Top Rated UserLock Alternatives
6 UserLock Reviews

Easy to install and configure, enterprise-level software. Excellent integration with Microsoft LDA. Very efficient support Review collected by and hosted on G2.com.
for now nothing to report. the software meets our requests Review collected by and hosted on G2.com.
From all the 2FA solutions I could find on the internet UserLock fits our need to add 2FA to an IIS application using Windows Authentication. Review collected by and hosted on G2.com.
The lack of a user self-service option, all our MFA enabled users are external customers. Review collected by and hosted on G2.com.
UserLock is a very simple and self-explanatory software.
Once set up, it does its job without having to change anything.
I have tested several 2FA software. In the end, I stuck with UserLock because I have almost no administrative effort.
I really like the reports and the control of who is connected to which device.
The Geo Location also works well. One of my employees was abroad and couldn't log in, so I know that this function is also good.
Translated with www.DeepL.com/Translator (free version) Review collected by and hosted on G2.com.
What I don't like so much is the fact that when changes are made in AD, the groupe has to be recreated in UserLock because it doesn't update the users. I have noticed this twice so far.
I simply deleted the respective group and copied another group and adjusted the group. Review collected by and hosted on G2.com.
The ability to see the sessions and where users in logged in. it helps on daily basis Review collected by and hosted on G2.com.
First - I would add control over computer accounts and not just users. For example, on a certain computer only users x, y, z can connect. Currently the rules of the restrictions are by users only.
Secound - there is a bug that sometimes when user's logging in via MFA, the desktop appears with the "Enter mfa code" screen. (while it shoud sppear only after the MFA autentication). Review collected by and hosted on G2.com.
This was an important resource for our company, especially in order to protect many confidential files and information. Review collected by and hosted on G2.com.
This is ideal for a company with a large number of employees and remote workers, being in a small company, we ended up not needing enough of this softwares resources to make it worth the cost. Review collected by and hosted on G2.com.