Authentication31Authentication is the process of verifying the legitimacy of data, most often data used by people attempting to access a system. Multi-factor authentication (most commonly two-factor authentication, or 2FA) is the use of additional data or components, like a password, PIN, a secret question, or simply a randomly generated code, to provide additional access control and security.HID DigitalPersona (formerly Crossmatch)1https://media.trustradius.com/vendor-logos/wX/Vn/WE5TVGSXKW3L-180x180.PNGOkta Workforce Identity2https://media.trustradius.com/product-logos/lp/6M/XZVJG3Z9WVSS.PNGLastPass for Business3https://media.trustradius.com/product-logos/zc/CR/P2OA0E00D6VH.JPEGIdaptive Next-Gen Access (formerly Centrify)4https://media.trustradius.com/product-logos/l2/cm/X6S7STATKRXE.JPEGDuo Security5https://media.trustradius.com/product-logos/vN/jh/AOFRMOBFHMTC.JPEGRSA SecurID Suite6https://media.trustradius.com/product-logos/DM/pf/J9NUOOJ4LT2P.JPEGGoogle Authenticator7https://media.trustradius.com/vendor-logos/a6/c6/JGG6SW6IUMTJ-180x180.PNGSolarWinds Access Rights Manager8https://media.trustradius.com/product-logos/K9/OY/DI903HA5JF0Q.PNGSymantec VIP9https://media.trustradius.com/product-logos/vv/Nz/EXNPZIO53VRG.PNGIBM Cloud App ID10https://media.trustradius.com/product-logos/Uv/Xp/77N37PEPH17Z-180x180.PNGAzure Active Directory11https://media.trustradius.com/vendor-logos/tf/J4/RTX1AO2GSVNS-180x180.JPEGVenafi12https://media.trustradius.com/product-logos/M1/Yw/RE4H09A4GSWH.pngAuthy13https://media.trustradius.com/product-logos/DQ/3q/LNTS0F4JG5K7.JPEGYubico14https://media.trustradius.com/product-logos/WS/Yr/NI540LK4NENM.pngDefender15https://media.trustradius.com/vendor-logos/mM/Hm/FTTX4ZXS5GHQ-180x180.JPEGOneSpan Authenticators (formerly Digipass)16https://media.trustradius.com/vendor-logos/2u/lF/CGASVK335ZQ3-180x180.JPEGPing Identity Platform17https://media.trustradius.com/product-logos/tt/tc/VZWP9DPA7AJ5.pngAzure Multi-Factor Authentication (Discontinued)18https://media.trustradius.com/vendor-logos/tf/J4/RTX1AO2GSVNS-180x180.JPEGAppViewX CERT+19https://media.trustradius.com/product-logos/6f/OK/Q2ZDFAMQ9UCL.JPEGHID Global ActivID Authentication Server (formerly ActivIdentity or 4TRESS)20https://media.trustradius.com/vendor-logos/wX/Vn/WE5TVGSXKW3L-180x180.PNGLayer7 Advanced Authentication (formerly CA Advanced Authentication)21https://media.trustradius.com/vendor-logos/XC/qb/OEOG2461M9II-180x180.JPEGSwivel Secure PINsafe22https://media.trustradius.com/product-logos/kp/Z1/TJANDW5772QG.pngEntrust IdentityGuard23https://media.trustradius.com/vendor-logos/GC/nx/Q0WRPV0TE55B-180x180.PNGSecurEnvoy SecurAccess24https://media.trustradius.com/product-logos/Qx/zH/4FIL2TM4NOWD.jpegGemalto Confirm Authentication Server (Ezio Server)25https://media.trustradius.com/product-logos/5D/Z6/94MSB9QGEAHT.JPEG

Authentication Systems

Authentication Systems Overview

What are Authentication Systems?

Authentication Systems aid the process of verifying the legitimacy of data, most often data used by people attempting to access a system.

Multi-factor authentication (most commonly two-factor authentication, or 2FA) is the use of additional data or components, like a password, PIN, a secret question, or simply a randomly generated code, to provide additional access control and security.

Authentication Products

Listings (1-25 of 62)

HID DigitalPersona (formerly Crossmatch)

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow'>Customer Verified: Read more.</a>
86 Ratings

HID DigitalPersona (formerly Crossmatch) provides a comprehensive multi-factor authentication solution. The vendor’s value proposition is that their solution frees users from cumbersome login activities while making it easy for an IT Team to secure access to their networks, data and applications.

Okta Workforce Identity

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow'>Customer Verified: Read more.</a>
136 Ratings

Okta is an enterprise grade identity management service, built in the cloud. IT can manage access across any application, person or device. Whether the people are employees, partners or customers or whether the applications are in the cloud, on premises or on a mobile device, Okta helps IT become...

LastPass for Business

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow'>Customer Verified: Read more.</a>
79 Ratings

LastPass, a LogMeIn company, is a password management application to simplify access to enterprise applications for users but also increase centrality and ease of management of access for administrators with task automation, convenient and secure password sharing, and other features.

52 Ratings

Duo Security is a two-factor authentication system (2FA), acquired by Cisco in October 2018. DUO provides single sign-on (SSO) and endpoint visibility, as well as access controls and policy controlled adaptive authentication.

41 Ratings

The RSA SecurID Suite is an identity management, authentication and user provisioning offering supported by EMC's security division, RSA. The SecurID Suite includes SecurID Access 2FA and multi-factor authentication solutions and RSA Identity Governance & Lifecycle products.

7 Ratings

SolarWinds Access Rights Manager (ARM) is designed to assist IT and security admins to quickly and easily provision, deprovision, manage and audit user access rights to systems, data, and files. By analyzing user authorizations and access permission you get visualization of who has access to what...

8 Ratings

IBM Cloud App ID helps developers who are not security experts to easily add authentication to their apps, and protect their APIs and app back-ends running on IBM Cloud. Developers can add a variety of login-in types: Email or username and passwordEnterpriseSocial App ID includes a cloud user ...

38 Ratings

Microsoft Azure Active Directory (Azure AD) is a cloud-based identity and access management (IAM) solution supporting restricted access to applications with Azure Multi-Factor Authentication (MFA) built-in, single sign-on (SSO), B2B collaboration controls, self-service password, and integration w...

4 Ratings

The Next-Gen Identity Platform from Ping Identity in Denver, Colorado is an identity management and access solution (IAM) for enterprises. Features of the products include single sign-on, multi-factor authentication, user management with directory, provisioning and deprovisioning, and more. Ping...

1 Ratings

AppViewX, headquartered in Seattle, offers the AppViewX Platform supporting multi-vendor network environments with automation and orchestration, providing blueprints for hybrid cloud environments and deploying resources to support and protect applications.

We don't have enough ratings and reviews to provide an overall score.

Layer7 Advanced Authentication (formerly CA Advanced Authentication) from Broadcom company CA Technologies provides real-time protection for online and mobile applications. The solution can authenticate an employee, partner or contractor while providing frictionless login, ensuring legitimate use...