Compare PingID vs. RSA SecurID Access

Cancel
You must select at least 2 products to compare!
PingID Logo
4,473 views|3,477 comparisons
RSA SecurID Access Logo
1,891 views|1,767 comparisons
Most Helpful Review
Find out what your peers are saying about Fortinet, Cisco, Ping Identity and others in Authentication Systems. Updated: May 2021.
501,818 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
501,818 professionals have used our research since 2012.
Questions from the Community
Top Answer: It's pretty stable as a product.
Top Answer: We don't directly deal with the licenses. It's basically purchased by the central team and we are just consuming it through the common APIs. I really couldn't comment on the pricing at the moment.
Top Answer: Many times when we are authenticating, we'd like the freedom to set the time. Maybe it needs to be slightly longer. I understand that this is work based on the token exchange and so on. The timing of… more »
Ask a question

Earn 20 points

Ranking
3rd
Views
4,473
Comparisons
3,477
Reviews
3
Average Words per Review
464
Rating
8.7
13th
Views
1,891
Comparisons
1,767
Reviews
0
Average Words per Review
0
Rating
N/A
Popular Comparisons
Also Known As
Ping Identity
RSA Access Manager
Learn More
Overview
IDENTITY DEFINED SECURITY PLATFORM delivers a unified, standards-based platform that can be deployed as SaaS, software or both and can scale to handle millions of identities. From multi-factor authentication and single sign-on to access security, directory and data governance, our capabilities work together to give employees, partners and customers secure access to cloud, mobile and enterprise applications, securing and streamlined everything from sign-on to sign-off and everywhere in between.

The RSA SecurID Suite combines the separate disciplines of access management and authentication with identity governance and user lifecycle management into one comprehensive suite. It goes way beyond the capabilities of traditional identity and access management systems by using risk analytics to provide identity and access assurance. This helps organizations solve two fundamental challenges:

  • Verifying that their users are who they say they are.
  • Providing their users with the right level of access.
Offer
Learn more about PingID
Learn more about RSA SecurID Access
Sample Customers
Equinix, Land O'Lakes, CDPHP, Box, International SOS, Opower, VSP, Chevron, Truist, Academy of Art University, Northern Air Cargo, Repsol
Milliman, Geisinger Health System, Advanced Micro Devices
Top Industries
VISITORS READING REVIEWS
Computer Software Company29%
Comms Service Provider13%
Financial Services Firm12%
Insurance Company6%
VISITORS READING REVIEWS
Computer Software Company30%
Comms Service Provider21%
Manufacturing Company7%
Government7%
Find out what your peers are saying about Fortinet, Cisco, Ping Identity and others in Authentication Systems. Updated: May 2021.
501,818 professionals have used our research since 2012.

PingID is ranked 3rd in Authentication Systems with 3 reviews while RSA SecurID Access is ranked 13th in Authentication Systems. PingID is rated 8.6, while RSA SecurID Access is rated 0.0. The top reviewer of PingID writes "Stable, popular with customers, and has a good mobile application". On the other hand, PingID is most compared with Symantec Siteminder, Azure Active Directory, SailPoint IdentityIQ, ForgeRock and Auth0, whereas RSA SecurID Access is most compared with Yubico YubiKey, Fortinet FortiToken, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager and Fortinet FortiAuthenticator.

See our list of best Authentication Systems vendors.

We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.