Simple Execution for Impactful Network Protection
October 13, 2021

Simple Execution for Impactful Network Protection

Alec Chin Lee | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with WatchGuard AuthPoint

We use Authpoint as a 2-factor authentication for user access to their PCs. Users log into Windows and then are prompted on their smartphone with the push notification or the other options. This gives us a little peace of mind as we do not have to trust in passwords as the only line of defense for authentication to our network.
  • Easy to set up.
  • Quick notification on a smart phone.
  • Backup methods if network is not functional.
  • Would like support for the WatchGuard mobile VPN.
  • Group program for admin credentials.
  • We are a partner so the price for us is very good.
  • The centralized management saves a lot of set up time and management.
  • Compared to Google Authenticator, we get value from the management.
Much better suited for businesses with much better management.
We have definitely benefitted by improving our security with AuthPoint. The simple cloud-based management was an easy decision over competitors like Google Authenticator. We have set it up once and haven't had to do anything since. It just works.
Yes, the push notification method definitely benefits users with its simplicity. Even when there is not network access, the QR code scan is very easy to use. With happy users, it makes security compliance easier for the admins.
We currently only use AuthPoint for Windows access but will be implementing for other applications soon.

Do you think WatchGuard AuthPoint delivers good value for the price?

Not sure

Are you happy with WatchGuard AuthPoint's feature set?

Yes

Did WatchGuard AuthPoint live up to sales and marketing promises?

Yes

Did implementation of WatchGuard AuthPoint go as expected?

Yes

Would you buy WatchGuard AuthPoint again?

Yes

I think it is very good for use with any size company since authentication is the biggest security threat in a network. Adding more factors improves security significantly.