Best Risk-Based Authentication Software

BS
Researched and written by Brandon Summers-Miller

Risk-based authentication (RBA) solutions are identity management products that weigh user variables to determine and identify threats. Companies use RBA software to increase the effectiveness of user governance and authentication procedures. Users who are determined to be riskier are required to provide additional authentication information. These analyze IP addresses, devices, behaviors and identities to set customized authentication methods for each individual user attempting to access the network. Non-suspicious users accessing applications from known devices, locations, and networks may be automatically signed in. Suspicious users may be required to prompted to provide SMS code, biometric verification, or email confirmation actions to properly verify their identity.

Risk-based authentication products often contain multi-factor authentication features, but set unique requirements based the administrators configuration. RBA tools may work in sync with cloud identity and access management products, but typically only provide the authentication component, rather than the application access and governance components.

To qualify for inclusion in the Risk-Based Authentication category, a product must:

Assess a user’s unique network, device, and behavior to determine risk
Prompt authentication measures after assessment
Utilize authentication methods such as SMS, questioning, or email confirmation
Periodically store and update suspicious networks, devices, and behaviors

Best Risk-Based Authentication Software At A Glance

Leader:
Highest Performer:
Best Contender:
Most Niche:
Most Trending:
Show LessShow More
Best Contender:
Most Niche:
Most Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
107 Listings in Risk-Based Authentication (RBA) Available
(449)4.7 out of 5
Optimized for quick response
1st Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sift is the AI-powered fraud platform delivering identity trust for leading global businesses. Our deep investments in machine learning and user identity, a data network scoring 1 trillion events per

    Users
    • Risk Investigator
    • Fraud Analyst
    Industries
    • Financial Services
    • Consumer Services
    Market Segment
    • 55% Mid-Market
    • 29% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Sift is a fraud detection tool that uses machine learning and real-time data to identify and prevent fraudulent activity.
    • Reviewers appreciate Sift's ability to provide detailed insights into transactions, its user-friendly interface, and its robust features that aid in fraud detection and risk management.
    • Reviewers mentioned issues with Sift's risk scores being too strict or inaccurate, occasional bugs, and a lack of advanced features or detailed analytics.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sift Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    115
    Fraud Prevention
    100
    Data Analysis
    71
    Fraud Detection
    58
    Detection Efficiency
    50
    Cons
    Inaccuracy
    41
    Insufficient Information
    31
    Lack of Clarity
    21
    Complexity
    18
    Insufficient Data
    17
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sift features and usability ratings that predict user satisfaction
    8.5
    Bi-Directional Identity Synchronization
    Average: 9.0
    8.9
    Policy Management
    Average: 9.0
    8.9
    Ease of Use
    Average: 9.0
    8.1
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    San Francisco, CA
    Twitter
    @GetSift
    9,636 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    339 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sift is the AI-powered fraud platform delivering identity trust for leading global businesses. Our deep investments in machine learning and user identity, a data network scoring 1 trillion events per

Users
  • Risk Investigator
  • Fraud Analyst
Industries
  • Financial Services
  • Consumer Services
Market Segment
  • 55% Mid-Market
  • 29% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Sift is a fraud detection tool that uses machine learning and real-time data to identify and prevent fraudulent activity.
  • Reviewers appreciate Sift's ability to provide detailed insights into transactions, its user-friendly interface, and its robust features that aid in fraud detection and risk management.
  • Reviewers mentioned issues with Sift's risk scores being too strict or inaccurate, occasional bugs, and a lack of advanced features or detailed analytics.
Sift Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
115
Fraud Prevention
100
Data Analysis
71
Fraud Detection
58
Detection Efficiency
50
Cons
Inaccuracy
41
Insufficient Information
31
Lack of Clarity
21
Complexity
18
Insufficient Data
17
Sift features and usability ratings that predict user satisfaction
8.5
Bi-Directional Identity Synchronization
Average: 9.0
8.9
Policy Management
Average: 9.0
8.9
Ease of Use
Average: 9.0
8.1
Cloud Directory
Average: 8.7
Seller Details
Company Website
Year Founded
2011
HQ Location
San Francisco, CA
Twitter
@GetSift
9,636 Twitter followers
LinkedIn® Page
www.linkedin.com
339 employees on LinkedIn®
(395)4.5 out of 5
Optimized for quick response
2nd Easiest To Use in Risk-Based Authentication (RBA) software
View top Consulting Services for Cisco Duo
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

    Users
    • Consultant
    • Software Engineer
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 45% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Duo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    73
    Authentication Ease
    52
    Security
    51
    Authentication
    48
    Easy Access
    37
    Cons
    Authentication Issues
    28
    Access Limitations
    21
    Login Issues
    18
    Notification Issues
    14
    Poor Notifications
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Duo features and usability ratings that predict user satisfaction
    9.7
    Bi-Directional Identity Synchronization
    Average: 9.0
    9.4
    Policy Management
    Average: 9.0
    9.3
    Ease of Use
    Average: 9.0
    9.4
    Cloud Directory
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • User Sentiment
    How are these determined?Information
    These insights are written by G2's Market Research team, using actual user reviews for Cisco Duo, left between September 2020 and April 2022.
    • Reviewers of Duo Security frequently cite the push notifications as being a major benefit of this software, but some wish the push notifications were faster.
    • Reviewers mention that they use Duo security to improve the security of their login process, but sometimes the login request times out too quickly.
    • Reviewers of Duo Security mention that they like how easy setup and integration is for end users.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Company Website
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    732,001 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97,323 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

Users
  • Consultant
  • Software Engineer
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 45% Enterprise
  • 38% Mid-Market
Cisco Duo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
73
Authentication Ease
52
Security
51
Authentication
48
Easy Access
37
Cons
Authentication Issues
28
Access Limitations
21
Login Issues
18
Notification Issues
14
Poor Notifications
12
Cisco Duo features and usability ratings that predict user satisfaction
9.7
Bi-Directional Identity Synchronization
Average: 9.0
9.4
Policy Management
Average: 9.0
9.3
Ease of Use
Average: 9.0
9.4
Cloud Directory
Average: 8.7
User Sentiment
How are these determined?Information
These insights are written by G2's Market Research team, using actual user reviews for Cisco Duo, left between September 2020 and April 2022.
  • Reviewers of Duo Security frequently cite the push notifications as being a major benefit of this software, but some wish the push notifications were faster.
  • Reviewers mention that they use Duo security to improve the security of their login process, but sometimes the login request times out too quickly.
  • Reviewers of Duo Security mention that they like how easy setup and integration is for end users.
Seller Details
Seller
Cisco
Company Website
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
732,001 Twitter followers
LinkedIn® Page
www.linkedin.com
97,323 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(200)4.3 out of 5
6th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and se

    Users
    • Software Engineer
    • Software Developer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 52% Small-Business
    • 26% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Auth0 Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Security
    16
    Integrations
    14
    Authentication
    12
    Easy Integrations
    11
    Cons
    Expensive
    8
    Cost
    5
    Complex Setup
    4
    Pricing Issues
    4
    Customization Difficulties
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Auth0 features and usability ratings that predict user satisfaction
    9.3
    Bi-Directional Identity Synchronization
    Average: 9.0
    9.0
    Policy Management
    Average: 9.0
    8.5
    Ease of Use
    Average: 9.0
    9.3
    Cloud Directory
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • User Sentiment
    How are these determined?Information
    These insights are written by G2's Market Research team, using actual user reviews for Auth0, left between December 2020 and January 2022.
    • Reviewers mention that Auth0 is easy to use, easy to deploy, and easy to update.
    • Reviewers of Auth0 cite their great experiences with customer support in resolving their issues.
    • Reviewers say that the examples given in product documentation are intuitive and easy to follow.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okta
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @okta
    42,299 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,122 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and se

Users
  • Software Engineer
  • Software Developer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 52% Small-Business
  • 26% Mid-Market
Auth0 Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Security
16
Integrations
14
Authentication
12
Easy Integrations
11
Cons
Expensive
8
Cost
5
Complex Setup
4
Pricing Issues
4
Customization Difficulties
3
Auth0 features and usability ratings that predict user satisfaction
9.3
Bi-Directional Identity Synchronization
Average: 9.0
9.0
Policy Management
Average: 9.0
8.5
Ease of Use
Average: 9.0
9.3
Cloud Directory
Average: 8.7
User Sentiment
How are these determined?Information
These insights are written by G2's Market Research team, using actual user reviews for Auth0, left between December 2020 and January 2022.
  • Reviewers mention that Auth0 is easy to use, easy to deploy, and easy to update.
  • Reviewers of Auth0 cite their great experiences with customer support in resolving their issues.
  • Reviewers say that the examples given in product documentation are intuitive and easy to follow.
Seller Details
Seller
Okta
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@okta
42,299 Twitter followers
LinkedIn® Page
www.linkedin.com
8,122 employees on LinkedIn®
(1,785)4.5 out of 5
Optimized for quick response
3rd Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:$4.25
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LastPass is a cloud-based password manager solution designed to help users securely store, manage, and access their passwords across various devices and platforms. This innovative tool simplifies the

    Users
    • Owner
    • CEO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 63% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • LastPass Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    374
    Password Management
    240
    Security
    214
    Autofill Feature
    170
    Easy Access
    154
    Cons
    Password Management
    163
    Autofill Issues
    136
    Login Issues
    97
    Password Issues
    52
    Browser Extension Issues
    46
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LastPass features and usability ratings that predict user satisfaction
    9.3
    Bi-Directional Identity Synchronization
    Average: 9.0
    9.4
    Policy Management
    Average: 9.0
    8.7
    Ease of Use
    Average: 9.0
    9.2
    Cloud Directory
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • User Sentiment
    How are these determined?Information
    These insights are written by G2's Market Research team, using actual user reviews for LastPass, left between March 2018 and May 2022.
    • Reviewers mention that LastPass is a huge time saver for them.
    • Reviewers say that they like the simple user interface of LastPass.
    • Reviewers cite they’d like improved user experiences, however.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LastPass
    Company Website
    Year Founded
    2008
    HQ Location
    Boston, Massachusetts
    Twitter
    @LastPass
    47,510 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    846 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LastPass is a cloud-based password manager solution designed to help users securely store, manage, and access their passwords across various devices and platforms. This innovative tool simplifies the

Users
  • Owner
  • CEO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 63% Small-Business
  • 25% Mid-Market
LastPass Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
374
Password Management
240
Security
214
Autofill Feature
170
Easy Access
154
Cons
Password Management
163
Autofill Issues
136
Login Issues
97
Password Issues
52
Browser Extension Issues
46
LastPass features and usability ratings that predict user satisfaction
9.3
Bi-Directional Identity Synchronization
Average: 9.0
9.4
Policy Management
Average: 9.0
8.7
Ease of Use
Average: 9.0
9.2
Cloud Directory
Average: 8.7
User Sentiment
How are these determined?Information
These insights are written by G2's Market Research team, using actual user reviews for LastPass, left between March 2018 and May 2022.
  • Reviewers mention that LastPass is a huge time saver for them.
  • Reviewers say that they like the simple user interface of LastPass.
  • Reviewers cite they’d like improved user experiences, however.
Seller Details
Seller
LastPass
Company Website
Year Founded
2008
HQ Location
Boston, Massachusetts
Twitter
@LastPass
47,510 Twitter followers
LinkedIn® Page
www.linkedin.com
846 employees on LinkedIn®
(107)4.4 out of 5
5th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:Starting at $2.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 48% Enterprise
    • 48% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Workforce Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    8
    Security
    7
    Ease of Use
    6
    Access Management
    5
    Access Control
    4
    Cons
    Timing Issues
    3
    Complexity
    2
    Complex Usability
    2
    Delayed Response
    2
    Difficult Learning
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Workforce Identity features and usability ratings that predict user satisfaction
    8.3
    Bi-Directional Identity Synchronization
    Average: 9.0
    8.3
    Policy Management
    Average: 9.0
    8.7
    Ease of Use
    Average: 9.0
    10.0
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,354 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,824 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 48% Enterprise
  • 48% Mid-Market
CyberArk Workforce Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
8
Security
7
Ease of Use
6
Access Management
5
Access Control
4
Cons
Timing Issues
3
Complexity
2
Complex Usability
2
Delayed Response
2
Difficult Learning
2
CyberArk Workforce Identity features and usability ratings that predict user satisfaction
8.3
Bi-Directional Identity Synchronization
Average: 9.0
8.3
Policy Management
Average: 9.0
8.7
Ease of Use
Average: 9.0
10.0
Cloud Directory
Average: 8.7
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,354 Twitter followers
LinkedIn® Page
www.linkedin.com
3,824 employees on LinkedIn®
Ownership
NASDAQ:CYBR
(113)4.8 out of 5
Optimized for quick response
9th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kount is trust and safety technology. Businesses pick the solutions that are relevant to their unique challenges, and we help them grow with confidence — no matter the industry. We use data-driven

    Users
    No information available
    Industries
    • Retail
    • Apparel & Fashion
    Market Segment
    • 46% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kount Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Fraud Prevention
    12
    Customer Support
    8
    Ease of Use
    6
    Fraud Protection
    6
    Data Analysis
    5
    Cons
    Lack of Clarity
    4
    Not User-Friendly
    3
    Complex Usability
    2
    Inaccuracy
    2
    Inconvenience
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kount features and usability ratings that predict user satisfaction
    9.2
    Bi-Directional Identity Synchronization
    Average: 9.0
    9.3
    Policy Management
    Average: 9.0
    9.2
    Ease of Use
    Average: 9.0
    9.2
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2007
    HQ Location
    Boise, ID
    Twitter
    @KountInc
    2,458 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    254 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kount is trust and safety technology. Businesses pick the solutions that are relevant to their unique challenges, and we help them grow with confidence — no matter the industry. We use data-driven

Users
No information available
Industries
  • Retail
  • Apparel & Fashion
Market Segment
  • 46% Mid-Market
  • 33% Small-Business
Kount Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Fraud Prevention
12
Customer Support
8
Ease of Use
6
Fraud Protection
6
Data Analysis
5
Cons
Lack of Clarity
4
Not User-Friendly
3
Complex Usability
2
Inaccuracy
2
Inconvenience
2
Kount features and usability ratings that predict user satisfaction
9.2
Bi-Directional Identity Synchronization
Average: 9.0
9.3
Policy Management
Average: 9.0
9.2
Ease of Use
Average: 9.0
9.2
Cloud Directory
Average: 8.7
Seller Details
Company Website
Year Founded
2007
HQ Location
Boise, ID
Twitter
@KountInc
2,458 Twitter followers
LinkedIn® Page
www.linkedin.com
254 employees on LinkedIn®
(17)4.8 out of 5
4th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative age

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Silverfort features and usability ratings that predict user satisfaction
    6.7
    Bi-Directional Identity Synchronization
    Average: 9.0
    6.7
    Policy Management
    Average: 9.0
    9.9
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Tel Aviv, Israel
    Twitter
    @silverfort
    590 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    404 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative age

Users
No information available
Industries
No information available
Market Segment
  • 47% Small-Business
  • 35% Mid-Market
Silverfort features and usability ratings that predict user satisfaction
6.7
Bi-Directional Identity Synchronization
Average: 9.0
6.7
Policy Management
Average: 9.0
9.9
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
Year Founded
2016
HQ Location
Tel Aviv, Israel
Twitter
@silverfort
590 Twitter followers
LinkedIn® Page
www.linkedin.com
404 employees on LinkedIn®
(139)4.3 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:$1.71 / user, per month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 66% Enterprise
    • 38% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • IBM Verify is an identity access management tool that provides secure user authentication and access management.
    • Users frequently mention the tool's robust features such as Single Sign-On, Multi-Factor Authentication, and adaptive authentication, as well as its ease of use and excellent customer support.
    • Users experienced challenges with the initial setup and configuration, occasional slow performance, and some found the user interface complex and not user-friendly.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Verify CIAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    34
    Ease of Use
    24
    Authentication
    23
    Identity Management
    20
    Features
    18
    Cons
    Expensive
    12
    Difficult Learning
    11
    Complexity
    10
    Complex Setup
    10
    Cost
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Verify CIAM features and usability ratings that predict user satisfaction
    8.8
    Bi-Directional Identity Synchronization
    Average: 9.0
    8.7
    Policy Management
    Average: 9.0
    8.4
    Ease of Use
    Average: 9.0
    9.0
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Company Website
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,653 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    317,108 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 66% Enterprise
  • 38% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • IBM Verify is an identity access management tool that provides secure user authentication and access management.
  • Users frequently mention the tool's robust features such as Single Sign-On, Multi-Factor Authentication, and adaptive authentication, as well as its ease of use and excellent customer support.
  • Users experienced challenges with the initial setup and configuration, occasional slow performance, and some found the user interface complex and not user-friendly.
IBM Verify CIAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
34
Ease of Use
24
Authentication
23
Identity Management
20
Features
18
Cons
Expensive
12
Difficult Learning
11
Complexity
10
Complex Setup
10
Cost
9
IBM Verify CIAM features and usability ratings that predict user satisfaction
8.8
Bi-Directional Identity Synchronization
Average: 9.0
8.7
Policy Management
Average: 9.0
8.4
Ease of Use
Average: 9.0
9.0
Cloud Directory
Average: 8.7
Seller Details
Seller
IBM
Company Website
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,653 Twitter followers
LinkedIn® Page
www.linkedin.com
317,108 employees on LinkedIn®
(1,366)4.7 out of 5
13th Easiest To Use in Risk-Based Authentication (RBA) software
View top Consulting Services for 1Password
Save to My Lists
100% off: 0
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Most Used Enterprise Password Manager, trusted by over 150,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure

    Users
    • Software Engineer
    • Owner
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • 1Password Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    99
    Security
    74
    Intuitive
    33
    Password Management
    31
    Secure Sharing
    31
    Cons
    Password Management
    41
    Authentication Issues
    24
    Login Issues
    21
    Process Complexity
    20
    Autofill Issues
    18
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 1Password features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    9.0
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    1Password
    Company Website
    Year Founded
    2005
    HQ Location
    Ontario
    Twitter
    @1Password
    141,384 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,449 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Most Used Enterprise Password Manager, trusted by over 150,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure

Users
  • Software Engineer
  • Owner
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 31% Mid-Market
1Password Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
99
Security
74
Intuitive
33
Password Management
31
Secure Sharing
31
Cons
Password Management
41
Authentication Issues
24
Login Issues
21
Process Complexity
20
Autofill Issues
18
1Password features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
9.0
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
Seller
1Password
Company Website
Year Founded
2005
HQ Location
Ontario
Twitter
@1Password
141,384 Twitter followers
LinkedIn® Page
www.linkedin.com
2,449 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Thales’ SafeNet Trusted Access is a cloud-based Access Management and Authentication Service. It ensures that no user is a target by allowing you to expand authentication to all users and apps with di

    Users
    No information available
    Industries
    • Computer Networking
    Market Segment
    • 68% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Thales SafeNet Trusted Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Administration Management
    1
    Convenience
    1
    Customer Support
    1
    Customizability
    1
    Cons
    Authentication Issues
    1
    Compatibility Issues
    1
    Device Limitations
    1
    Integration Issues
    1
    Limited Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Thales SafeNet Trusted Access features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    9.8
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin, Texas
    Twitter
    @ThalesCloudSec
    6,814 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    666 employees on LinkedIn®
    Ownership
    EPA:HO
    Total Revenue (USD mm)
    $15,854
Product Description
How are these determined?Information
This description is provided by the seller.

Thales’ SafeNet Trusted Access is a cloud-based Access Management and Authentication Service. It ensures that no user is a target by allowing you to expand authentication to all users and apps with di

Users
No information available
Industries
  • Computer Networking
Market Segment
  • 68% Enterprise
  • 25% Mid-Market
Thales SafeNet Trusted Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Administration Management
1
Convenience
1
Customer Support
1
Customizability
1
Cons
Authentication Issues
1
Compatibility Issues
1
Device Limitations
1
Integration Issues
1
Limited Reporting
1
Thales SafeNet Trusted Access features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
9.8
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
HQ Location
Austin, Texas
Twitter
@ThalesCloudSec
6,814 Twitter followers
LinkedIn® Page
www.linkedin.com
666 employees on LinkedIn®
Ownership
EPA:HO
Total Revenue (USD mm)
$15,854
(90)4.5 out of 5
11th Easiest To Use in Risk-Based Authentication (RBA) software
View top Consulting Services for WSO2 Identity Server
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    WSO2 Identity Server is a modern, open-source Customer Identity and Access Management (CIAM) solution designed to enhance user experiences across various digital platforms. This robust software provid

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • WSO2 Identity Server Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Authentication
    16
    Security
    15
    Ease of Use
    12
    Identity Management
    12
    Single Sign-On
    12
    Cons
    Complex Setup
    7
    Difficult Learning
    7
    Complexity
    6
    Expertise Requirement
    6
    Required Expertise
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WSO2 Identity Server features and usability ratings that predict user satisfaction
    9.3
    Bi-Directional Identity Synchronization
    Average: 9.0
    9.3
    Policy Management
    Average: 9.0
    8.5
    Ease of Use
    Average: 9.0
    9.5
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    WSO2
    Company Website
    Year Founded
    2005
    HQ Location
    Mountain View, CA
    Twitter
    @wso2
    12,699 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,154 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

WSO2 Identity Server is a modern, open-source Customer Identity and Access Management (CIAM) solution designed to enhance user experiences across various digital platforms. This robust software provid

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Mid-Market
  • 36% Enterprise
WSO2 Identity Server Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Authentication
16
Security
15
Ease of Use
12
Identity Management
12
Single Sign-On
12
Cons
Complex Setup
7
Difficult Learning
7
Complexity
6
Expertise Requirement
6
Required Expertise
6
WSO2 Identity Server features and usability ratings that predict user satisfaction
9.3
Bi-Directional Identity Synchronization
Average: 9.0
9.3
Policy Management
Average: 9.0
8.5
Ease of Use
Average: 9.0
9.5
Cloud Directory
Average: 8.7
Seller Details
Seller
WSO2
Company Website
Year Founded
2005
HQ Location
Mountain View, CA
Twitter
@wso2
12,699 Twitter followers
LinkedIn® Page
www.linkedin.com
1,154 employees on LinkedIn®
(29)4.4 out of 5
10th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

    Users
    No information available
    Industries
    • Hospital & Health Care
    Market Segment
    • 141% Mid-Market
    • 66% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureAuth: Workforce IAM features and usability ratings that predict user satisfaction
    9.7
    Bi-Directional Identity Synchronization
    Average: 9.0
    9.7
    Policy Management
    Average: 9.0
    8.9
    Ease of Use
    Average: 9.0
    9.5
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Irvine, CA
    Twitter
    @SecureAuth
    8,755 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    157 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

Users
No information available
Industries
  • Hospital & Health Care
Market Segment
  • 141% Mid-Market
  • 66% Small-Business
SecureAuth: Workforce IAM features and usability ratings that predict user satisfaction
9.7
Bi-Directional Identity Synchronization
Average: 9.0
9.7
Policy Management
Average: 9.0
8.9
Ease of Use
Average: 9.0
9.5
Cloud Directory
Average: 8.7
Seller Details
Company Website
Year Founded
2005
HQ Location
Irvine, CA
Twitter
@SecureAuth
8,755 Twitter followers
LinkedIn® Page
www.linkedin.com
157 employees on LinkedIn®
(106)4.4 out of 5
12th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:$3 Per User Per Month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ping Identity (NYSE: PING) builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 67% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ping Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Administration Management
    1
    Data Security
    1
    Ease of Use
    1
    Security
    1
    Simple
    1
    Cons
    Clunky Interface
    1
    Complex Administration
    1
    Complexity
    1
    Complex Setup
    1
    Complex Usage
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ping Identity features and usability ratings that predict user satisfaction
    9.2
    Bi-Directional Identity Synchronization
    Average: 9.0
    8.7
    Policy Management
    Average: 9.0
    8.7
    Ease of Use
    Average: 9.0
    9.2
    Cloud Directory
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • User Sentiment
    How are these determined?Information
    These insights are written by G2's Market Research team, using actual user reviews for Ping Identity, left between October 2020 and April 2022.
    • Reviewers mention that they like that there is a desktop application in addition to a mobile app.
    • Reviewers value how easy Ping Identity is to set up and use.
    • Reviewers like the support Ping Identity provides, both from the user community and from Ping’s technical team.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,737 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,923 employees on LinkedIn®
    Phone
    1.303.468.2900
Product Description
How are these determined?Information
This description is provided by the seller.

Ping Identity (NYSE: PING) builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 67% Enterprise
  • 25% Mid-Market
Ping Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Administration Management
1
Data Security
1
Ease of Use
1
Security
1
Simple
1
Cons
Clunky Interface
1
Complex Administration
1
Complexity
1
Complex Setup
1
Complex Usage
1
Ping Identity features and usability ratings that predict user satisfaction
9.2
Bi-Directional Identity Synchronization
Average: 9.0
8.7
Policy Management
Average: 9.0
8.7
Ease of Use
Average: 9.0
9.2
Cloud Directory
Average: 8.7
User Sentiment
How are these determined?Information
These insights are written by G2's Market Research team, using actual user reviews for Ping Identity, left between October 2020 and April 2022.
  • Reviewers mention that they like that there is a desktop application in addition to a mobile app.
  • Reviewers value how easy Ping Identity is to set up and use.
  • Reviewers like the support Ping Identity provides, both from the user community and from Ping’s technical team.
Seller Details
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,737 Twitter followers
LinkedIn® Page
www.linkedin.com
1,923 employees on LinkedIn®
Phone
1.303.468.2900
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Telesign's Verification products allow businesses to secure their ecosystem by having users prove they are in possession of their mobile device. Telesign Verification provides companies with the optio

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 58% Small-Business
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Telesign Verification Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    8
    Fraud Prevention
    5
    Features
    3
    Implementation Ease
    3
    Access Control
    2
    Cons
    Expensive
    5
    Login Issues
    2
    Slow Performance
    2
    Software Bugs
    2
    Inaccuracy
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Telesign Verification features and usability ratings that predict user satisfaction
    7.9
    Bi-Directional Identity Synchronization
    Average: 9.0
    7.9
    Policy Management
    Average: 9.0
    9.4
    Ease of Use
    Average: 9.0
    6.7
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Telesign
    Company Website
    Year Founded
    2005
    HQ Location
    Marina del Rey, US
    Twitter
    @TeleSign
    1,897 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    768 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Telesign's Verification products allow businesses to secure their ecosystem by having users prove they are in possession of their mobile device. Telesign Verification provides companies with the optio

Users
No information available
Industries
No information available
Market Segment
  • 58% Small-Business
  • 37% Mid-Market
Telesign Verification Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
8
Fraud Prevention
5
Features
3
Implementation Ease
3
Access Control
2
Cons
Expensive
5
Login Issues
2
Slow Performance
2
Software Bugs
2
Inaccuracy
1
Telesign Verification features and usability ratings that predict user satisfaction
7.9
Bi-Directional Identity Synchronization
Average: 9.0
7.9
Policy Management
Average: 9.0
9.4
Ease of Use
Average: 9.0
6.7
Cloud Directory
Average: 8.7
Seller Details
Seller
Telesign
Company Website
Year Founded
2005
HQ Location
Marina del Rey, US
Twitter
@TeleSign
1,897 Twitter followers
LinkedIn® Page
www.linkedin.com
768 employees on LinkedIn®
(285)4.4 out of 5
8th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:$6 /User /Month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin e

    Users
    • Account Manager
    Industries
    • Computer Software
    • Education Management
    Market Segment
    • 49% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OneLogin Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Single Sign-On
    11
    SSO (Single Sign-On)
    9
    Easy Access
    6
    Security
    6
    Cons
    Bugs
    4
    Error Handling
    4
    Authentication Issues
    3
    Connection Issues
    3
    Login Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OneLogin features and usability ratings that predict user satisfaction
    8.6
    Bi-Directional Identity Synchronization
    Average: 9.0
    8.9
    Policy Management
    Average: 9.0
    9.1
    Ease of Use
    Average: 9.0
    9.4
    Cloud Directory
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • User Sentiment
    How are these determined?Information
    These insights are written by G2's Market Research team, using actual user reviews for OneLogin, left between February 2021 and April 2022.
    • Reviewers commonly cite that they use OneLogin to improve their security.
    • Reviewers appreciate the single-tap and ease of access to apps.
    • Reviewers mention that OneLogin support is quick and professional.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Aliso Viejo, CA
    Twitter
    @OneIdentity
    7,979 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    589 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin e

Users
  • Account Manager
Industries
  • Computer Software
  • Education Management
Market Segment
  • 49% Mid-Market
  • 40% Enterprise
OneLogin Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Single Sign-On
11
SSO (Single Sign-On)
9
Easy Access
6
Security
6
Cons
Bugs
4
Error Handling
4
Authentication Issues
3
Connection Issues
3
Login Issues
3
OneLogin features and usability ratings that predict user satisfaction
8.6
Bi-Directional Identity Synchronization
Average: 9.0
8.9
Policy Management
Average: 9.0
9.1
Ease of Use
Average: 9.0
9.4
Cloud Directory
Average: 8.7
User Sentiment
How are these determined?Information
These insights are written by G2's Market Research team, using actual user reviews for OneLogin, left between February 2021 and April 2022.
  • Reviewers commonly cite that they use OneLogin to improve their security.
  • Reviewers appreciate the single-tap and ease of access to apps.
  • Reviewers mention that OneLogin support is quick and professional.
Seller Details
HQ Location
Aliso Viejo, CA
Twitter
@OneIdentity
7,979 Twitter followers
LinkedIn® Page
www.linkedin.com
589 employees on LinkedIn®