Authentication Systems

TrustRadius Top Rated for 2023

Top Rated Products

(1-5 of 5)

1
Cisco Duo

Cisco Duo is a two-factor authentication system (2FA), acquired by Cisco in October 2018. It provides single sign-on (SSO) and endpoint visibility, as well as access controls and policy controlled adaptive authentication.

2
WatchGuard AuthPoint

AuthPoint Total Identity Security provides businesses with a solution to protect user accounts and credentials. With multi-factor authentication, password management, and dark web credential monitoring, AuthPoint mitigates the risks associated with workforce credential attacks.…

3
The Okta Identity Cloud

Okta is an enterprise grade identity management service, built in the cloud. IT can manage access across any application, person or device. Whether the people are employees, partners or customers or whether the applications are in the cloud, on premises or on a mobile device, Okta…

4
HID DigitalPersona

HID DigitalPersona (formerly Crossmatch) provides a comprehensive multi-factor authentication solution. The vendor’s value proposition is that their solution frees users from cumbersome login activities while making it easy for an IT Team to secure access to their networks, data…

5
LastPass for Business

LastPass is a password management application to simplify access to enterprise applications for users but also increase centrality and ease of management of access for administrators with task automation, convenient and secure password sharing, and other features.

All Products

(26-50 of 241)

26
Workspace ONE Access

Workspace ONE Access, (formerly VMware Identity Manager), provides multi-factor authentication, conditional access and single sign-on to SaaS, web and native mobile apps.

27
Rublon

Rublon enables workforces to securely access an organization's networks, servers and applications. With it, users can protect data via multi-factor authentication, and comply with data protection regulations like GDPR. The vendor says Rublon can be deployed organization-wide, enabling…

28
StealthINTERCEPT

StealthINTERCEPT, an evolution of STEALTHBITS Enterprise Password Enforcer supporting high security password creation, the ability to detect and prevent the creation of previously exploited passwords, rejection of user log in credentials, and other password policy enforcement features.…

Explore recently added products

29
F5 Distributed Cloud Authentication Intelligence

F5 Distributed Cloud Authentication Intelligence provides continuous authentication to establish trust, reduce friction of excessive logins and reauthentication through machine learning and analytics insights with an integrated platform that stops automated and human-driven fraud…

30
Authlogics Multi-Factor Authentication

To help ysers simplify and secure their login experience, Authlogics Multi-Factor Authentication (MFA) is presented as a complete and easy to deploy login solution that offers multi-token and tokenless technology, password replacement, and a single-sign-on solution for on-premises…

31
DocuSign Identify

DocuSign Identify makes identity proofing and authentication a part of eSignature. This helps users to protect important agreements, and customer experience. The solution helps meet requirements with Know Your Customer (KYC), Anti-Money Laundering (AML) and regional regulations.…

32
Berbix

Berbix helps users verify photo IDs. Berbix ID checks enable platforms to verify age, enhance KYC, deter marketplace fraud, and validate data subject requests. Berbix is founded by the former leaders for Trust & Safety at Airbnb and backed by Y Combinator.

33
SecureAuth IdP

SecureAuth is an identity and adaptive access management solution from the company of the same name in Irvine, California, featuring 2FA or multi-factor authentication, adaptive authentication, and user self-service (e.g. password).

34
HYPR

HYPR, from the company of the same name in New York, is a passworldless authentication solution designed to prevent phishing, fraud, and friction, and make it easier for businesses to eliminate passwords and deliver fast login experiences with the push of a button.

35
Transmit Security CIAM Platform

Transmit Security headquartered in Boston offers their identity orchestration solution, providing strong customer authentication and authorization for entities that need it.

36
Plaid

Plaid in San Francisco offers a suite of applications supporting banks with risk management and customer account management features. Plaid is used by digital financial apps and services like Betterment, Expensify, Microsoft and Venmo, and by banks to make it easier for consumers…

37
Clerk

Poor user management can stand between users and products. From forgotten passwords and failed account de-duplication, to broken and out-of-sync vendor integrations — there's a lot that can go wrong. Clerk is a software solution that aims to solve user management.

38
Jamf Connect

Jamf Connect is a Mac device authentication solution, that lets a user unbox their device, power it on and access all of their corporate applications and resources after signing on with a single set of cloud identity credentials.

39
FreeRADIUS

The FreeRADIUS project, the open source implementation of RADIUS, is an IETF protocol for AAA (Authorisation, Authentication, and Accounting).

40
Azure Multi-Factor Authentication (Discontinued)

Microsoft's Azure Multi-Factor Authentication is the recently rebranded technology acquired with PhoneFactor in 2012. From 2018 it is no longer available as a standalone product.

41
Onfido

Onfido simplifies identity verification with a platform used by over 900 businesses with the goal of navigating KYC and AML requirements, stopping fraud, and delivering exceptional onboarding experiences.

43
Delinea Server PAM

Delinea Server PAM solution (Cloud Suite and Server Suite) secures privileged access for servers on both on-premise and cloud/multi-cloud environments. It allows humans and machines to seamlessly authenticate, enforcing least privilege with just-in-time privilege elevation, increasing…

44
NetIQ by OpenText

NetIQ secures organizations through a comprehensive set of identity and access services for workforce and customer identities.

45
OneSpan Cloud Authentication

OneSpan Cloud Authentication increases operational efficiency by streamlining the authentication process. The solution is designed to provide all the benefits of the cloud and support banks and other businesses’ transformation from costly legacy, on-prem infrastructures to a more…

46
Sift Digital Trust & Safety Suite

Sift Science headquartered in San Francisco offers their software, Machine Learning and Device Fingerprinting, for fraud detection and prevention, priced per services added and volume of devices and orders checked.

47
FaceTec
0 reviews

FaceTec’s 3D Face Authentication software anchors digital identity with 3D FaceMaps. By creating a chain of trust from user onboarding to ongoing authentication on all modern smart devices and webcams, trusted remote identity verification is made possible. The technology is backed…

48
Traitware
0 reviews

Traitware offers passwordless login for enterprises, presented as real passwordless phishing-resistant multi-factor authentication (MFA) for the enterprise. This includes single-step MFA + SSO for access to any screen with a device already in use. The solution helps to eliminate…

49
VoiSentry
0 reviews

from Aculab, VoiSentry is an AI-driven voice biometric system, providing an additional layer of security and authentication to prevent fraud. They can also be used to authorise financial transactions where PCI DSS compliance is mandated.

Videos for Authentication Systems

Which One is More Secure - Authy or Google Authenticator?
03:32
Depending on the level of security you require, the best authentication system for you could look very different. While Authy is a very convenient option with many sign-in options and features - Google Authenticator provides a more stripped-down authenticator.

Learn More About Authentication Systems

What are Authentication Systems?

Authentication systems are security measures put in place to secure data and systems by requiring additional input beyond username and password for users to access a system. By providing this additional input, authentication systems help ensure that users are who they say they are. Authentication systems can require one other form of user input or more. These systems are sometimes called multiple-factor authentication, or MFA.

Using authentication improves data security and prevents potential breaches. When multi-factor authentication is required to access a system, the system is less vulnerable to security issues like weak passwords or attacks like phishing. Authentication systems are ideal for businesses with sensitive data or systems that require secure user accounts.

Authentication System Features & Capabilities

Authentication Systems have different ways of authenticating users, but they all share a few key features.

  • Enable multiple-factor authentication
  • Secure systems against password theft or data loss
  • Offline authentication
  • Secure single sign-on
  • User management

Multi-Factor Authentication Solution Methods

Most modern authentication systems offer a wider range of authentication methods than passwords alone. The most common approach for advanced authentication, such as two-factor authentication or multi-factor authentication, is to pair a password with some sort of external verification. Other common authentication methods include:

  • Challenge questions
  • Unique identifying items, such as physical devices or external applications
  • Biometric identifies, such as retina and fingerprint scans or facial recognition
  • Location-based authentication

Authentication System Comparison

When comparing different authentication systems, consider these factors:

  1. Authentication methods: What authentication methods do each system offer? Some authentication products focus on password creation and management, while others provide external applications for MFA. Others offer physical devices, such as keycards or retinal scanners. Buyers should consider which authentication methods are most appropriate for their business.
  2. Active vs. passive authentication: Some vendors have been more proactive in adopting responsive authentication capabilities, such as behavioral analysis or location-based authentication. These capabilities provide additional visibility into possible security breaches and suspicious authentication attempts, allowing for more rapid and effective responses. However, smaller or more geographically-distributed organizations may not be able to make as effective use of these extended capabilities.
  3. End-user experience: Each authentication method bears a unique user experience and is more or less accessible than others. For instance, biometric authentication like fingerprints may not be viable or appropriate in certain environments. Other methods require end users to have personal devices, which may not be true for all users. Buyers should consider what the end user base will look like, and what implications that has on which methods to use.

Pricing Information

Pricing for authentication systems depends on the kind of authentication needed. App-based and SMS authentication services tend to be cheaper than biometric authentication or authentication that requires a physical passkey. Many authentication systems offer a free option for a small number of users. Beyond that, authentication systems can start as low as $1.00 per user per month. More fully-featured authentication systems can reach $10.00 per user per month or more.

Related Categories

Frequently Asked Questions

What is two-factor authentication?

Two-factor authentication uses more than one authentication test, usually a password paired with another authentication method.

How is authentication done in computers?

Traditionally, digital authentication was via a password. In recent decades, multi-factor authentication has added other checks, such as key cards or one-time passwords from external devices, for additional security.

What is the difference between two-factor authentication and multi-factor authentication?

Two-factor authentication only uses 2 authentication checks, usually a password and another method. MFA uses 2 or more authentication methods, with each additional method designed to increase security.

What are the three types of authentication?

The three types of authentication are something that you know (a password, or challenge questions), something you have (like a key card, device, or external application), and something that you are (such as retina scans, fingerprints, or other biometric information).

How much does authentication software cost?

Costs vary depending on the scale and types of authentication being purchased. They can start as low as $1/user/month, up to $10/user/month, or more if authentication hardware like retinal scanners are required as well.