founded
2022
HQ Location
Los Altos, California
Twitter
@descopeinc
477 Twitter followers
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®

Learn More About Multi-Factor Authentication (MFA) Software

What You Should Know About Multi-Factor Authentication (MFA) Software


What is Multi-Factor Authentication (MFA) Software?

The main purpose of using multi-factor authentication (MFA) software is for increased security when users log in to accounts. Companies use this software to ensure only authorized users—such as employees, contractors, or customers have secure access to specific company accounts. This helps prevent both insider threats, such as unauthorized employees from accessing sensitive data, and external threats, like cybercriminals deploying phishing attacks for data breaches, from accessing restricted accounts. 

MFA requires users to complete additional authentication steps to prove their identity prior to being granted access to applications, systems, or sensitive information. The software helps secure accounts by providing additional security using a layered, multi-step authentication approach. Generally, the first step to authenticate a user’s identity includes a standard username and password login process. After this initial login attempt, the second step might require users to enter a code provided by a software app on a mobile device, a hardware token like a key fob, or a code sent to a user via (SMS) text message, email, or phone call. Other authentication steps might include presenting a biometric like a fingerprint or a faceprint, or presenting other identifying signals like the user’s typical IP address, their device ID, or via behavioral factors verified by risk-based authentication (RBA) tools.

What Does MFA Stand For?

MFA stands for multi-factor authentication. It requires two or more different authentication factors. This software may also be referred to as two-factor authentication (2FA) or two-step verification when employing exactly two different authentication factors. 

What are the factors of authentication?

MFA software requires users to authenticate with some or all of the following five factors:

Single-factor authentication: Single-factor authentication requires users to authenticate with something they know. The most common single-factor authentication is password-based authentication. This is considered insecure because many people use weak passwords or passwords that are easily compromised.

Two-factor authentication: Two-factor authentication requires users to authenticate with something they have. It requires users to provide the information they have, usually, a code provided by an authenticator app on their mobile devices, SMS or text message, software token (soft token), or hardware token (hard token). The code provided can be either an HMAC-based one-time password (HOTP) which does not expire until used, or a time-based one-time password (TOTP) that expires in 30 seconds.

Three-factor authentication: Three-factor authentication requires users to authenticate with what they are. It takes into account something unique to the user such as biometric factors. They can include fingerprint scans, finger geometry, palmprint or hand geometry scans, and facial recognition. Using biometrics for authentication is becoming increasingly common as biometric logins on mobile devices, including facial recognition software and fingerprint scanning capabilities, have gained in popularity among consumers. Other biometric authentication methods, such as ear shape recognition, voiceprints, retina scans, iris scans, DNA, odor identity, gait patterns, vein patterns, handwriting and signature analysis, and typing recognition, have not yet been widely commercialized for MFA purposes.

Four-factor authentication: Four-factor authentication requires users to authenticate with where they are and when. It considers a user’s geographic location and the time it took for them to get there. Usually, these authentication methods do not require a user to actively authenticate this information, instead, this runs in the background when determining a specific user’s authentication risk. Four-factor authentication verifies a user’s geolocation, which points to where they currently are and their geo-velocity, which is the reasonable amount of time it takes for a person to travel to a given location. For example, if a user authenticates with an MFA software provider in Chicago and 10 minutes later attempts to authenticate from Moscow, there is a security issue.

Five-factor authentication: Five-factor authentication requires users to authenticate with something they do. It relates to specific gestures or touch patterns that users generate. For example, using a touch-screen enabled with a relatively new OS, that supports the feature, users can create a picture password where they draw circles, straight lines, or tap an image to create a unique gesture password.

What Types of Multi-Factor Authentication (MFA) Software Exist?

There are several kinds of MFA software. In addition to standard MFA functionality, many companies are moving toward RBA software, also known as intelligent MFA, which uses risk monitoring to determine when to request users for authentication. The different types of authentication methods can include:

Mobile apps: A common way users prefer to authenticate is using MFA software’s mobile app.

Software token: Software tokens enable users to use MFA mobile apps including wearable devices. Using software tokens is considered more secure than using OTP via SMS, since these messages can be intercepted by hackers. Software tokens can be used when offline, making it convenient for end users who may not have access to the internet.

Push notifications: Push notifications make authentication simple for end users. A notification is sent to a user’s mobile device asking them to approve or deny the authentication request. Convenience is crucial for user adoption of MFA tools.

Hardware token: Hardware tokens are pieces of hardware users carry with them to authenticate their identity. Examples include OTP key fobs, USB devices, and smart cards. Common issues with hardware tokens include the hardware’s expense plus the added cost of replacements when users lose them.

One-time passwords (OTP) via SMS, voice, or email: Users who can’t use mobile apps on their phones can opt to use OTP sent to their mobile devices via SMS text message, voice call, or email. However, receiving authentication codes via SMS is considered one of the least secure ways to authenticate users.

Risk-based authentication (RBA) software: RBA, also known as intelligent or adaptive MFA, uses real-time information about end users to evaluate their risk and prompt them to authenticate when needed. RBA software analyzes IP addresses, devices, behaviors, and identities to set personalized authentication methods for each distinct user attempting to access the network. 

Passwordless authentication: Passwordless authentication, also known as invisible authentication, relies on RBA factors such as location, IP address, and other user behaviors. Push notifications are considered passwordless authentication, as a user is not required to enter a code, but merely asked to accept or reject an authentication request.

Biometrics: Biometric authentication factors, such as facial and fingerprint recognition, are gaining popularity among consumers, and therefore, MFA software providers are beginning to support them. Currently, other biometric factors, such as iris scanning, are not available in MFA tools. One issue with using biometrics for authentication is that once they are compromised, they are compromised forever.

MFA as a service: Tying in with a company’s cloud-based directories, some MFA providers offer cloud-based MFA as a service solution. These often support multiple authentication methods including push notifications, software tokens, hardware tokens, online and offline authentication, and biometrics.

On-premises MFA: On-premises MFA solutions run on a company’s server. Many software vendors are phasing out these kinds of MFA solutions and pushing customers to cloud-based solutions.

Offline-available MFA: Users who need to authenticate, but do not have access to the internet, can use MFA solutions with offline support. For example, many federal employees work in controlled, secure environments and might not have access to the internet. Federal government civilian employees might use personal identity verification (PIV) cards to authenticate, while the Department of Defense employees authenticate using a common access card (CAC). For general civilians, they can authenticate offline using a mobile app with offline access to OTPs or one that uses a hardware-based U2F security key. 

Enterprise solutions: Companies that manage MFA deployments to many users need robust solutions and will opt for software with administrator consoles, endpoint visibility, and connect with single sign-on (SSO) software.

What are the Common Features of Multi-Factor Authentication (MFA) Software?

The following are some core features within MFA software that can help users authenticate via multiple modalities.

Multiple authentication methods: To meet diverse needs, end users may like to authenticate in different ways. These might include OTPs sent via SMS, voice, email, push notifications sent to mobile devices, biometrics like fingerprints or facial recognition, hardware tokens such as key fobs, or fast identity online (FIDO) devices. Different software offer various kinds of authentication methods. It’s important to consider what type of authentication would work best for a specific organization.

Supports access types: Ensuring MFA software works with a company’s existing cloud applications, local and remote desktops, web, VPN, and other applications is important.

Prebuilt APIs: Developers adding MFA software in their applications may seek a provider with a prebuilt API for ease of development. Many software providers offer branded MFA functionality to maintain the look and feel of a developer’s own applications.

Supports FIDO protocols: FIDO is a set of protocols based on public-key encryption created by the FIDO Alliance that is more secure than OTPs. FIDO supports authentication of almost any type, including USB, near-field communication (NFC), and Bluetooth. FIDO protocols are the basis of passwordless authentication.

Self-registration and self-help portals: Positive user experience is critical for end-user adoption of MFA software. Many providers offer self-registration processes for end users, as well as self-service portals which save the deployment team’s time.

Administrator tools: Administrators need tools to help them be most effective in deploying MFA software, as well as meeting company policies. Some MFA providers allow administrators to limit MFA to specific IP addresses or applications and specific geographical or secure locations. Many MFA tools have policy settings that restrict end users from using jailbroken devices. When employees leave or change roles, some MFA providers offer automatic deprovisioning features.

Other Features of Multi-Factor Authentication Software: Backup Capabilities, Biometric Factor Capabilities, Compound Capabilities, Email Capabilities, Hardware Capabilities, Mobile SDK Capabilities, Multi-Device Sync Capabilities, Phone Capabilities, Point Capabilities, Risk-based Capabilities, SMS Capabilities, Voice-Based Telephony Capabilities, Web SDK Capabilities

What are the Benefits of Multi-Factor Authentication (MFA) Software?

Security: The main purpose of MFA software is for increased security when logging in to accounts. Companies use this software to ensure that only authorized users can log on and have access to specific company accounts. This helps the company prevent both insider threats, such as unauthorized employees, and external threats, like hackers, from accessing restricted accounts.

Simplified login processes: Another reason businesses use MFA software is to simplify login processes for their employees. Passwords can be a hassle and are not enough to secure an account anymore. Considering the number of accounts users have, many people struggle to remember their passwords and reuse weak or compromised passwords across multiple accounts. Because of password fatigue, companies need ways to secure their employees' accounts while keeping the process simple for end users. MFA can reduce, and in some instances entirely remove the need for passwords.

Improve customer experience: Developers use MFA software to increase security while simplifying login processes for their customers by embedding MFA tools in their applications. Trust is paramount for a company's success, so encouraging customers and other end users to secure their accounts is essential. Application developers are increasingly implementing MFA in the design of their applications.

Save time for helpdesk teams: MFA software also improves productivity for help desk teams who deploy these tools to employees. Many of these tools are easy to install and have simple interfaces, contributing to widespread adoption. Many include self-help tools that free up help desk team members' time.

Meet regulatory compliance: Some regulatory compliance rules, such as payment processing and healthcare regulations, require that MFA software be set up on user accounts.

Who Uses Multi-Factor Authentication (MFA) Software?

Everyone--from individual users to company employees and customers--should use MFA software to protect their accounts. It is even more important to use it to secure email accounts and password vaults to reduce the risk of being hacked. There are free versions of MFA software available for individuals and light users, as well as enterprise-level software available with added functionality for corporate deployments.

Individuals: individuals use MFA software to protect their personal accounts including email, password vaults, social media, banking, and other apps.

Administrators: Administrators or help desk technicians deploy MFA software to their colleagues. With large deployments, many administrators seek an MFA solution that provides a robust administrator platform to help with provisioning, deprovisioning, and setting risk policies.

End users: End users, like company employees or customers, use MFA software on a daily basis. Accessible solutions with easy usability increase the adoption of these tools, improving security. Presently, many MFA software deployments utilize mobile device applications in the process.

Developers: Developers, engineers, and product teams use MFA software to ensure the applications they’ve built are secure for end users. While some developers might choose to build their own MFA software, many are embedding existing MFA software solutions in their apps using APIs that allow developers’ software to integrate with the MFA software.

Software Related to Multi-Factor Authentication (MFA) Software

Related solutions include:

Passwordless authentication software: Passwordless authentication is a type of MFA software that eliminates a password as an authentication type. Instead of using passwords (something the user knows), passwordless authentication relies on authenticating a user via other means, such as something a user has (like a trusted mobile device or a hardware security key) and something that they are (for example, scanning their fingerprint).

Biometric authentication software: Biometric authentication software is a type of MFA software that helps improve security for networks, applications, and physical locations by requiring biometric factors as an additional access qualifier. Biometric authentication tools utilize physical characteristics including facial, fingerprint, or voice recognition, to verify a user’s identity.

Risk-based authentication software: RBA software is a type of MFA software that analyzes contextual factors like the user’s IP addresses, devices, behaviors, and identities to set customized authentication methods for each individual user attempting to access the network. Non-suspicious users accessing applications from known devices, locations, and networks may be automatically signed in. Suspicious users may be required to provide step-up authentication methods, such as inputting an SMS code, biometric verification, or email confirmation actions to properly verify their identity.

Single sign-on (SSO) software: SSO software is an authentication tool that provides users with access to multiple applications or datasets without requiring multiple logins through the use of federation. Many SSO solutions have MFA functionality native within their software.

Identity and access management (IAM) software: IAM software authenticates workforce users, provides access to systems and data, tracks user activity, and provides reporting tools to ensure employees comply with company policies. MFA is one component of this software.

Customer identity and access management (CIAM) software: Businesses use CIAM software to manage customer user identities and offer those customers a secure, seamless login experience for the company’s websites, applications, and other online services. MFA is one component of this software. CIAM software also allows businesses to manage customer identities, preferences, and profile information at scale. These solutions enable customers to self register for services, login and authenticate, and manage their own user profiles, including consent and other preferences.

Identity verification software: Businesses verify user identities to create trust online and offline, prevent identity fraud, and comply with privacy and anti-fraud regulations using identity verification software. This is different from authentication. With identity verification, companies are trying to verify who an unknown person is (1:N match). With authentication, however, a company is trying to ensure that the person logging in is indeed the known person they already know (1:1 match).

Challenges with Multi-Factor Authentication (MFA) Software

MFA methods: It is important to choose the best MFA methods for the workforce. For example, if the workforce cannot carry mobile phones to their job sites—such as those in manufacturing, healthcare, or government roles—businesses must consider using a hardware token. If the workforce often needs to authenticate themselves while they are not online, businesses should choose a solution that allows offline authentication. 

User adoption: Unlike many security tools that information security professionals deploy in the background, MFA tools are used by everyday users. It is important to properly train employees and ensure they understand how to use these tools.

Which Companies Should Buy Multi-Factor Authentication (MFA) Software?

All companies that have end users accessing important company resources should authenticate their users’ identities prior to granting access. Given that usernames and passwords are easily hacked, having a second or third form of authentication is advisable. 

All companies: Any company that wants to ensure that only verified, permissioned people--such as employees, contractors, or customers--have access to company accounts.

Regulated industries: While all companies should secure their resources, companies operating in regulated industries may be required by industry standards or law to do so. For example, many businesses that process credit card payments are subject to the Payment Card Industry Data Security Standard (PCI DSS) compliance standards that require MFA on their accounts. Similarly, the European Union Payment Services Directive requires strong customer authentication for electronic payments. Additionally, other bodies, such as the Health Insurance Portability and Accountability Act (HIPAA) for healthcare and the Sarbanes-Oxley Act (SOX) for finance and accounting, require strong authentication processes.

How to Buy Multi-Factor Authentication (MFA) Software

Requirements Gathering (RFI/RFP) for Multi-Factor Authentication (MFA) Software

As the buyer develops their list of requirements and priorities for selecting MFA software, they must keep these items in mind:

End user use cases: Determining the company’s end-user use cases is essential. The buyer should also classify the users they are trying to authenticate--are they employees, contractors, or customers? For example, employees may be able to use authentication methods such as hardware tokens and biometrics, while customers might rely on in-app mobile pushes or OTPs sent via email, SMS, or phone. 

Authentication methods: The buyer must determine the types of authentication methods that will and will not work for their end users. Are there limitations on the types of factors that the employees can use? For example, if employees in a manufacturing facility or healthcare unit cannot carry a mobile phone with them, authentication factors requiring a mobile device may not be suitable.

Licenses needed: Buyers must determine how many licenses are needed for their end users and if there are different license types based on user type.

Business segment or region-specific solution: If someone is looking for software tailored to the small businesses segment versus mid-market or enterprise segments, they have to be clear in their RFP about this. Similarly, if the buyer needs a tool that works well in a specific geographical region or language, they should include it in their RFP.

Integrations: The buyer must determine which integrations are important to their company.

Timeline: The company must decide how quickly they need to implement the solution.

Level of support: Buyers should know if they require high-quality support or if they prefer implementing the solution in house.

Compare Multi-Factor Authentication (MFA) Software Products

Create a long list

There are hundreds of MFA solutions available on the market, which can be daunting to sift through. It is best to narrow the list of potential vendors based on the features that are most important to the organization, such as the type of authentication available to end users. 

Buyers can review MFA products on g2.com, where they can search by languages supported, features such as authentication type, and whether the solution is a point solution for MFA or if MFA is a part of a more comprehensive identity product. Once the buyer has narrowed down the product selection, they can save them in the “My List” on g2.com.

Create a short list

After storing the long list of potential MFA products, the list further can be further narrowed down by reading user reviews, checking the product’s ranking on the G2 Grid® report for the Multi-Factor Authentication (MFA) software category, and reading usability ratings.

Conduct demos

After researching the options, it is time to conduct demos to ask detailed questions of the vendor and ensure it meets particular business needs. Potential buyers can contact many vendors directly on g2.com to request demos by selecting the “Get a quote” button. At each demo, buyers must be sure to ask the same questions and use case scenarios to best evaluate each product. 

Selection of Multi-Factor Authentication (MFA) Software

Choose a selection team

The software selection team should be a handful of people representing different areas of the business. Personas should include the ultimate decision maker, IT or security administrators, and end users. It is important to include at least one end user on the selection team because end-user adoption is critical to the success of this software solution.

Negotiation

When negotiating a contract, typically longer length contracts and larger license counts can improve discounting. 

Final decision

Prior to making a final decision on which tool to purchase, buyers should ask the vendor if they offer a trial period to test with a small number of users before going all in on the product. If the tool is well received by end users and administrators, businesses can feel more confident in their purchase.