Best Risk-Based Authentication Software - Page 5

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Risk-based authentication (RBA) solutions are identity management products that weigh user variables to determine and identify threats. Companies use RBA software to increase the effectiveness of user governance and authentication procedures. Users who are determined to be riskier are required to provide additional authentication information. These analyze IP addresses, devices, behaviors and identities to set customized authentication methods for each individual user attempting to access the network. Non-suspicious users accessing applications from known devices, locations, and networks may be automatically signed in. Suspicious users may be required to prompted to provide SMS code, biometric verification, or email confirmation actions to properly verify their identity.

Risk-based authentication products often contain multi-factor authentication features, but set unique requirements based the administrators configuration. RBA tools may work in sync with cloud identity and access management products, but typically only provide the authentication component, rather than the application access and governance components.

To qualify for inclusion in the Risk-Based Authentication category, a product must:

Assess a user’s unique network, device, and behavior to determine risk
Prompt authentication measures after assessment
Utilize authentication methods such as SMS, questioning, or email confirmation
Periodically store and update suspicious networks, devices, and behaviors

Best Risk-Based Authentication Software At A Glance

Leader:
Highest Performer:
Best Contender:
Most Niche:
Most Trending:
Show LessShow More
Best Contender:
Most Niche:
Most Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
107 Listings in Risk-Based Authentication (RBA) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With the ever-growing number of data breaches, billions of email addresses and passwords are easily accessible to fraudsters, which can lead to account takeover fraud. Since many people use the same c

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Accertify Digital Identity features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Accertify
    Year Founded
    2007
    HQ Location
    Itasca, IL
    Twitter
    @accertifyinc
    549 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    300 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

With the ever-growing number of data breaches, billions of email addresses and passwords are easily accessible to fraudsters, which can lead to account takeover fraud. Since many people use the same c

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Accertify Digital Identity features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Accertify
Year Founded
2007
HQ Location
Itasca, IL
Twitter
@accertifyinc
549 Twitter followers
LinkedIn® Page
www.linkedin.com
300 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Airlock Suite is Ergon's all-round IT security product.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Airlock Suite by Ergon Informatik features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ergon
    HQ Location
    Zurich, Switzerland
    Twitter
    @ErgonAirlock
    655 Twitter followers
Product Description
How are these determined?Information
This description is provided by the seller.

Airlock Suite is Ergon's all-round IT security product.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Airlock Suite by Ergon Informatik features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Ergon
HQ Location
Zurich, Switzerland
Twitter
@ErgonAirlock
655 Twitter followers

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Appgate's Risk-Based Authentication (RBA) solution offers dynamic protection against complex fraud through customizable authentication, transaction monitoring, and risk orchestration. It utilizes beha

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Appgate Risk-Based Authentication features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Appgate
    Year Founded
    2020
    HQ Location
    Coral Gables, US
    Twitter
    @AppgateSecurity
    883 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    386 employees on LinkedIn®
    Ownership
    OTC: APGT
Product Description
How are these determined?Information
This description is provided by the seller.

Appgate's Risk-Based Authentication (RBA) solution offers dynamic protection against complex fraud through customizable authentication, transaction monitoring, and risk orchestration. It utilizes beha

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Appgate Risk-Based Authentication features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Appgate
Year Founded
2020
HQ Location
Coral Gables, US
Twitter
@AppgateSecurity
883 Twitter followers
LinkedIn® Page
www.linkedin.com
386 employees on LinkedIn®
Ownership
OTC: APGT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Appsian’s MFA for PeopleSoft allows organizations to expand MFA functionality to the field, page, and component levels. Our MFA solution plugs directly into the PeopleSoft Web Server without any addit

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Appsian Adaptive Multi-Factor Authentication features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Pathlock
    Year Founded
    2004
    HQ Location
    Dallas, US
    Twitter
    @pathlock
    303 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    435 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Appsian’s MFA for PeopleSoft allows organizations to expand MFA functionality to the field, page, and component levels. Our MFA solution plugs directly into the PeopleSoft Web Server without any addit

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Appsian Adaptive Multi-Factor Authentication features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Pathlock
Year Founded
2004
HQ Location
Dallas, US
Twitter
@pathlock
303 Twitter followers
LinkedIn® Page
www.linkedin.com
435 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Authenticate: Desktop is an identity management software that checks identity and age.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Authenticate: Desktop features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

Authenticate: Desktop is an identity management software that checks identity and age.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Authenticate: Desktop features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AuthenWare is a network security software that delivers strong security through a combination of keystroke dynamics, behavioral and environmental characteristics to minimize identity theft, web fraud

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AuthenWare features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

AuthenWare is a network security software that delivers strong security through a combination of keystroke dynamics, behavioral and environmental characteristics to minimize identity theft, web fraud

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
AuthenWare features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Axiom Protect features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Axiom Protect features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BehavioSec provides a layer of security that lets your customers authenticate themselves through the unique ways they type, swipe and hold their devices.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BehavioSec features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1970
    HQ Location
    New York
    Twitter
    @NexisSolutions
    1,288 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,492 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BehavioSec provides a layer of security that lets your customers authenticate themselves through the unique ways they type, swipe and hold their devices.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
BehavioSec features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1970
HQ Location
New York
Twitter
@NexisSolutions
1,288 Twitter followers
LinkedIn® Page
www.linkedin.com
10,492 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Callsign is an identity proving and authentication company. We solve challenges that organisations face in getting their users on to and interacting with their digital platforms easily and securely.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Callsign features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Callsign
    Year Founded
    2011
    HQ Location
    London, United Kingdom
    Twitter
    @callsign
    875 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Callsign is an identity proving and authentication company. We solve challenges that organisations face in getting their users on to and interacting with their digital platforms easily and securely.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Callsign features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Callsign
Year Founded
2011
HQ Location
London, United Kingdom
Twitter
@callsign
875 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Censornet gives mid-market organisations the confidence and control of enterprise-grade cyber protection. Its Autonomous Security platform integrates attack intel across email, web, and cloud to ensur

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Censornet IAM features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Censornet
    Year Founded
    2015
    HQ Location
    Basingstoke, England
    Twitter
    @censornet
    1,912 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    71 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Censornet gives mid-market organisations the confidence and control of enterprise-grade cyber protection. Its Autonomous Security platform integrates attack intel across email, web, and cloud to ensur

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Censornet IAM features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Censornet
Year Founded
2015
HQ Location
Basingstoke, England
Twitter
@censornet
1,912 Twitter followers
LinkedIn® Page
www.linkedin.com
71 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure access to a wide range of systems, services and applications using an adaptive, cloud-based multi-factor authentication solution. Protect user accounts with more than just a password and reduce

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Censornet MFA (Multi-Factor Authentication) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    2FA Security
    1
    Data Analysis
    1
    Data Security
    1
    Security
    1
    SSO Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Censornet MFA (Multi-Factor Authentication) features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Censornet
    Year Founded
    2015
    HQ Location
    Basingstoke, England
    Twitter
    @censornet
    1,912 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    71 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secure access to a wide range of systems, services and applications using an adaptive, cloud-based multi-factor authentication solution. Protect user accounts with more than just a password and reduce

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Censornet MFA (Multi-Factor Authentication) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
2FA Security
1
Data Analysis
1
Data Security
1
Security
1
SSO Security
1
Cons
This product has not yet received any negative sentiments.
Censornet MFA (Multi-Factor Authentication) features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
10.0
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
Seller
Censornet
Year Founded
2015
HQ Location
Basingstoke, England
Twitter
@censornet
1,912 Twitter followers
LinkedIn® Page
www.linkedin.com
71 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CENTAGATE CLOUD offers a centralized login option that protects all applications from security breaches by using FIDO2 passwordless authentication. Control, protect and secure your application access.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Centagate Cloud features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

CENTAGATE CLOUD offers a centralized login option that protects all applications from security breaches by using FIDO2 passwordless authentication. Control, protect and secure your application access.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Centagate Cloud features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Customer Alerts creates a frictionless user experience for businesses who want to inspire confidence by protecting users and their data from compromise. Using alerts, companies are able to gain a mark

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Deduce Customer Alerts features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Deduce
Product Description
How are these determined?Information
This description is provided by the seller.

Customer Alerts creates a frictionless user experience for businesses who want to inspire confidence by protecting users and their data from compromise. Using alerts, companies are able to gain a mark

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Deduce Customer Alerts features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Deduce
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    eMudhra's emAS flagship multifactor authentication suite, integrates with multiple core banking and internet banking platforms to allow digital signature based authentication between customers, banks,

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • eMAS features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    emudhra
    Year Founded
    2008
    HQ Location
    Bangalore, Karnataka
    Twitter
    @eMudhra
    3,631 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    891 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

eMudhra's emAS flagship multifactor authentication suite, integrates with multiple core banking and internet banking platforms to allow digital signature based authentication between customers, banks,

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
eMAS features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
emudhra
Year Founded
2008
HQ Location
Bangalore, Karnataka
Twitter
@eMudhra
3,631 Twitter followers
LinkedIn® Page
www.linkedin.com
891 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entrust Identity Essentials is a cost-effective, easy-to-deploy on-premises multi-factor authentication (MFA) solution that lets Windows-based organizations realize a Zero Trust approach to security.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Entrust Identity Essentials features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1969
    HQ Location
    Minneapolis, MN
    Twitter
    @Entrust_Corp
    6,428 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,352 employees on LinkedIn®
    Phone
    1-888-690-2424
Product Description
How are these determined?Information
This description is provided by the seller.

Entrust Identity Essentials is a cost-effective, easy-to-deploy on-premises multi-factor authentication (MFA) solution that lets Windows-based organizations realize a Zero Trust approach to security.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Entrust Identity Essentials features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.3
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
Year Founded
1969
HQ Location
Minneapolis, MN
Twitter
@Entrust_Corp
6,428 Twitter followers
LinkedIn® Page
www.linkedin.com
3,352 employees on LinkedIn®
Phone
1-888-690-2424