RSA Adaptive Authentication Reviews

Filter by:Reset all filters
industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
rating
Loading...
Filter Unavailable
Real User
eBanking Security & Awareness with 10,001+ employees
Jul 21 2017

What is most valuable?

One of the most valuable features is the fraud detection capability with minimal friction in the customer experience… more»

How has it helped my organization?

Prior to the implementation of the system, our internet banking fraud team relied solely on customer reports for… more»

What needs improvement?

Reporting modules is one of the major areas that can be improved further. Understanding of system integration and its… more»

What's my experience with pricing, setup cost, and licensing?

You may need to opt for second best if funding is low and the number of users is huge. However, the pricing is able to be… more»

If you previously used a different solution, which one did you use and why did you switch?

No previous solution was used for the same purpose.

What other advice do I have?

Operational issues will need to be managed internally, since the vendor will not be able to provide much input on this… more»
Andres Roldan
Real User
Security Architect at Fluid Attacks
Mar 21 2019

What is most valuable?

Stopping fraud in the banks.

How has it helped my organization?

We are a partner who is supporting the application for our customers. Our customer are seeing value from the product, as they experience cost… more»

What needs improvement?

Better filters when searching for events. The current features for current filters when searching fraud events are not very comprehensive. You can… more»

What's my experience with pricing, setup cost, and licensing?

Customers need to deploy the solution in a very expensive infrastructure. RSA should should think about a less expensive recommended infrastructure… more»

What other advice do I have?

RSA Adaptive Authentication is one of the most used tools for stopping fraud in the world. The tool is very good variable to take into account when… more»
Find out what your peers are saying about RSA, CA Technologies, Cisco and others in Authentication Systems. Updated: April 2019.
340,467 professionals have used our research since 2012.
Real User
IT Security Engineer at a insurance company with 201-500 employees
Mar 26 2019

What is most valuable?

The most valuable feature is the stock tokens. That works the best for us.

What needs improvement?

I would like to see a more adaptive type of solution, something that we could use on our web pages. I would like to be able to give the same… more»

What's my experience with pricing, setup cost, and licensing?

The pricing is $50 per head, yearly.

If you previously used a different solution, which one did you use and why did you switch?

Before this solution it was just username and password, strictly.

What other advice do I have?

Look at something like Centrify or something along those lines: a single sign-on solution. We use the physical tokens and stock tokens. It's an… more»
Real User
Senior Developer AIG Digital Security Group at a insurance company with 10,001+ employees
Aug 15 2017

What is most valuable?

Risk Engine’s risk score, eFN, GeoIP, and device binding all coming together in the Policy Rules to decide when to… more»

How has it helped my organization?

It has reduced false positives greatly in our fraud detection ability.

What needs improvement?

RSA Adaptive Authentication lacks a mechanism to verify the identity of a new user in the Enrollment event workflow.

What's my experience with pricing, setup cost, and licensing?

Keep the proxy service layer on premises. That consumes SaaS security services on the back-end. Letting Cloud service… more»

If you previously used a different solution, which one did you use and why did you switch?

Before and in addition to RSA, we used RSA Authentication Manager SecureID Tokens for MFA in some apps.

What other advice do I have?

There are newer technologies and offerings from newer and smaller vendors. Look into the list of FinTech companies if you… more»
Real User
Director of Cyber Security at a financial services firm with 1,001-5,000 employees
Mar 27 2019

What do you think of RSA Adaptive Authentication?

What is our primary use case?

There are many use cases that we have defined based on our business needs.

What is most valuable?

Ingestion of logs and raising alert space on those logs are the most valuable features.

What needs improvement?

The product is basically unusable. We need better ease of use; it's overly complicated.

How was the initial setup?

It has taken years to implement.

What about the implementation team?

We used RSA consultants for the deployment. Our experience with them was not productive, but we did work with other consultants as well. The consultants' ability to configure this particular platform is limited based on their knowledge, because it is such a complex product. There are so many classes that you need to take in order to be proficient at it,…

Articles

User Assessments By Topic About RSA Adaptive Authentication

Find out what your peers are saying about RSA, CA Technologies, Cisco and others in Authentication Systems. Updated: April 2019.
340,467 professionals have used our research since 2012.

RSA Adaptive Authentication Questions

RSA Adaptive Authentication Projects By Members

What is RSA Adaptive Authentication?

RSA Adaptive Authentication is a risk-based two-factor authentication solution providing cost-effective protection for an entire user base. Adaptive Authentication secures online portals, SSL VPNs, and web access management portals for different types of organizations in the healthcare, insurance, enterprise, government, financial services, and other industries. Based on the transparent two-factor authentication technology, Adaptive Authentication works behind the scenes to authenticate end users and transactions based on individual end user and device profiles. In addition, Adaptive Authentication uses the RSA Risk Engine to estimate the level of risk for the specific activity and uses information collected from the RSAeFraudNetwork (a cross-organization, cross-application, cross-border online fraud network) to identify fraudulent activities. The Policy Manager determines what actions must be performed, depending on the risk score and other parameters.
RSA Adaptive Authentication customers
ADP, Ameritas, Partners Healthcare

Sign Up with Email