RSA Authentication Manager Valuable Features
It stands out as a comprehensive and adaptable solution that excels in both on-premises and cloud-based authentication, offers strong security with multi-layered authentication, and boasts a well-maintained product with reliable performance.
View full review »HW
Cipto Haryo
Director at PT Asia Megatama Sejahter
The most valuable features are multifactor authentication and simple on-prem implementation.
View full review »The self service token deployment combined with administrative rolls gives you a lot of flexibility as a Managed SP.
View full review »Buyer's Guide
Authentication Systems
March 2024
Find out what your peers are saying about RSA, Cisco, Thales Cloud Security and others in Authentication Systems. Updated: March 2024.
765,234 professionals have used our research since 2012.
US
Uwe Schomäcker
VP Business Development at SDVG
The most valuable feature is the SecurID.
View full review »GD
SecAnalyst3477
Security Analyst at a insurance company with 1,001-5,000 employees
It does what we want it to do, has nice security administration features and built in reporting and other provisions.
It provides effective two factor authentication for remote users. The product has features that provide varying authentication mechanisms -
- Hard hand held RSA tokens
- Soft tokens (software tokens for Smartphones)
- OnDemand one-time token authentication for vendors that may need access
Provisions for decentralized administration and Help Desk/Service Desk problem resolution have been incorporated into the product architecture, with built-in separation of duties. Examples include but are not limited to such events as -
- Resolving authentication issues
- Verifying the identities of those individuals that call with remote access issues
- Auditing/logging all activities, etc.
JB
reviewer1709259
Managing Director, Transmission Engineering at a energy/utilities company with 10,001+ employees
I have found the solution works well.
View full review »- Authentication Manager as hardware hardened appliance
- Secure creation of the token/FOB in RSA's secure manufacturing unit
- Securing the hardware/Software FOB
- Secure transportation of FOBs & Token Seeds.
SB
Sambhaji Bhosale
Sr. Security Engineer at a tech services company with 10,001+ employees
The most valuable feature is the provision part. The mapping and the logging is also very good. In addition, the troubleshooting (from a console point of view) is easy for administration and on the provisioning and logging part.
View full review »Easy setup, deployment, and integration in different infrastructures, including virtual ones.
View full review »Buyer's Guide
Authentication Systems
March 2024
Find out what your peers are saying about RSA, Cisco, Thales Cloud Security and others in Authentication Systems. Updated: March 2024.
765,234 professionals have used our research since 2012.