We paid 100 bucks for one Yubikey.
We paid 100 bucks for one Yubikey.
The RSA SecurID Suite combines the separate disciplines of access management and authentication with identity governance and user lifecycle management into one comprehensive suite. It goes way beyond the capabilities of traditional identity and access management systems by using risk analytics to provide identity and access assurance. This helps organizations solve two fundamental challenges:
I think the price of this solution is reasonable compared to YubiKey and Duo given that it offers the same similar features.
RSA SecurID Access is expensive.
I think the price of this solution is reasonable compared to YubiKey and Duo given that it offers the same similar features.
RSA SecurID Access is expensive.
Silverfort is a unified identity protection platform that helps organizations protect their networks and cloud environments from identity-based attacks. The platform uses agentless and proxyless technology to continuously monitor all access of users and service accounts across both cloud and on-premise environments, analyze risk in real time using an AI-based engine, and enforce adaptive authentication and access policies.
Amazon Cognito is a simple user identity and data synchronization service that helps you securely manage and synchronize app data for your users across their mobile devices. You can create unique identities for your users through a number of public login providers (Amazon, Facebook, and Google) and also support unauthenticated guests. You can save app data locally on users’ devices allowing your applications to work even when the devices are offline. With Amazon Cognito, you can save any kind of data in the AWS Cloud, such as app preferences or game state, without writing any backend code or managing any infrastructure. This means you can focus on creating great app experiences instead of having to worry about building and managing a backend solution to handle identity management, network state, storage, and sync.
The pricing of this solution is good compared to other solutions on the market.
The pricing is bad so I rate it a two out of ten.
The pricing of this solution is good compared to other solutions on the market.
The pricing is bad so I rate it a two out of ten.
Symantec VIP Access Manager is the next generation control platform that integrates Single Sign-On (SSO) with strong authentication, access control, and user management. It offers users and administrators control, convenience, and compliance for public and private cloud- based applications. Symantec VIP Access Manager solves cloud security problems using identity and/or context-based access control across multiple cloud applications. In the cloud, where a traditional enterprise perimeter doesn't exist, this solution fills the gap. Through Symantec VIP Access Manager, administrators can define policies that utilize the built-in user directory or existing identity management infrastructure to enforce security and compliance for applications without getting in the way of productivity. Symantec VIP Access Manager can also protect and consolidate access management for on-premise web applications. It also simplifies compliance auditing for cloud applications by consolidating logs across all applications it protects.
Licensing and pricing seems very fair.
There is a one-time setup fee plus the licenses are provided as per the number of users. For SMS and voice calls, the costs are separate.
Licensing and pricing seems very fair.
There is a one-time setup fee plus the licenses are provided as per the number of users. For SMS and voice calls, the costs are separate.
UserLock provides advanced Identity & Access Management (IAM) using Microsoft Active Directory, protecting hybrid and remote environments.
You will be hard-pressed to find better pricing.
You will be hard-pressed to find better pricing.
Clerk.com automates customer support tasks like ticket management and live chat, integrating seamlessly with other tools. Users appreciate its efficiency, customizable workflows, detailed analytics, and intuitive dashboard. However, they report issues with slow loading times, complicated setup, unresponsive customer support, and a confusing pricing structure, causing frustration.
If you are working on a personal project, there is a free tier version for up to a few thousand users.
If you are working on a personal project, there is a free tier version for up to a few thousand users.
Can be expensive as a solution.
The price is really good and it is flexible because they have CPU licenses. The license is a one-time-only purchase.
Can be expensive as a solution.
The price is really good and it is flexible because they have CPU licenses. The license is a one-time-only purchase.
Transmit Security's cloud-based platform streamlines Customer Identity and Access Management with comprehensive services, enhancing user identity and access operations for businesses globally.
CA Advanced Authentication provides a secure, user-convenient and cost-effective way to protect online and mobile applications. The solution consists of two components: CA Risk Authentication allows the enterprise to silently and transparently collect data and assess risk based on device identification, location and user behavior, among other factors, and CA Strong Authentication provides a wide variety of software-based, two-factor authentication credentials and technology to make passwords more secure. Together they enable an intelligent, layered security approach to protect user identities and organizational data.
The price is reasonable.
The price is reasonable.
Secret Double Octopus (SDO) is the most widely deployed workforce Passwordless MFA solution today. It offers the most non-disruptive and comprehensive way for enterprises to gain the benefits of truly secure authentication.
Security Monitoring, Blocking, and Fraud Protections
Akamai Identity Cloud continuously monitors our production environments for the state and health of the Akamai Identity Cloud platform. We gather detailed key performance indicator (KPI) metrics on uptime and availability for every service. Abnormalities trigger alerts to the Network Operations Command Center (NOCC) staff, on-call 24/7/365.
We provide robust authentication and authorisation services across web and mobile. Our Access: One platform protects high value data, equity and IP across critical industries. We partner with some of the world’s largest organisations to protect their services globally.
Descope serves as a comprehensive solution for seamless user authentication and management, transforming how businesses handle user access. It shines in simplifying user sign-ups, logins, and multi-factor authentication, significantly enhancing security. Widely used to integrate into applications for managing user sessions and access controls, Descope also excels in monitoring and reporting user activities, giving businesses critical insights into user behavior and application security.
Key features that set Descope apart include advanced authentication options such as biometric support and passwordless logins, praised for their security and user-friendliness. Its integration capabilities across various platforms add flexibility and ease of use. An intuitive dashboard offers valuable insights, making user management straightforward, while an API-first approach allows developers to customize and extend functionalities effortlessly.
Organizations leveraging Descope report increased efficiency, streamlined processes, enhanced collaboration, valuable insights, better data management, and significant cost savings, collectively driving operational improvements and achieving organizational goals more effectively.