Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Smart Authentication Reviews & Product Details

Smart Authentication Overview

What is Smart Authentication?

Smart Authentication (SA) is the ultimate solution for customer authentication and transaction signing, based on behavioural and risk based continuous evaluation, designed for innovative e-payment services.

Smart Authentication Details
Show LessShow More
Product Description

Smart Authentication (SA) is the ultimate solution for customer authentication and transaction signing, based on behavioural and risk based continuous evaluation, designed for innovative e-payment services.


Seller Details
Year Founded
2014
HQ Location
Padova, IT
Twitter
@XtnLab
116 Twitter followers
LinkedIn® Page
www.linkedin.com
30 employees on LinkedIn®

Recent Smart Authentication Reviews

DJ
Damjan J.Small-Business (50 or fewer emp.)
4.5 out of 5
"The Approapriate Approach that Makes System Authentication Reliable."
The deployment of Smart Authentication is straightforward. The interface from Smart Authentication is accessible and simplified. The integratio...
Laura G.
LG
Laura G.Enterprise (> 1000 emp.)
3.5 out of 5
"Online security has never been so important"
You can start for free and support the main social networks
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Smart Authentication Media

Answer a few questions to help the Smart Authentication community
Have you used Smart Authentication before?
Yes

2 Smart Authentication Reviews

4.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
2 Smart Authentication Reviews
4.0 out of 5
2 Smart Authentication Reviews
4.0 out of 5

Smart Authentication Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
DJ
Digital Marketer
Pharmaceuticals
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Smart Authentication?

The deployment of Smart Authentication is straightforward.

The interface from Smart Authentication is accessible and simplified.

The integration with other security approach makes the software excellent. Review collected by and hosted on G2.com.

What do you dislike about Smart Authentication?

Smart Authentication has infused all the security options, and it saves on issues malware and business safety. Review collected by and hosted on G2.com.

What problems is Smart Authentication solving and how is that benefiting you?

Smart Authentication makes every security access efficient, and no safety risks that companies take.

Further, the speed in malware attack detection is something the vendor has also navigated effortlessly. Review collected by and hosted on G2.com.

Laura G.
LG
Data Base Analyst
Real Estate
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Smart Authentication?

You can start for free and support the main social networks Review collected by and hosted on G2.com.

What do you dislike about Smart Authentication?

There's nothing I disliked about Smart Authentication although I do think the interface could be better. Review collected by and hosted on G2.com.

What problems is Smart Authentication solving and how is that benefiting you?

It's great knowing all of our passwords are secure since we handle very delicate information Review collected by and hosted on G2.com.

There are not enough reviews of Smart Authentication for G2 to provide buying insight. Below are some alternatives with more reviews:

1
LastPass Logo
LastPass
4.5
(1,757)
LastPass business solutions help teams & businesses take control of their identity management with password management, single sign-on (SSO), and adaptive multifactor authentication (MFA).
2
1Password Logo
1Password
4.7
(1,362)
1Password remembers your passwords for you — and helps you make them stronger. All your secrets are secure and always available, safe behind the one password that only you know.
3
Sift Logo
Sift
4.7
(449)
Sift is a fraud detection system it has flexible, adaptive, and automated solution thathelps businesses of all sizes detect and prevent fraud, before it hits the bottom line.
4
Cisco Duo Logo
Cisco Duo
4.5
(394)
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
5
OneLogin Logo
OneLogin
4.4
(285)
Extend enterprise security & compliance to all public and private cloud apps with secure single sign-on (SSO), multi-factor authentication & user provisioning.
6
Auth0 Logo
Auth0
4.3
(200)
Auth0 is a cloud service that provides a set of unified APIs and tools that enables single sign-on and user management for any application, API or IoT device, it allows connections to any identity provider from social to enterprise to custom username/password databases.
7
IBM Verify Logo
IBM Verify
4.3
(139)
Provides identity-as-a-service (IDaaS) for every user, including single sign-on (SSO), risk-based multi-factor authentication (MFA), adaptive access, user lifecycle management, and identity analytics
8
Uniqkey Logo
Uniqkey
4.4
(137)
Uniqkey is an all-in-one platform designed to protect companies against the increasing cyber threat with innovative password & identity management. With excellent end-user experience, easy implementation, and military-grade offline security we provide maximum security while empowering your workforce with automated workflows. We combine the most powerful features from leading cyber security tools and state-of-the-art technology to remove the daily use of passwords completely while providing an overview and control over all credentials, services, and employee access across all platforms. Say goodbye to time-consuming logins, weak and reused password,s and reclaim control of your it infrastructure within minitues.
9
Kount Logo
Kount
4.8
(112)
Kount technology provides customizable automation, real-time analytics, and robust identity insights so businesses can make data-driven decisions and increase revenue.
10
CyberArk Workforce Identity Logo
CyberArk Workforce Identity
4.4
(107)
Today’s new reality requires a new kind of access platform. Built on Zero Trust, CyberArk Identity is creating a new era -secure access everywhere- that uniquely combines leading capabilities to seamlessly integrate SSO, MFA, EMM and UBA. Using our proven technologies, we’re ushering in a new generation of access technology that not only protects companies, but also leads to happier customers, better products and more valuable organizations.
Show More