What is our primary use case?
Our employees, whether working on-site or remotely, use Thales Authenticators for two-factor authentication to log in to their laptops or PCs. This is our primary use case.
How has it helped my organization?
Two-factor authentication acts as a protective measure against cyber-attacks and unauthorized access. It ensures that even if someone knows a password, they must enter an OTP received on their mobile for access. This secures endpoints and data, something vital for every organization.
What is most valuable?
One valuable feature is Thales' ability to provide off-site tokens. These can be used without the internet, allowing authentication even when remote users face internet issues. This feature permits users to connect securely by verifying locally through the agent installed on the system.
What needs improvement?
Currently, the solution fulfills our requirements. We are very satisfied with its features, and do not have any specific ideas for improvement right now. Perhaps, in the future, three-factor authentication might become useful.
For how long have I used the solution?
We have been using Thales Authenticators for the past two years.
What do I think about the stability of the solution?
Thales Authenticators have been stable. From past two years of usage, we have not faced any major downtime.
What do I think about the scalability of the solution?
Scalability is rated as eight out of ten. The solution is flexible and can handle up to 150 to 200 users smoothly.
How are customer service and support?
Initially, we faced issues due to slow ticket responses, which improved over time. Their technical support has been satisfactory recently.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
We have always used Thales, starting from the initial deployment.
How was the initial setup?
The initial setup took almost a month to fully integrate and deploy across the organization. The process involved clients registering with the server, which took some time due to initial unfamiliarity with the product.
What about the implementation team?
We required two people for the deployment process. Ongoing maintenance involves a team of around three to four people who manage multiple tasks.
What was our ROI?
The return on investment is seen as we now feel our endpoints are secure. This reflects the original intention of securing our data and applications against unauthorized access.
What's my experience with pricing, setup cost, and licensing?
Thales Authenticators are considered very expensive, rated nine out of ten for pricing where ten is highest. However, despite the high costs, our management was satisfied with the product's offerings.
Which other solutions did I evaluate?
We evaluated other products but were not satisfied with their features and performance, hence the decision to choose Thales.
What other advice do I have?
From our past years of experience, the solution is very smooth, and we have had a good experience with it. We would definitely recommend Thales to others for its reliability and features.
I'd rate the solution seven out of ten.
Which deployment model are you using for this solution?
On-premises
*Disclosure: I am a real user, and this review is based on my own experience and opinions.