Authentify and UserLock compete in the user authentication and security solutions category. UserLock appears to have the upper hand due to its advanced security features as highlighted by user reviews.
What features are offered by Authentify in comparison to UserLock?Authentify offers integration capabilities, flexibility, and ease of deployment. UserLock provides robust security features, detailed auditing capabilities, and advanced security options.
What areas of improvement can be found in Authentify in comparison to UserLock?Authentify users seek better customization options, enhanced user guides, and improved technical support. UserLock users desire a more intuitive experience, quicker technical support response times, and enhanced ease of use.
How is the ease of deployment and customer service of Authentify in comparison to UserLock?Authentify is praised for its straightforward and quick deployment process, with strong customer service backing. UserLock, while more complex to deploy, is supported by comprehensive documentation.
What setup costs and ROI can be seen with Authentify in comparison to UserLock?Authentify users find the setup cost reasonable and the ROI satisfactory due to its efficiency. UserLock, though higher in cost, is deemed worth the investment for its advanced features by its users.
Two Factor Authentication & Access Management for Windows Active Directory.
UserLock helps administrators to manage and secure access for every user, without obstructing employees or frustrating IT.
Two Factor Authentication on Windows logon, RDP, IIS and VPN connections. UserLock supports 2FA using authenticator applications which include Google Authenticator, Microsoft Authenticator and LastPass Authenticator, or programmable hardware tokens such as YubiKey and Token2.
Single Sign-On: Secure and frictionless access to Microsoft 365 and other Cloud Applications, using on-premise Active Directory credentials.
Access Restrictions: Using the contextual information around a user’s logon, UserLock will authorize, deny or limit how a user can access the network, once authenticated.
Access Monitoring: Track and alert on all users’ logon and logoff activity in real-time. Interact remotely with any session and respond to login behavior.
Access Auditing: Record and report on all user connection events to provide a central audit across the whole network.
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.