Best Multi-Factor Authentication Software

G2 Crowd Grid® for Multi-Factor Authentication
Leaders
High Performers
Contenders
Niche
Momentum Leaders
Momentum Score
Market Presence
Satisfaction
content
Star Rating

Multi-Factor Authentication reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Compare Multi-Factor Authentication Software
Results: 154
G2 Crowd takes pride in showing unbiased ratings on user satisfaction. G2 Crowd does not allow for paid placement in any of our ratings.
Results: 154
Filter Results
Filter by:
Sort by
Star Rating
Sort By:

    Duo Security's frictionless Trusted Access platform protects users, data and applications from malicious hackers and data breaches. Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based Trusted Access platform addresses security threats before they become a problem. We do this by verifying the identity of your users and the health of their devices before they connect to the apps you want them to access.

    Ensure users have convenient, secure access—from any device, anywhere—to the applications they need, whether in the cloud or on-premises. RSA SecurID Access is an enterprise-grade multi-factor authentication and access management solution that lets organizations consistently and centrally enforce dynamic risk-driven access policies aimed at providing continuous, seamless authentication. It protects all of your resources with a wide range of authentication methods, including push notification, biometrics, OTP, SMS, and traditional hardware and software tokens.

    Idaptive Services secures enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. Idaptive helps protect against the leading point of attack used in data breaches ― compromised credentials — through it’s Next Gen Access, which uniquely unifies single single-on (SSO), adaptive multi-factor authentication (MFA), enterprise mobility management (EMM) and user behavior analytics (UBA) into an integrated solution. Idaptive Services include the following: Single Sign-On Services – Adaptive single-sign on and one-click access to your cloud, mobile and on-premises apps. No more forgotten passwords, no more user confusion. MFA Services – A common sense approach to multi-factor authentication with risk-based policy that does not hinder end-user productivity. Lifecycle Management Services – Automatically route application requests, create accounts, manage entitlements within those accounts, and revoke access when necessary. Provision users across apps, all from a central control point. Mobility Management Services– Manage mobile devices, secure native mobile apps and provide context for smarter access decisions. Endpoint Management Services - Designed to help control access to corporate resources through a zero trust security approach. Bolster endpoint security with cross-platform policy enforcement and leading device security management capabilities.

    Create a single access point to protect your cloud and on-premise web apps via Single Sign-On (SSO) with Symantec VIP two-factor authentication.

    Ping Identity envisions a digital world powered by intelligent identity. We help enterprises achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The Ping Intelligent Identity Platform provides customers, employees and partners with access to cloud, mobile, SaaS and on-premises applications and APIs, while also managing identity and profile data at scale. Over half of the Fortune 100 choose us for our identity expertise, open standards leadership, and partnership with companies including Microsoft, Amazon and Google. We provide flexible options to extend hybrid IT environments and accelerate digital business initiatives with multi-factor authentication, single sign-on, access management, intelligent API security, directory and data governance capabilities. Visit www.pingidentity.com.

    Yubico YubiKey is a small USB and NFC device that support multiple authentication and cryptographic protocols it protects access to computers, networks, and online services for the organizations.

    Azure Multi-Factor Authentication reduces organizational risk and helps enable regulatory compliance by providing an extra level of authentication, in addition to a user’s account credentials, to secure employee, customer, and partner access.

    SecureAuth IdP streamlines secure access into all applications and resources with one set of credentials; regardless of cloud, mobile, web or VPN resources. IdP enables any device with any identity type to authenticate to any identity store using any VPN to access any application — offering unparalleled choice and flexibility. SecureAuth puts strong adaptive authentication in front of SSO across all applications (on-premises, cloud, mobile and homegrown) to ensure maximum protection without compromising the user experience.

    Two-Factor Authentication smartphone app for consumers, simplest 2fa Rest API for developers and a strong authentication platform for the enterprise.

    App ID helps developers to easily add authentication to their web and mobile apps with few lines of code, and secure their Cloud-native applications and services on IBM Cloud. App ID also helps manage user specific data that developers can use to build personalized app experiences.

    WatchGuard's AuthPoint is an easy-to-use multi-factor authentication (MFA) service that helps companies keep their assets, information, and user identities secure. It closes a security gap that leaves companies vulnerable to breaches by adding a layer of security beyond just a username and password – without creating a disruptive user experience. AuthPoint’s mobile app makes it easy for users to approve or deny login attempts with just a single touch right from their smartphone. WatchGuard’s AuthPoint solution is a Cloud service, so there’s no expensive hardware to deploy, and it can be managed from anywhere using WatchGuard Cloud’s intuitive interface.

    AWS Certificate Manager is a service that lets you easily provision, manage, and deploy Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services to secure network communications and establish the identity of websites.

    DigitalPersona Altus is a modular framework that leverages what user already built without ripping and replacing, it integrates seamlessly with both legacy and cloud-based applications to fit existing workflows and supports the widest range of authentication credentials, including biometrics which provide proof of presence.

    FusionAuth provides enterprise-ready auth, registration, login, MFA, SSO, user management and more. 100% free for unlimited users. Built for developers, it installs in minutes for any size web or mobile application from start-up to unicorn to enterprise. FusionAuth provides secure, single-tenant, on-prem or private cloud identity with social login, custom emails with localization, customizable registration branding, group-based authentication and more. Deploys on macOS, Linux, Windows, and cloud servers as well as any dev box for local development. Docker and Kubernetes images also available.

    GlobalSign's cloud-based certificate management platform offers unique features and functionality that give you complete control of your certificate needs from one centralized account.

    LaunchKey manages all digital and physical authentication and authorization processes right in its mobile app.

    OAuth.io handles identity infrastructure, maintenance, and security overhead with Social Login, Token Authentication, Multi-Factor Authentication, and more. OAuth.io allows you to choose identity providers, add custom attributes, customize your login page or use OAuth's widget and integrate with its app in minutes.

    Safenet ProtectDrive is identity and data protection solutions to protect the data, identities, and intellectual property.

    HyID enables strong multi-factor authentication based on One-Time-Password, Bio-metrics parameters validations, Device Hardware ID & PKI. HyID protects the corporate resources from unchecked access by privileged users and provides detailed audit logs about who accessed what, from where and what time. The system can generate alerts based when an access by a user invalidates the set risk thresholds, enabling organizations to detect and prevent identity thefts and privilege rights misuse.

    
SMS PASSCODE leverages the one thing users always carry with them – their mobile phone. 
The solution provides a superior user experience by taking full advantage of contextual information such as login behavior patterns, geo-location, and type of login system being accessed.

    Akku is an Identity and Access Management (IAM) solution that is packed with features including single sign-on, password policy enforcement, IP- and device-based restrictions, multi-factor authentication and YouTube filtering. It provides enterprises with complete control over data access and privacy on the cloud while ensuring that they stay compliant to statutory industry standards. Akku also offers a dedicated deployment support service, without the need for a third-party system integrator, along with round-the-clock support for operations, maintenance, and troubleshooting. With this, Akku enables the seamless integration of on-premise legacy applications with that of a company’s cloud environment.

    Alibaba Cloud Key Management Service (KMS) is a secure and easy-to-use service to create, control, and manage encryption keys used to secure your data

    AssureID is an identity management software that reduces fraud and increases revenue while providing a seamless customer experience. It includes document authentication and identity verification software for desktop, mobile and mobile app solutions including facial recognition.

    AU10TIX provides solutions for automating ID document authentication, validation and conversion to workable digital records.

    Authenticator Plus is a highly rated two factor authentication app to protect multiple accounts.

    Authentify pioneered the use of the telephone as an authentication tool by synchronizing the use of the telephone's voice channel to an online event at the 2001 RSA Conference. Since that introduction, phone-based two-factor authentication (2FA), sometimes called two-step verification (2SV), has become an industry standard. Authentify has continued the revolution, offering cloud-based advanced authentication services that transform mobile devices into strong authentication tools. Authentify's mobile multi-factor authentication platform, Authentify xFA™, enables any organization to rapidly and economically deploy powerful user authentication technologies including: • Digital Certificates • Voice Biometrics • Fingerprints • SMS OTP/PIN • Voice Channel OTP/PIN • Encrypted Messaging Channel OTP/PIN to an App • Transaction Verification • NFC capability • Geolocation • Gesture/pattern swipe • QR code scanning • SDKs for using authentication factor with native apps Authentify's global services can reach any user with any type of phone or smart device. In mobile and BYOD environments, all supported authentication factors, or "Authentifiers," can be invoked by an enterprise's own mobile app via the xFA Mobile SDK. The need to know with certainty who is on your network or Internet property has never been more critical. Certainty is power. Be certain with Authentify.

    Add multi-factor and passwordless authentication to your site today.

    AuthenWare is a network security software that delivers strong security through a combination of keystroke dynamics, behavioral and environmental characteristics to minimize identity theft, web fraud and other system vulnerabilities.

    Authernative is an enterprise and consumer-level security solutions for enterprises, government agencies and online service providers.

    Unlike all competing multi-factor authentication solutions, the unique AuthLite technology teaches your Active Directory how to natively understand two-factor authentication.

    Our innovative Two Factor Authentication (2FA) technology permits users to be authenticated in a strong (2FA) sense without the hassles of OTPs/hardware tokens or additional Authenticator apps. When combined with our Single Sign-On technology, this extends the power of strong authentication to all web applications. Combined with Mobile wallets or payment gateways, this ensures simple, convenient and secure mobile payments.

    Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys.

    Basis ID is a simple and trustworthy method of user authentication for your enterprise or governmental institution. BASIS ID users have access to their personal account for personal data control and enrichment. Using the Blockchain technology based on the Exonum solution from the Bitfury Group.

    Cuckoo Tech provides a cloud-based biometric attendance system designed to handle or maintain all aspects related to HR and employee attendance.

    BioScriber is a complete biometric enrollment system with powerful identity management features. Its modular nature and customizable workflow make it the perfect solution for any project involving the capture and verification of biometric data. With BioScriber you can capture fingerprints, faces, irises, personal information as well as documents quickly and accurately.

    BKF Repair is a tool that repair and restore damaged backup or BKF file, it perform easy recovery of all damaged backup files which has been created by Windows NT- Backup and Symantec Backup Exec. Backup utility software smartly works and provides simple, secure process for recovery of lost and corrupted BKF file data.

    BlackBerry 2FA is a comprehensive endpoint-to-endpoint security solution that leverages mobile devices to deliver simple, highly secure user authentication for your key cloud apps, VPN, and other on-premises systems.

    The BlackBerry Dynamics Secure Mobility Platform provides a rich set of APIs that allow select developers to introduce apps or hardware to authenticate other apps in the BlackBerry ecosystem.

    Two-factor authentication or full identity verification without passwords for customers and employees

    Bulletin delivers to all types of businesses and enterprises easy-to-use, carrier-grade SaaS solutions in the rapidly-growing field of wireless mobile messaging.

    CA Strong Authentication is a versatile multi-factor authentication system that can help you deploy and manage a wide range of authentication methods, from passwords and knowledge-based authentication (KBA) to two-factor software tokens or hardware credentials. It also can provide out-of-band authentication methods such as SMS, email or voice delivery of one-time passwords (OTP). CA Strong Authentication supports two-factor authentication to VPNs and can protect access and transactions from PCs, laptops, tablets and mobile phones so that organizations can build a cohesive and comprehensive authentication strategy. It also includes free mobile applications to facilitate the use of mobile devices for strong authentication and software development kits (SDKs) to help easily incorporate two-factor authentication into mobile applications

    CA Strong Authentication for Payments is a mobile authentication solution that makes banks' and cardholders' lives easier and less frustrating by reducing friction when shopping online. It delivers two-factor authentication via a user-friendly mobile app, linking a card with a device and protecting that association with a credential.

    Centrify Multi-factor Authentication is designed to offers adaptive strong authentication across enterprise identities and resources.

    AppViewX CERT+ provides a single-stop solution for automated discovery, expiration alerting, renewal, provisioning, and revoking of SSL/TLS certificates and SSH keys across networks.