Elevate your security posture in accessing applications
March 24, 2022

Elevate your security posture in accessing applications

Raphael Soares | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Symantec VIP

Today we have several applications that are accessed on the internet, which we cannot accept that a simple exposure of a user password allows undue access to one or more of these applications. So to raise the level of protection to access performed by users, we use VIP as a two-factor authentication solution.
  • Push authentication request.
  • Credential wallet.
  • Cloning protection.
  • The API is no easy to use.
  • The push functionality not always is quickly to alert in mobile.
  • The migration feature is so hard to execute.
  • Credential Wallet.
  • Cloning Protection.
  • Push request authentication.
  • Elevation of the security posture of 100% of corporate users in the authentication process.
  • Resistance from some users with the greatest complexity in the access process.
  • 100% confidence that the access was actually performed by the authorized person.
The Symantec VIP solution has a more easy implementation process, which makes implementation faster.
The Prove Of Concept of the solution presents the best results compared with Duo.
The final price charged was cheaper.
Consultants that participate in the process get show to us in a more clear manner all scenarios where we can use the Symantec VIP.

Do you think Symantec VIP delivers good value for the price?

Yes

Are you happy with Symantec VIP's feature set?

Yes

Did Symantec VIP live up to sales and marketing promises?

Yes

Did implementation of Symantec VIP go as expected?

Yes

Would you buy Symantec VIP again?

Yes

Well Suited for
- Implement Multi-Factor Authentication to Enterprise Applications.
- Give the contributor a tool to protect their personal application accounts in the same app.

Less appropriate for
- Protect the desktop login process.
- Integrate with Virtual Private Network systems to protect the remote access to systems and servers inside the company.