ThumbSignIn vs UserLock comparison

Cancel
You must select at least 2 products to compare!
ThumbSignIn Logo
67 views|60 comparisons
IS Decisions Logo
1,290 views|931 comparisons
100% willing to recommend
Executive Summary

We performed a comparison between ThumbSignIn and UserLock based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems.
To learn more, read our detailed Authentication Systems Report (Updated: April 2024).
767,667 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pricing and Cost Advice
Information Not Available
  • "You will be hard-pressed to find better pricing."
  • More UserLock Pricing and Cost Advice →

    Ranking
    52nd
    Views
    67
    Comparisons
    60
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    11th
    Views
    1,290
    Comparisons
    931
    Reviews
    1
    Average Words per Review
    506
    Rating
    10.0
    Buyer's Guide
    Authentication Systems
    April 2024
    Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems. Updated: April 2024.
    767,667 professionals have used our research since 2012.
    Comparisons
    Learn More
    Overview

    ThumbSignIn is the easiest way to integrate strong authentication technologies that use biometric and PKI to make your system more secure, easier to use and provide a compelling return on your investment.

    Two Factor Authentication & Access Management for Windows Active Directory.

    UserLock helps administrators to manage and secure access for every user, without obstructing employees or frustrating IT.

    Two Factor Authentication on Windows logon, RDP, IIS and VPN connections. UserLock supports 2FA using authenticator applications which include Google Authenticator, Microsoft Authenticator and LastPass Authenticator, or programmable hardware tokens such as YubiKey and Token2.

    Single Sign-On: Secure and frictionless access to Microsoft 365 and other Cloud Applications, using on-premise Active Directory credentials.

    Access Restrictions: Using the contextual information around a user’s logon, UserLock will authorize, deny or limit how a user can access the network, once authenticated.

    Access Monitoring: Track and alert on all users’ logon and logoff activity in real-time. Interact remotely with any session and respond to login behavior. 

    Access Auditing: Record and report on all user connection events to provide a central audit across the whole network.

    Sample Customers
    Information Not Available
    Barclays, US Department of Justice, National Bank of Kuwait, Turkish Aerospace, New York Albany School District, Regtransfers, University of Kent, Camden City School District, Oklahoma City Public Schools, Bank of Cyprus, Detran-PE: Pernambuco State Traffic Department
    Top Industries
    No Data Available
    VISITORS READING REVIEWS
    Computer Software Company11%
    Government10%
    Financial Services Firm9%
    Construction Company8%
    Company Size
    No Data Available
    VISITORS READING REVIEWS
    Small Business40%
    Midsize Enterprise13%
    Large Enterprise48%
    Buyer's Guide
    Authentication Systems
    April 2024
    Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems. Updated: April 2024.
    767,667 professionals have used our research since 2012.

    ThumbSignIn is ranked 52nd in Authentication Systems while UserLock is ranked 11th in Authentication Systems. ThumbSignIn is rated 0.0, while UserLock is rated 10.0. On the other hand, the top reviewer of UserLock writes "Affordable, easy to use, and integrates well with Active Directory". ThumbSignIn is most compared with , whereas UserLock is most compared with Cisco Duo, Microsoft Entra ID, Fortinet FortiAuthenticator, Silverfort and Aruba ClearPass.

    See our list of best Authentication Systems vendors.

    We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.