Best Software for 2025 is now live!

Best Multi-Factor Authentication (MFA) Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Multi-factor authentication (MFA) software secures users’ accounts by requiring them to prove their identity in two or more ways before granting access to accounts, sensitive information, systems, or applications. In addition to a single authentication factor, such as inputting a username and password, users are prompted to provide a second authentication factor to validate who the user says they are. Examples of authentication factors include one-time passcodes (OTPs) for SMS, email, or phone call, software tokens, hardware tokens, which are commonly small thumb drives or keycards, mobile-push on a software application to a mobile device, biometric factors, and contextual or risk-based authentication.

Businesses use MFA tools for security purposes to confirm a user is who they say they are prior to accessing privileged information or applications. This software can help companies prevent internal theft or data loss, as well as external access from unapproved parties. MFA tools are traditionally used by businesses, but they can also be used by individuals hoping to improve security on their personal devices or online accounts.

Risk-based authentication software is a form of MFA, but achieves authentication through different means by taking into account factors such as the user’s geolocation, IP address, IP address reputation, time since last authentication, device posture, device management, and other factors to determine the user’s authentication and risk. Passwordless authentication software is a form of MFA as well, which eliminates passwords as an authentication factor, instead relying on additional factors to authenticate a user.

MFA software can be sold as a point solution, where it can be integrated with a business’ user accounts, or it can be sold as part of a compound solution, typically in identity products, such as workforce-based identity and access management (IAM) software or customer-based customer identity and access management (CIAM) solutions.

To qualify for inclusion in the Multi-Factor Authentication (MFA) category, a product must:

Utilize a secondary authentication method such as OTPs, mobile push, software token, hardware token, biometric factors, or more
Prompt authentication from a user
Allow for triggered MFA for new users and devices

Best Multi-Factor Authentication (MFA) Software At A Glance

Best for Small Businesses:
Best for Mid-Market:
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:
Show LessShow More
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
257 Listings in Multi-Factor Authentication (MFA) Available
By HYPR
(14)4.5 out of 5
14th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:$3.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HYPR, the leader in passwordless identity assurance, delivers the industry's most comprehensive end-to-end identity security for your workforce and customers. By unifying phishing-resistant passwor

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • HYPR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Customer Support
    6
    Easy Access
    4
    Integrations
    4
    Customer Experience
    3
    Cons
    System Errors
    3
    Account Management
    2
    Complexity
    2
    Connectivity Issues
    2
    Limited Access
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HYPR features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    9.3
    Multi-Device Sync
    Average: 8.9
    9.4
    Easy Setup
    Average: 9.0
    8.1
    Backup
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    HYPR
    Company Website
    Year Founded
    2014
    HQ Location
    New York, NY
    Twitter
    @HyprCorp
    16,676 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    121 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HYPR, the leader in passwordless identity assurance, delivers the industry's most comprehensive end-to-end identity security for your workforce and customers. By unifying phishing-resistant passwor

Users
No information available
Industries
No information available
Market Segment
  • 57% Mid-Market
  • 29% Enterprise
HYPR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Customer Support
6
Easy Access
4
Integrations
4
Customer Experience
3
Cons
System Errors
3
Account Management
2
Complexity
2
Connectivity Issues
2
Limited Access
2
HYPR features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
9.3
Multi-Device Sync
Average: 8.9
9.4
Easy Setup
Average: 9.0
8.1
Backup
Average: 8.8
Seller Details
Seller
HYPR
Company Website
Year Founded
2014
HQ Location
New York, NY
Twitter
@HyprCorp
16,676 Twitter followers
LinkedIn® Page
www.linkedin.com
121 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ensure users have convenient, secure access—from any device, anywhere—to the applications they need, whether in the cloud or on-premises. RSA SecurID Access is an enterprise-grade multi-factor authent

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 68% Enterprise
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RSA SecureID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Security
    3
    Ease of Use
    3
    Security
    3
    Risk Assessment
    2
    Access Control
    1
    Cons
    2FA Issues
    1
    Authentication Issues
    1
    Connectivity Issues
    1
    Data Security
    1
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RSA SecureID features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    8.5
    Multi-Device Sync
    Average: 8.9
    9.0
    Easy Setup
    Average: 9.0
    7.4
    Backup
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Bedford, MA
    Twitter
    @RSAsecurity
    113,554 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,775 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ensure users have convenient, secure access—from any device, anywhere—to the applications they need, whether in the cloud or on-premises. RSA SecurID Access is an enterprise-grade multi-factor authent

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 68% Enterprise
  • 27% Mid-Market
RSA SecureID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Security
3
Ease of Use
3
Security
3
Risk Assessment
2
Access Control
1
Cons
2FA Issues
1
Authentication Issues
1
Connectivity Issues
1
Data Security
1
Expensive
1
RSA SecureID features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
8.5
Multi-Device Sync
Average: 8.9
9.0
Easy Setup
Average: 9.0
7.4
Backup
Average: 8.8
Seller Details
HQ Location
Bedford, MA
Twitter
@RSAsecurity
113,554 Twitter followers
LinkedIn® Page
www.linkedin.com
2,775 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(40)4.7 out of 5
11th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Powerful authentication and user management for modern applications. Created by founders and engineers to help your business generate more revenue, reduce costs, and make lifelong loyal customers –

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kinde Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    27
    Customer Support
    22
    Easy Setup
    16
    Authentication
    15
    Pricing
    15
    Cons
    Missing Features
    15
    Limited Features
    7
    Poor Documentation
    4
    Authentication Issues
    3
    Insufficient Information
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kinde features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    10.0
    Easy Setup
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kinde
    Year Founded
    2021
    HQ Location
    Sydney, AU
    Twitter
    @HeyKinde
    7,747 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Powerful authentication and user management for modern applications. Created by founders and engineers to help your business generate more revenue, reduce costs, and make lifelong loyal customers –

Users
No information available
Industries
  • Computer Software
Market Segment
  • 100% Small-Business
Kinde Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
27
Customer Support
22
Easy Setup
16
Authentication
15
Pricing
15
Cons
Missing Features
15
Limited Features
7
Poor Documentation
4
Authentication Issues
3
Insufficient Information
3
Kinde features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
10.0
Easy Setup
Average: 9.0
0.0
No information available
Seller Details
Seller
Kinde
Year Founded
2021
HQ Location
Sydney, AU
Twitter
@HeyKinde
7,747 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative agen

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Silverfort features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Multi-Device Sync
    Average: 8.9
    8.6
    Easy Setup
    Average: 9.0
    5.0
    Backup
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Tel Aviv, Israel
    Twitter
    @silverfort
    583 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    404 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative agen

Users
No information available
Industries
No information available
Market Segment
  • 47% Small-Business
  • 35% Mid-Market
Silverfort features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
8.3
Multi-Device Sync
Average: 8.9
8.6
Easy Setup
Average: 9.0
5.0
Backup
Average: 8.8
Seller Details
Year Founded
2016
HQ Location
Tel Aviv, Israel
Twitter
@silverfort
583 Twitter followers
LinkedIn® Page
www.linkedin.com
404 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AuthPoint MFA: designed to be fatigue-resistant with features like the phishing toggle that prevent a faulty user experience. With offline and online authentication methods available, you can easily e

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 50% Small-Business
    • 46% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • WatchGuard AuthPoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WatchGuard AuthPoint features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Multi-Device Sync
    Average: 8.9
    8.8
    Easy Setup
    Average: 9.0
    8.8
    Backup
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1996
    HQ Location
    Seatle, WA
    Twitter
    @watchguard
    19,933 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,082 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AuthPoint MFA: designed to be fatigue-resistant with features like the phishing toggle that prevent a faulty user experience. With offline and online authentication methods available, you can easily e

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 50% Small-Business
  • 46% Mid-Market
WatchGuard AuthPoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Cons
This product has not yet received any negative sentiments.
WatchGuard AuthPoint features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.0
9.4
Multi-Device Sync
Average: 8.9
8.8
Easy Setup
Average: 9.0
8.8
Backup
Average: 8.8
Seller Details
Year Founded
1996
HQ Location
Seatle, WA
Twitter
@watchguard
19,933 Twitter followers
LinkedIn® Page
www.linkedin.com
1,082 employees on LinkedIn®
Entry Level Price:$49.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Add multi-factor and passwordless authentication to your site today.

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 43% Mid-Market
    • 41% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Authentiq Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    77
    Security
    61
    Authentication
    40
    Passwordless Authentication
    34
    Reliability
    32
    Cons
    Expensive
    17
    Compatibility Issues
    13
    Difficult Setup
    13
    Security Issues
    12
    Limited Compatibility
    11
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Authentiq features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.0
    8.2
    Multi-Device Sync
    Average: 8.9
    8.3
    Easy Setup
    Average: 9.0
    8.1
    Backup
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Authentiq
    Year Founded
    2015
    HQ Location
    Utrecht, NL
    Twitter
    @AuthentiqID
    122 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Add multi-factor and passwordless authentication to your site today.

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 43% Mid-Market
  • 41% Small-Business
Authentiq Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
77
Security
61
Authentication
40
Passwordless Authentication
34
Reliability
32
Cons
Expensive
17
Compatibility Issues
13
Difficult Setup
13
Security Issues
12
Limited Compatibility
11
Authentiq features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.0
8.2
Multi-Device Sync
Average: 8.9
8.3
Easy Setup
Average: 9.0
8.1
Backup
Average: 8.8
Seller Details
Seller
Authentiq
Year Founded
2015
HQ Location
Utrecht, NL
Twitter
@AuthentiqID
122 Twitter followers
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®
(102)4.5 out of 5
10th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Socure’s patented machine learning platform powers an elevated standard for seamless CIP/KYC compliance, fraud detection, ID document verification, and bank account ownership validation through a purp

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 52% Mid-Market
    • 32% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Socure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Customer Support
    3
    Detection Efficiency
    3
    Efficiency
    3
    ID Verification
    3
    Cons
    False Positives
    2
    Lack of Clarity
    2
    Missing Features
    2
    Account Management
    1
    Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Socure features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Socure
    Year Founded
    2012
    HQ Location
    Incline Village, Nevada
    Twitter
    @socureme
    6,950 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    448 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Socure’s patented machine learning platform powers an elevated standard for seamless CIP/KYC compliance, fraud detection, ID document verification, and bank account ownership validation through a purp

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 52% Mid-Market
  • 32% Small-Business
Socure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Customer Support
3
Detection Efficiency
3
Efficiency
3
ID Verification
3
Cons
False Positives
2
Lack of Clarity
2
Missing Features
2
Account Management
1
Complexity
1
Socure features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Socure
Year Founded
2012
HQ Location
Incline Village, Nevada
Twitter
@socureme
6,950 Twitter followers
LinkedIn® Page
www.linkedin.com
448 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Security and great experiences needn’t be mutually exclusive. You can give your customers both with Entersekt’s innovative authentication technology, trusted by over 100 financial institutions in more

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 67% Mid-Market
    • 42% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Entersekt Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Management
    1
    Customer Support
    1
    Easy Integrations
    1
    Fraud Prevention
    1
    Reliability
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Entersekt features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    9.6
    Backup
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Entersekt
    Year Founded
    2008
    HQ Location
    Atlanta, US
    Twitter
    @Entersekt
    1,012 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    245 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Security and great experiences needn’t be mutually exclusive. You can give your customers both with Entersekt’s innovative authentication technology, trusted by over 100 financial institutions in more

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 67% Mid-Market
  • 42% Enterprise
Entersekt Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Management
1
Customer Support
1
Easy Integrations
1
Fraud Prevention
1
Reliability
1
Cons
This product has not yet received any negative sentiments.
Entersekt features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
9.2
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
9.6
Backup
Average: 8.8
Seller Details
Seller
Entersekt
Year Founded
2008
HQ Location
Atlanta, US
Twitter
@Entersekt
1,012 Twitter followers
LinkedIn® Page
www.linkedin.com
245 employees on LinkedIn®
(729)4.5 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Pay As You Go
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Plivo’s cloud communication platform is a powerful, fast, scalable, and better option for customer engagement. Trusted by leading brands like IBM, MercadoLibre, OneLogin and Zomato, our API platform l

    Users
    • CEO
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 79% Small-Business
    • 16% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Plivo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    20
    API Quality
    15
    Customer Support
    10
    Pricing
    8
    Features
    7
    Cons
    Messaging Issues
    6
    Poor Customer Support
    6
    Development Challenges
    3
    Slow Service
    3
    API Integration
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Plivo features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Plivo
    Company Website
    Year Founded
    2011
    HQ Location
    Austin, TX
    Twitter
    @plivo
    11,396 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    247 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Plivo’s cloud communication platform is a powerful, fast, scalable, and better option for customer engagement. Trusted by leading brands like IBM, MercadoLibre, OneLogin and Zomato, our API platform l

Users
  • CEO
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 79% Small-Business
  • 16% Mid-Market
Plivo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
20
API Quality
15
Customer Support
10
Pricing
8
Features
7
Cons
Messaging Issues
6
Poor Customer Support
6
Development Challenges
3
Slow Service
3
API Integration
2
Plivo features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Plivo
Company Website
Year Founded
2011
HQ Location
Austin, TX
Twitter
@plivo
11,396 Twitter followers
LinkedIn® Page
www.linkedin.com
247 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 48% Enterprise
    • 48% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Workforce Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    8
    Security
    7
    Ease of Use
    6
    Access Management
    5
    Access Control
    4
    Cons
    Timing Issues
    3
    Complexity
    2
    Complex Usability
    2
    Delayed Response
    2
    Difficult Learning
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Workforce Identity features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Multi-Device Sync
    Average: 8.9
    10.0
    Easy Setup
    Average: 9.0
    9.2
    Backup
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,222 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,824 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 48% Enterprise
  • 48% Mid-Market
CyberArk Workforce Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
8
Security
7
Ease of Use
6
Access Management
5
Access Control
4
Cons
Timing Issues
3
Complexity
2
Complex Usability
2
Delayed Response
2
Difficult Learning
2
CyberArk Workforce Identity features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
8.3
Multi-Device Sync
Average: 8.9
10.0
Easy Setup
Average: 9.0
9.2
Backup
Average: 8.8
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,222 Twitter followers
LinkedIn® Page
www.linkedin.com
3,824 employees on LinkedIn®
Ownership
NASDAQ:CYBR
Entry Level Price:$3.00
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 74% Enterprise
    • 18% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PingID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Security
    6
    Biometric Authentication
    5
    2FA Security
    2
    Easy Access
    2
    Cons
    Authentication Issues
    3
    Login Issues
    3
    Notification Issues
    3
    Delay Issues
    2
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PingID features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.0
    9.1
    Multi-Device Sync
    Average: 8.9
    9.2
    Easy Setup
    Average: 9.0
    8.3
    Backup
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,846 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,923 employees on LinkedIn®
    Phone
    1.303.468.2900
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 74% Enterprise
  • 18% Small-Business
PingID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Security
6
Biometric Authentication
5
2FA Security
2
Easy Access
2
Cons
Authentication Issues
3
Login Issues
3
Notification Issues
3
Delay Issues
2
Limited Features
1
PingID features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.0
9.1
Multi-Device Sync
Average: 8.9
9.2
Easy Setup
Average: 9.0
8.3
Backup
Average: 8.8
Seller Details
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,846 Twitter followers
LinkedIn® Page
www.linkedin.com
1,923 employees on LinkedIn®
Phone
1.303.468.2900
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Thales’ SafeNet Trusted Access is a cloud-based Access Management and Authentication Service. It ensures that no user is a target by allowing you to expand authentication to all users and apps with di

    Users
    No information available
    Industries
    • Computer Networking
    Market Segment
    • 68% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Thales SafeNet Trusted Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Administration Management
    1
    Convenience
    1
    Customer Support
    1
    Customizability
    1
    Cons
    Authentication Issues
    1
    Compatibility Issues
    1
    Device Limitations
    1
    Integration Issues
    1
    Limited Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Thales SafeNet Trusted Access features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Multi-Device Sync
    Average: 8.9
    8.9
    Easy Setup
    Average: 9.0
    9.4
    Backup
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin, Texas
    Twitter
    @ThalesCloudSec
    6,830 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    666 employees on LinkedIn®
    Ownership
    EPA:HO
    Total Revenue (USD mm)
    $15,854
Product Description
How are these determined?Information
This description is provided by the seller.

Thales’ SafeNet Trusted Access is a cloud-based Access Management and Authentication Service. It ensures that no user is a target by allowing you to expand authentication to all users and apps with di

Users
No information available
Industries
  • Computer Networking
Market Segment
  • 68% Enterprise
  • 25% Mid-Market
Thales SafeNet Trusted Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Administration Management
1
Convenience
1
Customer Support
1
Customizability
1
Cons
Authentication Issues
1
Compatibility Issues
1
Device Limitations
1
Integration Issues
1
Limited Reporting
1
Thales SafeNet Trusted Access features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
9.2
Multi-Device Sync
Average: 8.9
8.9
Easy Setup
Average: 9.0
9.4
Backup
Average: 8.8
Seller Details
HQ Location
Austin, Texas
Twitter
@ThalesCloudSec
6,830 Twitter followers
LinkedIn® Page
www.linkedin.com
666 employees on LinkedIn®
Ownership
EPA:HO
Total Revenue (USD mm)
$15,854
(57)4.4 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:$1.50
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PortalGuard is a single, unified Identity and Access Management (IAM) platform designed to help organizations streamline their security processes while enhancing user experience. This comprehensive so

    Users
    No information available
    Industries
    • Higher Education
    • Education Management
    Market Segment
    • 56% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PortalGuard Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    20
    Customer Support
    14
    Easy Setup
    12
    Security
    12
    Reliability
    10
    Cons
    Complexity
    4
    Inconvenience
    4
    Limited Customization
    4
    Limited Features
    4
    Software Bugs
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PortalGuard features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.0
    7.7
    Multi-Device Sync
    Average: 8.9
    8.6
    Easy Setup
    Average: 9.0
    8.0
    Backup
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BIO-key
    Company Website
    Year Founded
    1993
    HQ Location
    Wall, NJ
    Twitter
    @BIOkeyIntl
    1,471 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    69 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PortalGuard is a single, unified Identity and Access Management (IAM) platform designed to help organizations streamline their security processes while enhancing user experience. This comprehensive so

Users
No information available
Industries
  • Higher Education
  • Education Management
Market Segment
  • 56% Mid-Market
  • 40% Enterprise
PortalGuard Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
20
Customer Support
14
Easy Setup
12
Security
12
Reliability
10
Cons
Complexity
4
Inconvenience
4
Limited Customization
4
Limited Features
4
Software Bugs
4
PortalGuard features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.0
7.7
Multi-Device Sync
Average: 8.9
8.6
Easy Setup
Average: 9.0
8.0
Backup
Average: 8.8
Seller Details
Seller
BIO-key
Company Website
Year Founded
1993
HQ Location
Wall, NJ
Twitter
@BIOkeyIntl
1,471 Twitter followers
LinkedIn® Page
www.linkedin.com
69 employees on LinkedIn®
(47)4.6 out of 5
13th Easiest To Use in Multi-Factor Authentication (MFA) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FusionAuth is a powerful customer identity and access management (CIAM) platform designed for developers, by developers. Headquartered in Denver, Colorado, FusionAuth was founded in 2016 to provide se

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 66% Small-Business
    • 26% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FusionAuth Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Integrations
    12
    Customer Support
    11
    Easy Setup
    11
    Easy Integrations
    10
    Cons
    Complex Setup
    6
    Complexity
    5
    Difficult Learning
    5
    Missing Features
    5
    Difficult Setup
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FusionAuth features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.0
    7.5
    Multi-Device Sync
    Average: 8.9
    8.3
    Easy Setup
    Average: 9.0
    7.6
    Backup
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    Broomfield, US
    Twitter
    @FusionAuth
    1,939 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    54 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FusionAuth is a powerful customer identity and access management (CIAM) platform designed for developers, by developers. Headquartered in Denver, Colorado, FusionAuth was founded in 2016 to provide se

Users
No information available
Industries
  • Computer Software
Market Segment
  • 66% Small-Business
  • 26% Mid-Market
FusionAuth Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Integrations
12
Customer Support
11
Easy Setup
11
Easy Integrations
10
Cons
Complex Setup
6
Complexity
5
Difficult Learning
5
Missing Features
5
Difficult Setup
4
FusionAuth features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.0
7.5
Multi-Device Sync
Average: 8.9
8.3
Easy Setup
Average: 9.0
7.6
Backup
Average: 8.8
Seller Details
Company Website
Year Founded
2009
HQ Location
Broomfield, US
Twitter
@FusionAuth
1,939 Twitter followers
LinkedIn® Page
www.linkedin.com
54 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ping Identity (NYSE: PING) builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 67% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ping Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Administration Management
    2
    Data Security
    2
    Ease of Use
    2
    Security
    2
    Solutions
    2
    Cons
    Clunky Interface
    1
    Complex Administration
    1
    Complexity
    1
    Complex Setup
    1
    Complex Usage
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ping Identity features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.0
    7.7
    Multi-Device Sync
    Average: 8.9
    7.8
    Easy Setup
    Average: 9.0
    7.1
    Backup
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,846 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,923 employees on LinkedIn®
    Phone
    1.303.468.2900
Product Description
How are these determined?Information
This description is provided by the seller.

Ping Identity (NYSE: PING) builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 67% Enterprise
  • 25% Mid-Market
Ping Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Administration Management
2
Data Security
2
Ease of Use
2
Security
2
Solutions
2
Cons
Clunky Interface
1
Complex Administration
1
Complexity
1
Complex Setup
1
Complex Usage
1
Ping Identity features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.0
7.7
Multi-Device Sync
Average: 8.9
7.8
Easy Setup
Average: 9.0
7.1
Backup
Average: 8.8
Seller Details
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,846 Twitter followers
LinkedIn® Page
www.linkedin.com
1,923 employees on LinkedIn®
Phone
1.303.468.2900