- Encryption
- Random key generation and making it available for the user on the fly without any knowledge of the user regarding the keys.
Senior Consultant with 51-200 employees
Deployment is smooth if the prerequisites are met but log-in and log-out need improvement
What is most valuable?
How has it helped my organization?
Basically this works best and comes very handy where there is a large number of keys required on a scheduled (Hourly, Daily, Weekly or Monthly etc) basis.
What needs improvement?
Log-in with the credentials and log-out. After logging out, if the back button of the browser is clicked then it was taking users into the platform without asking for any credentials. Sometimes the URL needs to be altered for log-in.
For how long have I used the solution?
I have used this solution for almost two years. This is not as an end user but as a Consultant and worked in implementing and migrating the products various versions.
Buyer's Guide
Authentication Systems
December 2024
Find out what your peers are saying about RSA, Yubico, Microsoft and others in Authentication Systems. Updated: December 2024.
824,067 professionals have used our research since 2012.
What was my experience with deployment of the solution?
Deployment is smooth if the prerequisites are met completely. Please check the version compatibility.
What do I think about the stability of the solution?
It was really stable during my use.
What do I think about the scalability of the solution?
As I mentioned earlier, it was scalable as well.
How are customer service and support?
I would really rate the technical support as 4 (in a scale of 1-10). My interaction with the technical support was never good. Case registering is a complex activity and support responds very late and takes a lot of time to resolve small issues.
How was the initial setup?
Initial setup was straightforward in terms of number of steps and activities to be completed. Most important thing is to make sure the prerequisites are met.
What about the implementation team?
We implemented this with our in-house team as we planned well for the implementation.
What other advice do I have?
Go ahead and implement.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Authentication Systems Report and find out what your peers are saying about RSA, Yubico, Microsoft, and more!
Updated: December 2024
Popular Comparisons
Microsoft Entra ID
Fortinet FortiAuthenticator
Cisco Duo
Ping Identity Platform
Yubico YubiKey
Fortinet FortiToken
Symantec VIP Access Manager
Silverfort
Thales Authenticators
RSA Authentication Manager
Entrust Identity Enterprise
OneSpan DIGIPASS
HID PIV
One Identity Defender
Buyer's Guide
Download our free Authentication Systems Report and find out what your peers are saying about RSA, Yubico, Microsoft, and more!
Quick Links
Learn More: Questions:
- Which solution do you prefer: Duo Security or RSA SecurID Access?
- When evaluating Authentication Systems, what aspect do you think is the most important to look for?
- Why is Authentication Systems important for companies?
- Which front-end product for authorization and authentication into an Apache Web Server application, PIXIA, would you recommend?
- What is the difference between SPML and SAML?
- How would you compare Cisco Duo Security with other Authentication Systems products?
- What is CAPTCHA and how does it work? How can you use it for Artificial Intelligence (AI)?
- What are some alternatives for UserLock?