Sr. Security Engineer at a tech services company with 10,001+ employees
Real User
The two-factor authentication is a trusted part of the solution.
Pros and Cons
  • "The most valuable feature is the provision part. The mapping and the logging is also very good. In addition, the troubleshooting, from a console point of view, is easy for administration and on the provisioning and logging part."
  • "We have encountered issue when trying to expand this particular solution for a large set of users across the country."

What is our primary use case?

We use this solution for authentication needs.

How has it helped my organization?

The advantage to this solution is the two-factor authentication. It is a very trusted part of the solution. It provides benefits usch as secure application access in terms of remote VPN, application security, and WiFi security.

What is most valuable?

The most valuable feature is the provision part. The mapping and the logging is also very good. In addition, the troubleshooting (from a console point of view) is easy for administration and on the provisioning and logging part.

What needs improvement?

We have users throughout the world, and this current solution is causing us a lot of manual effort, and lots of back-end inventory management. We want to avoid all of these things. So, that is the overall learning solution we are looking for. In addition, the features of RSA are lagging. In terms of the cloud, and of appliation, they are providing application security on-boarding with the two-factor authentication for RSA. We are seeing a lot of difficult issues in terms of RSA, especially the cloud-based two-factor authentication process. We find issues with the application of the Android, i-Pad or other Apple products two-factor authentication solutions. There are significant issues with MobilePASS authentication.

Buyer's Guide
Authentication Systems
April 2024
Find out what your peers are saying about RSA, Cisco, Thales Cloud Security and others in Authentication Systems. Updated: April 2024.
768,886 professionals have used our research since 2012.

For how long have I used the solution?

More than five years.

What do I think about the scalability of the solution?

We have encountered issue when trying to expand this particular solution for a large set of users across the country.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Owner at a tech services company
Real User
Easy setup, deployment, and integration including for virtual infrastructures
Pros and Cons
  • "Easy setup, deployment, and integration in different infrastructures, including virtual ones."
  • "Perhaps parts of the the user interface should become more intuitive."

What is most valuable?

Easy setup, deployment, and integration in different infrastructures, including virtual ones.

How has it helped my organization?

2FA with hardware tokens for VMware VDIs.

What needs improvement?

Perhaps parts of the the user interface should become more intuitive.

For how long have I used the solution?

About a year.

What do I think about the stability of the solution?

No.

What do I think about the scalability of the solution?

No.

Which solution did I use previously and why did I switch?

I haven't used another solution previously and I am not familiar with another vendor for 2FA.

How was the initial setup?

Yes, it was quiet straightforward after carefully reading and following the setup manual and documentation.

What's my experience with pricing, setup cost, and licensing?

 I have no idea, I wasn't responsible for licensing.

Which other solutions did I evaluate?

No, we decided to use RSA because of the easy integration with VMware infra.

What other advice do I have?

I would recommend it, very good product for implementing 2FA.

Disclosure: My company has a business relationship with this vendor other than being a customer: Business partner.
PeerSpot user
Buyer's Guide
Download our free Authentication Systems Report and find out what your peers are saying about RSA, Cisco, Thales Cloud Security, and more!
Updated: April 2024
Product Categories
Authentication Systems
Buyer's Guide
Download our free Authentication Systems Report and find out what your peers are saying about RSA, Cisco, Thales Cloud Security, and more!