Top Rated RSA SecureID Alternatives

One of the good things about RSA (SecuriD) is that it can be integrated into the system as security. With the TWO factor feature, we can make processes safe. Its interface is user friendly. Review collected by and hosted on G2.com.
In physical rsa keys, it is a little difficult to understand that the password is process lock in lock states, so it can be bad. Active directory integration processes are difficult and cumbersome. Review collected by and hosted on G2.com.
107 out of 108 Total Reviews for RSA SecureID
Overall Review Sentiment for RSA SecureID
Log in to view review sentiment.

RSA SecurID Risk-Based Authentication stands as a cybersecurity sentinel, transcending traditional paradigms. Imagine it as a digital chameleon, dynamically adapting to user behavior. It discerns not just passwords but the subtleties in your digital dance, a symphony of actions that forms a unique signature. This isn't mere gatekeeping; it's intelligent custodianship. By scrutinizing patterns and anomalies, it functions like a cognitive gatekeeper, granting access based on informed confidence. It's the fusion of user identity and behavioral analytics, a security tango where the system learns the rhythm of normalcy and detects the discord of potential threats. RSA SecurID Risk-Based Authentication is not just a security protocol; it's a harmonious blend of human interaction and machine intelligence, orchestrating protection in a nuanced and adaptive symphony of defense. Review collected by and hosted on G2.com.
RSA SecurID has considerations: high costs for implementation, dependence on physical tokens or mobile apps posing risks if lost, integration complexities into existing systems, potential user resistance due to added steps, and the need for robust mobile device security. Additionally, as with any cryptographic system, staying vigilant for algorithm vulnerabilities is crucial. Review collected by and hosted on G2.com.
In our organization, RSA SecurID Authentication Manger takes the risk out of Multi Factor user access for authorized personnel. Customer Service and Technical support is outstanding. Review collected by and hosted on G2.com.
Nothing to dislike. Our Organization has utilized RSA SecurID products for several years. Review collected by and hosted on G2.com.

Easy to use, very rarely gives issues, you are connected to the network securely Review collected by and hosted on G2.com.
When I was using this software I need to carry the device for the autentication code which was kind of demerit. Later they released the app I gues. Review collected by and hosted on G2.com.
It is easy to use. The token has never delayed my productivity and was easy to update when I needed to. Review collected by and hosted on G2.com.
The downside of SecurID is that the app needs to be on a smartphone and connected to the internet/cellular service, but that is common for two-factor authenticator apps. Stored accessible codes would be great. Review collected by and hosted on G2.com.
RSA secure id is very important for vpn environment.
It has support client management access via xenapp server.
It can be easily handle to provide access to end user to support remotely task.
It is very protective against security threat. Review collected by and hosted on G2.com.
If it loss then you can't recover easily.
Some challenge you might face to login your virtual system or site.
Easy to use Review collected by and hosted on G2.com.

SecurID can be integrated with many systems and applications, including remote access VPNs, cloud-based applications, and on-premises systems. We used this in both remote environments as well as an inhouse office environments. Review collected by and hosted on G2.com.
Once one of our colleague's pins was lost in travel. These hardware tokens are costly to replace, and the authentication process took us around 2 weeks to implement. Review collected by and hosted on G2.com.

Trust worthy and secure. Work extremely smooth every time. Every time I take security passcode from app and put in my application everytime it works. Review collected by and hosted on G2.com.
User interface is not upto the mark. New user might face issue to find various information like binding id Review collected by and hosted on G2.com.

SecurID provides the most secure way of accessing because of hosting it inside a DMZ.
Soft tokens are the better because it can be installed on handheld devices as well as desktop and laptops. Review collected by and hosted on G2.com.
Hard tokens are like a liability, they had to be carried with the user. Also cost is high for hard tokens. Review collected by and hosted on G2.com.

The software is very to easy and reachable for any kind of user, you do not need to be a tech savant to use this one, even though it has several menus specialized on different functions. Review collected by and hosted on G2.com.
How dependant it is of different variables like the date and time of the local machine it is being used on. I understand that this is one of the parameters for server syncing but you can always access to internet date and time to sync. Review collected by and hosted on G2.com.

I like the fact how efficient RSA software is with granting access to only authenticate people Review collected by and hosted on G2.com.
Nothing much. Just instead of a software on laptop, it can enhance with some kind of physical device providing codes. Review collected by and hosted on G2.com.