All Products
(1-25 of 243)
1
Cisco Duo
145 reviews
Cisco Duo is a two-factor authentication system (2FA), acquired by Cisco in October 2018. It provides single sign-on (SSO) and endpoint visibility, as well as access controls and policy controlled adaptive authentication.
2
Yubico YubiKeys
102 reviews
Yubico YubiKeys make the internet safer with phishing-resistant multi-factor authentication (MFA) by providing simple and secure access to computers, mobile devices, servers, and internet accounts. The Yubico YubiKey stops account takeovers at scale by mitigating phishing and ransomware…
3
HID DigitalPersona
112 reviews
HID DigitalPersona (formerly Crossmatch) provides a comprehensive multi-factor authentication solution. The vendor’s value proposition is that their solution frees users from cumbersome login activities while making it easy for an IT Team to secure access to their networks, data…
4
WatchGuard AuthPoint
219 reviews
AuthPoint Total Identity Security provides businesses with a solution to protect user accounts and credentials. Withmulti-factor authentication and dark web credentialmonitoring, AuthPoint mitigates the risks associated with workforce credentialattacks. AuthPoint adds an extra layer of security by monitoring forpotential credential exposure in the dark web for both personal and corpora…
5
Microsoft Entra ID
121 reviews
Microsoft Entra ID (formerly Microsoft Azure Active Directory or Azure AD) is a cloud-based identity and access management (IAM) solution supporting restricted access to applications with Azure Multi-Factor Authentication (MFA) built-in, single sign-on (SSO), B2B collaboration controls,…
6
Okta
152 reviews
Okta is an enterprise grade identity management service, built in the cloud. IT can manage access across any application, person or device. Whether the people are employees, partners or customers or whether the applications are in the cloud, on premises or on a mobile device, Okta…
7
CyberArk Workforce Identity
43 reviews
CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security, and credential management. Identity Management capabilities include lifec…
8
SafeNet Trusted Access
0 reviews
Thales's SafeNet Trusted Access is an access management and authentication service. It enables secure remote access to cloud services, on-prem apps, networks, and endpoints by allowing securing teams to implement a broad range of authentication methods for all users and apps.
9
LastPass for Business
147 reviews
LastPass is a password management application to simplify access to enterprise applications for users but also increase centrality and ease of management of access for administrators with task automation, convenient and secure password sharing, and other features.
10
Authlogics Multi-Factor Authentication
1 review
To help ysers simplify and securetheir login experience, Authlogics Multi-FactorAuthentication (MFA) is presented as a complete and eas…
11
Castle
0 reviews
Castle is a solution for protecting customers in web and mobile apps. The vendor says their simple developer-friendly APIs lets users send activity from web and mobile apps. Castle builds behavior models over what's normal for the user’s site and each user account. When there is…
12
Auth0
55 reviews
Auth0 is an identity management platform for developers and application teams. It gives users a platform to authenticate and authorize, providing secure access to applications, devices, and users. Auth0 aims to provide the simplicity, extensibility, and expertise to scale and protect…
13
CloudABIS by M2SYS
0 reviews
CloudABIS™ is a cloud-based biometric matching system. According to the vendor, CloudABIS™ removes the burden and cost associated with building and maintaining a reliable biometric identification system.
CloudABIS™ supports fingerprint, finger vein, face and iris recognition. Customers simply connect through our API or CloudApper™ software and instantly have the ability to perform fast 1:N matching. The software supports many fingerprint readers and device activation is seamless with our CloudScanr™ app. CloudScanr™ also ena…
14
Futurae Authentication Platform
0 reviews
Futurae’s customer authentication helps address:
«When users see the login to a customer platform as a hurdle?»
«Help-desk costs are getting out of hand due to complicated onboarding and login methods?»
«When existing authentication technology is inflexible and doe…
15
SecurID
21 reviews
SecurID, a company and solution suite from RSA, is an identity and access management suite supporting access management, authentication, and identity governance.
16
Keycloak
0 reviews
Keycloak is an open source Identity and Access Management solution aimed at modern applications and services.
17
Fourthline
0 reviews
Fourthline is a European-based provider of digital KYC (Know Your Customer). Boasting trust by banks, online broker…
18
Tecalis Authentication
0 reviews
Tecalis Authentication is a multi-factor authentication solution with advanced biometrics, designed to provide maximum security and frictionless access to products, services and systems.
19
Google Authenticator
46 reviews
Google Authenticator is a mobile authentication app.
20
Passbase
0 reviews
Passbase is a digital identity solution that enables teams to integrate a suite of identity verification tools into their product with a few lines of code and a no-code solution. Passbase helps companies securely verify users from over 190 countries without having to store user data with biometric authentication, liven…
21
PingOne from Ping Identity
8 reviews
The PingOne Cloud Platform from Ping Identity in Denver, Colorado is an identity management and access solution (IAM) for enterprises. Features of the products include single sign-on, multi-factor authentication, user management with directory, provisioning and deprovisioning.
The…
22
IBM Cloud App ID
17 reviews
IBM Cloud App ID helpsdevelopers who are not security experts to add authentication to theirapps, and protect their APIs and app back-ends running on IBM Cloud.
Developerscan add a variety of login-in types:
- Email or username and password
- Enterprise
- Social
App ID includes a cloud user repository to on-board newusers, so they can log-in with email/username & passwords, with pre-builtself-service workflows (password reset, email validation etc.) App ID alsomanages user specific data that developers can use to build personalized app…
23
Shufti Pro
0 reviews
Shufti Pro is an AI-powered identity verification solution that employs hybrid technology, artificial intelligence (AI) and human intelligence (HI) to provide accurate and robust identification solutions to eliminate risks, identity theft and financial crimes. Shufti Pro offers KYC, KYB and AML verification for organisation…
24
Rublon
1 review
Rublon enables workforces to securely access an organization's networks, servers and applications. With it, users can protect data via multi-factor authentication, and comply with data protection regulations like GDPR. The vendor says Rublon can be deployed organization-wide, enabling…
25
Daito Authenticator
0 reviews
Daito is a specialized TOTP 2FA authentication solution that helps manage 2FA & MFA for shared accounts.
It is a web-based solution tha…
Videos for Authentication Systems
Which One is More Secure - Authy or Google Authenticator?
03:32
Depending on the level of security you require, the best authentication system for you could look very different. While Authy is a very convenient option with many sign-in options and features - Google Authenticator provides a more stripped-down authenticator.
Learn More About Authentication Systems
What are Authentication Systems?
Authentication systems are security measures put in place to secure data and systems by requiring additional input beyond username and password for users to access a system. By providing this additional input, authentication systems help ensure that users are who they say they are. Authentication systems can require one other form of user input or more. These systems are sometimes called multiple-factor authentication, or MFA.
Using authentication improves data security and prevents potential breaches. When multi-factor authentication is required to access a system, the system is less vulnerable to security issues like weak passwords or attacks like phishing. Authentication systems are ideal for businesses with sensitive data or systems that require secure user accounts.
Authentication System Features & Capabilities
Authentication Systems have different ways of authenticating users, but they all share a few key features.
- Enable multiple-factor authentication
- Secure systems against password theft or data loss
- Offline authentication
- Secure single sign-on
- User management
Multi-Factor Authentication Solution Methods
Most modern authentication systems offer a wider range of authentication methods than passwords alone. The most common approach for advanced authentication, such as two-factor authentication or multi-factor authentication, is to pair a password with some sort of external verification. Other common authentication methods include:
- Challenge questions
- Unique identifying items, such as physical devices or external applications
- Biometric identifies, such as retina and fingerprint scans or facial recognition
- Location-based authentication
Authentication System Comparison
When comparing different authentication systems, consider these factors:
- Authentication methods: What authentication methods do each system offer? Some authentication products focus on password creation and management, while others provide external applications for MFA. Others offer physical devices, such as keycards or retinal scanners. Buyers should consider which authentication methods are most appropriate for their business.
- Active vs. passive authentication: Some vendors have been more proactive in adopting responsive authentication capabilities, such as behavioral analysis or location-based authentication. These capabilities provide additional visibility into possible security breaches and suspicious authentication attempts, allowing for more rapid and effective responses. However, smaller or more geographically-distributed organizations may not be able to make as effective use of these extended capabilities.
- End-user experience: Each authentication method bears a unique user experience and is more or less accessible than others. For instance, biometric authentication like fingerprints may not be viable or appropriate in certain environments. Other methods require end users to have personal devices, which may not be true for all users. Buyers should consider what the end user base will look like, and what implications that has on which methods to use.
Pricing Information
Pricing for authentication systems depends on the kind of authentication needed. App-based and SMS authentication services tend to be cheaper than biometric authentication or authentication that requires a physical passkey. Many authentication systems offer a free option for a small number of users. Beyond that, authentication systems can start as low as $1.00 per user per month. More fully-featured authentication systems can reach $10.00 per user per month or more.
- Authorization Systems
- Bot Mitigation Software
- Fraud Detection Software
- Identity Management Solutions
- Mobile Identity Software
- Network Access Control (NAC) Solutions
- Password Management System Software
- Privileged Access Management Solutions
- Single Sign-On Solutions
- Social Login Tools
- Web Access Management Software
- Zero Trust Security Solutions Software
- Internet Security Software
- Customer Identity and Access Management (CIAM) Solutions
- Identity Governance and Administration Tools and Solutions
- Chargeback Management Software
- Identity Verification Platforms
- Certificate Lifecycle Management Software
- Anti-Money Laundering (AML) Software
- Secret Managers
- Machine Identity Management Software
Frequently Asked Questions
- What is two-factor authentication?
- How is authentication done in computers?
- What is the difference between two-factor authentication and multi-factor authentication?
- What are the three types of authentication?
- How much does authentication software cost?
What is two-factor authentication?
Two-factor authentication uses more than one authentication test, usually a password paired with another authentication method.
How is authentication done in computers?
Traditionally, digital authentication was via a password. In recent decades, multi-factor authentication has added other checks, such as key cards or one-time passwords from external devices, for additional security.
What is the difference between two-factor authentication and multi-factor authentication?
Two-factor authentication only uses 2 authentication checks, usually a password and another method. MFA uses 2 or more authentication methods, with each additional method designed to increase security.
What are the three types of authentication?
The three types of authentication are something that you know (a password, or challenge questions), something you have (like a key card, device, or external application), and something that you are (such as retina scans, fingerprints, or other biometric information).
How much does authentication software cost?
Costs vary depending on the scale and types of authentication being purchased. They can start as low as $1/user/month, up to $10/user/month, or more if authentication hardware like retinal scanners are required as well.