We just raised a $30M Series A: Read our story

Compare HID PIV vs. UserLock

Cancel
You must select at least 2 products to compare!
HID PIV Logo
416 views|389 comparisons
UserLock Logo
900 views|635 comparisons
Featured Review
Find out what your peers are saying about Cisco, Fortinet, Frontegg and others in Authentication Systems. Updated: November 2021.
553,954 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
Information Not Available
"You will be hard-pressed to find better pricing."

More UserLock Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
553,954 professionals have used our research since 2012.
Ranking
20th
Views
416
Comparisons
389
Reviews
0
Average Words per Review
0
Rating
N/A
8th
Views
900
Comparisons
635
Reviews
1
Average Words per Review
506
Rating
10.0
Comparisons
Also Known As
HID PIV Enterprise, HID PIV Express, HID Personal Identity Verification
Learn More
Overview

HID PIV (Personal Identity Verification) delivers an integrated solution for standards-compliant identity and credential management. The components are designed to support each other, so you can deploy our solution faster, and enjoy a simplified management experience going forward.

Two Factor Authentication & Access Management for Windows Active Directory.

UserLock helps administrators to manage and secure access for every user, without obstructing employees or frustrating IT.

Two Factor Authentication on Windows logon, RDP, IIS and VPN connections. UserLock supports 2FA using authenticator applications which include Google Authenticator, Microsoft Authenticator and LastPass Authenticator, or programmable hardware tokens such as YubiKey and Token2.

Single Sign-On: Secure and frictionless access to Microsoft 365 and other Cloud Applications, using on-premise Active Directory credentials.

Access Restrictions: Using the contextual information around a user’s logon, UserLock will authorize, deny or limit how a user can access the network, once authenticated.

Access Monitoring: Track and alert on all users’ logon and logoff activity in real-time. Interact remotely with any session and respond to login behavior. 

Access Auditing: Record and report on all user connection events to provide a central audit across the whole network.

Offer
Learn more about HID PIV
Learn more about UserLock
Sample Customers
Information Not Available
Barclays, US Department of Justice, National Bank of Kuwait, Turkish Aerospace, New York Albany School District, Regtransfers, University of Kent, Camden City School District, Oklahoma City Public Schools, Bank of Cyprus, Detran-PE: Pernambuco State Traffic Department
Top Industries
VISITORS READING REVIEWS
Computer Software Company31%
Government18%
Comms Service Provider11%
Wholesaler/Distributor4%
VISITORS READING REVIEWS
Computer Software Company28%
Comms Service Provider16%
Government13%
Healthcare Company6%
Find out what your peers are saying about Cisco, Fortinet, Frontegg and others in Authentication Systems. Updated: November 2021.
553,954 professionals have used our research since 2012.

HID PIV is ranked 20th in Authentication Systems while UserLock is ranked 8th in Authentication Systems with 1 review. HID PIV is rated 0.0, while UserLock is rated 10.0. On the other hand, the top reviewer of UserLock writes "Affordable, easy to use, and integrates well with Active Directory". HID PIV is most compared with Yubico YubiKey, RSA SecurID Access, RSA Authentication Manager, EmpowerID and CyberArk Privileged Access Manager, whereas UserLock is most compared with Duo Security, Azure Active Directory, NEVIS nevisAuth, Fortinet FortiAuthenticator and Aruba ClearPass.

See our list of best Authentication Systems vendors.

We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.