Best Risk-Based Authentication Software - Page 4

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Risk-based authentication (RBA) solutions are identity management products that weigh user variables to determine and identify threats. Companies use RBA software to increase the effectiveness of user governance and authentication procedures. Users who are determined to be riskier are required to provide additional authentication information. These analyze IP addresses, devices, behaviors and identities to set customized authentication methods for each individual user attempting to access the network. Non-suspicious users accessing applications from known devices, locations, and networks may be automatically signed in. Suspicious users may be required to prompted to provide SMS code, biometric verification, or email confirmation actions to properly verify their identity.

Risk-based authentication products often contain multi-factor authentication features, but set unique requirements based the administrators configuration. RBA tools may work in sync with cloud identity and access management products, but typically only provide the authentication component, rather than the application access and governance components.

To qualify for inclusion in the Risk-Based Authentication category, a product must:

Assess a user’s unique network, device, and behavior to determine risk
Prompt authentication measures after assessment
Utilize authentication methods such as SMS, questioning, or email confirmation
Periodically store and update suspicious networks, devices, and behaviors

Best Risk-Based Authentication Software At A Glance

Leader:
Highest Performer:
Best Contender:
Most Niche:
Most Trending:
Show LessShow More
Best Contender:
Most Niche:
Most Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
107 Listings in Risk-Based Authentication (RBA) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Nok Nok S3 Authentication Suite is a digital authentication platform that delivers a modern user experience, protects customers, and engages users to drive more revenue. The Nok Nok S3 Authenticat

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 50% Small-Business
    • 30% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • S3 Authentication Suite Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Authentication
    1
    Biometric Authentication
    1
    Security Authentication
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • S3 Authentication Suite features and usability ratings that predict user satisfaction
    9.2
    Bi-Directional Identity Synchronization
    Average: 8.9
    10.0
    Policy Management
    Average: 9.0
    9.0
    Ease of Use
    Average: 9.0
    10.0
    Cloud Directory
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    San Jose, California
    Twitter
    @NokNokLabs
    2,099 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Nok Nok S3 Authentication Suite is a digital authentication platform that delivers a modern user experience, protects customers, and engages users to drive more revenue. The Nok Nok S3 Authenticat

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 50% Small-Business
  • 30% Enterprise
S3 Authentication Suite Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Authentication
1
Biometric Authentication
1
Security Authentication
1
Cons
This product has not yet received any negative sentiments.
S3 Authentication Suite features and usability ratings that predict user satisfaction
9.2
Bi-Directional Identity Synchronization
Average: 8.9
10.0
Policy Management
Average: 9.0
9.0
Ease of Use
Average: 9.0
10.0
Cloud Directory
Average: 9.0
Seller Details
Year Founded
2011
HQ Location
San Jose, California
Twitter
@NokNokLabs
2,099 Twitter followers
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Smart Authentication (SA) is the ultimate solution for customer authentication and transaction signing, based on behavioural and risk based continuous evaluation, designed for innovative e-payment ser

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Smart Authentication Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Integrations
    1
    Security Authentication
    1
    Setup Ease
    1
    User Interface
    1
    Cons
    Network Connectivity
    1
    Poor Interface Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Smart Authentication features and usability ratings that predict user satisfaction
    8.3
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.3
    Policy Management
    Average: 9.0
    9.2
    Ease of Use
    Average: 9.0
    8.3
    Cloud Directory
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Padova, IT
    Twitter
    @XtnLab
    116 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    30 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Smart Authentication (SA) is the ultimate solution for customer authentication and transaction signing, based on behavioural and risk based continuous evaluation, designed for innovative e-payment ser

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
Smart Authentication Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Integrations
1
Security Authentication
1
Setup Ease
1
User Interface
1
Cons
Network Connectivity
1
Poor Interface Design
1
Smart Authentication features and usability ratings that predict user satisfaction
8.3
Bi-Directional Identity Synchronization
Average: 8.9
8.3
Policy Management
Average: 9.0
9.2
Ease of Use
Average: 9.0
8.3
Cloud Directory
Average: 9.0
Seller Details
Year Founded
2014
HQ Location
Padova, IT
Twitter
@XtnLab
116 Twitter followers
LinkedIn® Page
www.linkedin.com
30 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Transmit Security CIAM Platform helps cybersecurity leaders, identity professionals and digital product teams provide strong account protection and a seamless user experience across the entire custome

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Transmit Security CIAM Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Services
    1
    Ease of Use
    1
    Functionality Features
    1
    Useful
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Transmit Security CIAM Platform features and usability ratings that predict user satisfaction
    7.5
    Bi-Directional Identity Synchronization
    Average: 8.9
    9.2
    Policy Management
    Average: 9.0
    10.0
    Ease of Use
    Average: 9.0
    8.3
    Cloud Directory
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Tel Aviv, IL
    Twitter
    @TransmitSec
    717 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    298 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Transmit Security CIAM Platform helps cybersecurity leaders, identity professionals and digital product teams provide strong account protection and a seamless user experience across the entire custome

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 25% Enterprise
Transmit Security CIAM Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Services
1
Ease of Use
1
Functionality Features
1
Useful
1
Cons
This product has not yet received any negative sentiments.
Transmit Security CIAM Platform features and usability ratings that predict user satisfaction
7.5
Bi-Directional Identity Synchronization
Average: 8.9
9.2
Policy Management
Average: 9.0
10.0
Ease of Use
Average: 9.0
8.3
Cloud Directory
Average: 9.0
Seller Details
Year Founded
2014
HQ Location
Tel Aviv, IL
Twitter
@TransmitSec
717 Twitter followers
LinkedIn® Page
www.linkedin.com
298 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Workspace ONE is a digital workspace platform that simply and securely delivers and manages any app on any device by integrating access control, application management and multi-platform endpoint mana

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 39% Mid-Market
    • 37% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Workspace ONE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Daily Use
    1
    Data Analysis
    1
    Device Management
    1
    Ease of Management
    1
    Cons
    Error Handling
    2
    Installation Issues
    2
    Product Issues
    2
    Access Issues
    1
    Account Setup Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Workspace ONE features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.1
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    59,531 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    61,034 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Workspace ONE is a digital workspace platform that simply and securely delivers and manages any app on any device by integrating access control, application management and multi-platform endpoint mana

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 39% Mid-Market
  • 37% Enterprise
Workspace ONE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Daily Use
1
Data Analysis
1
Device Management
1
Ease of Management
1
Cons
Error Handling
2
Installation Issues
2
Product Issues
2
Access Issues
1
Account Setup Issues
1
Workspace ONE features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.1
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
59,531 Twitter followers
LinkedIn® Page
www.linkedin.com
61,034 employees on LinkedIn®
Ownership
NASDAQ: CA
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Authsignal is a drop-in authentication platform, delivering passkeys and other modern authentication factors. Focused on enabling enterprise and mid-market businesses to seamlessly authenticate custom

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Authsignal Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Focus
    2
    Ease of Use
    2
    Easy Integrations
    2
    Easy Setup
    2
    Implementation Ease
    2
    Cons
    Data Inaccuracy
    1
    Inaccuracy
    1
    Inefficient Processes
    1
    Insufficient Data
    1
    Insufficient Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Authsignal features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    9.2
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Auckland
    Twitter
    @authsignal
    104 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Authsignal is a drop-in authentication platform, delivering passkeys and other modern authentication factors. Focused on enabling enterprise and mid-market businesses to seamlessly authenticate custom

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 50% Mid-Market
Authsignal Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Focus
2
Ease of Use
2
Easy Integrations
2
Easy Setup
2
Implementation Ease
2
Cons
Data Inaccuracy
1
Inaccuracy
1
Inefficient Processes
1
Insufficient Data
1
Insufficient Information
1
Authsignal features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
9.2
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
Year Founded
2021
HQ Location
Auckland
Twitter
@authsignal
104 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Castle is an identity and fraud risk management platform. We help security and fraud teams discover, investigate, report on and ultimately stop fraud at signup, login, and during transactions. Our SDK

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Castle Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    This product has not yet received any positive sentiments.
    Cons
    Communication Issues
    1
    Insufficient Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Castle features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    7.5
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Castle
    Twitter
    @Castle_IO
    755 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    36 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Castle is an identity and fraud risk management platform. We help security and fraud teams discover, investigate, report on and ultimately stop fraud at signup, login, and during transactions. Our SDK

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Castle Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
This product has not yet received any positive sentiments.
Cons
Communication Issues
1
Insufficient Information
1
Castle features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
7.5
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
Seller
Castle
Twitter
@Castle_IO
755 Twitter followers
LinkedIn® Page
www.linkedin.com
36 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    cidaas, the European cloud identity and access management system from Widas ID GmbH, delivers an out-of-the-box solution for federated identities, single sign-on and multi-factor authentication. With

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • cidaas features and usability ratings that predict user satisfaction
    10.0
    Bi-Directional Identity Synchronization
    Average: 8.9
    10.0
    Policy Management
    Average: 9.0
    10.0
    Ease of Use
    Average: 9.0
    10.0
    Cloud Directory
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1997
    HQ Location
    Wimsheim, Germany
    Twitter
    @WidasGroup
    129 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    87 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

cidaas, the European cloud identity and access management system from Widas ID GmbH, delivers an out-of-the-box solution for federated identities, single sign-on and multi-factor authentication. With

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
cidaas features and usability ratings that predict user satisfaction
10.0
Bi-Directional Identity Synchronization
Average: 8.9
10.0
Policy Management
Average: 9.0
10.0
Ease of Use
Average: 9.0
10.0
Cloud Directory
Average: 9.0
Seller Details
Year Founded
1997
HQ Location
Wimsheim, Germany
Twitter
@WidasGroup
129 Twitter followers
LinkedIn® Page
www.linkedin.com
87 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entsecure, a zero trust identity security platform, provides a unique blend of zero trust identity management with device health monitoring that can be deployed across entire organizations in minutes.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Entsecure features and usability ratings that predict user satisfaction
    10.0
    Bi-Directional Identity Synchronization
    Average: 8.9
    10.0
    Policy Management
    Average: 9.0
    10.0
    Ease of Use
    Average: 9.0
    10.0
    Cloud Directory
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Entsecure
Product Description
How are these determined?Information
This description is provided by the seller.

Entsecure, a zero trust identity security platform, provides a unique blend of zero trust identity management with device health monitoring that can be deployed across entire organizations in minutes.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Entsecure features and usability ratings that predict user satisfaction
10.0
Bi-Directional Identity Synchronization
Average: 8.9
10.0
Policy Management
Average: 9.0
10.0
Ease of Use
Average: 9.0
10.0
Cloud Directory
Average: 9.0
Seller Details
Seller
Entsecure
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    miniOrange IAM trusted platform offers frictionless solutions like - Single Sign-On, Multi-Factor Authentication, User lifeCycle Management, Passwordless Authentication, and much more. miniOrange’s u

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 44% Enterprise
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • miniOrange Identity & Access Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Product Usability
    1
    Service Quality
    1
    Single Sign-On
    1
    Solutions
    1
    Cons
    Access Restrictions
    1
    High Licensing Cost
    1
    Licensing Issues
    1
    Limited Access
    1
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • miniOrange Identity & Access Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.9
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Pune, India
    Twitter
    @miniOrange_it
    25 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    393 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

miniOrange IAM trusted platform offers frictionless solutions like - Single Sign-On, Multi-Factor Authentication, User lifeCycle Management, Passwordless Authentication, and much more. miniOrange’s u

Users
No information available
Industries
No information available
Market Segment
  • 44% Enterprise
  • 28% Mid-Market
miniOrange Identity & Access Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Product Usability
1
Service Quality
1
Single Sign-On
1
Solutions
1
Cons
Access Restrictions
1
High Licensing Cost
1
Licensing Issues
1
Limited Access
1
Limited Features
1
miniOrange Identity & Access Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.9
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
Year Founded
2012
HQ Location
Pune, India
Twitter
@miniOrange_it
25 Twitter followers
LinkedIn® Page
www.linkedin.com
393 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Next Caller, a Pindrop® Company, provides enterprise-grade ANI Validation and Spoof Detection for contact centers using VeriCall® Technology. VeriCall Technology analyzes the metadata on incoming call

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Next Caller Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Efficiency
    2
    Dashboard Usability
    1
    Detection Efficiency
    1
    Ease of Use
    1
    Reliability
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Next Caller features and usability ratings that predict user satisfaction
    10.0
    Bi-Directional Identity Synchronization
    Average: 8.9
    10.0
    Policy Management
    Average: 9.0
    10.0
    Ease of Use
    Average: 9.0
    10.0
    Cloud Directory
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    New York, NY
    Twitter
    @nextcaller
    3,901 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Next Caller, a Pindrop® Company, provides enterprise-grade ANI Validation and Spoof Detection for contact centers using VeriCall® Technology. VeriCall Technology analyzes the metadata on incoming call

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 33% Enterprise
Next Caller Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Efficiency
2
Dashboard Usability
1
Detection Efficiency
1
Ease of Use
1
Reliability
1
Cons
This product has not yet received any negative sentiments.
Next Caller features and usability ratings that predict user satisfaction
10.0
Bi-Directional Identity Synchronization
Average: 8.9
10.0
Policy Management
Average: 9.0
10.0
Ease of Use
Average: 9.0
10.0
Cloud Directory
Average: 9.0
Seller Details
Year Founded
2012
HQ Location
New York, NY
Twitter
@nextcaller
3,901 Twitter followers
LinkedIn® Page
www.linkedin.com
8 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetIQ Advanced Authentication is a standards-based framework built to meet today’s authentication challenges. Its open architecture is designed to enable organizations to protect their applications an

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText NetIQ Advanced Authentication features and usability ratings that predict user satisfaction
    5.0
    Bi-Directional Identity Synchronization
    Average: 8.9
    5.0
    Policy Management
    Average: 9.0
    7.5
    Ease of Use
    Average: 9.0
    5.0
    Cloud Directory
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,926 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22,114 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

NetIQ Advanced Authentication is a standards-based framework built to meet today’s authentication challenges. Its open architecture is designed to enable organizations to protect their applications an

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Small-Business
OpenText NetIQ Advanced Authentication features and usability ratings that predict user satisfaction
5.0
Bi-Directional Identity Synchronization
Average: 8.9
5.0
Policy Management
Average: 9.0
7.5
Ease of Use
Average: 9.0
5.0
Cloud Directory
Average: 9.0
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,926 Twitter followers
LinkedIn® Page
www.linkedin.com
22,114 employees on LinkedIn®
Ownership
NASDAQ:OTEX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mapping to the latest EMV® 3-D Secure protocol, Outseer 3-D Secure™ is a leading global ACS solution for issuers / issuer processors to fight CNP fraud: • 95% fraud stopped with only 5% intervention

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Outseer 3-D Secure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Analysis
    1
    Real-time Monitoring
    1
    Risk Assessment
    1
    Risk Management
    1
    Cons
    Delayed Updates
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Outseer 3-D Secure features and usability ratings that predict user satisfaction
    8.3
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.3
    Policy Management
    Average: 9.0
    10.0
    Ease of Use
    Average: 9.0
    8.3
    Cloud Directory
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Outseer
    HQ Location
    Bedford, US
    Twitter
    @OutseerCo
    125 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    227 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Mapping to the latest EMV® 3-D Secure protocol, Outseer 3-D Secure™ is a leading global ACS solution for issuers / issuer processors to fight CNP fraud: • 95% fraud stopped with only 5% intervention

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Outseer 3-D Secure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Analysis
1
Real-time Monitoring
1
Risk Assessment
1
Risk Management
1
Cons
Delayed Updates
1
Outseer 3-D Secure features and usability ratings that predict user satisfaction
8.3
Bi-Directional Identity Synchronization
Average: 8.9
8.3
Policy Management
Average: 9.0
10.0
Ease of Use
Average: 9.0
8.3
Cloud Directory
Average: 9.0
Seller Details
Seller
Outseer
HQ Location
Bedford, US
Twitter
@OutseerCo
125 Twitter followers
LinkedIn® Page
www.linkedin.com
227 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SolidPass is a authentication solution that protects enterprises and their customers from fraud, digital attacks, and information theft through advanced security software.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Solidpass Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Solidpass features and usability ratings that predict user satisfaction
    8.3
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.3
    Policy Management
    Average: 9.0
    8.3
    Ease of Use
    Average: 9.0
    8.3
    Cloud Directory
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Solidpass
    HQ Location
    Istanbul, Turkey
    Twitter
    @solidpass
    148 Twitter followers
Product Description
How are these determined?Information
This description is provided by the seller.

SolidPass is a authentication solution that protects enterprises and their customers from fraud, digital attacks, and information theft through advanced security software.

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Solidpass Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
1
Cons
Expensive
1
Solidpass features and usability ratings that predict user satisfaction
8.3
Bi-Directional Identity Synchronization
Average: 8.9
8.3
Policy Management
Average: 9.0
8.3
Ease of Use
Average: 9.0
8.3
Cloud Directory
Average: 9.0
Seller Details
Seller
Solidpass
HQ Location
Istanbul, Turkey
Twitter
@solidpass
148 Twitter followers
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CA Risk Authentication is a powerful risk-based, adaptive authentication solution that works in real time to evaluate context, calculate a risk score, recommend actions and provide alerts/case managem

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Symantec Advanced Authentication Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Convenience
    1
    Easy Access
    1
    Performance Reliability
    1
    Security
    1
    Cons
    Complex Setup
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Advanced Authentication features and usability ratings that predict user satisfaction
    10.0
    Bi-Directional Identity Synchronization
    Average: 8.9
    10.0
    Policy Management
    Average: 9.0
    10.0
    Ease of Use
    Average: 9.0
    10.0
    Cloud Directory
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    59,531 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    61,034 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

CA Risk Authentication is a powerful risk-based, adaptive authentication solution that works in real time to evaluate context, calculate a risk score, recommend actions and provide alerts/case managem

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Symantec Advanced Authentication Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Convenience
1
Easy Access
1
Performance Reliability
1
Security
1
Cons
Complex Setup
1
Slow Performance
1
Symantec Advanced Authentication features and usability ratings that predict user satisfaction
10.0
Bi-Directional Identity Synchronization
Average: 8.9
10.0
Policy Management
Average: 9.0
10.0
Ease of Use
Average: 9.0
10.0
Cloud Directory
Average: 9.0
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
59,531 Twitter followers
LinkedIn® Page
www.linkedin.com
61,034 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    UserLock provides on-premise Active Directory Identities with secure access to corporate networks and multiple cloud applications, from wherever they are working. Enable Multi-Factor Authentication (

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 17% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • UserLock Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    2FA Security
    1
    MFA Security
    1
    Security
    1
    Security Authentication
    1
    Cons
    Access Issues
    1
    Authentication Issues
    1
    Lack of Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UserLock features and usability ratings that predict user satisfaction
    8.3
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.3
    Policy Management
    Average: 9.0
    9.6
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    BIDART, Aquitaine
    LinkedIn® Page
    www.linkedin.com
    41 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

UserLock provides on-premise Active Directory Identities with secure access to corporate networks and multiple cloud applications, from wherever they are working. Enable Multi-Factor Authentication (

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 17% Mid-Market
UserLock Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
2FA Security
1
MFA Security
1
Security
1
Security Authentication
1
Cons
Access Issues
1
Authentication Issues
1
Lack of Customization
1
UserLock features and usability ratings that predict user satisfaction
8.3
Bi-Directional Identity Synchronization
Average: 8.9
8.3
Policy Management
Average: 9.0
9.6
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
Year Founded
2000
HQ Location
BIDART, Aquitaine
LinkedIn® Page
www.linkedin.com
41 employees on LinkedIn®