User reviews highlight that UserLock offers strong access management, detailed reporting capabilities, and reliable security policies. Users of RSA Adaptive Authentication mention its comprehensive risk analysis, adaptive learning, and advanced fraud detection features.
What areas of improvement can be found in UserLock in comparison to RSA Adaptive Authentication?Users note that UserLock could improve its scalability, integration options, and user interface. RSA Adaptive Authentication receives feedback regarding its complexity, the steep learning curve for administrators, and the need for better documentation.
How is the ease of deployment and customer service of UserLock in comparison to RSA Adaptive Authentication?User reviews reveal that UserLock is straightforward to deploy and offers responsive customer service. RSA Adaptive Authentication has a more complex deployment process but provides robust support once implemented.
What setup costs and ROI can be seen with UserLock in comparison to RSA Adaptive Authentication?UserLock is reported to have a lower setup cost and delivers quick ROI according to user reviews. RSA Adaptive Authentication, with its higher initial investment, provides considerable ROI through its advanced features and enhanced security.
Two Factor Authentication & Access Management for Windows Active Directory.
UserLock helps administrators to manage and secure access for every user, without obstructing employees or frustrating IT.
Two Factor Authentication on Windows logon, RDP, IIS and VPN connections. UserLock supports 2FA using authenticator applications which include Google Authenticator, Microsoft Authenticator and LastPass Authenticator, or programmable hardware tokens such as YubiKey and Token2.
Single Sign-On: Secure and frictionless access to Microsoft 365 and other Cloud Applications, using on-premise Active Directory credentials.
Access Restrictions: Using the contextual information around a user’s logon, UserLock will authorize, deny or limit how a user can access the network, once authenticated.
Access Monitoring: Track and alert on all users’ logon and logoff activity in real-time. Interact remotely with any session and respond to login behavior.
Access Auditing: Record and report on all user connection events to provide a central audit across the whole network.
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.