Symantec Advanced Authentication Archived Reviews (More than two years old)

Filter by:
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Vendor
Senior Program Analyst at a logistics company with 10,001+ employees
Dec 05 2017

What is most valuable?

Rules on Risk Authentication are very good.

How has it helped my organization?

It actually increases our revenue and the customer base.

What needs improvement?

They definitely need to automate a few processes like the Wiley process. Even though Wiley is part of the CA group, it is not present in CA Advanced Authentication. I want that to be integrated, and… more »

Which solution did I use previously and why did I switch?

We were not previously using another solution. We went with CA because of customer demand.

What other advice do I have?

For this type of product it has to be able to handle a sufficient customer base. You have to take the traffic load into consideration, will it take the capacity. I give it an eight out of 10 because… more »

Which other solutions did I evaluate?

None.
Vendor
Lead Technical Architect with 1,001-5,000 employees
Nov 02 2017

What is most valuable?

It tells us exactly what we want in terms of authentication to various applications and provides protection for users who access them. Our users can have access to applications securely through various devices.

How has it helped my organization?

It adds a strong layer of security for the multi-factor authentication. Rather than just the one factor with your password, it gives you a one-time password and adds an extra layer of security with encryption.

What needs improvement?

We have seen quite a few issues with bugginess. It is indeed pretty buggy and we have had to install some fixes.

What other advice do I have?

It is quite buggy, so I would be careful with the product.
Find out what your peers are saying about Broadcom, RSA, OneSpan and others in Authentication Systems. Updated: September 2020.
438,246 professionals have used our research since 2012.
Vendor
Director - Transformation Programs and Architecture at a comms service provider with 10,001+ employees
Jan 16 2017

What is most valuable?

Ease of deployment: no need to keep up with physical devices for multi-factor authentication; no software to deploy on end-user computers requiring administrative rights… more »

How has it helped my organization?

My team migrated away from RSA SecurID hard tokens to the digital certificate-based authentication.

What needs improvement?

It would be nice to have some level of integration with a separate user store (i.e., Active Directory integration) such that the user name would stay the same across… more »

What's my experience with pricing, setup cost, and licensing?

The initial setup of the tenant is a big cost element of the service and we were doing multiple tenants for our customer. Given that structure, the costs for building… more »

Which solution did I use previously and why did I switch?

RSA SecurID: Our service was coming up to being “end of support” and we decided to switch platforms rather than paying to upgrade our platform.

What other advice do I have?

Make sure you understand the up-front costs and the ongoing cost structure. Users are billed when they are built into the portal, so also make sure your users enroll right… more »

Which other solutions did I evaluate?

Before choosing this product, we evaluated Gemalto soft token-based, two-factor authentication.
Vendor
Solution Architect at Votorantim bank
Jan 05 2017

What is most valuable?

For Votorantim bank, the best feature is the token solution. We can analyze any transaction that is declined or blocked. We can make a decision to release or block the transaction or anything else.

How has it helped my organization?

CA products are the best fit with our backend systems. CA is the best tool for our backend solution. This solution has made the bank more secure.

What needs improvement?

We are looking for something that can fingerprint a check. For example, if you lose your credit card, they can double-check your identity with your fingerprint.

What other advice do I have?

I would suggest that others first analyze their backend systems very well. Make sure that the backend systems are a good fit with the new product that they are buying. When selecting a vendor, I look for technical knowledge. This is the… more »

Which other solutions did I evaluate?

We looked into other vendors, such as Novell and Oracle. We reviewed IBM, but they did not have the best fit for our backend systems. CA fits better with our backend system.
Vendor
Engineer at a tech vendor with 1,001-5,000 employees
Feb 09 2016

What is most valuable?

Aside from the two factor authentication requirements that we have, as far as having access to HIPA protected data, there's also the risk engine that helps us evaluate and answer questions like "When was the last time and location that a person accessed that data?" It's infeasible within time and place, they can't have been in Dallas at 3:00 and then at Florida at 3:30 and say, "Yeah, it's the… more »

How has it helped my organization?

It allows us to assure our customers that we are protecting their data. We deal with a lot of other data. They'll have contractual and as well as Federal requirements to protect that. It's just another tool in our toolbox to make sure that happens.

What other advice do I have?

If you just need basic 2-factor, it fills the bill. Where we get our value is the risk-evaluation and those additional protections. Make sure you have all your requirements identified and really think about what you're trying to accomplish. A lot of times, we'll have a problem and we'll already have a solution in mind. And, "How do we make this fit this?" Versus "Well, what do we actually need to… more »
Vendor
Executive Director, CTO Security - Identity Management Architect at a financial services firm with 10,001+ employees
Jan 08 2016

What is most valuable?

Arcot, for us, is really about multi-factor authentication. We use it on our client's side and, I think, probably the two biggest features of that are from the end-user experience. So, it is basically a token that is stored on the device which represents something you have, but the user actually… more »

How has it helped my organization?

The main benefit is really around the fact that there is a soft token. The cost of having to distribute a hard token isn't there. Some of our colleagues in other business divisions are issuing cards or some other second-factor device. This gets quite expensive, so being able to issue a soft token… more »

What needs improvement?

Arcot itself is based on a browser technology. This means that the office ID is effectively stored as a cookie in the browser. One of the things we have seen from our customers is that certain policies dictate that browser caches are cleared, which means cookies get deleted. This then means that… more »

What other advice do I have?

I think one thing I would say would be to make sure you test all of your use cases against Arcot. Make sure you understand the enrollment process, the de-enrollment process, understand how to authenticate use cases, and ensure that it covers everything that you need.
Vendor
IT Infrastructure Services at a mining and metals company with 10,001+ employees
Dec 10 2015

What is most valuable?

The most valuable feature is that we get a wide range of authentication methods and authentication integrators. Different platforms can get a service authentication with transparency to the final user. With the transparency we also get strong authentication forms and connectors. We submit our… more »

How has it helped my organization?

The cloud implementation with different platforms and software has been great for our clients.

What needs improvement?

It needs faster implementation on the cloud for our customers.

Which other solutions did I evaluate?

No, because this is a very specialized solution for which there aren't many other vendors.

What is Symantec Advanced Authentication?

CA Advanced Authentication provides a secure, user-convenient and cost-effective way to protect online and mobile applications. The solution consists of two components:  CA Risk Authentication allows the enterprise to silently and transparently collect data and assess risk based on device identification, location and user behavior, among other factors, and CA Strong Authentication provides a wide variety of software-based, two-factor authentication credentials and technology to make passwords more secure.  Together they enable an intelligent, layered security approach to protect user identities and organizational data.

Take the assessment


Also known as
CA Advanced Authentication, CA Strong Authentication, CA Risk Authentication, Arcot WebFort, Arcot RiskFort
Symantec Advanced Authentication customers

Global bank, Large Filipino Bank and SK Infosec

BUYER'S GUIDE
Download our free Authentication Systems Report and find out what your peers are saying about Broadcom, RSA, OneSpan, and more!