Authentication31Authentication is the process of verifying the legitimacy of data, most often data used by people attempting to access a system. Multi-factor authentication (most commonly two-factor authentication, or 2FA) is the use of additional data or components, like a password, PIN, a secret question, or simply a randomly generated code, to provide additional access control and security.HID DigitalPersona (formerly Crossmatch)1https://media.trustradius.com/vendor-logos/wX/Vn/WE5TVGSXKW3L-180x180.PNGOkta Workforce Identity2https://media.trustradius.com/product-logos/lp/6M/XZVJG3Z9WVSS.PNGLastPass for Business3https://media.trustradius.com/product-logos/pj/H6/3TPTE2MFEL1P.PNGIdaptive Next-Gen Access (formerly Centrify)4https://media.trustradius.com/product-logos/l2/cm/X6S7STATKRXE.JPEGDuo Security5https://media.trustradius.com/product-logos/vN/jh/AOFRMOBFHMTC.JPEGRSA SecurID Suite6https://media.trustradius.com/product-logos/DM/pf/J9NUOOJ4LT2P.JPEGAzure Active Directory7https://media.trustradius.com/vendor-logos/tf/J4/RTX1AO2GSVNS-180x180.JPEGGoogle Authenticator8https://media.trustradius.com/vendor-logos/a6/c6/JGG6SW6IUMTJ-180x180.PNGSolarWinds Access Rights Manager9https://media.trustradius.com/product-logos/K9/OY/DI903HA5JF0Q.PNGSymantec VIP10https://media.trustradius.com/product-logos/vv/Nz/EXNPZIO53VRG.PNGIBM Cloud App ID11https://media.trustradius.com/product-logos/Uv/Xp/77N37PEPH17Z-180x180.PNGAuthy12https://media.trustradius.com/product-logos/DQ/3q/LNTS0F4JG5K7.JPEGVenafi13https://media.trustradius.com/product-logos/M1/Yw/RE4H09A4GSWH.pngYubico14https://media.trustradius.com/product-logos/WS/Yr/NI540LK4NENM.pngDefender15https://media.trustradius.com/vendor-logos/mM/Hm/FTTX4ZXS5GHQ-180x180.JPEGOneSpan Authenticators (formerly Digipass)16https://media.trustradius.com/vendor-logos/2u/lF/CGASVK335ZQ3-180x180.JPEGPing Identity Platform17https://media.trustradius.com/product-logos/tt/tc/VZWP9DPA7AJ5.pngAzure Multi-Factor Authentication (Discontinued)18https://media.trustradius.com/vendor-logos/tf/J4/RTX1AO2GSVNS-180x180.JPEGAppViewX CERT+19https://media.trustradius.com/product-logos/6f/OK/Q2ZDFAMQ9UCL.JPEGWatchGuard AuthPoint20https://media.trustradius.com/product-logos/5W/jq/7QGQ3JW39HTT.JPEGOkta Customer Identity21https://media.trustradius.com/vendor-logos/tg/9R/CD40URXZCHH7-180x180.JPEGHID Global ActivID Authentication Server (formerly ActivIdentity or 4TRESS)22https://media.trustradius.com/vendor-logos/wX/Vn/WE5TVGSXKW3L-180x180.PNGLayer7 Advanced Authentication (formerly CA Advanced Authentication)23https://media.trustradius.com/vendor-logos/XC/qb/OEOG2461M9II-180x180.JPEGSwivel Secure PINsafe24https://media.trustradius.com/product-logos/kp/Z1/TJANDW5772QG.pngEntrust IdentityGuard25https://media.trustradius.com/vendor-logos/GC/nx/Q0WRPV0TE55B-180x180.PNG

Authentication Systems

Authentication Systems Overview

What are Authentication Systems?

Authentication Systems aid the process of verifying the legitimacy of data, most often data used by people attempting to access a system.

Multi-factor authentication (most commonly two-factor authentication, or 2FA) is the use of additional data or components, like a password, PIN, a secret question, or simply a randomly generated code, to provide additional access control and security.

Authentication Products

Listings (1-25 of 62)

HID DigitalPersona (formerly Crossmatch) provides a comprehensive multi-factor authentication solution. The vendor’s value proposition is that their solution frees users from cumbersome login activities while making it easy for an IT Team to secure access to their networks, data and applications.

Okta Workforce Identity

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
Top Rated
143 Ratings

Okta is an enterprise grade identity management service, built in the cloud. IT can manage access across any application, person or device. Whether the people are employees, partners or customers or whether the applications are in the cloud, on premises or on a mobile device, Okta helps IT become...

LastPass for Business

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
96 Ratings

LastPass, a LogMeIn company, is a password management application to simplify access to enterprise applications for users but also increase centrality and ease of management of access for administrators with task automation, convenient and secure password sharing, and other features.

57 Ratings

Duo Security is a two-factor authentication system (2FA), acquired by Cisco in October 2018. DUO provides single sign-on (SSO) and endpoint visibility, as well as access controls and policy controlled adaptive authentication.

The RSA SecurID Suite is an identity management, authentication and user provisioning offering supported by EMC's security division, RSA. The SecurID Suite includes SecurID Access 2FA and multi-factor authentication solutions and RSA Identity Governance & Lifecycle products.

Microsoft Azure Active Directory (Azure AD) is a cloud-based identity and access management (IAM) solution supporting restricted access to applications with Azure Multi-Factor Authentication (MFA) built-in, single sign-on (SSO), B2B collaboration controls, self-service password, and integration w...

SolarWinds Access Rights Manager (ARM) is designed to assist IT and security admins to quickly and easily provision, deprovision, manage and audit user access rights to systems, data, and files. By analyzing user authorizations and access permission you get visualization of who has access to what...

IBM Cloud App ID helps developers who are not security experts to easily add authentication to their apps, and protect their APIs and app back-ends running on IBM Cloud. Developers can add a variety of login-in types: Email or username and passwordEnterpriseSocial App ID includes a cloud user ...

The Next-Gen Identity Platform from Ping Identity in Denver, Colorado is an identity management and access solution (IAM) for enterprises. Features of the products include single sign-on, multi-factor authentication, user management with directory, provisioning and deprovisioning, and more. Ping...

AppViewX, headquartered in Seattle, offers the AppViewX Platform supporting multi-vendor network environments with automation and orchestration, providing blueprints for hybrid cloud environments and deploying resources to support and protect applications.

WatchGuard AuthPoint is a multi-factor authentication (MFA) service that helps companies keep their assets, information, and user identities secure. The vendor says it closes a security gap that leaves companies vulnerable to breaches by adding a layer of security beyond just a username and passw...

In the Okta Customer Identity platform, Okta bundles authentication with social login, authorization, and (if desired) multi factor authentication, for free on the Developer plan. Okta Customer Identity is also available in the One App or Enterprise editions, which include add-on services, premie...

We don't have enough ratings and reviews to provide an overall score.

Layer7 Advanced Authentication (formerly CA Advanced Authentication) from Broadcom company CA Technologies provides real-time protection for online and mobile applications. The solution can authenticate an employee, partner or contractor while providing frictionless login, ensuring legitimate use...