Want to see who topped the 2019 Best Software Awards?

Clef

4.5
(1)

Clef's identity solutions combine cutting-edge design research, and security to protect businesses and customers from fraud.

Work for Clef?

Learning about Clef?

We can help you find the solution that fits you best.

Clef Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
Ratings
Company Size
User Role
Industry
Showing 1 Clef review
LinkedIn Connections
Clef review by User
User
Validated Reviewer
Review Source

"Easy-to-Use Security Solution "

What do you like best?

Clef is so simple to use, cost-effective, and peace-of-mind for people who like me and those at my company who value security.

What do you dislike?

Clef has crashed a few times and acted up when my phone has been slow. However, ultimately, I've found Clef to be reliable.

Recommendations to others considering the product

Consider whether or not your company required a package or if you get by on the free version of Clef. My company uses Clef for a couple of different things, and because we're so small we've found that we can save a lot on our security costs with Clef, while still achieving that peace of mind we sought out to get by implementing two-factor authentication for our company. I've even expanded my use of Clef beyond the scope of my work because I liked it so much. Highly recommended.

What business problems are you solving with the product? What benefits have you realized?

As security becomes easier for people to compromise, it's important to keep up to date with simple measures that increase security. Two-factor is a great way to increase security and Clef makes it easy and cheap.

Sign in to G2 Crowd to see what your connections have to say about Clef

What Multi-Factor Authentication solution do you use?

Thanks for letting us know!

There are not enough reviews of Clef for G2 Crowd to provide buying insight. Below are some alternatives with more reviews:

1
Google Authenticator Logo
Google Authenticator
4.5
(67 reviews)
Google Authenticator is a multifactor app for mobile devices.
2
RSA SecurID® Access Logo
RSA SecurID® Access
4.3
(47 reviews)
Establish an enterprise-wide authentication policy that protects your most valuable applications, resources, and information.
3
Authy Logo
Authy
4.5
(25 reviews)
Two-Factor Authentication smartphone app for consumers, simplest 2fa Rest API for developers and a strong authentication platform for the enterprise.
4
AWS Certificate Manager Logo
AWS Certificate Manager
4.5
(24 reviews)
AWS Certificate Manager is a service that lets you easily provision, manage, and deploy Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services to secure network communications and establish the identity of websites.
5
Azure Multi-Factor Authentication Logo
Azure Multi-Factor Authentication
4.1
(18 reviews)
Azure Multi-Factor Authentication reduces organizational risk and helps enable regulatory compliance by providing an extra level of authentication, in addition to a user’s account credentials, to secure employee, customer, and partner access.
6
Symantec VIP Access Manager Logo
Symantec VIP Access Manager
4.3
(16 reviews)
Create a single access point to protect your cloud and on-premise web apps via Single Sign-On (SSO) with Symantec VIP two-factor authentication.
7
PingID Logo
PingID
4.4
(15 reviews)
PingID is a multi-factor authentication solution.
8
AuthPoint Multi-Factor Authentication Logo
AuthPoint Multi-Factor Authentication
4.4
(12 reviews)
WatchGuard AuthPoint is the right solution at the right time to make MFA a reality for the businesses who desperately need it to block attacks. Multi-factor authentication (MFA) solution not only helps to reduce the likelihood of network disruptions and data breaches arising from lost or stolen credentials, but we deliver this important capability entirely from the Cloud for easy set-up and management. AuthPoint goes beyond traditional 2-Factor Authentication (2FA) by considering innovative ways to positively identify users, and our large ecosystem of 3rd party integrations means that you can use MFA to protect access to the network, VPNs, and Cloud applications.
9
Yubico Logo
Yubico
4.8
(10 reviews)
Yubico YubiKey is a small USB and NFC device that support multiple authentication and cryptographic protocols it protects access to computers, networks, and online services for the organizations.
10
Axiom Logo
Axiom
4.1
(9 reviews)
Complete cyber security product suite
Show more
Kate from G2 Crowd

Learning about Clef?

I can help.
* We monitor all Clef reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.