Authentication31Authentication is the process of verifying the legitimacy of data, most often data used by people attempting to access a system. Multi-factor authentication (most commonly two-factor authentication, or 2FA) is the use of additional data or components, like a password, PIN, a secret question, or simply a randomly generated code, to provide additional access control and security.DigitalPersona1https://dudodiprj2sv7.cloudfront.net/product-logos/bm/L0/B5L329E818WT.JPEGIdaptive Next-Gen Access2https://dudodiprj2sv7.cloudfront.net/product-logos/l2/cm/X6S7STATKRXE.JPEGDuo Security3https://dudodiprj2sv7.cloudfront.net/product-logos/vN/jh/AOFRMOBFHMTC.JPEGRSA SecurID4https://dudodiprj2sv7.cloudfront.net/product-logos/DM/pf/J9NUOOJ4LT2P.JPEGGoogle Authenticator5https://dudodiprj2sv7.cloudfront.net/vendor-logos/a6/c6/JGG6SW6IUMTJ-180x180.PNGIBM App ID6https://dudodiprj2sv7.cloudfront.net/product-logos/Re/DQ/DU49QKN0S539.PNGVenafi7https://dudodiprj2sv7.cloudfront.net/product-logos/M1/Yw/RE4H09A4GSWH.pngSymantec VIP8https://dudodiprj2sv7.cloudfront.net/product-logos/vv/Nz/EXNPZIO53VRG.PNGYubico9https://dudodiprj2sv7.cloudfront.net/product-logos/WS/Yr/NI540LK4NENM.pngDefender10https://dudodiprj2sv7.cloudfront.net/vendor-logos/mM/Hm/FTTX4ZXS5GHQ-180x180.JPEGOneSpan Authenticators (formerly Digipass)11https://dudodiprj2sv7.cloudfront.net/vendor-logos/2u/lF/CGASVK335ZQ3-180x180.JPEGPing Identity Platform12https://dudodiprj2sv7.cloudfront.net/product-logos/tt/tc/VZWP9DPA7AJ5.pngAzure Multi-Factor Authentication (Discontinued)13https://dudodiprj2sv7.cloudfront.net/vendor-logos/tf/J4/RTX1AO2GSVNS-180x180.JPEGRSA Authentication Manager14https://dudodiprj2sv7.cloudfront.net/product-logos/4M/z9/RETRQZTFDFHT.gifAzure Active Directory15https://dudodiprj2sv7.cloudfront.net/vendor-logos/tf/J4/RTX1AO2GSVNS-180x180.JPEGAuthy16https://dudodiprj2sv7.cloudfront.net/product-logos/DQ/3q/LNTS0F4JG5K7.JPEGSolarWinds Access Rights Manager17https://dudodiprj2sv7.cloudfront.net/product-logos/K9/OY/DI903HA5JF0Q.PNGAnakam.TFA18https://dudodiprj2sv7.cloudfront.net/vendor-logos/N7/Ut/JCPI1I7OM3J4-180x180.PNGHID Global ActivID Authentication Server (formerly ActivIdentity or 4TRESS)19https://dudodiprj2sv7.cloudfront.net/vendor-logos/wX/Vn/WE5TVGSXKW3L-180x180.PNGCA Advanced Authentication20https://dudodiprj2sv7.cloudfront.net/vendor-logos/gg/9W/HVBIZE1VBDZ6-180x180.PNGSwivel Secure PINsafe21https://dudodiprj2sv7.cloudfront.net/product-logos/kp/Z1/TJANDW5772QG.pngEntrust IdentityGuard22https://dudodiprj2sv7.cloudfront.net/vendor-logos/GC/nx/Q0WRPV0TE55B-180x180.PNGSecurEnvoy SecurAccess23https://dudodiprj2sv7.cloudfront.net/product-logos/Qx/zH/4FIL2TM4NOWD.jpegGemalto Ezio24https://dudodiprj2sv7.cloudfront.net/vendor-logos/vW/kz/NNKDAGNZHXER-180x180.JPEGMcAfee Nordic Edge25https://dudodiprj2sv7.cloudfront.net/vendor-logos/eB/ri/277N5FG3B8SN-180x180.JPEG

Authentication Systems

Authentication Systems Overview

What are Authentication Systems?

Authentication Systems aid the process of verifying the legitimacy of data, most often data used by people attempting to access a system.

Multi-factor authentication (most commonly two-factor authentication, or 2FA) is the use of additional data or components, like a password, PIN, a secret question, or simply a randomly generated code, to provide additional access control and security.

Authentication Products

Listings (1-25 of 53)

DigitalPersona

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow'>Customer Verified: Read more.</a>
80 Ratings

Crossmatch's DigitalPersona provides a comprehensive multi-factor authentication solution. The vendor’s value proposition is that their solution frees users from cumbersome login activities while making it easy for an IT Team to secure access to their networks, data and applications.

Idaptive Next-Gen Access

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow'>Customer Verified: Read more.</a>
66 Ratings

Idaptive Next-Gen Access Services secures enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. Idaptive helps protect against the leading point of attack used in data breaches ― compromised credentials — through its Next-Gen Access...

Duo Security

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow'>Customer Verified: Read more.</a>
45 Ratings

Duo Security is a two-factor authentication system (2FA), acquired by Cisco in October 2018. DUO provides single sign-on (SSO) and endpoint visibility, as well as access controls and policy controlled adaptive authentication.

37 Ratings

The RSA SecurID Suite is an identity management, authentication and user provisioning offering supported by EMC's security division, RSA. The SecurID Suite includes SecurID Access 2FA and multi-factor authentication solutions and RSA Identity Governance & Lifecycle products.

5 Ratings

IBM Cloud App ID helps developers who are not security experts to easily add authentication to their apps, and protect their APIs and app back-ends running on IBM Cloud. Developers can add a variety of login-in types: Email or username and passwordEnterpriseSocial App ID includes a cloud user ...

3 Ratings

The Next-Gen Identity Platform from Ping Identity in Denver, Colorado is an identity management and access solution (IAM) for enterprises. Features of the products include single sign-on, multi-factor authentication, user management with directory, provisioning and deprovisioning, and more. Ping...

19 Ratings

Microsoft Azure Active Directory (Azure AD) is a cloud-based identity and access management (IAM) solution supporting restricted access to applications with Azure Multi-Factor Authentication (MFA) built-in, single sign-on (SSO), B2B collaboration controls, self-service password, and integration w...

2 Ratings

SolarWinds Access Rights Manager (ARM) is designed to assist IT and security admins to quickly and easily provision, deprovision, manage and audit user access rights to systems, data, and files. By analyzing user authorizations and access permission you get visualization of who has access to what...

We don't have enough ratings and reviews to provide an overall score.

Anakam.TFA (two-factor authentication) is an authentication system acquired by Equifax in 2010 along with the company, Anakam, the original developer of the system in Arlington, Virginia.

We don't have enough ratings and reviews to provide an overall score.

Dutch company Gemalto's Ezio software is an authentication system for financial institutions and fraud prevention.

We don't have enough ratings and reviews to provide an overall score.

Nordic Edge authentication system was acquired by McAfee / Intel Security in 2012 and provides support for it... however McAfee has End-of-Lifed most of their identity management offerings.