The best purchase you can make.
August 10, 2022

The best purchase you can make.

Victor Gonzalez | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with WatchGuard AuthPoint

We use WatchGuard AuthPoint in many areas in our organization. From authenticating ourselves as an administrator of our Firebox, Accessing our computers with Logon, authenticating our VPNs and the AuthPoint application on our phones as a token manager. This technology has allowed us to mitigate risks such as: reused passwords, unauthorized access to resources, shared passwords between users.
  • Managing tokens.
  • Logon.
  • To create good habits with the use of credentials.
  • Mitigating the risk of our credentials being compromised.
  • Easier API integration.
  • Logon for Linux.
  • More profiles.
  • Protect the reputation of our organization and therefore the prestige by attracting new clients.
  • Guarantees access to financial resources only authorized personnel.
  • It is not necessary to use other technologies and therefore spend money.
AuthPoint has a simpler and more intuitive configuration, added to the cloud administration that it provides us, without a doubt it is a point in its favor.
The simplicity of AuthPoint has allowed our organization and clients to focus on growing our business.
Our users love AuthPoint, compared to other authentication services, the simplicity provided by AuthPoint is unmatched. From push notifications that allow you to quickly accept access, without having to open the application, to the possibility of adding third-party tokens.
This took a lot of responsibility off our users, as they don't have to change passwords in a certain period of time.

Do you think WatchGuard AuthPoint delivers good value for the price?

Yes

Are you happy with WatchGuard AuthPoint's feature set?

Yes

Did WatchGuard AuthPoint live up to sales and marketing promises?

Yes

Did implementation of WatchGuard AuthPoint go as expected?

Yes

Would you buy WatchGuard AuthPoint again?

Yes

AuthPoint is appropriate for companies concerned about the security of their information, since it allows us to deliver resources to the user for whom it is intended. If we talk about suitable scenarios, AuthPoint is recommended for any type of company. It is less appropriate work environments where user schemes are not defined, or there are no specific policies on team management, for example teams where there is only one user per computer, with users doing totally different functions, it should be noted that integration with Other Firewalls limits sales of this product as potential customers prefer to stick with their captive portal authentication solution provided by their current firewall.