Best Risk-Based Authentication Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Risk-based authentication (RBA) solutions are identity management products that weigh user variables to determine and identify threats. Companies use RBA software to increase the effectiveness of user governance and authentication procedures. Users who are determined to be riskier are required to provide additional authentication information. These analyze IP addresses, devices, behaviors and identities to set customized authentication methods for each individual user attempting to access the network. Non-suspicious users accessing applications from known devices, locations, and networks may be automatically signed in. Suspicious users may be required to prompted to provide SMS code, biometric verification, or email confirmation actions to properly verify their identity.

Risk-based authentication products often contain multi-factor authentication features, but set unique requirements based the administrators configuration. RBA tools may work in sync with cloud identity and access management products, but typically only provide the authentication component, rather than the application access and governance components.

To qualify for inclusion in the Risk-Based Authentication category, a product must:

Assess a user’s unique network, device, and behavior to determine risk
Prompt authentication measures after assessment
Utilize authentication methods such as SMS, questioning, or email confirmation
Periodically store and update suspicious networks, devices, and behaviors

Best Risk-Based Authentication Software At A Glance

Leader:
Highest Performer:
Best Contender:
Most Niche:
Most Trending:
Show LessShow More
Best Contender:
Most Niche:
Most Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
107 Listings in Risk-Based Authentication (RBA) Available
(449)4.7 out of 5
Optimized for quick response
1st Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sift is the AI-powered fraud platform delivering identity trust for leading global businesses. Our deep investments in machine learning and user identity, a data network scoring 1 trillion events per

    Users
    • Risk Investigator
    • Fraud Analyst
    Industries
    • Financial Services
    • Consumer Services
    Market Segment
    • 55% Mid-Market
    • 29% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Sift is a fraud detection and risk management tool that provides insights into transactions, identifies potential fraudulent activity, and offers customizable workflows for businesses.
    • Reviewers like the comprehensive data Sift provides, its ease of use, and its ability to detect and link behavioral patterns, which aids in fraud prevention and enhances customer service.
    • Reviewers noted that Sift's risk scores can sometimes be inaccurate, requiring manual double-checking, and that the platform occasionally misclassifies normal activity as suspicious, potentially impacting user experience.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sift Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    115
    Fraud Prevention
    99
    Data Analysis
    71
    Fraud Detection
    57
    Detection Efficiency
    49
    Cons
    Inaccuracy
    41
    Insufficient Information
    31
    Lack of Clarity
    21
    Complexity
    18
    Insufficient Data
    17
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sift features and usability ratings that predict user satisfaction
    8.5
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.9
    Policy Management
    Average: 9.0
    8.9
    Ease of Use
    Average: 9.0
    8.1
    Cloud Directory
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    San Francisco, CA
    Twitter
    @GetSift
    9,661 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    339 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sift is the AI-powered fraud platform delivering identity trust for leading global businesses. Our deep investments in machine learning and user identity, a data network scoring 1 trillion events per

Users
  • Risk Investigator
  • Fraud Analyst
Industries
  • Financial Services
  • Consumer Services
Market Segment
  • 55% Mid-Market
  • 29% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Sift is a fraud detection and risk management tool that provides insights into transactions, identifies potential fraudulent activity, and offers customizable workflows for businesses.
  • Reviewers like the comprehensive data Sift provides, its ease of use, and its ability to detect and link behavioral patterns, which aids in fraud prevention and enhances customer service.
  • Reviewers noted that Sift's risk scores can sometimes be inaccurate, requiring manual double-checking, and that the platform occasionally misclassifies normal activity as suspicious, potentially impacting user experience.
Sift Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
115
Fraud Prevention
99
Data Analysis
71
Fraud Detection
57
Detection Efficiency
49
Cons
Inaccuracy
41
Insufficient Information
31
Lack of Clarity
21
Complexity
18
Insufficient Data
17
Sift features and usability ratings that predict user satisfaction
8.5
Bi-Directional Identity Synchronization
Average: 8.9
8.9
Policy Management
Average: 9.0
8.9
Ease of Use
Average: 9.0
8.1
Cloud Directory
Average: 9.0
Seller Details
Company Website
Year Founded
2011
HQ Location
San Francisco, CA
Twitter
@GetSift
9,661 Twitter followers
LinkedIn® Page
www.linkedin.com
339 employees on LinkedIn®
(394)4.5 out of 5
Optimized for quick response
2nd Easiest To Use in Risk-Based Authentication (RBA) software
View top Consulting Services for Cisco Duo
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

    Users
    • Consultant
    • Software Engineer
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 44% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Duo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    89
    Authentication Ease
    60
    Security
    59
    Authentication
    54
    Easy Access
    45
    Cons
    Authentication Issues
    32
    Access Limitations
    24
    Login Issues
    21
    Notification Issues
    15
    Poor Notifications
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Duo features and usability ratings that predict user satisfaction
    9.7
    Bi-Directional Identity Synchronization
    Average: 8.9
    9.4
    Policy Management
    Average: 9.0
    9.3
    Ease of Use
    Average: 9.0
    9.4
    Cloud Directory
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • User Sentiment
    How are these determined?Information
    These insights are written by G2's Market Research team, using actual user reviews for Cisco Duo, left between September 2020 and April 2022.
    • Reviewers of Duo Security frequently cite the push notifications as being a major benefit of this software, but some wish the push notifications were faster.
    • Reviewers mention that they use Duo security to improve the security of their login process, but sometimes the login request times out too quickly.
    • Reviewers of Duo Security mention that they like how easy setup and integration is for end users.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Company Website
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    733,457 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97,323 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

Users
  • Consultant
  • Software Engineer
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 44% Enterprise
  • 38% Mid-Market
Cisco Duo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
89
Authentication Ease
60
Security
59
Authentication
54
Easy Access
45
Cons
Authentication Issues
32
Access Limitations
24
Login Issues
21
Notification Issues
15
Poor Notifications
12
Cisco Duo features and usability ratings that predict user satisfaction
9.7
Bi-Directional Identity Synchronization
Average: 8.9
9.4
Policy Management
Average: 9.0
9.3
Ease of Use
Average: 9.0
9.4
Cloud Directory
Average: 9.0
User Sentiment
How are these determined?Information
These insights are written by G2's Market Research team, using actual user reviews for Cisco Duo, left between September 2020 and April 2022.
  • Reviewers of Duo Security frequently cite the push notifications as being a major benefit of this software, but some wish the push notifications were faster.
  • Reviewers mention that they use Duo security to improve the security of their login process, but sometimes the login request times out too quickly.
  • Reviewers of Duo Security mention that they like how easy setup and integration is for end users.
Seller Details
Seller
Cisco
Company Website
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
733,457 Twitter followers
LinkedIn® Page
www.linkedin.com
97,323 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(200)4.3 out of 5
6th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and se

    Users
    • Software Engineer
    • Software Developer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 52% Small-Business
    • 26% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Auth0 Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    11
    Security
    10
    Authentication
    9
    Customizability
    7
    Integrations
    7
    Cons
    Expensive
    7
    Complex Setup
    5
    Cost
    5
    Expensive Pricing
    4
    Complex Administration
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Auth0 features and usability ratings that predict user satisfaction
    9.2
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.9
    Policy Management
    Average: 9.0
    8.5
    Ease of Use
    Average: 9.0
    9.4
    Cloud Directory
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • User Sentiment
    How are these determined?Information
    These insights are written by G2's Market Research team, using actual user reviews for Auth0, left between December 2020 and January 2022.
    • Reviewers mention that Auth0 is easy to use, easy to deploy, and easy to update.
    • Reviewers of Auth0 cite their great experiences with customer support in resolving their issues.
    • Reviewers say that the examples given in product documentation are intuitive and easy to follow.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okta
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @okta
    42,268 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,122 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and se

Users
  • Software Engineer
  • Software Developer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 52% Small-Business
  • 26% Mid-Market
Auth0 Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
11
Security
10
Authentication
9
Customizability
7
Integrations
7
Cons
Expensive
7
Complex Setup
5
Cost
5
Expensive Pricing
4
Complex Administration
3
Auth0 features and usability ratings that predict user satisfaction
9.2
Bi-Directional Identity Synchronization
Average: 8.9
8.9
Policy Management
Average: 9.0
8.5
Ease of Use
Average: 9.0
9.4
Cloud Directory
Average: 9.0
User Sentiment
How are these determined?Information
These insights are written by G2's Market Research team, using actual user reviews for Auth0, left between December 2020 and January 2022.
  • Reviewers mention that Auth0 is easy to use, easy to deploy, and easy to update.
  • Reviewers of Auth0 cite their great experiences with customer support in resolving their issues.
  • Reviewers say that the examples given in product documentation are intuitive and easy to follow.
Seller Details
Seller
Okta
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@okta
42,268 Twitter followers
LinkedIn® Page
www.linkedin.com
8,122 employees on LinkedIn®
(1,758)4.5 out of 5
Optimized for quick response
3rd Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:$4.25
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LastPass is a cloud-based password manager solution designed to help users securely store, manage, and access their passwords across various devices and platforms. This innovative tool simplifies the

    Users
    • Owner
    • CEO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 63% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • LastPass Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    394
    Password Management
    247
    Security
    221
    Autofill Feature
    176
    Convenience
    164
    Cons
    Password Management
    169
    Autofill Issues
    142
    Login Issues
    98
    Password Issues
    52
    Security Issues
    49
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LastPass features and usability ratings that predict user satisfaction
    9.3
    Bi-Directional Identity Synchronization
    Average: 8.9
    9.4
    Policy Management
    Average: 9.0
    8.7
    Ease of Use
    Average: 9.0
    9.3
    Cloud Directory
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • User Sentiment
    How are these determined?Information
    These insights are written by G2's Market Research team, using actual user reviews for LastPass, left between March 2018 and May 2022.
    • Reviewers mention that LastPass is a huge time saver for them.
    • Reviewers say that they like the simple user interface of LastPass.
    • Reviewers cite they’d like improved user experiences, however.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LastPass
    Company Website
    Year Founded
    2008
    HQ Location
    Boston, Massachusetts
    Twitter
    @LastPass
    47,673 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    846 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LastPass is a cloud-based password manager solution designed to help users securely store, manage, and access their passwords across various devices and platforms. This innovative tool simplifies the

Users
  • Owner
  • CEO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 63% Small-Business
  • 25% Mid-Market
LastPass Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
394
Password Management
247
Security
221
Autofill Feature
176
Convenience
164
Cons
Password Management
169
Autofill Issues
142
Login Issues
98
Password Issues
52
Security Issues
49
LastPass features and usability ratings that predict user satisfaction
9.3
Bi-Directional Identity Synchronization
Average: 8.9
9.4
Policy Management
Average: 9.0
8.7
Ease of Use
Average: 9.0
9.3
Cloud Directory
Average: 9.0
User Sentiment
How are these determined?Information
These insights are written by G2's Market Research team, using actual user reviews for LastPass, left between March 2018 and May 2022.
  • Reviewers mention that LastPass is a huge time saver for them.
  • Reviewers say that they like the simple user interface of LastPass.
  • Reviewers cite they’d like improved user experiences, however.
Seller Details
Seller
LastPass
Company Website
Year Founded
2008
HQ Location
Boston, Massachusetts
Twitter
@LastPass
47,673 Twitter followers
LinkedIn® Page
www.linkedin.com
846 employees on LinkedIn®
(107)4.4 out of 5
5th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:Starting at $2.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 48% Enterprise
    • 48% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Workforce Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    8
    Security
    7
    Ease of Use
    6
    Access Management
    5
    Access Control
    4
    Cons
    Timing Issues
    3
    Complexity
    2
    Complex Usability
    2
    Delayed Response
    2
    Difficult Learning
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Workforce Identity features and usability ratings that predict user satisfaction
    8.3
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.3
    Policy Management
    Average: 9.0
    8.7
    Ease of Use
    Average: 9.0
    10.0
    Cloud Directory
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,293 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,824 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 48% Enterprise
  • 48% Mid-Market
CyberArk Workforce Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
8
Security
7
Ease of Use
6
Access Management
5
Access Control
4
Cons
Timing Issues
3
Complexity
2
Complex Usability
2
Delayed Response
2
Difficult Learning
2
CyberArk Workforce Identity features and usability ratings that predict user satisfaction
8.3
Bi-Directional Identity Synchronization
Average: 8.9
8.3
Policy Management
Average: 9.0
8.7
Ease of Use
Average: 9.0
10.0
Cloud Directory
Average: 9.0
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,293 Twitter followers
LinkedIn® Page
www.linkedin.com
3,824 employees on LinkedIn®
Ownership
NASDAQ:CYBR
(112)4.8 out of 5
Optimized for quick response
10th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kount is trust and safety technology. Businesses pick the solutions that are relevant to their unique challenges, and we help them grow with confidence — no matter the industry. We use data-driven

    Users
    No information available
    Industries
    • Retail
    • Apparel & Fashion
    Market Segment
    • 46% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kount Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Fraud Prevention
    12
    Customer Support
    8
    Ease of Use
    6
    Fraud Protection
    6
    Data Analysis
    5
    Cons
    Lack of Clarity
    4
    Not User-Friendly
    3
    Complex Usability
    2
    Inaccuracy
    2
    Inconvenience
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kount features and usability ratings that predict user satisfaction
    9.2
    Bi-Directional Identity Synchronization
    Average: 8.9
    9.3
    Policy Management
    Average: 9.0
    9.2
    Ease of Use
    Average: 9.0
    9.2
    Cloud Directory
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2007
    HQ Location
    Boise, ID
    Twitter
    @KountInc
    2,467 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    254 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kount is trust and safety technology. Businesses pick the solutions that are relevant to their unique challenges, and we help them grow with confidence — no matter the industry. We use data-driven

Users
No information available
Industries
  • Retail
  • Apparel & Fashion
Market Segment
  • 46% Mid-Market
  • 33% Small-Business
Kount Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Fraud Prevention
12
Customer Support
8
Ease of Use
6
Fraud Protection
6
Data Analysis
5
Cons
Lack of Clarity
4
Not User-Friendly
3
Complex Usability
2
Inaccuracy
2
Inconvenience
2
Kount features and usability ratings that predict user satisfaction
9.2
Bi-Directional Identity Synchronization
Average: 8.9
9.3
Policy Management
Average: 9.0
9.2
Ease of Use
Average: 9.0
9.2
Cloud Directory
Average: 9.0
Seller Details
Company Website
Year Founded
2007
HQ Location
Boise, ID
Twitter
@KountInc
2,467 Twitter followers
LinkedIn® Page
www.linkedin.com
254 employees on LinkedIn®
(139)4.3 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:$1.71 / user, per month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 66% Enterprise
    • 38% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • IBM Verify is an identity access management tool that provides secure user authentication and integration capabilities for managing customer and workforce identities.
    • Users like the tool's advanced authentication methods, including multi-factor authentication and single sign-on, its ease of use, and its ability to automate access allocation and revocation, enhancing security and simplifying user access.
    • Reviewers mentioned that the initial setup and configuration can be complex and time-consuming, especially for those new to identity management systems, and that the platform requires some learning and can be expensive.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Verify Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    34
    Ease of Use
    24
    Authentication
    23
    Identity Management
    20
    Features
    19
    Cons
    Expensive
    12
    Difficult Learning
    11
    Complexity
    10
    Complex Setup
    10
    Cost
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Verify features and usability ratings that predict user satisfaction
    8.8
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.7
    Policy Management
    Average: 9.0
    8.4
    Ease of Use
    Average: 9.0
    9.0
    Cloud Directory
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Company Website
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    710,706 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    317,108 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 66% Enterprise
  • 38% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • IBM Verify is an identity access management tool that provides secure user authentication and integration capabilities for managing customer and workforce identities.
  • Users like the tool's advanced authentication methods, including multi-factor authentication and single sign-on, its ease of use, and its ability to automate access allocation and revocation, enhancing security and simplifying user access.
  • Reviewers mentioned that the initial setup and configuration can be complex and time-consuming, especially for those new to identity management systems, and that the platform requires some learning and can be expensive.
IBM Verify Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
34
Ease of Use
24
Authentication
23
Identity Management
20
Features
19
Cons
Expensive
12
Difficult Learning
11
Complexity
10
Complex Setup
10
Cost
9
IBM Verify features and usability ratings that predict user satisfaction
8.8
Bi-Directional Identity Synchronization
Average: 8.9
8.7
Policy Management
Average: 9.0
8.4
Ease of Use
Average: 9.0
9.0
Cloud Directory
Average: 9.0
Seller Details
Seller
IBM
Company Website
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
710,706 Twitter followers
LinkedIn® Page
www.linkedin.com
317,108 employees on LinkedIn®
(17)4.8 out of 5
4th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative age

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Silverfort features and usability ratings that predict user satisfaction
    6.7
    Bi-Directional Identity Synchronization
    Average: 8.9
    6.7
    Policy Management
    Average: 9.0
    9.9
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Tel Aviv, Israel
    Twitter
    @silverfort
    589 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    404 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative age

Users
No information available
Industries
No information available
Market Segment
  • 47% Small-Business
  • 35% Mid-Market
Silverfort features and usability ratings that predict user satisfaction
6.7
Bi-Directional Identity Synchronization
Average: 8.9
6.7
Policy Management
Average: 9.0
9.9
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
Year Founded
2016
HQ Location
Tel Aviv, Israel
Twitter
@silverfort
589 Twitter followers
LinkedIn® Page
www.linkedin.com
404 employees on LinkedIn®
(1,362)4.7 out of 5
13th Easiest To Use in Risk-Based Authentication (RBA) software
View top Consulting Services for 1Password
Save to My Lists
100% off: 0
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Most Used Enterprise Password Manager, trusted by over 150,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure

    Users
    • Software Engineer
    • Owner
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 60% Small-Business
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • 1Password Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    98
    Security
    76
    Intuitive
    32
    Secure Sharing
    31
    Password Management
    30
    Cons
    Password Management
    41
    Authentication Issues
    25
    Login Issues
    21
    Process Complexity
    20
    Autofill Issues
    18
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 1Password features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    9.0
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    1Password
    Company Website
    Year Founded
    2005
    HQ Location
    Ontario
    Twitter
    @1Password
    141,746 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,449 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Most Used Enterprise Password Manager, trusted by over 150,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure

Users
  • Software Engineer
  • Owner
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 60% Small-Business
  • 30% Mid-Market
1Password Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
98
Security
76
Intuitive
32
Secure Sharing
31
Password Management
30
Cons
Password Management
41
Authentication Issues
25
Login Issues
21
Process Complexity
20
Autofill Issues
18
1Password features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
9.0
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
Seller
1Password
Company Website
Year Founded
2005
HQ Location
Ontario
Twitter
@1Password
141,746 Twitter followers
LinkedIn® Page
www.linkedin.com
2,449 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Thales’ SafeNet Trusted Access is a cloud-based Access Management and Authentication Service. It ensures that no user is a target by allowing you to expand authentication to all users and apps with di

    Users
    No information available
    Industries
    • Computer Networking
    Market Segment
    • 68% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Thales SafeNet Trusted Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Administration Management
    1
    Convenience
    1
    Customer Support
    1
    Customizability
    1
    Cons
    Authentication Issues
    1
    Compatibility Issues
    1
    Device Limitations
    1
    Integration Issues
    1
    Limited Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Thales SafeNet Trusted Access features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    9.8
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin, Texas
    Twitter
    @ThalesCloudSec
    6,823 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    666 employees on LinkedIn®
    Ownership
    EPA:HO
    Total Revenue (USD mm)
    $15,854
Product Description
How are these determined?Information
This description is provided by the seller.

Thales’ SafeNet Trusted Access is a cloud-based Access Management and Authentication Service. It ensures that no user is a target by allowing you to expand authentication to all users and apps with di

Users
No information available
Industries
  • Computer Networking
Market Segment
  • 68% Enterprise
  • 25% Mid-Market
Thales SafeNet Trusted Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Administration Management
1
Convenience
1
Customer Support
1
Customizability
1
Cons
Authentication Issues
1
Compatibility Issues
1
Device Limitations
1
Integration Issues
1
Limited Reporting
1
Thales SafeNet Trusted Access features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
9.8
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
HQ Location
Austin, Texas
Twitter
@ThalesCloudSec
6,823 Twitter followers
LinkedIn® Page
www.linkedin.com
666 employees on LinkedIn®
Ownership
EPA:HO
Total Revenue (USD mm)
$15,854
(90)4.5 out of 5
9th Easiest To Use in Risk-Based Authentication (RBA) software
View top Consulting Services for WSO2 Identity Server
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    WSO2 Identity Server is a modern, open-source Customer Identity and Access Management (CIAM) solution designed to enhance user experiences across various digital platforms. This robust software provid

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • WSO2 Identity Server Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Authentication
    16
    Security
    15
    Ease of Use
    12
    Identity Management
    12
    Single Sign-On
    12
    Cons
    Complex Setup
    7
    Difficult Learning
    7
    Complexity
    6
    Expertise Requirement
    6
    Required Expertise
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WSO2 Identity Server features and usability ratings that predict user satisfaction
    9.3
    Bi-Directional Identity Synchronization
    Average: 8.9
    9.3
    Policy Management
    Average: 9.0
    8.5
    Ease of Use
    Average: 9.0
    9.5
    Cloud Directory
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    WSO2
    Company Website
    Year Founded
    2005
    HQ Location
    Mountain View, CA
    Twitter
    @wso2
    12,698 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,154 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

WSO2 Identity Server is a modern, open-source Customer Identity and Access Management (CIAM) solution designed to enhance user experiences across various digital platforms. This robust software provid

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Mid-Market
  • 36% Enterprise
WSO2 Identity Server Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Authentication
16
Security
15
Ease of Use
12
Identity Management
12
Single Sign-On
12
Cons
Complex Setup
7
Difficult Learning
7
Complexity
6
Expertise Requirement
6
Required Expertise
6
WSO2 Identity Server features and usability ratings that predict user satisfaction
9.3
Bi-Directional Identity Synchronization
Average: 8.9
9.3
Policy Management
Average: 9.0
8.5
Ease of Use
Average: 9.0
9.5
Cloud Directory
Average: 9.0
Seller Details
Seller
WSO2
Company Website
Year Founded
2005
HQ Location
Mountain View, CA
Twitter
@wso2
12,698 Twitter followers
LinkedIn® Page
www.linkedin.com
1,154 employees on LinkedIn®
(29)4.4 out of 5
11th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

    Users
    No information available
    Industries
    • Hospital & Health Care
    Market Segment
    • 141% Mid-Market
    • 66% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureAuth: Workforce IAM features and usability ratings that predict user satisfaction
    9.7
    Bi-Directional Identity Synchronization
    Average: 8.9
    9.7
    Policy Management
    Average: 9.0
    8.9
    Ease of Use
    Average: 9.0
    9.5
    Cloud Directory
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Irvine, CA
    Twitter
    @SecureAuth
    8,782 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    157 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

Users
No information available
Industries
  • Hospital & Health Care
Market Segment
  • 141% Mid-Market
  • 66% Small-Business
SecureAuth: Workforce IAM features and usability ratings that predict user satisfaction
9.7
Bi-Directional Identity Synchronization
Average: 8.9
9.7
Policy Management
Average: 9.0
8.9
Ease of Use
Average: 9.0
9.5
Cloud Directory
Average: 9.0
Seller Details
Company Website
Year Founded
2005
HQ Location
Irvine, CA
Twitter
@SecureAuth
8,782 Twitter followers
LinkedIn® Page
www.linkedin.com
157 employees on LinkedIn®
(106)4.4 out of 5
12th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:$3 Per User Per Month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ping Identity (NYSE: PING) builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 67% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ping Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Administration Management
    2
    Ease of Use
    2
    Solutions
    2
    Adaptability
    1
    Customer Management
    1
    Cons
    Clunky Interface
    1
    Complex Administration
    1
    Complexity
    1
    Complex Setup
    1
    Complex Usage
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ping Identity features and usability ratings that predict user satisfaction
    9.2
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.7
    Policy Management
    Average: 9.0
    8.7
    Ease of Use
    Average: 9.0
    9.2
    Cloud Directory
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • User Sentiment
    How are these determined?Information
    These insights are written by G2's Market Research team, using actual user reviews for Ping Identity, left between October 2020 and April 2022.
    • Reviewers mention that they like that there is a desktop application in addition to a mobile app.
    • Reviewers value how easy Ping Identity is to set up and use.
    • Reviewers like the support Ping Identity provides, both from the user community and from Ping’s technical team.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,814 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,923 employees on LinkedIn®
    Phone
    1.303.468.2900
Product Description
How are these determined?Information
This description is provided by the seller.

Ping Identity (NYSE: PING) builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 67% Enterprise
  • 25% Mid-Market
Ping Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Administration Management
2
Ease of Use
2
Solutions
2
Adaptability
1
Customer Management
1
Cons
Clunky Interface
1
Complex Administration
1
Complexity
1
Complex Setup
1
Complex Usage
1
Ping Identity features and usability ratings that predict user satisfaction
9.2
Bi-Directional Identity Synchronization
Average: 8.9
8.7
Policy Management
Average: 9.0
8.7
Ease of Use
Average: 9.0
9.2
Cloud Directory
Average: 9.0
User Sentiment
How are these determined?Information
These insights are written by G2's Market Research team, using actual user reviews for Ping Identity, left between October 2020 and April 2022.
  • Reviewers mention that they like that there is a desktop application in addition to a mobile app.
  • Reviewers value how easy Ping Identity is to set up and use.
  • Reviewers like the support Ping Identity provides, both from the user community and from Ping’s technical team.
Seller Details
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,814 Twitter followers
LinkedIn® Page
www.linkedin.com
1,923 employees on LinkedIn®
Phone
1.303.468.2900
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Telesign's Verification products allow businesses to secure their ecosystem by having users prove they are in possession of their mobile device. Telesign Verification provides companies with the optio

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 58% Small-Business
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Telesign Verification Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    8
    Fraud Prevention
    5
    Features
    3
    Implementation Ease
    3
    Access Control
    2
    Cons
    Expensive
    5
    Login Issues
    2
    Slow Performance
    2
    Software Bugs
    2
    Inaccuracy
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Telesign Verification features and usability ratings that predict user satisfaction
    7.9
    Bi-Directional Identity Synchronization
    Average: 8.9
    7.9
    Policy Management
    Average: 9.0
    9.4
    Ease of Use
    Average: 9.0
    6.7
    Cloud Directory
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Telesign
    Company Website
    Year Founded
    2005
    HQ Location
    Marina del Rey, US
    Twitter
    @TeleSign
    1,902 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    768 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Telesign's Verification products allow businesses to secure their ecosystem by having users prove they are in possession of their mobile device. Telesign Verification provides companies with the optio

Users
No information available
Industries
No information available
Market Segment
  • 58% Small-Business
  • 37% Mid-Market
Telesign Verification Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
8
Fraud Prevention
5
Features
3
Implementation Ease
3
Access Control
2
Cons
Expensive
5
Login Issues
2
Slow Performance
2
Software Bugs
2
Inaccuracy
1
Telesign Verification features and usability ratings that predict user satisfaction
7.9
Bi-Directional Identity Synchronization
Average: 8.9
7.9
Policy Management
Average: 9.0
9.4
Ease of Use
Average: 9.0
6.7
Cloud Directory
Average: 9.0
Seller Details
Seller
Telesign
Company Website
Year Founded
2005
HQ Location
Marina del Rey, US
Twitter
@TeleSign
1,902 Twitter followers
LinkedIn® Page
www.linkedin.com
768 employees on LinkedIn®
(285)4.4 out of 5
8th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:$6 /User /Month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin e

    Users
    • Account Manager
    Industries
    • Computer Software
    • Education Management
    Market Segment
    • 49% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OneLogin Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Single Sign-On
    11
    SSO (Single Sign-On)
    9
    Easy Access
    6
    Security
    6
    Cons
    Bugs
    4
    Error Handling
    4
    Authentication Issues
    3
    Connection Issues
    3
    Login Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OneLogin features and usability ratings that predict user satisfaction
    8.6
    Bi-Directional Identity Synchronization
    Average: 8.9
    8.9
    Policy Management
    Average: 9.0
    9.1
    Ease of Use
    Average: 9.0
    9.4
    Cloud Directory
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • User Sentiment
    How are these determined?Information
    These insights are written by G2's Market Research team, using actual user reviews for OneLogin, left between February 2021 and April 2022.
    • Reviewers commonly cite that they use OneLogin to improve their security.
    • Reviewers appreciate the single-tap and ease of access to apps.
    • Reviewers mention that OneLogin support is quick and professional.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Aliso Viejo, CA
    Twitter
    @OneIdentity
    7,986 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    589 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin e

Users
  • Account Manager
Industries
  • Computer Software
  • Education Management
Market Segment
  • 49% Mid-Market
  • 40% Enterprise
OneLogin Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Single Sign-On
11
SSO (Single Sign-On)
9
Easy Access
6
Security
6
Cons
Bugs
4
Error Handling
4
Authentication Issues
3
Connection Issues
3
Login Issues
3
OneLogin features and usability ratings that predict user satisfaction
8.6
Bi-Directional Identity Synchronization
Average: 8.9
8.9
Policy Management
Average: 9.0
9.1
Ease of Use
Average: 9.0
9.4
Cloud Directory
Average: 9.0
User Sentiment
How are these determined?Information
These insights are written by G2's Market Research team, using actual user reviews for OneLogin, left between February 2021 and April 2022.
  • Reviewers commonly cite that they use OneLogin to improve their security.
  • Reviewers appreciate the single-tap and ease of access to apps.
  • Reviewers mention that OneLogin support is quick and professional.
Seller Details
HQ Location
Aliso Viejo, CA
Twitter
@OneIdentity
7,986 Twitter followers
LinkedIn® Page
www.linkedin.com
589 employees on LinkedIn®