Authentication Systems Features

Read what people say are the most valuable features of the solutions they use.
reviewer1067106 says in a Duo Security review
IT Security Analyst with 5,001-10,000 employees
The feature that we find most valuable is Duo's ability to provide MFA via mechanisms that do not require a smartphone. We have many users who either refuse or are unable to use a smartphone. Buying them hardware tokens is out of the question, as well. The availability of mechanisms that can achieve MFA, but do not rely on either of those two supplementary elements, is critical for our user population. View full review »
Consultant77a says in a Symantec VIP review
Consultant at a government with 11-50 employees
It is easy to use. I use it when traveling. View full review »
ITSecuri6e6d says in a RSA Adaptive Authentication review
IT Security Engineer at a insurance company with 201-500 employees
The most valuable feature is the stock tokens. That works the best for us. View full review »
Directorc4e7 says in a RSA Adaptive Authentication review
Director of Cyber Security at a financial services firm with 1,001-5,000 employees
Ingestion of logs and raising alert space on those logs are the most valuable features. View full review »
Andres Roldan says in a RSA Adaptive Authentication review
Security Architect at Fluid Attacks
Stopping fraud in the banks. View full review »
Sambhaji Bhosale says in a RSA Authentication Manager review
Sr. Security Engineer at a tech services company with 10,001+ employees
The most valuable feature is the provision part. The mapping and the logging is also very good. In addition, the troubleshooting (from a console point of view) is easy for administration and on the provisioning and logging part. View full review »
Eugene Milon says in a FortiAuthenticator review
Network Security Engineer at a tech services company with 51-200 employees
Valuable features include the robust SSO features, when you have more complicated authentication within an organization. We can mix AD, Radius, Portal, SSO Portals (Google, etc.), and build our own environment. It is very flexible. View full review »
Dennis Seyersdahl says in a FortiAuthenticator review
IT System Manager at a transportation company with 11-50 employees
* Easy integration with FortiGate to allow for 2FA with our VPN. * Addition and removal of access as needed for the VPN. View full review »
SeniorPr01a2 says in a CA Advanced Authentication review
Senior Program Analyst at a logistics company with 10,001+ employees
Rules on Risk Authentication are very good. View full review »
Philippe Fonton says in a Technology Nexus PortWise review
Country & Sales Manager France, Benelux & South Europe at a tech services company with 201-500 employees
The flexibility to have one single source for the whole audit trail. Security is normally a function of what you know. If no access will ever be granted without our having a log of it, that is a great start. Together with this comes the Authentication and Authorization for almost any standard. Certification with digital signatures both for desktop and in your mobile. Other MFA using tokens and other soft tokens. And don't forget OATH, SAML and OpenID. We also provide HTML 5 support with SSO for RDP, Telnet SSH, for example. This is on top of our reverse proxy with SSO. View full review »
Guerassimov Tony says in a RSA Authentication Manager review
Owner at a tech services company
Easy setup, deployment, and integration in different infrastructures, including virtual ones. View full review »
SeniorDee9eb says in a RSA Adaptive Authentication review
Senior Developer AIG Digital Security Group at a insurance company with 10,001+ employees
Risk Engine’s risk score, eFN, GeoIP, and device binding all coming together in the Policy Rules to decide when to escalate to MFA. View full review »
Gareth Hawkins says in a Symantec VIP review
Network Analyst at a healthcare company with 1,001-5,000 employees
The two-factor authentication is most definitely valuable and moves us closer to being able to check off those important boxes for compliance. View full review »
Iftikhar Iqbal says in a Symantec VIP review
Professional Services Consultant at a tech services company with 51-200 employees
* Intelligent authentication - Risk-based authentication * Cloud-based service and management View full review »
eBanking Security & Awareness with 10,001+ employees
One of the most valuable features is the fraud detection capability with minimal friction in the customer experience. Also, the capability to manage your business policy related to security when required without vendor involvement. View full review »
PreSales3b9c says in a FortiAuthenticator review
Pre-sales, Telecommunications & Security Specialist at a tech services company with 201-500 employees
Integrated RADIUS server with 802.1x functionality and access control. Single Sign On and AD integration. It integrates very tightly with the rest of the Fortinet ecosystem. View full review »
Adriana Ymeri says in a FortiAuthenticator review
IT Infrastructure Engineer at a tech company with 11-50 employees
Standards-based secure authentication FortiAuthenticator centralizes the management and storage of user identity information, thereby increasing the efficiency of administration and increasing the control over who accesses the network. • Two-factor authentication using tokens 1- OATH-compatible time-based tokens (Hardware tokens FortiToken200/FortiToken220) 2- USB certificate-based tokens FortiToken-300) 3- FortiToken Mobile for Android, iOS, and Windows Mobile 4- SMS and email tokens • Wired/Wireless authentication using the 802. 1X standard • Certificate management • Captive portal guest management • Fortinet Single Sign-On View full review »
Prashant Alhat says in a Symantec VIP review
Senior Network Engineer at a tech services company with 10,001+ employees
In this version 9.1, lots of changes are done for the dashboard, User Store etc. View full review »
Roberto Lopez Gil says in a FortiAuthenticator review
Pre-Sales Engineer at a tech services company with 11-50 employees
* User management with many credential sources: LDAPs, RADIUS, Social login, SAML, tokens, and local * Captive portal server: Used to configure several portals for each service * User friendly GUI with many features * Very powerful View full review »
it_user346296 says in a CA Advanced Authentication review
Lead Technical Architect with 1,001-5,000 employees
It tells us exactly what we want in terms of authentication to various applications and provides protection for users who access them. Our users can have access to applications securely through various devices. View full review »
it_user351696 says in a CA Risk Authentication review
Software Development Manager at a comms service provider with 1,001-5,000 employees
The benefits are that it allows us to have real-time risk analysis on authentication traffic, so we can determine whether or not it's suspicious. How suspicious is it? If it's suspicious, we can enable step-up authentication and challenge for some additional credentials, or we can block the authentication attempt completely. If it's a known good customer, we can actually remove the friction of authentication, or even automatically authenticate them without challenging their credentials. That aspect has been working well, even at the expense of causing some latency for authentication for everybody else because of the amount of traffic we're getting. View full review »
davidstrom says in an Authentify review
Owner at David Strom Inc.
Avoids man in the middle or man in the browser exploits that other two factor products are susceptible to View full review »

Sign Up with Email