- Authentication Manager as hardware hardened appliance
- Secure creation of the token/FOB in RSA's secure manufacturing unit
- Securing the hardware/Software FOB
- Secure transportation of FOBs & Token Seeds.
Senior Security Architect at a financial services firm with 10,001+ employees
Almost Plug n' Play. Price needs to be improved.
What is most valuable?
How has it helped my organization?
It has increased the level authentication.
What needs improvement?
The price needs to be improved.
For how long have I used the solution?
I've used it for two years -
RSA Authentication Manager & SecurID
Buyer's Guide
Authentication Systems
November 2024
Find out what your peers are saying about RSA, Cisco, Thales Cloud Security and others in Authentication Systems. Updated: November 2024.
816,660 professionals have used our research since 2012.
What was my experience with deployment of the solution?
RSA Authentication Manager Appliance is almost like Plug 'n' Play. So it's an excellent experience.
What do I think about the stability of the solution?
Not even with the software deployment. I found it a robust server.
What do I think about the scalability of the solution?
No concerns from the product on the scalability.
How are customer service and support?
Customer Service:
RSA's customer service is very good.
Technical Support:RSA's technical support is very good.
Which solution did I use previously and why did I switch?
In some cases other solution where the cost is a driving factor.
How was the initial setup?
It's straightforward. Appliance is almost like plug & Play.
What about the implementation team?
We did self implementation.
What was our ROI?
Security is always like insurance. It ensures against future threats, so it's tough to estimate the ROI, until unless some one broke the system without two-factor authentication in the past.
Which other solutions did I evaluate?
Yes. There are other products, but can not provide as per NDA.
What other advice do I have?
If cost is not a big concern, go ahead.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Cyber Security - Identity & Access Management at a tech services company with 10,001+ employees
A stable solution that is not user-friendly
Pros and Cons
- "It is a good solution for token identification."
- "We found technical support was not very responsive to our requests for assistance."
What is our primary use case?
We primarily use this for token identification.
What needs improvement?
I think this solution could be more user-friendly.
What do I think about the stability of the solution?
It is stable.
What do I think about the scalability of the solution?
It is scalable. We have about 100K users.
How is customer service and technical support?
We found technical support was not very responsive to our requests for assistance.
How was the initial setup?
The setup was complex, and there were complex folders that were not easy to install. We used a consultant to help us implement the solution.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Authentication Systems
November 2024
Find out what your peers are saying about RSA, Cisco, Thales Cloud Security and others in Authentication Systems. Updated: November 2024.
816,660 professionals have used our research since 2012.
Sr. Security Engineer at a tech services company with 10,001+ employees
The two-factor authentication is a trusted part of the solution.
Pros and Cons
- "The most valuable feature is the provision part. The mapping and the logging is also very good. In addition, the troubleshooting, from a console point of view, is easy for administration and on the provisioning and logging part."
- "We have encountered issue when trying to expand this particular solution for a large set of users across the country."
What is our primary use case?
We use this solution for authentication needs.
How has it helped my organization?
The advantage to this solution is the two-factor authentication. It is a very trusted part of the solution. It provides benefits usch as secure application access in terms of remote VPN, application security, and WiFi security.
What is most valuable?
The most valuable feature is the provision part. The mapping and the logging is also very good. In addition, the troubleshooting (from a console point of view) is easy for administration and on the provisioning and logging part.
What needs improvement?
We have users throughout the world, and this current solution is causing us a lot of manual effort, and lots of back-end inventory management. We want to avoid all of these things. So, that is the overall learning solution we are looking for. In addition, the features of RSA are lagging. In terms of the cloud, and of appliation, they are providing application security on-boarding with the two-factor authentication for RSA. We are seeing a lot of difficult issues in terms of RSA, especially the cloud-based two-factor authentication process. We find issues with the application of the Android, i-Pad or other Apple products two-factor authentication solutions. There are significant issues with MobilePASS authentication.
For how long have I used the solution?
More than five years.
What do I think about the scalability of the solution?
We have encountered issue when trying to expand this particular solution for a large set of users across the country.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Owner at a tech services company
Easy setup, deployment, and integration including for virtual infrastructures
Pros and Cons
- "Easy setup, deployment, and integration in different infrastructures, including virtual ones."
- "Perhaps parts of the the user interface should become more intuitive."
What is most valuable?
Easy setup, deployment, and integration in different infrastructures, including virtual ones.
How has it helped my organization?
2FA with hardware tokens for VMware VDIs.
What needs improvement?
Perhaps parts of the the user interface should become more intuitive.
For how long have I used the solution?
About a year.
What do I think about the stability of the solution?
No.
What do I think about the scalability of the solution?
No.
Which solution did I use previously and why did I switch?
I haven't used another solution previously and I am not familiar with another vendor for 2FA.
How was the initial setup?
Yes, it was quiet straightforward after carefully reading and following the setup manual and documentation.
What's my experience with pricing, setup cost, and licensing?
I have no idea, I wasn't responsible for licensing.
Which other solutions did I evaluate?
No, we decided to use RSA because of the easy integration with VMware infra.
What other advice do I have?
I would recommend it, very good product for implementing 2FA.
Disclosure: My company has a business relationship with this vendor other than being a customer: Business partner.
Buyer's Guide
Download our free Authentication Systems Report and find out what your peers are saying about RSA, Cisco, Thales Cloud Security, and more!
Updated: November 2024
Product Categories
Authentication SystemsPopular Comparisons
Microsoft Entra ID
Fortinet FortiAuthenticator
Yubico YubiKey
Fortinet FortiToken
RSA SecurID
Symantec VIP Access Manager
Thales Authenticators
Entrust Identity Enterprise
DigiCert PKI Platform
OneSpan DIGIPASS
RSA Adaptive Authentication
SecurEnvoy SecurAccess
Buyer's Guide
Download our free Authentication Systems Report and find out what your peers are saying about RSA, Cisco, Thales Cloud Security, and more!
Quick Links
Learn More: Questions:
- When evaluating Authentication Systems, what aspect do you think is the most important to look for?
- Why is Authentication Systems important for companies?
- Which front-end product for authorization and authentication into an Apache Web Server application, PIXIA, would you recommend?
- What is the difference between SPML and SAML?
- How would you compare Cisco Duo Security with other Authentication Systems products?
- What is CAPTCHA and how does it work? How can you use it for Artificial Intelligence (AI)?
- What are some alternatives for UserLock?