Best Risk-Based Authentication Software

BS
Researched and written by Brandon Summers-Miller

Risk-based authentication (RBA) solutions are identity management products that weigh user variables to determine and identify threats. Companies use RBA software to increase the effectiveness of user governance and authentication procedures. Users who are determined to be riskier are required to provide additional authentication information. These analyze IP addresses, devices, behaviors and identities to set customized authentication methods for each individual user attempting to access the network. Non-suspicious users accessing applications from known devices, locations, and networks may be automatically signed in. Suspicious users may be required to prompted to provide SMS code, biometric verification, or email confirmation actions to properly verify their identity.

Risk-based authentication products often contain multi-factor authentication features, but set unique requirements based the administrators configuration. RBA tools may work in sync with cloud identity and access management products, but typically only provide the authentication component, rather than the application access and governance components.

To qualify for inclusion in the Risk-Based Authentication category, a product must:

Assess a user’s unique network, device, and behavior to determine risk
Prompt authentication measures after assessment
Utilize authentication methods such as SMS, questioning, or email confirmation
Periodically store and update suspicious networks, devices, and behaviors

Best Risk-Based Authentication Software At A Glance

Leader:
Highest Performer:
Best Contender:
Most Niche:
Most Trending:
Show LessShow More
Best Contender:
Most Niche:
Most Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
106 Listings in Risk-Based Authentication (RBA) Available
(447)4.7 out of 5
Optimized for quick response
1st Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sift is the AI-powered fraud platform delivering identity trust for leading global businesses. Our deep investments in machine learning and user identity, a data network scoring 1 trillion events per

    Users
    • Risk Investigator
    • Fraud Analyst
    Industries
    • Financial Services
    • Consumer Services
    Market Segment
    • 56% Mid-Market
    • 29% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Sift is a fraud detection tool that uses machine learning and real-time data to identify and prevent fraudulent activity.
    • Reviewers appreciate Sift's ability to provide detailed insights into transactions, its ease of use, and its robust features that aid in fraud detection and risk management.
    • Users reported occasional inaccuracies in risk scores, a need for manual double-checking, and a lack of clarity in some data presentations.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sift Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    114
    Fraud Prevention
    97
    Data Analysis
    71
    Fraud Detection
    57
    Detection Efficiency
    49
    Cons
    Inaccuracy
    41
    Insufficient Information
    31
    Lack of Clarity
    21
    Complexity
    18
    Insufficient Data
    17
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sift features and usability ratings that predict user satisfaction
    8.5
    Bi-Directional Identity Synchronization
    Average: 9.0
    8.9
    Policy Management
    Average: 9.0
    8.9
    Ease of Use
    Average: 9.0
    8.1
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    San Francisco, CA
    Twitter
    @GetSift
    9,630 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    335 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sift is the AI-powered fraud platform delivering identity trust for leading global businesses. Our deep investments in machine learning and user identity, a data network scoring 1 trillion events per

Users
  • Risk Investigator
  • Fraud Analyst
Industries
  • Financial Services
  • Consumer Services
Market Segment
  • 56% Mid-Market
  • 29% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Sift is a fraud detection tool that uses machine learning and real-time data to identify and prevent fraudulent activity.
  • Reviewers appreciate Sift's ability to provide detailed insights into transactions, its ease of use, and its robust features that aid in fraud detection and risk management.
  • Users reported occasional inaccuracies in risk scores, a need for manual double-checking, and a lack of clarity in some data presentations.
Sift Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
114
Fraud Prevention
97
Data Analysis
71
Fraud Detection
57
Detection Efficiency
49
Cons
Inaccuracy
41
Insufficient Information
31
Lack of Clarity
21
Complexity
18
Insufficient Data
17
Sift features and usability ratings that predict user satisfaction
8.5
Bi-Directional Identity Synchronization
Average: 9.0
8.9
Policy Management
Average: 9.0
8.9
Ease of Use
Average: 9.0
8.1
Cloud Directory
Average: 8.7
Seller Details
Company Website
Year Founded
2011
HQ Location
San Francisco, CA
Twitter
@GetSift
9,630 Twitter followers
LinkedIn® Page
www.linkedin.com
335 employees on LinkedIn®
(395)4.5 out of 5
Optimized for quick response
2nd Easiest To Use in Risk-Based Authentication (RBA) software
View top Consulting Services for Cisco Duo
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

    Users
    • Consultant
    • Software Engineer
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 45% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Duo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    73
    Authentication Ease
    52
    Security
    51
    Authentication
    48
    Easy Access
    37
    Cons
    Authentication Issues
    28
    Access Limitations
    21
    Login Issues
    18
    Notification Issues
    14
    Poor Notifications
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Duo features and usability ratings that predict user satisfaction
    9.7
    Bi-Directional Identity Synchronization
    Average: 9.0
    9.4
    Policy Management
    Average: 9.0
    9.3
    Ease of Use
    Average: 9.0
    9.4
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Company Website
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    731,130 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

Users
  • Consultant
  • Software Engineer
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 45% Enterprise
  • 38% Mid-Market
Cisco Duo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
73
Authentication Ease
52
Security
51
Authentication
48
Easy Access
37
Cons
Authentication Issues
28
Access Limitations
21
Login Issues
18
Notification Issues
14
Poor Notifications
12
Cisco Duo features and usability ratings that predict user satisfaction
9.7
Bi-Directional Identity Synchronization
Average: 9.0
9.4
Policy Management
Average: 9.0
9.3
Ease of Use
Average: 9.0
9.4
Cloud Directory
Average: 8.7
Seller Details
Seller
Cisco
Company Website
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
731,130 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(202)4.3 out of 5
6th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and se

    Users
    • Software Engineer
    • Software Developer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 51% Small-Business
    • 26% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Auth0 Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Security
    16
    Integrations
    14
    Authentication
    12
    Easy Integrations
    11
    Cons
    Expensive
    8
    Cost
    5
    Complex Setup
    4
    Pricing Issues
    4
    Customization Difficulties
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Auth0 features and usability ratings that predict user satisfaction
    9.3
    Bi-Directional Identity Synchronization
    Average: 9.0
    9.0
    Policy Management
    Average: 9.0
    8.5
    Ease of Use
    Average: 9.0
    9.3
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okta
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @okta
    42,317 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,292 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and se

Users
  • Software Engineer
  • Software Developer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 51% Small-Business
  • 26% Mid-Market
Auth0 Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Security
16
Integrations
14
Authentication
12
Easy Integrations
11
Cons
Expensive
8
Cost
5
Complex Setup
4
Pricing Issues
4
Customization Difficulties
3
Auth0 features and usability ratings that predict user satisfaction
9.3
Bi-Directional Identity Synchronization
Average: 9.0
9.0
Policy Management
Average: 9.0
8.5
Ease of Use
Average: 9.0
9.3
Cloud Directory
Average: 8.7
Seller Details
Seller
Okta
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@okta
42,317 Twitter followers
LinkedIn® Page
www.linkedin.com
8,292 employees on LinkedIn®
(1,791)4.5 out of 5
Optimized for quick response
3rd Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:$4.25
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LastPass is a cloud-based password manager solution designed to help users securely store, manage, and access their passwords across various devices and platforms. This innovative tool simplifies the

    Users
    • Owner
    • CEO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 63% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • LastPass Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    374
    Password Management
    240
    Security
    214
    Autofill Feature
    170
    Easy Access
    154
    Cons
    Password Management
    163
    Autofill Issues
    136
    Login Issues
    97
    Password Issues
    52
    Browser Extension Issues
    46
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LastPass features and usability ratings that predict user satisfaction
    9.3
    Bi-Directional Identity Synchronization
    Average: 9.0
    9.4
    Policy Management
    Average: 9.0
    8.7
    Ease of Use
    Average: 9.0
    9.2
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LastPass
    Company Website
    Year Founded
    2008
    HQ Location
    Boston, Massachusetts
    Twitter
    @LastPass
    47,467 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    824 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LastPass is a cloud-based password manager solution designed to help users securely store, manage, and access their passwords across various devices and platforms. This innovative tool simplifies the

Users
  • Owner
  • CEO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 63% Small-Business
  • 25% Mid-Market
LastPass Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
374
Password Management
240
Security
214
Autofill Feature
170
Easy Access
154
Cons
Password Management
163
Autofill Issues
136
Login Issues
97
Password Issues
52
Browser Extension Issues
46
LastPass features and usability ratings that predict user satisfaction
9.3
Bi-Directional Identity Synchronization
Average: 9.0
9.4
Policy Management
Average: 9.0
8.7
Ease of Use
Average: 9.0
9.2
Cloud Directory
Average: 8.7
Seller Details
Seller
LastPass
Company Website
Year Founded
2008
HQ Location
Boston, Massachusetts
Twitter
@LastPass
47,467 Twitter followers
LinkedIn® Page
www.linkedin.com
824 employees on LinkedIn®
(107)4.4 out of 5
5th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:Starting at $2.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 48% Enterprise
    • 48% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Workforce Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    8
    Security
    7
    Ease of Use
    6
    Access Management
    5
    Access Control
    4
    Cons
    Timing Issues
    3
    Complexity
    2
    Complex Usability
    2
    Delayed Response
    2
    Difficult Learning
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Workforce Identity features and usability ratings that predict user satisfaction
    8.3
    Bi-Directional Identity Synchronization
    Average: 9.0
    8.3
    Policy Management
    Average: 9.0
    8.7
    Ease of Use
    Average: 9.0
    10.0
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,361 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,051 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 48% Enterprise
  • 48% Mid-Market
CyberArk Workforce Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
8
Security
7
Ease of Use
6
Access Management
5
Access Control
4
Cons
Timing Issues
3
Complexity
2
Complex Usability
2
Delayed Response
2
Difficult Learning
2
CyberArk Workforce Identity features and usability ratings that predict user satisfaction
8.3
Bi-Directional Identity Synchronization
Average: 9.0
8.3
Policy Management
Average: 9.0
8.7
Ease of Use
Average: 9.0
10.0
Cloud Directory
Average: 8.7
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,361 Twitter followers
LinkedIn® Page
www.linkedin.com
4,051 employees on LinkedIn®
Ownership
NASDAQ:CYBR
(1,370)4.7 out of 5
12th Easiest To Use in Risk-Based Authentication (RBA) software
View top Consulting Services for 1Password
Save to My Lists
100% off: 0
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Most Used Enterprise Password Manager, trusted by over 150,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secu

    Users
    • Software Engineer
    • Owner
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • 1Password Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    99
    Security
    74
    Intuitive
    33
    Password Management
    31
    Secure Sharing
    31
    Cons
    Password Management
    41
    Authentication Issues
    24
    Login Issues
    21
    Process Complexity
    20
    Autofill Issues
    18
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 1Password features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    9.0
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    1Password
    Company Website
    Year Founded
    2005
    HQ Location
    Ontario
    Twitter
    @1Password
    141,241 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,559 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Most Used Enterprise Password Manager, trusted by over 150,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secu

Users
  • Software Engineer
  • Owner
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 31% Mid-Market
1Password Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
99
Security
74
Intuitive
33
Password Management
31
Secure Sharing
31
Cons
Password Management
41
Authentication Issues
24
Login Issues
21
Process Complexity
20
Autofill Issues
18
1Password features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
9.0
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
Seller
1Password
Company Website
Year Founded
2005
HQ Location
Ontario
Twitter
@1Password
141,241 Twitter followers
LinkedIn® Page
www.linkedin.com
2,559 employees on LinkedIn®
(17)4.8 out of 5
4th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative age

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Silverfort features and usability ratings that predict user satisfaction
    6.7
    Bi-Directional Identity Synchronization
    Average: 9.0
    6.7
    Policy Management
    Average: 9.0
    9.9
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Tel Aviv, Israel
    Twitter
    @silverfort
    597 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    484 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative age

Users
No information available
Industries
No information available
Market Segment
  • 47% Small-Business
  • 35% Mid-Market
Silverfort features and usability ratings that predict user satisfaction
6.7
Bi-Directional Identity Synchronization
Average: 9.0
6.7
Policy Management
Average: 9.0
9.9
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
Year Founded
2016
HQ Location
Tel Aviv, Israel
Twitter
@silverfort
597 Twitter followers
LinkedIn® Page
www.linkedin.com
484 employees on LinkedIn®
(113)4.8 out of 5
Optimized for quick response
9th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kount is trust and safety technology. Businesses pick the solutions that are relevant to their unique challenges, and we help them grow with confidence — no matter the industry. We use data-driven

    Users
    No information available
    Industries
    • Retail
    • Apparel & Fashion
    Market Segment
    • 46% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kount Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Fraud Prevention
    12
    Customer Support
    8
    Ease of Use
    6
    Fraud Protection
    6
    Data Analysis
    5
    Cons
    Lack of Clarity
    4
    Not User-Friendly
    3
    Complex Usability
    2
    Inaccuracy
    2
    Inconvenience
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kount features and usability ratings that predict user satisfaction
    9.2
    Bi-Directional Identity Synchronization
    Average: 9.0
    9.3
    Policy Management
    Average: 9.0
    9.2
    Ease of Use
    Average: 9.0
    9.2
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2007
    HQ Location
    Boise, ID
    Twitter
    @KountInc
    2,458 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    228 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kount is trust and safety technology. Businesses pick the solutions that are relevant to their unique challenges, and we help them grow with confidence — no matter the industry. We use data-driven

Users
No information available
Industries
  • Retail
  • Apparel & Fashion
Market Segment
  • 46% Mid-Market
  • 33% Small-Business
Kount Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Fraud Prevention
12
Customer Support
8
Ease of Use
6
Fraud Protection
6
Data Analysis
5
Cons
Lack of Clarity
4
Not User-Friendly
3
Complex Usability
2
Inaccuracy
2
Inconvenience
2
Kount features and usability ratings that predict user satisfaction
9.2
Bi-Directional Identity Synchronization
Average: 9.0
9.3
Policy Management
Average: 9.0
9.2
Ease of Use
Average: 9.0
9.2
Cloud Directory
Average: 8.7
Seller Details
Company Website
Year Founded
2007
HQ Location
Boise, ID
Twitter
@KountInc
2,458 Twitter followers
LinkedIn® Page
www.linkedin.com
228 employees on LinkedIn®
(140)4.3 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:$1.71 / user, per month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 66% Enterprise
    • 38% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • IBM Verify is an access management tool that provides robust identity and access management (IAM) solutions, passwordless authentication, and integration capabilities for managing customer and workforce identities.
    • Reviewers frequently mention the tool's advanced authentication methods, streamlined user access, ease of interface, and the ability to easily integrate with other systems, highlighting its effectiveness in enhancing security and simplifying user access.
    • Reviewers experienced challenges with the initial setup and configuration, citing it as complex and time-consuming, especially for those new to IAM systems, and also mentioned difficulties in monitoring access risks and occasional slow loading times.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Verify CIAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    34
    Ease of Use
    24
    Authentication
    23
    Identity Management
    20
    Features
    18
    Cons
    Expensive
    12
    Difficult Learning
    11
    Complexity
    10
    Complex Setup
    10
    Cost
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Verify CIAM features and usability ratings that predict user satisfaction
    8.8
    Bi-Directional Identity Synchronization
    Average: 9.0
    8.7
    Policy Management
    Average: 9.0
    8.4
    Ease of Use
    Average: 9.0
    9.0
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Company Website
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,293 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331,391 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 66% Enterprise
  • 38% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • IBM Verify is an access management tool that provides robust identity and access management (IAM) solutions, passwordless authentication, and integration capabilities for managing customer and workforce identities.
  • Reviewers frequently mention the tool's advanced authentication methods, streamlined user access, ease of interface, and the ability to easily integrate with other systems, highlighting its effectiveness in enhancing security and simplifying user access.
  • Reviewers experienced challenges with the initial setup and configuration, citing it as complex and time-consuming, especially for those new to IAM systems, and also mentioned difficulties in monitoring access risks and occasional slow loading times.
IBM Verify CIAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
34
Ease of Use
24
Authentication
23
Identity Management
20
Features
18
Cons
Expensive
12
Difficult Learning
11
Complexity
10
Complex Setup
10
Cost
9
IBM Verify CIAM features and usability ratings that predict user satisfaction
8.8
Bi-Directional Identity Synchronization
Average: 9.0
8.7
Policy Management
Average: 9.0
8.4
Ease of Use
Average: 9.0
9.0
Cloud Directory
Average: 8.7
Seller Details
Seller
IBM
Company Website
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,293 Twitter followers
LinkedIn® Page
www.linkedin.com
331,391 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Thales’ SafeNet Trusted Access is a cloud-based Access Management and Authentication Service. It ensures that no user is a target by allowing you to expand authentication to all users and apps with di

    Users
    No information available
    Industries
    • Computer Networking
    Market Segment
    • 68% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Thales SafeNet Trusted Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Administration Management
    1
    Convenience
    1
    Customer Support
    1
    Customizability
    1
    Cons
    Authentication Issues
    1
    Compatibility Issues
    1
    Device Limitations
    1
    Integration Issues
    1
    Limited Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Thales SafeNet Trusted Access features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    9.8
    Ease of Use
    Average: 9.0
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin, Texas
    Twitter
    @ThalesCloudSec
    6,811 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    941 employees on LinkedIn®
    Ownership
    EPA:HO
    Total Revenue (USD mm)
    $15,854
Product Description
How are these determined?Information
This description is provided by the seller.

Thales’ SafeNet Trusted Access is a cloud-based Access Management and Authentication Service. It ensures that no user is a target by allowing you to expand authentication to all users and apps with di

Users
No information available
Industries
  • Computer Networking
Market Segment
  • 68% Enterprise
  • 25% Mid-Market
Thales SafeNet Trusted Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Administration Management
1
Convenience
1
Customer Support
1
Customizability
1
Cons
Authentication Issues
1
Compatibility Issues
1
Device Limitations
1
Integration Issues
1
Limited Reporting
1
Thales SafeNet Trusted Access features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
9.8
Ease of Use
Average: 9.0
0.0
No information available
Seller Details
HQ Location
Austin, Texas
Twitter
@ThalesCloudSec
6,811 Twitter followers
LinkedIn® Page
www.linkedin.com
941 employees on LinkedIn®
Ownership
EPA:HO
Total Revenue (USD mm)
$15,854
(29)4.4 out of 5
10th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

    Users
    No information available
    Industries
    • Hospital & Health Care
    Market Segment
    • 141% Mid-Market
    • 66% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureAuth: Workforce IAM features and usability ratings that predict user satisfaction
    9.7
    Bi-Directional Identity Synchronization
    Average: 9.0
    9.7
    Policy Management
    Average: 9.0
    8.9
    Ease of Use
    Average: 9.0
    9.5
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Irvine, CA
    Twitter
    @SecureAuth
    8,743 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    154 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

Users
No information available
Industries
  • Hospital & Health Care
Market Segment
  • 141% Mid-Market
  • 66% Small-Business
SecureAuth: Workforce IAM features and usability ratings that predict user satisfaction
9.7
Bi-Directional Identity Synchronization
Average: 9.0
9.7
Policy Management
Average: 9.0
8.9
Ease of Use
Average: 9.0
9.5
Cloud Directory
Average: 8.7
Seller Details
Company Website
Year Founded
2005
HQ Location
Irvine, CA
Twitter
@SecureAuth
8,743 Twitter followers
LinkedIn® Page
www.linkedin.com
154 employees on LinkedIn®
(90)4.5 out of 5
13th Easiest To Use in Risk-Based Authentication (RBA) software
View top Consulting Services for WSO2 Identity Server
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    WSO2 Identity Server is a modern, open-source Customer Identity and Access Management (CIAM) solution designed to enhance user experiences across various digital platforms. This robust software provid

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • WSO2 Identity Server Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Authentication
    16
    Security
    15
    Ease of Use
    12
    Identity Management
    12
    Single Sign-On
    12
    Cons
    Complex Setup
    7
    Difficult Learning
    7
    Complexity
    6
    Expertise Requirement
    6
    Required Expertise
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WSO2 Identity Server features and usability ratings that predict user satisfaction
    9.3
    Bi-Directional Identity Synchronization
    Average: 9.0
    9.3
    Policy Management
    Average: 9.0
    8.5
    Ease of Use
    Average: 9.0
    9.5
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    WSO2
    Company Website
    Year Founded
    2005
    HQ Location
    Mountain View, CA
    Twitter
    @wso2
    12,698 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,162 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

WSO2 Identity Server is a modern, open-source Customer Identity and Access Management (CIAM) solution designed to enhance user experiences across various digital platforms. This robust software provid

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Mid-Market
  • 36% Enterprise
WSO2 Identity Server Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Authentication
16
Security
15
Ease of Use
12
Identity Management
12
Single Sign-On
12
Cons
Complex Setup
7
Difficult Learning
7
Complexity
6
Expertise Requirement
6
Required Expertise
6
WSO2 Identity Server features and usability ratings that predict user satisfaction
9.3
Bi-Directional Identity Synchronization
Average: 9.0
9.3
Policy Management
Average: 9.0
8.5
Ease of Use
Average: 9.0
9.5
Cloud Directory
Average: 8.7
Seller Details
Seller
WSO2
Company Website
Year Founded
2005
HQ Location
Mountain View, CA
Twitter
@wso2
12,698 Twitter followers
LinkedIn® Page
www.linkedin.com
1,162 employees on LinkedIn®
(106)4.4 out of 5
11th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:$3 Per User Per Month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ping Identity (NYSE: PING) builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 67% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ping Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Administration Management
    1
    Data Security
    1
    Ease of Use
    1
    Security
    1
    Simple
    1
    Cons
    Clunky Interface
    1
    Complex Administration
    1
    Complexity
    1
    Complex Setup
    1
    Complex Usage
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ping Identity features and usability ratings that predict user satisfaction
    9.2
    Bi-Directional Identity Synchronization
    Average: 9.0
    8.7
    Policy Management
    Average: 9.0
    8.7
    Ease of Use
    Average: 9.0
    9.2
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,675 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,024 employees on LinkedIn®
    Phone
    1.303.468.2900
Product Description
How are these determined?Information
This description is provided by the seller.

Ping Identity (NYSE: PING) builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 67% Enterprise
  • 25% Mid-Market
Ping Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Administration Management
1
Data Security
1
Ease of Use
1
Security
1
Simple
1
Cons
Clunky Interface
1
Complex Administration
1
Complexity
1
Complex Setup
1
Complex Usage
1
Ping Identity features and usability ratings that predict user satisfaction
9.2
Bi-Directional Identity Synchronization
Average: 9.0
8.7
Policy Management
Average: 9.0
8.7
Ease of Use
Average: 9.0
9.2
Cloud Directory
Average: 8.7
Seller Details
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,675 Twitter followers
LinkedIn® Page
www.linkedin.com
2,024 employees on LinkedIn®
Phone
1.303.468.2900
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Telesign's Verification products allow businesses to secure their ecosystem by having users prove they are in possession of their mobile device. Telesign Verification provides companies with the optio

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 58% Small-Business
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Telesign Verification Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    8
    Fraud Prevention
    5
    Features
    3
    Implementation Ease
    3
    Access Control
    2
    Cons
    Expensive
    5
    Login Issues
    2
    Slow Performance
    2
    Software Bugs
    2
    Inaccuracy
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Telesign Verification features and usability ratings that predict user satisfaction
    7.9
    Bi-Directional Identity Synchronization
    Average: 9.0
    7.9
    Policy Management
    Average: 9.0
    9.4
    Ease of Use
    Average: 9.0
    6.7
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Telesign
    Company Website
    Year Founded
    2005
    HQ Location
    Marina del Rey, US
    Twitter
    @TeleSign
    1,895 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    736 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Telesign's Verification products allow businesses to secure their ecosystem by having users prove they are in possession of their mobile device. Telesign Verification provides companies with the optio

Users
No information available
Industries
No information available
Market Segment
  • 58% Small-Business
  • 37% Mid-Market
Telesign Verification Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
8
Fraud Prevention
5
Features
3
Implementation Ease
3
Access Control
2
Cons
Expensive
5
Login Issues
2
Slow Performance
2
Software Bugs
2
Inaccuracy
1
Telesign Verification features and usability ratings that predict user satisfaction
7.9
Bi-Directional Identity Synchronization
Average: 9.0
7.9
Policy Management
Average: 9.0
9.4
Ease of Use
Average: 9.0
6.7
Cloud Directory
Average: 8.7
Seller Details
Seller
Telesign
Company Website
Year Founded
2005
HQ Location
Marina del Rey, US
Twitter
@TeleSign
1,895 Twitter followers
LinkedIn® Page
www.linkedin.com
736 employees on LinkedIn®
(285)4.4 out of 5
8th Easiest To Use in Risk-Based Authentication (RBA) software
Save to My Lists
Entry Level Price:$6 /User /Month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin e

    Users
    • Account Manager
    Industries
    • Computer Software
    • Education Management
    Market Segment
    • 49% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OneLogin Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Single Sign-On
    11
    SSO (Single Sign-On)
    9
    Easy Access
    6
    Security
    6
    Cons
    Bugs
    4
    Error Handling
    4
    Authentication Issues
    3
    Connection Issues
    3
    Login Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OneLogin features and usability ratings that predict user satisfaction
    8.6
    Bi-Directional Identity Synchronization
    Average: 9.0
    8.9
    Policy Management
    Average: 9.0
    9.1
    Ease of Use
    Average: 9.0
    9.4
    Cloud Directory
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Aliso Viejo, CA
    Twitter
    @OneIdentity
    7,965 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    616 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin e

Users
  • Account Manager
Industries
  • Computer Software
  • Education Management
Market Segment
  • 49% Mid-Market
  • 40% Enterprise
OneLogin Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Single Sign-On
11
SSO (Single Sign-On)
9
Easy Access
6
Security
6
Cons
Bugs
4
Error Handling
4
Authentication Issues
3
Connection Issues
3
Login Issues
3
OneLogin features and usability ratings that predict user satisfaction
8.6
Bi-Directional Identity Synchronization
Average: 9.0
8.9
Policy Management
Average: 9.0
9.1
Ease of Use
Average: 9.0
9.4
Cloud Directory
Average: 8.7
Seller Details
HQ Location
Aliso Viejo, CA
Twitter
@OneIdentity
7,965 Twitter followers
LinkedIn® Page
www.linkedin.com
616 employees on LinkedIn®