Tech lead at a financial services firm with 10,001+ employees
Real User
Top 20
Feb 16, 2026
My main use case for Transmit Security is access management and identity journey coordination. A specific example of how I use Transmit Security for access management and identity journey coordination is that I can use it to log in end users. I appreciate the biometrics login, the security questions, the one-time password, and the FIDO underpinning the authentication. My team and I also use it to call other APIs. It has a very useful REST client interface.
My main use case for Transmit Security involves user application workflows. I use Transmit Security for user application workflows by developing the login for the app for users. One of the biggest challenges I face using Transmit Security for login is that sometimes I need to use the SDK provided with the front end because I have to work closely with the front end team. I do not have anything else to add about my main use case with Transmit Security, and I do not have something unique about how my organization uses it.
Lead IT Specialist at a tech services company with 201-500 employees
Real User
Mar 25, 2024
We use Transmit products in our data center and have been an ELA customer. It offer IAM products for the industry. Technically, their products are very good – especially in terms of customization and security – compared to solutions like SharePoint and Omada. However, as an end customer, pricing is a concern.
Transmit Security's cloud-based platform provides comprehensive Customer Identity and Access Management (CIAM) services, streamlining identity and access solutions with innovative functionalities.Transmit Security delivers a robust suite of CIAM services, focusing on identity orchestration for automated access control, detection and response for risk management, and identity management with features like single sign-on and verifications. Offering authentication services including multi-factor...
My main use case for Transmit Security is access management and identity journey coordination. A specific example of how I use Transmit Security for access management and identity journey coordination is that I can use it to log in end users. I appreciate the biometrics login, the security questions, the one-time password, and the FIDO underpinning the authentication. My team and I also use it to call other APIs. It has a very useful REST client interface.
My main use case for Transmit Security involves user application workflows. I use Transmit Security for user application workflows by developing the login for the app for users. One of the biggest challenges I face using Transmit Security for login is that sometimes I need to use the SDK provided with the front end because I have to work closely with the front end team. I do not have anything else to add about my main use case with Transmit Security, and I do not have something unique about how my organization uses it.
We use Transmit products in our data center and have been an ELA customer. It offer IAM products for the industry. Technically, their products are very good – especially in terms of customization and security – compared to solutions like SharePoint and Omada. However, as an end customer, pricing is a concern.