AuthPoint is on Point
June 12, 2021

AuthPoint is on Point

Eddie Naoum | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with WatchGuard AuthPoint

It is being used by the organization for all remote workers to authenticate for various application including VPN. It is used for more than 10 applications by users and more by the Information Technology Team. It addresses our security concerns especially since we work with private health information and sensitive data.
  • Super fast.
  • Ease of use.
  • Easy to set up.
  • Push notifications are nice.
  • The user interface.
  • The loading screen.
  • Third party logos for 3rd party tokens.
  • Addressed security concerns.
  • Provided an ease of use so security doesn't get in the way of productivity.
WatchGuard AuthPoint is up there with the best of them like Duo.
Since we use WG Fireboxes we decided to go with AuthPoint.
Being able to manage from the cloud is really good. Anytime we had an issue, it was fixed from anywhere.
AuthPoint is simple and gave us more control over the users and our environment.
The users have been loving using AuthPoint app for all their 2FA use cases. There has been not many issues reported or things AuthPoint can't do.
For the Information Tech Department, it is a dream to receive less calls from users and WG AuthPoint has made it very simple for users to access applications and manage their credentials. Users felt more secure and they still appreciated the ease of use...

Do you think WatchGuard AuthPoint delivers good value for the price?

Yes

Are you happy with WatchGuard AuthPoint's feature set?

Yes

Did WatchGuard AuthPoint live up to sales and marketing promises?

Yes

Did implementation of WatchGuard AuthPoint go as expected?

Yes

Would you buy WatchGuard AuthPoint again?

Yes

I think WatchGuard AuthPoint is well suited for all applications that require Multi Factor Authentication. It very user friendly and easy to use.
Scenarios are really all applications that contain sensitive information or apps that have access to secure resources that might be compromised with only one factor sign ins.

Scenarios where it is less needed is applications that are don't contain any valuable data. That will just add more tokens and will make it hard to find...