Authentication31Authentication is the process of verifying the legitimacy of data, most often data used by people attempting to access a system. Multi-factor authentication (most commonly two-factor authentication, or 2FA) is the use of additional data or components, like a password, PIN, a secret question, or simply a randomly generated code, to provide additional access control and security.HID DigitalPersona (formerly Crossmatch)1https://media.trustradius.com/product-logos/5a/2i/BOA3T5T8VU0C-180x180.PNGLastPass for Business2https://media.trustradius.com/product-logos/0m/wB/3TPTE2MFEL1P-180x180.PNGOkta Workforce Identity3https://media.trustradius.com/product-logos/wL/VF/XZVJG3Z9WVSS-180x180.PNGIdaptive Next-Gen Access (formerly Centrify)4https://media.trustradius.com/product-logos/Co/uw/X6S7STATKRXE-180x180.JPEGDuo Security5https://media.trustradius.com/product-logos/E7/kU/AOFRMOBFHMTC-180x180.JPEGWatchGuard AuthPoint6https://media.trustradius.com/product-logos/92/8u/7QGQ3JW39HTT-180x180.JPEGRSA SecurID Suite7https://media.trustradius.com/product-logos/Ws/Xz/J9NUOOJ4LT2P-180x180.JPEGAzure Active Directory8https://media.trustradius.com/vendor-logos/tf/J4/RTX1AO2GSVNS-180x180.JPEGGoogle Authenticator9https://media.trustradius.com/vendor-logos/a6/c6/JGG6SW6IUMTJ-180x180.PNGIBM Cloud App ID10https://media.trustradius.com/product-logos/Uv/Xp/77N37PEPH17Z-180x180.PNGAuthy11https://media.trustradius.com/product-logos/Ll/Sp/LNTS0F4JG5K7-180x180.JPEGSolarWinds Access Rights Manager12https://media.trustradius.com/product-logos/Rf/Jy/DI903HA5JF0Q-180x180.PNGSymantec VIP13https://media.trustradius.com/product-logos/wC/p3/EXNPZIO53VRG-180x180.PNGVenafi14https://media.trustradius.com/product-logos/M1/Yw/RE4H09A4GSWH.pngOkta Customer Identity15https://media.trustradius.com/vendor-logos/tg/9R/CD40URXZCHH7-180x180.JPEGOneSpan Authenticators (formerly Digipass)16https://media.trustradius.com/vendor-logos/2u/lF/CGASVK335ZQ3-180x180.JPEGDefender17https://media.trustradius.com/vendor-logos/mM/Hm/FTTX4ZXS5GHQ-180x180.JPEGAzure Multi-Factor Authentication (Discontinued)18https://media.trustradius.com/vendor-logos/tf/J4/RTX1AO2GSVNS-180x180.JPEGPing Identity Platform19https://media.trustradius.com/product-logos/tt/tc/VZWP9DPA7AJ5.pngYubico20https://media.trustradius.com/product-logos/WS/Yr/NI540LK4NENM.pngStealthINTERCEPT21https://media.trustradius.com/vendor-logos/xU/0I/F6PGMGWLEJ3K-180x180.PNGLayer7 Advanced Authentication (formerly CA Advanced Authentication)22https://media.trustradius.com/vendor-logos/XC/qb/OEOG2461M9II-180x180.JPEGSwivel Secure PINsafe23https://media.trustradius.com/product-logos/kp/Z1/TJANDW5772QG.pngEntrust IdentityGuard24https://media.trustradius.com/vendor-logos/GC/nx/Q0WRPV0TE55B-180x180.PNGSecurEnvoy SecurAccess25https://media.trustradius.com/product-logos/Qx/zH/4FIL2TM4NOWD.jpeg

Authentication Systems

Authentication Systems Overview

What are Authentication Systems?

Authentication Systems aid the process of verifying the legitimacy of data, most often data used by people attempting to access a system.

Multi-factor authentication (most commonly two-factor authentication, or 2FA) is the use of additional data or components, like a password, PIN, a secret question, or simply a randomly generated code, to provide additional access control and security.

Authentication Products

Listings (1-25 of 61)

HID DigitalPersona (formerly Crossmatch) provides a comprehensive multi-factor authentication solution. The vendor’s value proposition is that their solution frees users from cumbersome login activities while making it easy for an IT Team to secure access to their networks, data and applications.

LastPass for Business

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
121 Ratings

LastPass, a LogMeIn company, is a password management application to simplify access to enterprise applications for users but also increase centrality and ease of management of access for administrators with task automation, convenient and secure password sharing, and other features.

Okta Workforce Identity

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
Top Rated
155 Ratings

Okta is an enterprise grade identity management service, built in the cloud. IT can manage access across any application, person or device. Whether the people are employees, partners or customers or whether the applications are in the cloud, on premises or on a mobile device, Okta helps IT become...

Duo Security

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
67 Ratings

Duo Security is a two-factor authentication system (2FA), acquired by Cisco in October 2018. DUO provides single sign-on (SSO) and endpoint visibility, as well as access controls and policy controlled adaptive authentication.

WatchGuard AuthPoint

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
30 Ratings

WatchGuard AuthPoint is a multi-factor authentication (MFA) service that helps companies keep their assets, information, and user identities secure. Multi-factor authentication solutions can enable organizations to close security gaps that leave companies vulnerable to breaches by adding a layer ...

The RSA SecurID Suite is an identity management, authentication and user provisioning offering supported by EMC's security division, RSA. The SecurID Suite includes SecurID Access 2FA and multi-factor authentication solutions and RSA Identity Governance & Lifecycle products.

Azure Active Directory

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
71 Ratings

Microsoft Azure Active Directory (Azure AD) is a cloud-based identity and access management (IAM) solution supporting restricted access to applications with Azure Multi-Factor Authentication (MFA) built-in, single sign-on (SSO), B2B collaboration controls, self-service password, and integration w...

IBM Cloud App ID helps developers who are not security experts to easily add authentication to their apps, and protect their APIs and app back-ends running on IBM Cloud. Developers can add a variety of login-in types: Email or username and passwordEnterpriseSocial App ID includes a cloud user ...

SolarWinds Access Rights Manager (ARM) is designed to assist IT and security admins to quickly and easily provision, deprovision, manage and audit user access rights to systems, data, and files. By analyzing user authorizations and access permission you get visualization of who has access to what...

In the Okta Customer Identity platform, Okta bundles authentication with social login, authorization, and (if desired) multi factor authentication, for free on the Developer plan. Okta Customer Identity is also available in the One App or Enterprise editions, which include add-on services, premie...

The Next-Gen Identity Platform from Ping Identity in Denver, Colorado is an identity management and access solution (IAM) for enterprises. Features of the products include single sign-on, multi-factor authentication, user management with directory, provisioning and deprovisioning, and more. Ping...

STEALTHbits Technologies offers StealthINTERCEPT, an evolution of STEALTHBITS Enterprise Password Enforcer supporting high security password creation, the ability to detect and prevent the creation of previously exploited passwords, rejection of user log in credentials, and other password policy ...

We don't have enough ratings and reviews to provide an overall score.

Layer7 Advanced Authentication (formerly CA Advanced Authentication) from Broadcom company CA Technologies provides real-time protection for online and mobile applications. The solution can authenticate an employee, partner or contractor while providing frictionless login, ensuring legitimate use...