Anakam.TFA vs Symantec Advanced Authentication comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Anakam.TFA and Symantec Advanced Authentication based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems.
To learn more, read our detailed Authentication Systems Report (Updated: March 2024).
765,234 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pricing and Cost Advice
Information Not Available
  • "There are eventually going to be implementation costs. Sometimes you're required to have custom code developments there, so that has to be part of the implementation price."
  • "The price is reasonable."
  • More Symantec Advanced Authentication Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
    765,234 professionals have used our research since 2012.
    Questions from the Community
    Ask a question

    Earn 20 points

    Top Answer:One of the most valuable aspects is its remarkable stability.
    Top Answer:There has been a need for aggressive development to modernize the product and align it with contemporary security requirements. While the rebranding has been a step forward, further enhancements are… more »
    Ranking
    46th
    Views
    109
    Comparisons
    80
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    19th
    Views
    327
    Comparisons
    201
    Reviews
    1
    Average Words per Review
    770
    Rating
    7.0
    Comparisons
    Also Known As
    CA Advanced Authentication, CA Strong Authentication, CA Risk Authentication, Arcot WebFort, Arcot RiskFort
    Learn More
    Overview

    Once users have access to a portal or applications, it is important to identify that the same users are returning in order to maintain security of the system and guard against account take-over, data loss and theft. Multifactor authentication is a simple yet secure way of knowing who is using your applications and ensuring that they are exactly who you expect them to be.

    Our strong, multi-factor authentication product offers a range of layered, secure authentication methods in a single integrated platform. It delivers secure one-time passcodes via multiple vectors:

    SMS (text messages)

    Mobile app

    Voice message (IVR)

    Hard token

    Out-of-band delivery of quickly expiring, one-time passcodes confirms that the person possessing the passcode is the one attempting to access your systems. Multiple authentication vectors ensure high-level security with user-required flexibility and usability.

    If a biometric method is required or desired, two-factor authentication can also be done through voice biometrics – a secure, software-based method that doesn't require special hardware or detailed training.

    Progressive authentication is our term for the best practice we pioneered—using an integrated set of tools and processes for situation-based authentication of known users seeking access to secure networks, data, and applications.

    Based on your policy decisions, our solution will trigger authentication challenges at login or when suspicious transactions, unknown or risky devices, or out-of-norm behavior is recognized. These security authentication parameters can be customized in real-time for users both inside and outside your organization, progressively presenting authentication challenges based upon the latest threat assessment.

    CA Advanced Authentication provides a secure, user-convenient and cost-effective way to protect online and mobile applications. The solution consists of two components:  CA Risk Authentication allows the enterprise to silently and transparently collect data and assess risk based on device identification, location and user behavior, among other factors, and CA Strong Authentication provides a wide variety of software-based, two-factor authentication credentials and technology to make passwords more secure.  Together they enable an intelligent, layered security approach to protect user identities and organizational data.

    Take the assessment


    Sample Customers
    Cinemark, City of Phoenix, RehabCare, PepsiAmericas, ServiceMaster, Exelon Corporation, Stein Mart
    Global bank, Large Filipino Bank and SK Infosec
    Top Industries
    No Data Available
    VISITORS READING REVIEWS
    Financial Services Firm25%
    Real Estate/Law Firm13%
    Comms Service Provider13%
    Computer Software Company11%
    Company Size
    No Data Available
    REVIEWERS
    Small Business22%
    Large Enterprise78%
    VISITORS READING REVIEWS
    Small Business26%
    Midsize Enterprise6%
    Large Enterprise68%
    Buyer's Guide
    Authentication Systems
    March 2024
    Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems. Updated: March 2024.
    765,234 professionals have used our research since 2012.

    Anakam.TFA is ranked 46th in Authentication Systems while Symantec Advanced Authentication is ranked 19th in Authentication Systems with 9 reviews. Anakam.TFA is rated 0.0, while Symantec Advanced Authentication is rated 7.8. On the other hand, the top reviewer of Symantec Advanced Authentication writes "Ensures robust security features and ease of deployment, although it may lack some of the more modern authentication options ". Anakam.TFA is most compared with , whereas Symantec Advanced Authentication is most compared with OneSpan DIGIPASS, Thales Authenticators and Symantec VIP Access Manager.

    See our list of best Authentication Systems vendors.

    We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.