Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

1 Symantec Advanced Authentication Reviews

5.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.

Symantec Advanced Authentication Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
Haswitha N.
HN
Associate Consultant
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Symantec Advanced Authentication?

1. It provides secure, user convenient and cost effective way to protect mobile and web based applications.

2. It improves security for online transactions.

3.It deploy and manage a wide range of multi factor authentication like JBA and two factor software tojens and many more.

4. It supports Cryptographic camouflage which is a patented key concealment technology usex to protect unique auth ID and mobile OTP credentials.

5. Frictionless accesss and authentication.

6.Superios user experience Review collected by and hosted on G2.com.

What do you dislike about Symantec Advanced Authentication?

1. Due to high resources consuption it is slow down the performance.

2. Initial configuration is reported difficult at times. Review collected by and hosted on G2.com.

There are not enough reviews of Symantec Advanced Authentication for G2 to provide buying insight. Below are some alternatives with more reviews:

1
LastPass Logo
LastPass
4.5
(1,756)
LastPass business solutions help teams & businesses take control of their identity management with password management, single sign-on (SSO), and adaptive multifactor authentication (MFA).
2
1Password Logo
1Password
4.7
(1,362)
1Password remembers your passwords for you — and helps you make them stronger. All your secrets are secure and always available, safe behind the one password that only you know.
3
Sift Logo
Sift
4.7
(449)
Sift is a fraud detection system it has flexible, adaptive, and automated solution thathelps businesses of all sizes detect and prevent fraud, before it hits the bottom line.
4
Cisco Duo Logo
Cisco Duo
4.5
(394)
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
5
OneLogin Logo
OneLogin
4.4
(285)
Extend enterprise security & compliance to all public and private cloud apps with secure single sign-on (SSO), multi-factor authentication & user provisioning.
6
Auth0 Logo
Auth0
4.3
(193)
Auth0 is a cloud service that provides a set of unified APIs and tools that enables single sign-on and user management for any application, API or IoT device, it allows connections to any identity provider from social to enterprise to custom username/password databases.
7
IBM Verify Logo
IBM Verify
4.3
(139)
Provides identity-as-a-service (IDaaS) for every user, including single sign-on (SSO), risk-based multi-factor authentication (MFA), adaptive access, user lifecycle management, and identity analytics
8
Uniqkey Logo
Uniqkey
4.4
(137)
Uniqkey is an all-in-one platform designed to protect companies against the increasing cyber threat with innovative password & identity management. With excellent end-user experience, easy implementation, and military-grade offline security we provide maximum security while empowering your workforce with automated workflows. We combine the most powerful features from leading cyber security tools and state-of-the-art technology to remove the daily use of passwords completely while providing an overview and control over all credentials, services, and employee access across all platforms. Say goodbye to time-consuming logins, weak and reused password,s and reclaim control of your it infrastructure within minitues.
9
Kount Logo
Kount
4.8
(112)
Kount technology provides customizable automation, real-time analytics, and robust identity insights so businesses can make data-driven decisions and increase revenue.
10
CyberArk Workforce Identity Logo
CyberArk Workforce Identity
4.4
(107)
Today’s new reality requires a new kind of access platform. Built on Zero Trust, CyberArk Identity is creating a new era -secure access everywhere- that uniquely combines leading capabilities to seamlessly integrate SSO, MFA, EMM and UBA. Using our proven technologies, we’re ushering in a new generation of access technology that not only protects companies, but also leads to happier customers, better products and more valuable organizations.
Show More