RSA Adaptive Authentication Reviews

Filter by:Reset all filters
industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
rating
Loading...
Filter Unavailable
Andres Roldan
Real User
Security Architect at Fluid Attacks
Mar 21 2019

What is most valuable?

Stopping fraud in the banks.

How has it helped my organization?

We are a partner who is supporting the application for our customers. Our customer are seeing value from the product, as they experience cost reductions. They can stop fraud from their customers, then… more»

What needs improvement?

Better filters when searching for events. The current features for current filters when searching fraud events are not very comprehensive. You can only filter by certain fields in the transaction.

What's my experience with pricing, setup cost, and licensing?

Customers need to deploy the solution in a very expensive infrastructure. RSA should should think about a less expensive recommended infrastructure for customers because the infrastructure needed to… more»

What other advice do I have?

RSA Adaptive Authentication is one of the most used tools for stopping fraud in the world. The tool is very good variable to take into account when deciding what product to choose. I think RSA is best… more»

Which other solutions did I evaluate?

We don't experience with another tool.
Real User
IT Security Engineer at a insurance company with 201-500 employees
Mar 26 2019

What is most valuable?

The most valuable feature is the stock tokens. That works the best for us.

What needs improvement?

I would like to see a more adaptive type of solution, something that we could use on our web pages. I would like to be able to give the same ability to a user out there on the internet.

What's my experience with pricing, setup cost, and licensing?

The pricing is $50 per head, yearly.

If you previously used a different solution, which one did you use and why did you switch?

Before this solution it was just username and password, strictly.

What other advice do I have?

Look at something like Centrify or something along those lines: a single sign-on solution. We use the physical tokens and stock tokens. It's an okay solution. It's just old technology and it's time to… more»

Which other solutions did I evaluate?

We'll probably go to Centrify or Thycotic.
Find out what your peers are saying about RSA, CA (A Broadcom Company), Cisco and others in Authentication Systems. Updated: October 2019.
371,639 professionals have used our research since 2012.
Real User
Director of Cyber Security at a financial services firm with 1,001-5,000 employees
Mar 27 2019

What do you think of RSA Adaptive Authentication?

What is our primary use case?

There are many use cases that we have defined based on our business needs.

What is most valuable?

Ingestion of logs and raising alert space on those logs are the most valuable features.

What needs improvement?

The product is basically unusable. We need better ease of use; it's overly complicated.

How was the initial setup?

It has taken years to implement.

What about the implementation team?

We used RSA consultants for the deployment. Our experience with them was not productive, but we did work with other consultants as well. The consultants' ability to configure this particular platform is limited based on their knowledge, because it is such a complex product. There are so many classes that you need to take in order to be proficient at it,…

Articles

User Assessments By Topic About RSA Adaptive Authentication

Find out what your peers are saying about RSA, CA (A Broadcom Company), Cisco and others in Authentication Systems. Updated: October 2019.
371,639 professionals have used our research since 2012.

RSA Adaptive Authentication Questions

What is RSA Adaptive Authentication?

RSA Adaptive Authentication is a risk-based two-factor authentication solution providing cost-effective protection for an entire user base. Adaptive Authentication secures online portals, SSL VPNs, and web access management portals for different types of organizations in the healthcare, insurance, enterprise, government, financial services, and other industries. Based on the transparent two-factor authentication technology, Adaptive Authentication works behind the scenes to authenticate end users and transactions based on individual end user and device profiles. In addition, Adaptive Authentication uses the RSA Risk Engine to estimate the level of risk for the specific activity and uses information collected from the RSAeFraudNetwork (a cross-organization, cross-application, cross-border online fraud network) to identify fraudulent activities. The Policy Manager determines what actions must be performed, depending on the risk score and other parameters.
RSA Adaptive Authentication customers
ADP, Ameritas, Partners Healthcare
Sign Up with Email