We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"During testing we are allowed a certain number of licenses for free."
"Its price is reasonable. It is not highly expensive."
"Their pricing model is a little bit weird. Currently, there is no price advantage in signing up for yearly contracts. There are no additional costs to the standard licensing costs."
"Our licensing fee is currently on an annual basis."
"I think the price of this solution is reasonable compared to YubiKey and Duo given that it offers the same similar features."
Earn 20 points
Once users have access to a portal or applications, it is important to identify that the same users are returning in order to maintain security of the system and guard against account take-over, data loss and theft. Multifactor authentication is a simple yet secure way of knowing who is using your applications and ensuring that they are exactly who you expect them to be.
Our strong, multi-factor authentication product offers a range of layered, secure authentication methods in a single integrated platform. It delivers secure one-time passcodes via multiple vectors:
SMS (text messages)
Voice message (IVR)
Out-of-band delivery of quickly expiring, one-time passcodes confirms that the person possessing the passcode is the one attempting to access your systems. Multiple authentication vectors ensure high-level security with user-required flexibility and usability.
If a biometric method is required or desired, two-factor authentication can also be done through voice biometrics – a secure, software-based method that doesn't require special hardware or detailed training.
Progressive authentication is our term for the best practice we pioneered—using an integrated set of tools and processes for situation-based authentication of known users seeking access to secure networks, data, and applications.
Based on your policy decisions, our solution will trigger authentication challenges at login or when suspicious transactions, unknown or risky devices, or out-of-norm behavior is recognized. These security authentication parameters can be customized in real-time for users both inside and outside your organization, progressively presenting authentication challenges based upon the latest threat assessment.
The RSA SecurID Suite combines the separate disciplines of access management and authentication with identity governance and user lifecycle management into one comprehensive suite. It goes way beyond the capabilities of traditional identity and access management systems by using risk analytics to provide identity and access assurance. This helps organizations solve two fundamental challenges:
Anakam.TFA is ranked 48th in Authentication Systems while RSA SecurID Access is ranked 9th in Authentication Systems with 1 review. Anakam.TFA is rated 0.0, while RSA SecurID Access is rated 7.0. On the other hand, the top reviewer of RSA SecurID Access writes "Scalable and secure, but could be more compliant-based". Anakam.TFA is most compared with , whereas RSA SecurID Access is most compared with Yubico YubiKey, Microsoft Authenticator, PingID, Fortinet FortiToken and Cisco ISE (Identity Services Engine).
See our list of best Authentication Systems vendors.
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.