Thales Authenticators vs i-Sprint AccessMatrix Universal Authentication Server comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between i-Sprint AccessMatrix Universal Authentication Server and Thales Authenticators based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems.
To learn more, read our detailed Authentication Systems Report (Updated: March 2024).
765,234 professionals have used our research since 2012.
Featured Review
Use i-Sprint AccessMatrix Universal Authentication Server?
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pricing and Cost Advice
Information Not Available
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
765,234 professionals have used our research since 2012.
Questions from the Community
Ask a question

Earn 20 points

Top Answer:We use this solution to log into virtual machines like VMware and VMware Horizon.
Top Answer:The problem with SafeNet is that it's not integrated with Microsoft 365. That was the breaking point for us. The security is a little bit redundant because if you have already unlocked your phone… more »
Top Answer:We use this solution to log into virtual machines like VMware and VMware Horizon. The solution is deployed on a hybrid cloud.
Ranking
59th
Views
48
Comparisons
38
Reviews
0
Average Words per Review
0
Rating
N/A
17th
Views
1,859
Comparisons
1,639
Reviews
1
Average Words per Review
406
Rating
8.0
Comparisons
Also Known As
Gemalto Ezio, Ezio, Gemalto Authenticators, SafeNet Authentication Manager
Learn More
Overview

AccessMatrix™ Universal Authentication Server (UAS), is a comprehensive and versatile authentication server that enable organizations to centralize all its authentication schemes in a single unified platform. It is a future-proof authentication infrastructure that supports multiple authentication mechanisms (such as passwords, OTP, biometrics) for strong authentication and authorization requirements.

UAS offers the freedom for organizations to deploy various authentication methods from different vendors under one platform, and manage it as a holistic security approach. This means organizations will not be restricted or locked to a specific hardware or software authentication solution. The use of Pluggable Authentication Module (PAM) approach also allows organizations to have ease of adding new methods when available on top of their existing scheme.

Offering the broadest range of authentication methods and form factors, Thales allows customers to address numerous use cases, assurance levels, and threat vectors with unified, centrally managed policies—managed from one authentication back end delivered in the cloud or on premise.

Sample Customers
AmBank Group, Cathay United Bank
Standard Chartered Bank (SCB)
Top Industries
No Data Available
VISITORS READING REVIEWS
Computer Software Company17%
Financial Services Firm14%
Government10%
Comms Service Provider10%
Company Size
No Data Available
VISITORS READING REVIEWS
Small Business22%
Midsize Enterprise12%
Large Enterprise66%
Buyer's Guide
Authentication Systems
March 2024
Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems. Updated: March 2024.
765,234 professionals have used our research since 2012.

i-Sprint AccessMatrix Universal Authentication Server is ranked 59th in Authentication Systems while Thales Authenticators is ranked 17th in Authentication Systems with 4 reviews. i-Sprint AccessMatrix Universal Authentication Server is rated 0.0, while Thales Authenticators is rated 7.8. On the other hand, the top reviewer of Thales Authenticators writes "Responsive support, effective authentication, but stability could improve". i-Sprint AccessMatrix Universal Authentication Server is most compared with , whereas Thales Authenticators is most compared with Yubico YubiKey, Microsoft Entra ID, Cisco Duo, Atalla Hardware Security Module and Fortinet FortiAuthenticator.

See our list of best Authentication Systems vendors.

We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.