Compare SecurEnvoy SecurICE vs. UserLock

You must select at least 2 products to compare!
SecurEnvoy SecurICE Logo
84 views|71 comparisons
UserLock Logo
456 views|249 comparisons
Most Helpful Review
Find out what your peers are saying about Fortinet, Cisco, Ping Identity and others in Authentication Systems. Updated: July 2021.
521,189 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
Information Not Available
"You will be hard-pressed to find better pricing."

More UserLock Pricing and Cost Advice »

Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
521,189 professionals have used our research since 2012.
Questions from the Community
Ask a question

Earn 20 points

Top Answer: The most valuable features are two-factor authentication and real-time logon monitoring.
Top Answer: You will be hard-pressed to find better pricing.
Top Answer: The product and service are already great as it is but if I could add one feature, I guess it would be nice to have another factor of authentication (two additional factors) like your phone and a… more »
Average Words per Review
Average Words per Review
Popular Comparisons
Also Known As
Learn More
SecurIce provides clients with the ability to turn on robust, multi-factor authentication for users in the event of an emergency. The user’s existing standard password is the first factor, and a passcode sent to the user’s mobile phone is the second. There is no need for the user to enrol and remember an additional PIN, and no need for extra tokens or smartcards - the ideal, emergency two-factor authentication system.

Two Factor Authentication & Access Management for Windows Active Directory.

UserLock helps administrators to manage and secure access for every user, without obstructing employees or frustrating IT.

Two Factor Authentication on Windows logon, RDP and VPN connections. UserLock supports 2FA using authenticator applications which include Google Authenticator, Microsoft Authenticator and LastPass Authenticator, or programmable hardware tokens such as YubiKey and Token2.

Access Restrictions: Using the contextual information around a user’s logon, UserLock will authorize, deny or limit how a user can access the network, once authenticated.

Access Monitoring: Track and alert on all users’ logon and logoff activity in real-time. Interact remotely with any session and respond to login behavior. 

Access Auditing: Record and report on all user connection events to provide a central audit across the whole network.

Learn more about SecurEnvoy SecurICE
Learn more about UserLock
Sample Customers
Barclays, US Department of Justice, National Bank of Kuwait, Turkish Aerospace, New York Albany School District, Regtransfers, University of Kent, Camden City School District, Oklahoma City Public Schools, Bank of Cyprus, Detran-PE: Pernambuco State Traffic Department
Top Industries
No Data Available
Comms Service Provider29%
Computer Software Company11%
Energy/Utilities Company8%
Find out what your peers are saying about Fortinet, Cisco, Ping Identity and others in Authentication Systems. Updated: July 2021.
521,189 professionals have used our research since 2012.

SecurEnvoy SecurICE is ranked 36th in Authentication Systems while UserLock is ranked 8th in Authentication Systems with 1 review. SecurEnvoy SecurICE is rated 0.0, while UserLock is rated 10.0. On the other hand, the top reviewer of UserLock writes "Affordable, easy to use, and integrates well with Active Directory". SecurEnvoy SecurICE is most compared with Microsoft Authenticator, whereas UserLock is most compared with Duo Security, NEVIS nevisAuth, Azure Active Directory, Gluu and Fortinet FortiAuthenticator.

See our list of best Authentication Systems vendors.

We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.