Skip to main content
TrustRadius
Rublon

Rublon

Overview

What is Rublon?

Rublon enables workforces to securely access an organization's networks, servers and applications. With it, users can protect data via multi-factor authentication, and comply with data protection regulations like GDPR. The vendor says Rublon can be deployed organization-wide, enabling MFA for…

Read more
Recent Reviews

TrustRadius Insights

Helpful User Guide: Several users have found Rublon's user guide with pictures very helpful in making the setup process easy. They …
Continue reading
Read all reviews
Return to navigation

Pricing

View all pricing

Free

$0

Cloud
up to 1 user

Business

$1

Cloud
per user

Entry-level set up fee?

  • Setup fee optional
    Optional
For the latest information on pricing, visithttps://rublon.com/pricing

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Product Details

What is Rublon?

Rublon enables workforces to securely access an organization's networks, servers and applications. With it, users can protect data via multi-factor authentication, and comply with data protection regulations like GDPR. The vendor says Rublon can be deployed organization-wide, enabling MFA for all cloud apps, VPNs, servers, workstations, internal as well as on-premise apps.

Rublon Features

  • Supported: MFA for Windows, Remote Desktop, VPN, SSH, Linux, Cloud, SAML, RADIUS and others via SDK/API
  • Supported: Automatic User Enrollment
  • Supported: Access Policies
  • Supported: Use Active Directory and OpenLDAP as Identity Providers
  • Supported: Multiple Authentication Methods (Software & Hardware)
  • Supported: Use WebAuthn/U2F Security Keys as Hardware Tokens
  • Supported: Rublon Authenticator Mobile App with Mobile Push
  • Supported: SSO Portal for SAML Apps

Rublon Screenshots

Screenshot of Rublon MFA for Windows Logon with Mobile Push

Rublon Video

Rublon for Cisco AnyConnect (VPN) with Mobile Push

Rublon Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationApple iOS, Android
Supported CountriesGlobal
Supported LanguagesEnglish

Rublon Customer Size Distribution

Consumers0%
Small Businesses (1-50 employees)30%
Mid-Size Companies (51-500 employees)50%
Enterprises (more than 500 employees)20%
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(1)

Reviews

(1-1 of 1)
Companies can't remove reviews or game the system. Here's why
August 03, 2022

About Rublon

Nina Ritchie | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use this authentication software to validate the identity when you log in to various pages or programs on the network. It can be used on computers or mobile devices. Additionally, you may receive a push notification before you are allowed to log in. Push notifications allow user authentication by sending a temporary message.
  • It is recommended to introduce authentication software using a phased approach.
  • This authentication software can also be used via the risk-based authentication approach.
  • This mechanism certainly allows to protect a work site, but it can be expensive from an application point of view.
  • It is unavoidable to precisely verify the user at the launch of the workstation and/or at the connection to its application using the measures of the security policy and also to show that the authentication procedure is correctly applied.
The risk of interception or manipulation by hackers is reduced. It manages to be combined with other means of authentication, they allow the developer's software to be completed with the AMF software. The application tests the user's rights and links him to its services and data. The authentication of the interested party is one of the many keys to this process.
  • Each of the authentication methods has its own characteristics.
  • Useful for managing a newcomer to work so that they have access only to what is necessary from the different elements.
  • Consequently, with an OTP system, the user has an expert forecaster who provides him with a password upon request.
  • This password is valid for a limited duration, and for a single use.
A user communications neighbor serves as an immediate access gate to all applications to which the appropriate permission has been provided. The end user will simply have to have a single effectively secure signal. we get the authentication required to be able to verify a user. This provides greater fixity, speed and also efficiency of the connection.
Return to navigation