RSA Adaptive Authentication vs Secret Double Octopus comparison

Cancel
You must select at least 2 products to compare!
RSA Logo
319 views|268 comparisons
71% willing to recommend
Secret Double Octopus Logo
501 views|280 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between RSA Adaptive Authentication and Secret Double Octopus based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems.
To learn more, read our detailed Authentication Systems Report (Updated: April 2024).
767,319 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Risk Engine’s risk score, eFN, GeoIP, and device binding all coming together in the Policy Rules to decide when to escalate to MFA.""Our customer are seeing value from the product, as they experience cost reductions. They can stop fraud from their customers, then their customers can have a better experience from their services.""Ingestion of logs and raising alert space on those logs are the most valuable features.""The capability to manage your business policy related to security when required without vendor involvement.""The most valuable feature is the stock tokens. That works the best for us."

More RSA Adaptive Authentication Pros →

"This solution has a mobile application, which comes with multi-factor authentication; allowing for more flexible usage, without having to sacrifice system security."

More Secret Double Octopus Pros →

Cons
"I would like to see a more adaptive type of solution, something that we could use on our web pages...""Reporting modules is one of the major areas that can be improved further.""It has taken years to implement.""The product is basically unusable. We need better ease of use; it's overly complicated.""Better filters when searching for events. The current features for current filters when searching fraud events are not very comprehensive. You can only filter by certain fields in the transaction.""RSA Adaptive Authentication lacks a mechanism to verify the identity of a new user in the Enrollment event workflow."

More RSA Adaptive Authentication Cons →

"The product suffers from frequent disturbances in service, that have impacted our end users when we deploy software updates."

More Secret Double Octopus Cons →

Pricing and Cost Advice
  • "You may need to opt for second best if funding is low and the number of users is huge. However, the pricing is able to be negotiated if your user figures are huge."
  • "Keep the proxy service layer on premises. That consumes SaaS security services on the back-end."
  • "Customers need to deploy the solution in a very expensive infrastructure. RSA should should think about a less expensive infrastructure for customers because the solution costs around $100,000, and the infrastructure needed to support that solution may be even more expensive than that price."
  • "The pricing is $50 per head, yearly."
  • More RSA Adaptive Authentication Pricing and Cost Advice →

    Information Not Available
    report
    Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
    767,319 professionals have used our research since 2012.
    Questions from the Community
    Ask a question

    Earn 20 points

    Top Answer:This solution has a mobile application, which comes with multi-factor authentication; allowing for more flexible usage, without having to sacrifice system security.
    Top Answer:The product suffers from frequent disturbances in service, that have impacted our end users when we deploy software updates.
    Top Answer:We have been using this solution for its desktop-based, single channel capabilities.
    Ranking
    25th
    Views
    319
    Comparisons
    268
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    21st
    Views
    501
    Comparisons
    280
    Reviews
    1
    Average Words per Review
    290
    Rating
    7.0
    Comparisons
    Also Known As
    Octopus Authenticator
    Learn More
    Overview
    RSA Adaptive Authentication is a risk-based two-factor authentication solution providing cost-effective protection for an entire user base. Adaptive Authentication secures online portals, SSL VPNs, and web access management portals for different types of organizations in the healthcare, insurance, enterprise, government, financial services, and other industries. Based on the transparent two-factor authentication technology, Adaptive Authentication works behind the scenes to authenticate end users and transactions based on individual end user and device profiles. In addition, Adaptive Authentication uses the RSA Risk Engine to estimate the level of risk for the specific activity and uses information collected from the RSAeFraudNetwork (a cross-organization, cross-application, cross-border online fraud network) to identify fraudulent activities. The Policy Manager determines what actions must be performed, depending on the risk score and other parameters.

    Secret Double Octopus (SDO) is the most widely deployed workforce Passwordless MFA solution today. It offers the most non-disruptive and comprehensive way for enterprises to gain the benefits of truly secure authentication.

    SDO is the only passwordless MFA provider that enables organizations to achieve passwordless benefits incrementally, with options that range from extending existing MFA solutions to desktops to implementing full end-to-end passwordless MFA across all use cases end users encounter.

    SDO is FIDO-certified and makes access frictionless and passwordless secure for desktop end users, administrative users, remote workers and legacy app users.

    https://doubleoctopus.com/

    Sample Customers
    ADP, Ameritas, Partners Healthcare
    United Technologies (UTC), American Family Association, ASL Airlines France, BNP Paribas, A Fortune 50 Bank, Bingham County Idaho, Britannia Financial Services, Carolina Behavioral Health Alliance LLC, European Commission, County of Midland Michigan, JRM Construction Management, Greer Commission of Public Works, Poste Italiane, Kennedy Wilson Europe, Key Mechanical, Marker Therapeutics Inc, Mediawan, Ministero Dell'interno, FairPrice, NTUC Health, Mercatus, TBC, Techni-Photo, Tinsa Group, Yates Law, Weil, Gotshal & Manges LLP, Z-Medica Corporation, A Member of the 5 largest US law firms.
    Top Industries
    VISITORS READING REVIEWS
    Financial Services Firm47%
    Computer Software Company13%
    Healthcare Company6%
    Retailer4%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Manufacturing Company16%
    University10%
    Financial Services Firm8%
    Company Size
    REVIEWERS
    Midsize Enterprise14%
    Large Enterprise86%
    VISITORS READING REVIEWS
    Small Business16%
    Midsize Enterprise7%
    Large Enterprise78%
    VISITORS READING REVIEWS
    Small Business21%
    Midsize Enterprise12%
    Large Enterprise66%
    Buyer's Guide
    Authentication Systems
    April 2024
    Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems. Updated: April 2024.
    767,319 professionals have used our research since 2012.

    RSA Adaptive Authentication is ranked 25th in Authentication Systems while Secret Double Octopus is ranked 21st in Authentication Systems with 1 review. RSA Adaptive Authentication is rated 6.8, while Secret Double Octopus is rated 7.0. The top reviewer of RSA Adaptive Authentication writes "It stops fraud in banks and reduces their costs". On the other hand, the top reviewer of Secret Double Octopus writes "A solution with good capabilities across a wide range of platforms that comes with a useful mobile application, but upgrades cause issues". RSA Adaptive Authentication is most compared with RSA Authentication Manager, ThreatMetrix, Fortinet FortiAuthenticator and IBM Trusteer, whereas Secret Double Octopus is most compared with Cisco Duo, HYPR and Thales Authenticators.

    See our list of best Authentication Systems vendors.

    We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.