Try our new research platform with insights from 80,000+ expert users

Authentify vs RSA Adaptive Authentication comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Authentify
Ranking in Authentication Systems
31st
Average Rating
8.0
Number of Reviews
2
Ranking in other categories
No ranking in other categories
RSA Adaptive Authentication
Ranking in Authentication Systems
24th
Average Rating
6.8
Number of Reviews
6
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2026, in the Authentication Systems category, the mindshare of Authentify is 1.1%, up from 0.1% compared to the previous year. The mindshare of RSA Adaptive Authentication is 1.6%, up from 0.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems Mindshare Distribution
ProductMindshare (%)
RSA Adaptive Authentication1.6%
Authentify1.1%
Other97.3%
Authentication Systems
 

Featured Reviews

DS
Owner at David Strom Inc.
A new way to perform multifactor authentication using specialized SaaS software
Avoids man in the middle or man in the browser exploits that other two factor products are susceptible to One month I got a few error messages which turned out to be themselves errors. I have been using SecurID tokens and wanted something that didn't require hardware authentication devices.…
Directorc4e7 - PeerSpot reviewer
Director of Cyber Security at a financial services firm with 1,001-5,000 employees
We need better ease of use; the product is overly complicated
There are many use cases that we have defined based on our business needs Ingestion of logs and raising alert space on those logs are the most valuable features. The product is basically unusable. We need better ease of use; it's overly complicated. It has taken years to implement. We used RSA…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Avoids man in the middle or man in the browser exploits that other two factor products are susceptible to."
"One of the most valuable features is the fraud detection capability with minimal friction in the customer experience."
"Ingestion of logs and raising alert space on those logs are the most valuable features."
"The most valuable feature is the stock tokens. That works the best for us."
"The most valuable feature is the stock tokens, which work the best for us."
"Our customer are seeing value from the product, as they experience cost reductions."
"The capability to manage your business policy related to security when required without vendor involvement."
"Risk Engine’s risk score, eFN, GeoIP, and device binding all coming together in the Policy Rules to decide when to escalate to MFA."
"It has reduced false positives greatly in our fraud detection ability."
 

Cons

"I got a few error messages which turned out to be themselves errors."
"Better filters when searching for events. The current features for current filters when searching fraud events are not very comprehensive. You can only filter by certain fields in the transaction."
"It has taken years to implement."
"Better filters when searching for events. The current features for current filters when searching fraud events are not very comprehensive."
"Reporting modules is one of the major areas that can be improved further."
"I would like to see a more adaptive type of solution, something that we could use on our web pages..."
"Reporting modules is one of the major areas that can be improved further."
"It's an okay solution. It's just old technology and it's time to move on."
"I think I would like to see them use more of our data, and give us more ability to control or configure how the protection patterns work for a specific business, and also provide more transparency into the methodology."
 

Pricing and Cost Advice

Information not available
"Customers need to deploy the solution in a very expensive infrastructure. RSA should should think about a less expensive infrastructure for customers because the solution costs around $100,000, and the infrastructure needed to support that solution may be even more expensive than that price."
"Keep the proxy service layer on premises. That consumes SaaS security services on the back-end."
"The pricing is $50 per head, yearly."
"You may need to opt for second best if funding is low and the number of users is huge. However, the pricing is able to be negotiated if your user figures are huge."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
885,264 professionals have used our research since 2012.
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Midsize Enterprise1
Large Enterprise6
 

Also Known As

xFA
No data available
 

Overview

 

Sample Customers

Midwestern Bank
ADP, Ameritas, Partners Healthcare
Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems. Updated: March 2026.
885,264 professionals have used our research since 2012.