Authentication Systems

TrustRadius Top Rated for 2023

Top Rated Products

(1-5 of 5)

1
Cisco Duo

Cisco Duo is a two-factor authentication system (2FA), acquired by Cisco in October 2018. It provides single sign-on (SSO) and endpoint visibility, as well as access controls and policy controlled adaptive authentication.

2
WatchGuard AuthPoint

AuthPoint Total Identity Security provides businesses with a solution to protect user accounts and credentials. With multi-factor authentication, password management, and dark web credential monitoring, AuthPoint mitigates the risks associated with workforce credential attacks.…

3
The Okta Identity Cloud

Okta is an enterprise grade identity management service, built in the cloud. IT can manage access across any application, person or device. Whether the people are employees, partners or customers or whether the applications are in the cloud, on premises or on a mobile device, Okta…

4
HID DigitalPersona

HID DigitalPersona (formerly Crossmatch) provides a comprehensive multi-factor authentication solution. The vendor’s value proposition is that their solution frees users from cumbersome login activities while making it easy for an IT Team to secure access to their networks, data…

5
LastPass for Business

LastPass is a password management application to simplify access to enterprise applications for users but also increase centrality and ease of management of access for administrators with task automation, convenient and secure password sharing, and other features.

All Products

(76-100 of 241)

76
Modirum
0 reviews

Modirum supports Card Not Present (CNP) payments with niche solutions for Issuers, Acquirers, Payment Systems, PSPs, Processors and merchants to secure and process Card not Present payments through certified PCI-DSS and PCI-3DS geo-redundant datacenters.

77
Nuance Gatekeeper

Nuance Gatekeeper is a cloud‑native, decision‑making, AI‑powered biometric solution for frictionless authentication designed to enable organizations to mitigate fraud losses, improve operational efficiency and increase customer satisfaction across both voice and digital channels.…

78
Hideez
0 reviews

Hideez provides identity and access management solutions for business and personal use. The flagship product, Hideez Key, is presented as a compact, wareable, all-in-one Bluetooth-enabled hardware key that serves as a secure password manager, proximity lock/unlock for PCs, and electronic…

Explore recently added products

79
ProID Multifactor

ProID Multifactor are tools and methods for workforce identity authentication (2FA, MFA) and simple login to computers, clouds or applications. This is accompanied by a number of modules for certificate lifecycle management in MS Windows, iOS, or Linux. The vendor describes the…

80
Krontech Single Connect

Single Connect from Krontech, headquartered in Istanbul, is a product family that strengthens, simplifies and secures the management of privileged accounts, for enterprises and network operators who serve them. Single Connect unifies multivendor environments with pre-integrated modules…

81
Routee
0 reviews

Routee is a CPaaS for mobile marketing and related purposes, powered by AMD Telecom.

82
Mati
0 reviews

Mati is presented by the vendor as an all-in-one User Verification platform with a high level of biometrics and document analysis. Users can integrate its API into a product to onboard customers faster and reduce the risk of fraud. The vendor states they work with over 200 companies,…

83
Unbound Crypto-of-Things

Unbound CoT eliminates the single point of compromise by ensuring that sensitive keys that reside on untrusted and insecure devices never exist in the clear at any point in their lifecycle – not even when generated or while in use. With Unbound CoT, key material is never whole. Rather,…

84
Finartz DS
0 reviews

Finartz DS 2.2 is a 3D Secure 2.2 compliant directory server which is mainly responsible for authentication of the 3DS Server and routing of the messages between the 3DS Server and the ACS. The vendor states that Finartz DS 2.2 is tested and approved by EMVCo.3D Secure Protocol Related…

85
Finartz ACS
0 reviews

Finartz ACS provides a management portal for back office and call center support, with an API for integration. Finartz ACS supports EMVCo 3DS 2.0 protocol. Finartz 3D Secure 2.0 ACS can be configured according to requirements.

86
Symantec Managed PKI Service

Conducting business electronically, increasingly from mobile devices, has become a business standard. Therefore it is more important than ever to properly authenticate users, restrict access to confidential information, and verify the integrity or origination of sensitive documents…

87
CloudABIS by M2SYS

CloudABIS™ is a cloud-based biometric matching system. According to the vendor, CloudABIS™ removes the burden and cost associated with building and maintaining a reliable biometric identification system.CloudABIS™ supports fingerprint, finger vein, face and iris recognition. Customers…

88
Blackberry 2FA

Blackberry 2FA is the company's multi-factor authentication offering dedicated to securing enterprise cloud applications.

89
SecurEnvoy SecurAccess

SecurAccess from SecurEnvoy in the UK is an authentication system.

90
mSIGNIA
0 reviews

mSignia offers authentication through digital biometrics.

91
SecurEnvoy SecurICE

SecurICE is an authentication system from SecurEnvoy in the UK.

92
OpenAthens Managed Directory

OpenAthens MD is a completely hosted solution that is designed to enable organisations to securely and effectively manage their users’ access to web-based resources, and allow access to services outside or within federations such as the UK Access Management Federation and OpenAthens…

93
Authentify
0 reviews

Chicago based company Authentify Inc offers a two-factor authentication solution.

94
McAfee One Time Password (Discontinued)

Nordic Edge authentication system was acquired by McAfee in 2012, since rebranded McAfee Pledge, and merged into McAfee One Time Password, an authentication token system. It is now obsolete.

95
inWebo
0 reviews

inWebo is an authentication system from French company inWebo Technologies.

96
Thales Gemalto Confirm Authentication Server (CAS)

The Thales Gemalto Confirm Authentication Server (formerly Ezio Server) is an authentication system for financial institutions and fraud prevention. Gemalto is now a Thales company since the April 2019 acquisition.

97
Tesseract
0 reviews

98
SAWO
0 reviews

99
PixelPin
0 reviews

100
Futurae Authentication Platform

Futurae’s customer authentication helps address: «When users see the login to a customer platform as a hurdle?»«Help-desk costs are getting out of hand due to complicated onboarding and login methods?»«When existing authentication technology is inflexible and does not cover all cases…

Videos for Authentication Systems

Which One is More Secure - Authy or Google Authenticator?
03:32
Depending on the level of security you require, the best authentication system for you could look very different. While Authy is a very convenient option with many sign-in options and features - Google Authenticator provides a more stripped-down authenticator.

Learn More About Authentication Systems

What are Authentication Systems?

Authentication systems are security measures put in place to secure data and systems by requiring additional input beyond username and password for users to access a system. By providing this additional input, authentication systems help ensure that users are who they say they are. Authentication systems can require one other form of user input or more. These systems are sometimes called multiple-factor authentication, or MFA.

Using authentication improves data security and prevents potential breaches. When multi-factor authentication is required to access a system, the system is less vulnerable to security issues like weak passwords or attacks like phishing. Authentication systems are ideal for businesses with sensitive data or systems that require secure user accounts.

Authentication System Features & Capabilities

Authentication Systems have different ways of authenticating users, but they all share a few key features.

  • Enable multiple-factor authentication
  • Secure systems against password theft or data loss
  • Offline authentication
  • Secure single sign-on
  • User management

Multi-Factor Authentication Solution Methods

Most modern authentication systems offer a wider range of authentication methods than passwords alone. The most common approach for advanced authentication, such as two-factor authentication or multi-factor authentication, is to pair a password with some sort of external verification. Other common authentication methods include:

  • Challenge questions
  • Unique identifying items, such as physical devices or external applications
  • Biometric identifies, such as retina and fingerprint scans or facial recognition
  • Location-based authentication

Authentication System Comparison

When comparing different authentication systems, consider these factors:

  1. Authentication methods: What authentication methods do each system offer? Some authentication products focus on password creation and management, while others provide external applications for MFA. Others offer physical devices, such as keycards or retinal scanners. Buyers should consider which authentication methods are most appropriate for their business.
  2. Active vs. passive authentication: Some vendors have been more proactive in adopting responsive authentication capabilities, such as behavioral analysis or location-based authentication. These capabilities provide additional visibility into possible security breaches and suspicious authentication attempts, allowing for more rapid and effective responses. However, smaller or more geographically-distributed organizations may not be able to make as effective use of these extended capabilities.
  3. End-user experience: Each authentication method bears a unique user experience and is more or less accessible than others. For instance, biometric authentication like fingerprints may not be viable or appropriate in certain environments. Other methods require end users to have personal devices, which may not be true for all users. Buyers should consider what the end user base will look like, and what implications that has on which methods to use.

Pricing Information

Pricing for authentication systems depends on the kind of authentication needed. App-based and SMS authentication services tend to be cheaper than biometric authentication or authentication that requires a physical passkey. Many authentication systems offer a free option for a small number of users. Beyond that, authentication systems can start as low as $1.00 per user per month. More fully-featured authentication systems can reach $10.00 per user per month or more.

Related Categories

Frequently Asked Questions

What is two-factor authentication?

Two-factor authentication uses more than one authentication test, usually a password paired with another authentication method.

How is authentication done in computers?

Traditionally, digital authentication was via a password. In recent decades, multi-factor authentication has added other checks, such as key cards or one-time passwords from external devices, for additional security.

What is the difference between two-factor authentication and multi-factor authentication?

Two-factor authentication only uses 2 authentication checks, usually a password and another method. MFA uses 2 or more authentication methods, with each additional method designed to increase security.

What are the three types of authentication?

The three types of authentication are something that you know (a password, or challenge questions), something you have (like a key card, device, or external application), and something that you are (such as retina scans, fingerprints, or other biometric information).

How much does authentication software cost?

Costs vary depending on the scale and types of authentication being purchased. They can start as low as $1/user/month, up to $10/user/month, or more if authentication hardware like retinal scanners are required as well.