WatchGuard AuthPoint - Best in class MFA for your needs....and you need it!
August 31, 2022

WatchGuard AuthPoint - Best in class MFA for your needs....and you need it!

Andrea Manzi | TrustRadius Reviewer
Score 10 out of 10
Vetted Review

Overall Satisfaction with WatchGuard AuthPoint

  • Easy to implement
  • Large third-party services and applications integration
  • OTP when Push can't work
  • Powerful but cost-effective
  • To many steps to get to Watchguard Cloud
  • Ensure that only allowed users can VPN
  • Prevent unathorized Windows log in to crucial VM's
As a cloud service, I
can enter into any of my customer's environments from anywhere, leveraging the MFA feature even to access the WatchGuard portal.
Sometimes users are reluctant
to allow their personal smartphone and not any company provides a smartphone to
employees.

Do you think WatchGuard AuthPoint delivers good value for the price?

Yes

Are you happy with WatchGuard AuthPoint's feature set?

Yes

Did WatchGuard AuthPoint live up to sales and marketing promises?

Yes

Did implementation of WatchGuard AuthPoint go as expected?

Yes

Would you buy WatchGuard AuthPoint again?

Yes

The main purpose to implement the MFA for my customers was to provide an easy-to-implement, flexible and cost-effective solution to ensure that only allowed users can remotely access the LAN.
The pandemic showed any Company that allowing employees to work remotely is a great resource for both.
For IT managers is crucial that the large use of VPNs is not to become an open door for anyone who just stole credentials. With the latest firmware on the recent firewalls, the implementation became even easier
since a RADIUS Client Resource in AuthPoint is not necessary anymore. The associated Mobile
App runs either on Android or iOS. Another interesting use case is to prevent unauthorized users from login into crucial Windows Server implementing the Logon app. We, administrators, are very careful in keeping secret an administrator account password but, for different reasons, it can be breached. After entering such a password an automatic request for approval reaches the AuthPoint App on your smartphone so, if it is not you, not only the intruder can’t log in, but you
know that such credentials had been breached and you must immediately change the password and investigate back.
My advice, go for it!