Overview
ProductRatingMost Used ByProduct SummaryStarting Price
BlockID
Score 0.0 out of 10
N/A
N/AN/A
PingOne from Ping Identity
Score 8.9 out of 10
N/A
The PingOne Cloud Platform from Ping Identity in Denver, Colorado is an identity management and access solution (IAM) for enterprises. Features of the products include single sign-on, multi-factor authentication, user management with directory, provisioning and deprovisioning. The solution is presented as a comprehensive, standards-based platform that allows users and devices to securely access any service, application or API from any device. Designed for hybrid IT…
$20,000
per year
Rublon
Score 8.0 out of 10
Mid-Size Companies (51-1,000 employees)
Rublon enables workforces to securely access an organization's networks, servers and applications. With it, users can protect data via multi-factor authentication, and comply with data protection regulations like GDPR. The vendor says Rublon can be deployed organization-wide, enabling MFA for all cloud apps, VPNs, servers, workstations, internal as well as on-premise apps.
$0
up to 1 user
Pricing
BlockIDPingOne from Ping IdentityRublon
Editions & Modules
No answers on this topic
Essential
$20,000
per year
Plus
$40,000
per year
Premium
Contact Sales
Free
$0
up to 1 user
Business
$1
per user
Offerings
Pricing Offerings
BlockIDPingOne from Ping IdentityRublon
Free Trial
NoYesYes
Free/Freemium Version
NoNoYes
Premium Consulting/Integration Services
NoNoYes
Entry-level Setup FeeNo setup feeNo setup feeOptional
Additional DetailsTry PingOne for Customers for free. Sign up for a free 30-day trial of PingOne for customers.The minimum number of user licenses that can be purchased for Rublon Business is 30.
More Pricing Information
Features
BlockIDPingOne from Ping IdentityRublon
Identity Management
Comparison of Identity Management features of Product A and Product B
BlockID
-
Ratings
PingOne from Ping Identity
9.3
9 Ratings
12% above category average
Rublon
-
Ratings
ID-Management Access Control00 Ratings10.07 Ratings00 Ratings
ID Management Single-Sign On (SSO)00 Ratings10.09 Ratings00 Ratings
Multi-Factor Authentication00 Ratings9.59 Ratings00 Ratings
Password Management00 Ratings10.06 Ratings00 Ratings
Account Provisioning and De-provisioning00 Ratings8.05 Ratings00 Ratings
ID Management Workflow Automation00 Ratings9.04 Ratings00 Ratings
ID Risk Management00 Ratings8.56 Ratings00 Ratings
Best Alternatives
BlockIDPingOne from Ping IdentityRublon
Small Businesses
WatchGuard AuthPoint
WatchGuard AuthPoint
Score 9.1 out of 10
1Password
1Password
Score 9.2 out of 10
WatchGuard AuthPoint
WatchGuard AuthPoint
Score 9.1 out of 10
Medium-sized Companies
WatchGuard AuthPoint
WatchGuard AuthPoint
Score 9.1 out of 10
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
WatchGuard AuthPoint
WatchGuard AuthPoint
Score 9.1 out of 10
Enterprises
Cisco Duo
Cisco Duo
Score 9.4 out of 10
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
Cisco Duo
Cisco Duo
Score 9.4 out of 10
All AlternativesView all alternativesView all alternativesView all alternatives
User Ratings
BlockIDPingOne from Ping IdentityRublon
Likelihood to Recommend
-
(0 ratings)
7.9
(8 ratings)
8.0
(1 ratings)
Usability
-
(0 ratings)
9.0
(1 ratings)
-
(0 ratings)
Support Rating
-
(0 ratings)
8.6
(4 ratings)
-
(0 ratings)
User Testimonials
BlockIDPingOne from Ping IdentityRublon
Likelihood to Recommend
1Kosmos
No answers on this topic
Ping Identity
Really like [this] solution, it fits our requirements 100%. There are unlimited possibilities to extend the product, either by creating additional adapters or selectors. We really like the policy management level in PingFederate. It's extremely helpful when we can specify customer journey per many different requirements like user location, application type etc. As well, both StepUp and TopDown authentication flows were implemented [easily].
Read full review
Rublon
The risk of interception or manipulation by hackers is reduced. It manages to be combined with other means of authentication, they allow the developer's software to be completed with the AMF software. The application tests the user's rights and links him to its services and data. The authentication of the interested party is one of the many keys to this process.
Read full review
Pros
1Kosmos
No answers on this topic
Ping Identity
  • Based on open standards, we can use as much or as little of the Ping suite as we like, depending on which other technologies we've already implemented.
  • Continuous innovation and product enhancements have ensured their products continue to meet our rapidly evolving needs.
  • Ping Identity has been an outstanding partner, starting with the RFP process and continuing to this day, years after the sale. They are focused on our success at every level of the company and are highly responsive to our needs, issues, and product suggestions.
Read full review
Rublon
  • It is recommended to introduce authentication software using a phased approach.
  • This authentication software can also be used via the risk-based authentication approach.
Read full review
Cons
1Kosmos
No answers on this topic
Ping Identity
  • Solutions are attractive to engineers but harder to sell to upper management.
  • Support was initially a challenge but has improved immensely.
Read full review
Rublon
  • This mechanism certainly allows to protect a work site, but it can be expensive from an application point of view.
  • It is unavoidable to precisely verify the user at the launch of the workstation and/or at the connection to its application using the measures of the security policy and also to show that the authentication procedure is correctly applied.
Read full review
Usability
1Kosmos
No answers on this topic
Ping Identity
As I mentioned earlier, efficiency and security are this software's bread and butter. The usability is very simple and straightforward, very user-friendly. As a result, it is efficient in a way that we can provide faster quality service to our merchants, and security in a way that our credentials will never leak since PingOne always values Personal Identifiable Information.
Read full review
Rublon
No answers on this topic
Support Rating
1Kosmos
No answers on this topic
Ping Identity
Ping's support is willing and attentive, but if I am in a position to engage them I am often at a point where most of the usual support engineers would not be in a position to answer the questions I have. However, Ping has been more than willing to engage their product and development teams with our organization as we take advanced deployment and use case challenges to them.
Read full review
Rublon
No answers on this topic
Alternatives Considered
1Kosmos
No answers on this topic
Ping Identity
This solution is selected before my time so, not much influence ,but product allow to customized and require decent ping skills to configure the solution. Okta and Other solutions are well suited in this category with some positive and some negative capabilities. it must say that Auth0 is the best option with Azure Identity to move ahead.
Read full review
Rublon
A user communications neighbor serves as an immediate access gate to all applications to which the appropriate permission has been provided. The end user will simply have to have a single effectively secure signal. we get the authentication required to be able to verify a user. This provides greater fixity, speed and also efficiency of the connection.
Read full review
Return on Investment
1Kosmos
No answers on this topic
Ping Identity
  • Decreased overall number of help desk calls for password reset.
  • Reduced time need for authentication; user[s] now have to authenticate once to be able to use more than 20 applications, instead of authenticating 20 times (per app).
Read full review
Rublon
  • Consequently, with an OTP system, the user has an expert forecaster who provides him with a password upon request.
  • This password is valid for a limited duration, and for a single use.
Read full review
ScreenShots

Rublon Screenshots

Screenshot of Rublon MFA for Windows Logon with Mobile Push