Symantec Advanced Authentication Valuable Features

Umair (Abu Mohaymin) Akhlaque - PeerSpot reviewer
Enterprise Solutions & Services Head at Duroob Technologies

One of the most valuable aspects is its remarkable stability. Rarely do my customers encounter issues or complaints once it's been properly configured. Once set up, it consistently delivers reliable performance.

View full review »
Umair (Abu Mohaymin) Akhlaque - PeerSpot reviewer
Enterprise Solutions & Services Head at Duroob Technologies

One of the most valuable features of this solution is that it's a strong authentication solution that's able to integrate with applications. 

View full review »
it_user467721 - PeerSpot reviewer
Director - Transformation Programs and Architecture at a comms service provider with 10,001+ employees

Ease of deployment: no need to keep up with physical devices for multi-factor authentication; no software to deploy on end-user computers requiring administrative rights.

The delivery of multi-factor authentication using a SaaS model keeps us from having to keep our servers/infrastructure updated. It also helped us roll out the service much faster than building it out ourselves.

View full review »
Buyer's Guide
Symantec Advanced Authentication
March 2024
Learn what your peers think about Symantec Advanced Authentication. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,415 professionals have used our research since 2012.
it_user359505 - PeerSpot reviewer
Executive Director, CTO Security - Identity Management Architect at a financial services firm with 10,001+ employees

Arcot, for us, is really about multi-factor authentication. We use it on our client's side and, I think, probably the two biggest features of that are from the end-user experience. So, it is basically a token that is stored on the device which represents something you have, but the user actually logs in effectively with a password. They're not really aware that they've got a second factor. So, that's quite nice.

The second distinctive feature is that it has protection against brute force attacks, which means even if you got a hold of the token and you tried to guess passwords or try a brute force circuit, it will always return a value of which you cannot tell whether it is successful at all.

View full review »
it_user778929 - PeerSpot reviewer
Senior Program Analyst at a logistics company with 10,001+ employees

Rules on Risk Authentication are very good.

View full review »
it_user558045 - PeerSpot reviewer
Solution Architect at Votorantim bank

For Votorantim bank, the best feature is the token solution. We can analyze any transaction that is declined or blocked. We can make a decision to release or block the transaction or anything else.

View full review »
it_user346296 - PeerSpot reviewer
Lead Technical Architect with 1,001-5,000 employees

It tells us exactly what we want in terms of authentication to various applications and provides protection for users who access them. Our users can have access to applications securely through various devices.

View full review »
it_user384225 - PeerSpot reviewer
Engineer at a tech vendor with 1,001-5,000 employees

Aside from the two factor authentication requirements that we have, as far as having access to HIPA protected data, there's also the risk engine that helps us evaluate and answer questions like "When was the last time and location that a person accessed that data?" It's infeasible within time and place, they can't have been in Dallas at 3:00 and then at Florida at 3:30 and say, "Yeah, it's the same person accessing that data."

It will therefore help us respond with "Hey, maybe we need to re-evaluate and see if that's really the same person." We try to make sure that our customers only use one device to access that data, preferably their work device. We don't really want them accessing that from their home PCs and potentially exposing that data to other places. So, we'll use device fingerprinting as well to make sure that we are getting them on just that one device and not letting them proliferate on other devices we wouldn't like.

View full review »
it_user351606 - PeerSpot reviewer
IT Infrastructure Services at a mining and metals company with 10,001+ employees

The most valuable feature is that we get a wide range of authentication methods and authentication integrators. Different platforms can get a service authentication with transparency to the final user. With the transparency we also get strong authentication forms and connectors.

We submit our company to SOX compliance, and it helps us with applying controls to for that.

View full review »
Buyer's Guide
Symantec Advanced Authentication
March 2024
Learn what your peers think about Symantec Advanced Authentication. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,415 professionals have used our research since 2012.