Best Risk-Based Authentication Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Risk-based authentication (RBA) solutions are identity management products that weigh user variables to determine and identify threats. Companies use RBA software to increase the effectiveness of user governance and authentication procedures. Users who are determined to be riskier are required to provide additional authentication information. These analyze IP addresses, devices, behaviors and identities to set customized authentication methods for each individual user attempting to access the network. Non-suspicious users accessing applications from known devices, locations, and networks may be automatically signed in. Suspicious users may be required to prompted to provide SMS code, biometric verification, or email confirmation actions to properly verify their identity.

Risk-based authentication products often contain multi-factor authentication features, but set unique requirements based the administrators configuration. RBA tools may work in sync with cloud identity and access management products, but typically only provide the authentication component, rather than the application access and governance components.

To qualify for inclusion in the Risk-Based Authentication category, a product must:

  • Assess a user’s unique network, device, and behavior to determine risk
  • Prompt authentication measures after assessment
  • Utilize authentication methods such as SMS, questioning, or email confirmation
  • Periodically store and update suspicious networks, devices, and behaviors

Best Risk-Based Authentication Software At A Glance

Leader:
Best Free Software:
Top Trending:
Show LessShow More
Best Free Software:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
106 Listings in Risk-Based Authentication (RBA) Available
(486)4.6 out of 5
Optimized for quick response
2nd Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sift is the AI-powered fraud platform delivering identity trust for leading global businesses. Our deep investments in machine learning and user identity, a data network scoring 1 trillion events per

    Users
    • Risk Investigator
    • Fraud Analyst
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 57% Mid-Market
    • 28% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Sift is a fraud detection tool that provides real-time analysis and monitoring to help users identify potential risks and take preventive measures.
    • Users frequently mention the ease of use, flexibility of rules, and the ability to adjust them to fit specific business needs, as well as the tool's effectiveness in catching fraud and providing valuable insights.
    • Reviewers experienced a steep learning curve for new users, occasional false positives requiring manual review, and a lack of transparency behind some risk scores, which can make it difficult to understand why certain decisions were made.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sift Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    107
    Fraud Prevention
    94
    Data Analysis
    69
    Fraud Detection
    55
    Detection Efficiency
    47
    Cons
    Inaccuracy
    40
    Insufficient Information
    28
    Lack of Clarity
    19
    Complexity
    18
    Learning Difficulty
    16
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sift features and usability ratings that predict user satisfaction
    8.4
    Bi-Directional Identity Synchronization
    Average: 9.0
    8.8
    Policy Management
    Average: 9.0
    8.9
    Ease of Use
    Average: 9.0
    8.1
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    San Francisco, CA
    Twitter
    @GetSift
    9,589 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    335 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sift is the AI-powered fraud platform delivering identity trust for leading global businesses. Our deep investments in machine learning and user identity, a data network scoring 1 trillion events per

Users
  • Risk Investigator
  • Fraud Analyst
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 57% Mid-Market
  • 28% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Sift is a fraud detection tool that provides real-time analysis and monitoring to help users identify potential risks and take preventive measures.
  • Users frequently mention the ease of use, flexibility of rules, and the ability to adjust them to fit specific business needs, as well as the tool's effectiveness in catching fraud and providing valuable insights.
  • Reviewers experienced a steep learning curve for new users, occasional false positives requiring manual review, and a lack of transparency behind some risk scores, which can make it difficult to understand why certain decisions were made.
Sift Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
107
Fraud Prevention
94
Data Analysis
69
Fraud Detection
55
Detection Efficiency
47
Cons
Inaccuracy
40
Insufficient Information
28
Lack of Clarity
19
Complexity
18
Learning Difficulty
16
Sift features and usability ratings that predict user satisfaction
8.4
Bi-Directional Identity Synchronization
Average: 9.0
8.8
Policy Management
Average: 9.0
8.9
Ease of Use
Average: 9.0
8.1
Cloud Directory
Average: 8.7
Seller Details
Company Website
Year Founded
2011
HQ Location
San Francisco, CA
Twitter
@GetSift
9,589 Twitter followers
LinkedIn® Page
www.linkedin.com
335 employees on LinkedIn®
(399)4.5 out of 5
Optimized for quick response
3rd Easiest To Use in Risk-Based Authentication (RBA) software
View top Consulting Services for Cisco Duo
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

    Users
    • Software Engineer
    • Consultant
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 44% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Duo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    71
    Authentication Ease
    51
    Security
    50
    Authentication
    48
    Easy Access
    36
    Cons
    Authentication Issues
    28
    Access Limitations
    20
    Login Issues
    17
    Notification Issues
    13
    Poor Notifications
    11
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Duo features and usability ratings that predict user satisfaction
    9.7
    Bi-Directional Identity Synchronization
    Average: 9.0
    9.4
    Policy Management
    Average: 9.0
    9.3
    Ease of Use
    Average: 9.0
    9.4
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Company Website
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,134 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

Users
  • Software Engineer
  • Consultant
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 44% Enterprise
  • 38% Mid-Market
Cisco Duo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
71
Authentication Ease
51
Security
50
Authentication
48
Easy Access
36
Cons
Authentication Issues
28
Access Limitations
20
Login Issues
17
Notification Issues
13
Poor Notifications
11
Cisco Duo features and usability ratings that predict user satisfaction
9.7
Bi-Directional Identity Synchronization
Average: 9.0
9.4
Policy Management
Average: 9.0
9.3
Ease of Use
Average: 9.0
9.4
Cloud Directory
Average: 8.7
Seller Details
Seller
Cisco
Company Website
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,134 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(203)4.3 out of 5
6th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and se

    Users
    • Software Engineer
    • Software Developer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 51% Small-Business
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Auth0 Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    17
    Security
    17
    Integrations
    15
    Authentication
    12
    Easy Integrations
    12
    Cons
    Expensive
    8
    Cost
    5
    Complex Setup
    4
    Difficult Learning
    4
    Pricing Issues
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Auth0 features and usability ratings that predict user satisfaction
    9.3
    Bi-Directional Identity Synchronization
    Average: 9.0
    9.0
    Policy Management
    Average: 9.0
    8.5
    Ease of Use
    Average: 9.0
    9.3
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okta
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @okta
    42,309 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,292 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and se

Users
  • Software Engineer
  • Software Developer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 51% Small-Business
  • 27% Mid-Market
Auth0 Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
17
Security
17
Integrations
15
Authentication
12
Easy Integrations
12
Cons
Expensive
8
Cost
5
Complex Setup
4
Difficult Learning
4
Pricing Issues
4
Auth0 features and usability ratings that predict user satisfaction
9.3
Bi-Directional Identity Synchronization
Average: 9.0
9.0
Policy Management
Average: 9.0
8.5
Ease of Use
Average: 9.0
9.3
Cloud Directory
Average: 8.7
Seller Details
Seller
Okta
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@okta
42,309 Twitter followers
LinkedIn® Page
www.linkedin.com
8,292 employees on LinkedIn®
(1,824)4.4 out of 5
Optimized for quick response
4th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:$4.25
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LastPass is a secure, cloud-based password manager that takes the hassle out of remembering and managing passwords. It works across all your devices, so you can log in faster and stay protected everyw

    Users
    • Owner
    • CEO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 63% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • LastPass Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    375
    Password Management
    247
    Security
    223
    Autofill Feature
    177
    Easy Access
    158
    Cons
    Password Management
    169
    Autofill Issues
    136
    Login Issues
    105
    Password Issues
    55
    Browser Extension Issues
    50
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LastPass features and usability ratings that predict user satisfaction
    9.3
    Bi-Directional Identity Synchronization
    Average: 9.0
    9.4
    Policy Management
    Average: 9.0
    8.7
    Ease of Use
    Average: 9.0
    9.2
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LastPass
    Company Website
    Year Founded
    2008
    HQ Location
    Boston, Massachusetts
    Twitter
    @LastPass
    47,058 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    824 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LastPass is a secure, cloud-based password manager that takes the hassle out of remembering and managing passwords. It works across all your devices, so you can log in faster and stay protected everyw

Users
  • Owner
  • CEO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 63% Small-Business
  • 25% Mid-Market
LastPass Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
375
Password Management
247
Security
223
Autofill Feature
177
Easy Access
158
Cons
Password Management
169
Autofill Issues
136
Login Issues
105
Password Issues
55
Browser Extension Issues
50
LastPass features and usability ratings that predict user satisfaction
9.3
Bi-Directional Identity Synchronization
Average: 9.0
9.4
Policy Management
Average: 9.0
8.7
Ease of Use
Average: 9.0
9.2
Cloud Directory
Average: 8.7
Seller Details
Seller
LastPass
Company Website
Year Founded
2008
HQ Location
Boston, Massachusetts
Twitter
@LastPass
47,058 Twitter followers
LinkedIn® Page
www.linkedin.com
824 employees on LinkedIn®
(107)4.4 out of 5
7th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:Starting at $2.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 48% Enterprise
    • 48% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Workforce Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    8
    Security
    7
    Ease of Use
    6
    Access Management
    5
    Access Control
    4
    Cons
    Timing Issues
    3
    Complexity
    2
    Complex Usability
    2
    Delayed Response
    2
    Difficult Learning
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Workforce Identity features and usability ratings that predict user satisfaction
    8.3
    Bi-Directional Identity Synchronization
    Average: 9.0
    8.3
    Policy Management
    Average: 9.0
    8.7
    Ease of Use
    Average: 9.0
    10.0
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,361 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,051 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 48% Enterprise
  • 48% Mid-Market
CyberArk Workforce Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
8
Security
7
Ease of Use
6
Access Management
5
Access Control
4
Cons
Timing Issues
3
Complexity
2
Complex Usability
2
Delayed Response
2
Difficult Learning
2
CyberArk Workforce Identity features and usability ratings that predict user satisfaction
8.3
Bi-Directional Identity Synchronization
Average: 9.0
8.3
Policy Management
Average: 9.0
8.7
Ease of Use
Average: 9.0
10.0
Cloud Directory
Average: 8.7
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,361 Twitter followers
LinkedIn® Page
www.linkedin.com
4,051 employees on LinkedIn®
Ownership
NASDAQ:CYBR
(17)4.8 out of 5
5th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative age

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Silverfort features and usability ratings that predict user satisfaction
    6.7
    Bi-Directional Identity Synchronization
    Average: 9.0
    6.7
    Policy Management
    Average: 9.0
    9.9
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Tel Aviv, Israel
    Twitter
    @silverfort
    624 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    484 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative age

Users
No information available
Industries
No information available
Market Segment
  • 47% Small-Business
  • 35% Mid-Market
Silverfort features and usability ratings that predict user satisfaction
6.7
Bi-Directional Identity Synchronization
Average: 9.0
6.7
Policy Management
Average: 9.0
9.9
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
Year Founded
2016
HQ Location
Tel Aviv, Israel
Twitter
@silverfort
624 Twitter followers
LinkedIn® Page
www.linkedin.com
484 employees on LinkedIn®
(1,378)4.7 out of 5
11th Easiest To Use in Risk-Based Authentication (RBA) software
View top Consulting Services for 1Password
Save to My Lists
100% off: 0
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Most Used Enterprise Password Manager, trusted by over 150,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secu

    Users
    • Software Engineer
    • Owner
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • 1Password Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    116
    Security
    88
    Intuitive
    38
    Password Management
    38
    Secure Sharing
    36
    Cons
    Password Management
    49
    Authentication Issues
    26
    Login Issues
    22
    Process Complexity
    20
    Autofill Issues
    19
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 1Password features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    9.0
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    1Password
    Company Website
    Year Founded
    2005
    HQ Location
    Ontario
    Twitter
    @1Password
    140,212 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,559 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Most Used Enterprise Password Manager, trusted by over 150,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secu

Users
  • Software Engineer
  • Owner
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 31% Mid-Market
1Password Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
116
Security
88
Intuitive
38
Password Management
38
Secure Sharing
36
Cons
Password Management
49
Authentication Issues
26
Login Issues
22
Process Complexity
20
Autofill Issues
19
1Password features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
9.0
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
Seller
1Password
Company Website
Year Founded
2005
HQ Location
Ontario
Twitter
@1Password
140,212 Twitter followers
LinkedIn® Page
www.linkedin.com
2,559 employees on LinkedIn®
(113)4.8 out of 5
Optimized for quick response
12th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kount is trust and safety technology. Businesses pick the solutions that are relevant to their unique challenges, and we help them grow with confidence — no matter the industry. We use data-driven

    Users
    No information available
    Industries
    • Retail
    • Apparel & Fashion
    Market Segment
    • 46% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kount Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Fraud Prevention
    8
    Ease of Use
    5
    Features
    5
    Customer Support
    4
    Fraud Protection
    3
    Cons
    Delayed Updates
    2
    Lack of Clarity
    2
    Not User-Friendly
    2
    Access Limitations
    1
    App Stability
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kount features and usability ratings that predict user satisfaction
    9.2
    Bi-Directional Identity Synchronization
    Average: 9.0
    9.3
    Policy Management
    Average: 9.0
    9.2
    Ease of Use
    Average: 9.0
    9.2
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2007
    HQ Location
    Boise, ID
    Twitter
    @KountInc
    2,444 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    228 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kount is trust and safety technology. Businesses pick the solutions that are relevant to their unique challenges, and we help them grow with confidence — no matter the industry. We use data-driven

Users
No information available
Industries
  • Retail
  • Apparel & Fashion
Market Segment
  • 46% Mid-Market
  • 33% Small-Business
Kount Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Fraud Prevention
8
Ease of Use
5
Features
5
Customer Support
4
Fraud Protection
3
Cons
Delayed Updates
2
Lack of Clarity
2
Not User-Friendly
2
Access Limitations
1
App Stability
1
Kount features and usability ratings that predict user satisfaction
9.2
Bi-Directional Identity Synchronization
Average: 9.0
9.3
Policy Management
Average: 9.0
9.2
Ease of Use
Average: 9.0
9.2
Cloud Directory
Average: 8.7
Seller Details
Company Website
Year Founded
2007
HQ Location
Boise, ID
Twitter
@KountInc
2,444 Twitter followers
LinkedIn® Page
www.linkedin.com
228 employees on LinkedIn®
(106)4.4 out of 5
13th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:$3 Per User Per Month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ping Identity (NYSE: PING) builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 67% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ping Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Administration Management
    1
    Data Security
    1
    Ease of Use
    1
    Security
    1
    Simple
    1
    Cons
    Clunky Interface
    1
    Complex Administration
    1
    Complexity
    1
    Complex Setup
    1
    Complex Usage
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ping Identity features and usability ratings that predict user satisfaction
    9.2
    Bi-Directional Identity Synchronization
    Average: 9.0
    8.7
    Policy Management
    Average: 9.0
    8.7
    Ease of Use
    Average: 9.0
    9.2
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,527 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,024 employees on LinkedIn®
    Phone
    1.303.468.2900
Product Description
How are these determined?Information
This description is provided by the seller.

Ping Identity (NYSE: PING) builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 67% Enterprise
  • 25% Mid-Market
Ping Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Administration Management
1
Data Security
1
Ease of Use
1
Security
1
Simple
1
Cons
Clunky Interface
1
Complex Administration
1
Complexity
1
Complex Setup
1
Complex Usage
1
Ping Identity features and usability ratings that predict user satisfaction
9.2
Bi-Directional Identity Synchronization
Average: 9.0
8.7
Policy Management
Average: 9.0
8.7
Ease of Use
Average: 9.0
9.2
Cloud Directory
Average: 8.7
Seller Details
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,527 Twitter followers
LinkedIn® Page
www.linkedin.com
2,024 employees on LinkedIn®
Phone
1.303.468.2900
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Thales’ SafeNet Trusted Access is a cloud-based Access Management and Authentication Service. It ensures that no user is a target by allowing you to expand authentication to all users and apps with di

    Users
    No information available
    Industries
    • Computer Networking
    Market Segment
    • 68% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Thales SafeNet Trusted Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Administration Management
    1
    Customer Support
    1
    Customizability
    1
    Customization
    1
    Deployment Ease
    1
    Cons
    Authentication Issues
    1
    Compatibility Issues
    1
    Device Limitations
    1
    Integration Issues
    1
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Thales SafeNet Trusted Access features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    9.8
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin, Texas
    Twitter
    @ThalesCloudSec
    6,795 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    941 employees on LinkedIn®
    Ownership
    EPA:HO
    Total Revenue (USD mm)
    $15,854
Product Description
How are these determined?Information
This description is provided by the seller.

Thales’ SafeNet Trusted Access is a cloud-based Access Management and Authentication Service. It ensures that no user is a target by allowing you to expand authentication to all users and apps with di

Users
No information available
Industries
  • Computer Networking
Market Segment
  • 68% Enterprise
  • 25% Mid-Market
Thales SafeNet Trusted Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Administration Management
1
Customer Support
1
Customizability
1
Customization
1
Deployment Ease
1
Cons
Authentication Issues
1
Compatibility Issues
1
Device Limitations
1
Integration Issues
1
Missing Features
1
Thales SafeNet Trusted Access features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
9.8
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
HQ Location
Austin, Texas
Twitter
@ThalesCloudSec
6,795 Twitter followers
LinkedIn® Page
www.linkedin.com
941 employees on LinkedIn®
Ownership
EPA:HO
Total Revenue (USD mm)
$15,854
(149)4.2 out of 5
Optimized for quick response
15th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:$1.71 / user, per month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 62% Enterprise
    • 39% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • IBM Verify CIAM is a tool designed for protecting digital customer identities and securing digital services, with features such as passwordless and biometric authentication, risk scoring, and customer consent and data security mechanisms.
    • Users frequently mention the enhanced security, customer experience, 24/7 support, personalized interaction, and the ability to easily integrate the tool with other systems, as well as its robust identity and access management solution and integration capabilities.
    • Reviewers mentioned the complex implementation process, outdated and non-user-friendly interface, slow responsiveness, and the need for deep technical knowledge for setup, as well as difficulties in monitoring access risks and the high cost of the platform.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Verify CIAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    34
    Ease of Use
    24
    Authentication
    22
    Identity Management
    19
    Features
    18
    Cons
    Expensive
    12
    Difficult Learning
    11
    Complexity
    10
    Complex Setup
    10
    Cost
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Verify CIAM features and usability ratings that predict user satisfaction
    8.8
    Bi-Directional Identity Synchronization
    Average: 9.0
    8.0
    Policy Management
    Average: 9.0
    8.3
    Ease of Use
    Average: 9.0
    8.2
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Company Website
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    708,859 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331,391 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 62% Enterprise
  • 39% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • IBM Verify CIAM is a tool designed for protecting digital customer identities and securing digital services, with features such as passwordless and biometric authentication, risk scoring, and customer consent and data security mechanisms.
  • Users frequently mention the enhanced security, customer experience, 24/7 support, personalized interaction, and the ability to easily integrate the tool with other systems, as well as its robust identity and access management solution and integration capabilities.
  • Reviewers mentioned the complex implementation process, outdated and non-user-friendly interface, slow responsiveness, and the need for deep technical knowledge for setup, as well as difficulties in monitoring access risks and the high cost of the platform.
IBM Verify CIAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
34
Ease of Use
24
Authentication
22
Identity Management
19
Features
18
Cons
Expensive
12
Difficult Learning
11
Complexity
10
Complex Setup
10
Cost
9
IBM Verify CIAM features and usability ratings that predict user satisfaction
8.8
Bi-Directional Identity Synchronization
Average: 9.0
8.0
Policy Management
Average: 9.0
8.3
Ease of Use
Average: 9.0
8.2
Cloud Directory
Average: 8.7
Seller Details
Seller
IBM
Company Website
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
708,859 Twitter followers
LinkedIn® Page
www.linkedin.com
331,391 employees on LinkedIn®
(40)4.9 out of 5
1st Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:$3.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proximity MFA for shared workstations. MFA for Shared Computers is a cutting-edge security solution designed to enhance user authentication and access control in environments where multiple users shar

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Electrical/Electronic Manufacturing
    Market Segment
    • 43% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • GateKeeper Proximity Authentication Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Security
    7
    Customer Support
    6
    Easy Setup
    4
    Implementation Ease
    4
    Cons
    Authentication Issues
    1
    Difficult Learning
    1
    Improvement Needed
    1
    Learning Curve
    1
    Limited Compatibility
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GateKeeper Proximity Authentication features and usability ratings that predict user satisfaction
    10.0
    Bi-Directional Identity Synchronization
    Average: 9.0
    10.0
    Policy Management
    Average: 9.0
    9.8
    Ease of Use
    Average: 9.0
    10.0
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    College Park, Maryland
    Twitter
    @gkaccess
    2,028 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    23 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Proximity MFA for shared workstations. MFA for Shared Computers is a cutting-edge security solution designed to enhance user authentication and access control in environments where multiple users shar

Users
No information available
Industries
  • Hospital & Health Care
  • Electrical/Electronic Manufacturing
Market Segment
  • 43% Small-Business
  • 35% Mid-Market
GateKeeper Proximity Authentication Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Security
7
Customer Support
6
Easy Setup
4
Implementation Ease
4
Cons
Authentication Issues
1
Difficult Learning
1
Improvement Needed
1
Learning Curve
1
Limited Compatibility
1
GateKeeper Proximity Authentication features and usability ratings that predict user satisfaction
10.0
Bi-Directional Identity Synchronization
Average: 9.0
10.0
Policy Management
Average: 9.0
9.8
Ease of Use
Average: 9.0
10.0
Cloud Directory
Average: 8.7
Seller Details
Company Website
Year Founded
2015
HQ Location
College Park, Maryland
Twitter
@gkaccess
2,028 Twitter followers
LinkedIn® Page
www.linkedin.com
23 employees on LinkedIn®
(90)4.5 out of 5
14th Easiest To Use in Risk-Based Authentication (RBA) software
View top Consulting Services for WSO2 Identity Server
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    WSO2 Identity Server is a modern, open-source Identity and Access Management (IAM) solution designed to meet the evolving needs of enterprises. With AI-powered automation, an API-centric architecture,

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • WSO2 Identity Server Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Authentication
    16
    Security
    15
    Ease of Use
    12
    Identity Management
    12
    Single Sign-On
    12
    Cons
    Complex Setup
    7
    Difficult Learning
    7
    Complexity
    6
    Expertise Requirement
    6
    Required Expertise
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WSO2 Identity Server features and usability ratings that predict user satisfaction
    9.3
    Bi-Directional Identity Synchronization
    Average: 9.0
    9.3
    Policy Management
    Average: 9.0
    8.5
    Ease of Use
    Average: 9.0
    9.5
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    WSO2
    Company Website
    Year Founded
    2005
    HQ Location
    Mountain View, CA
    Twitter
    @wso2
    12,648 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,162 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

WSO2 Identity Server is a modern, open-source Identity and Access Management (IAM) solution designed to meet the evolving needs of enterprises. With AI-powered automation, an API-centric architecture,

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Mid-Market
  • 36% Enterprise
WSO2 Identity Server Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Authentication
16
Security
15
Ease of Use
12
Identity Management
12
Single Sign-On
12
Cons
Complex Setup
7
Difficult Learning
7
Complexity
6
Expertise Requirement
6
Required Expertise
6
WSO2 Identity Server features and usability ratings that predict user satisfaction
9.3
Bi-Directional Identity Synchronization
Average: 9.0
9.3
Policy Management
Average: 9.0
8.5
Ease of Use
Average: 9.0
9.5
Cloud Directory
Average: 8.7
Seller Details
Seller
WSO2
Company Website
Year Founded
2005
HQ Location
Mountain View, CA
Twitter
@wso2
12,648 Twitter followers
LinkedIn® Page
www.linkedin.com
1,162 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Telesign's Verification products allow businesses to secure their ecosystem by having users prove they are in possession of their mobile device. Telesign Verification provides companies with the optio

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 58% Small-Business
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Telesign Verification Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    8
    Fraud Prevention
    5
    Features
    3
    Implementation Ease
    3
    Access Control
    2
    Cons
    Expensive
    5
    Login Issues
    2
    Slow Performance
    2
    Software Bugs
    2
    Inaccuracy
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Telesign Verification features and usability ratings that predict user satisfaction
    7.9
    Bi-Directional Identity Synchronization
    Average: 9.0
    7.9
    Policy Management
    Average: 9.0
    9.4
    Ease of Use
    Average: 9.0
    6.7
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Telesign
    Company Website
    Year Founded
    2005
    HQ Location
    Marina del Rey, US
    Twitter
    @TeleSign
    1,888 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    736 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Telesign's Verification products allow businesses to secure their ecosystem by having users prove they are in possession of their mobile device. Telesign Verification provides companies with the optio

Users
No information available
Industries
No information available
Market Segment
  • 58% Small-Business
  • 37% Mid-Market
Telesign Verification Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
8
Fraud Prevention
5
Features
3
Implementation Ease
3
Access Control
2
Cons
Expensive
5
Login Issues
2
Slow Performance
2
Software Bugs
2
Inaccuracy
1
Telesign Verification features and usability ratings that predict user satisfaction
7.9
Bi-Directional Identity Synchronization
Average: 9.0
7.9
Policy Management
Average: 9.0
9.4
Ease of Use
Average: 9.0
6.7
Cloud Directory
Average: 8.7
Seller Details
Seller
Telesign
Company Website
Year Founded
2005
HQ Location
Marina del Rey, US
Twitter
@TeleSign
1,888 Twitter followers
LinkedIn® Page
www.linkedin.com
736 employees on LinkedIn®
(29)4.4 out of 5
10th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

    Users
    No information available
    Industries
    • Hospital & Health Care
    Market Segment
    • 141% Mid-Market
    • 66% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureAuth: Workforce IAM features and usability ratings that predict user satisfaction
    9.7
    Bi-Directional Identity Synchronization
    Average: 9.0
    9.7
    Policy Management
    Average: 9.0
    8.9
    Ease of Use
    Average: 9.0
    9.5
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Irvine, CA
    Twitter
    @SecureAuth
    8,714 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    154 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

Users
No information available
Industries
  • Hospital & Health Care
Market Segment
  • 141% Mid-Market
  • 66% Small-Business
SecureAuth: Workforce IAM features and usability ratings that predict user satisfaction
9.7
Bi-Directional Identity Synchronization
Average: 9.0
9.7
Policy Management
Average: 9.0
8.9
Ease of Use
Average: 9.0
9.5
Cloud Directory
Average: 8.7
Seller Details
Company Website
Year Founded
2005
HQ Location
Irvine, CA
Twitter
@SecureAuth
8,714 Twitter followers
LinkedIn® Page
www.linkedin.com
154 employees on LinkedIn®