Symantec Advanced Authentication Valuable Features
One of the most valuable aspects is its remarkable stability. Rarely do my customers encounter issues or complaints once it's been properly configured. Once set up, it consistently delivers reliable performance.
One of the most valuable features of this solution is that it's a strong authentication solution that's able to integrate with applications.
View full review »Ease of deployment: no need to keep up with physical devices for multi-factor authentication; no software to deploy on end-user computers requiring administrative rights.
The delivery of multi-factor authentication using a SaaS model keeps us from having to keep our servers/infrastructure updated. It also helped us roll out the service much faster than building it out ourselves.
View full review »Buyer's Guide
Symantec Advanced Authentication
March 2024
Learn what your peers think about Symantec Advanced Authentication. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,415 professionals have used our research since 2012.
Arcot, for us, is really about multi-factor authentication. We use it on our client's side and, I think, probably the two biggest features of that are from the end-user experience. So, it is basically a token that is stored on the device which represents something you have, but the user actually logs in effectively with a password. They're not really aware that they've got a second factor. So, that's quite nice.
The second distinctive feature is that it has protection against brute force attacks, which means even if you got a hold of the token and you tried to guess passwords or try a brute force circuit, it will always return a value of which you cannot tell whether it is successful at all.
View full review »Rules on Risk Authentication are very good.
View full review »For Votorantim bank, the best feature is the token solution. We can analyze any transaction that is declined or blocked. We can make a decision to release or block the transaction or anything else.
View full review »It tells us exactly what we want in terms of authentication to various applications and provides protection for users who access them. Our users can have access to applications securely through various devices.
View full review »Aside from the two factor authentication requirements that we have, as far as having access to HIPA protected data, there's also the risk engine that helps us evaluate and answer questions like "When was the last time and location that a person accessed that data?" It's infeasible within time and place, they can't have been in Dallas at 3:00 and then at Florida at 3:30 and say, "Yeah, it's the same person accessing that data."
It will therefore help us respond with "Hey, maybe we need to re-evaluate and see if that's really the same person." We try to make sure that our customers only use one device to access that data, preferably their work device. We don't really want them accessing that from their home PCs and potentially exposing that data to other places. So, we'll use device fingerprinting as well to make sure that we are getting them on just that one device and not letting them proliferate on other devices we wouldn't like.
View full review »The most valuable feature is that we get a wide range of authentication methods and authentication integrators. Different platforms can get a service authentication with transparency to the final user. With the transparency we also get strong authentication forms and connectors.
We submit our company to SOX compliance, and it helps us with applying controls to for that.
View full review »Buyer's Guide
Symantec Advanced Authentication
March 2024
Learn what your peers think about Symantec Advanced Authentication. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,415 professionals have used our research since 2012.