RSA Adaptive Authentication

4.8
(4 reviews)

RSA Adaptive Authentication is a complete fraud detection platform that leverages risk-based, multifactor authentication to protect users accessing websites, online portals, mobile browsers and mobile apps.

Work for RSA Adaptive Authentication?

Learning about RSA Adaptive Authentication?

We can help you find the solution that fits you best.

RSA Adaptive Authentication Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • For Category
  • Industry
Ratings
Company Size
User Role
For Category
Industry
Showing 4 RSA Adaptive Authentication reviews
LinkedIn Connections
RSA Adaptive Authentication review by User
User
Validated Reviewer
Verified Current User
Review Source

"Very easy to use"

What do you like best?

I like that this program is quick to open and will let you copy the code you need right into wherever you need to put the authentication code.

What do you dislike?

I dislike that I have to wait for the code to change again sometimes when it is near the end of its usage period. Otherwise, I end up in a scenario where I have try to login again if it takes too long for my computer to process the request.

Recommendations to others considering the product

Good, easy tool to use for greater information security. Fair warning though- it can be very difficult to set up. I know it took several hours on the phone with my company's IT support to get it set up for remote access on my personal computer.

What business problems are you solving with the product? What benefits have you realized?

We are keeping our information and sites more secure with the RSA authentication codes.

Sign in to G2 Crowd to see what your connections have to say about RSA Adaptive Authentication
RSA Adaptive Authentication review by Hannah  O.
Hannah O.
Validated Reviewer
Verified Current User
Review Source

"Convenient, Secure Internet on the go"

What do you like best?

I can log in to internet and work safely from any location. No concerns about confidential information getting compromised

What do you dislike?

I really have no complaints with the product. It is easy to use and I do not experience any crashing with it.

What business problems are you solving with the product? What benefits have you realized?

Lack of office space in headquarters is

What Risk-based Authentication solution do you use?

Thanks for letting us know!
RSA Adaptive Authentication review by Nicole F.
Nicole F.
Validated Reviewer
Verified Current User
Review Source
Business partner of the vendor or vendor's competitor, not included in G2 Crowd scores.

"Use it to log in remotely"

What do you like best?

That it is easy to use and user friendly

What do you dislike?

I have never experienced anything negative with this program

What business problems are you solving with the product? What benefits have you realized?

I am able to login to my systems when working remotely

RSA Adaptive Authentication review by User in Accounting
User in Accounting
Validated Reviewer
Verified Current User
Review Source

"RSA has worked well for the company I work for - adds another layer of security "

What do you like best?

I like how it adds another layer of protection in order to prevent information loss

What do you dislike?

I dislike the extra time it takes to log in

Recommendations to others considering the product

If you have had problems in the past with sensitive information being stolen, this product will help prevent that

What business problems are you solving with the product? What benefits have you realized?

It is solving the problem of losing sensitive company information

There are not enough reviews of RSA Adaptive Authentication for G2 Crowd to provide buying insight. Below are some alternatives with more reviews:

1
SecureAuth Logo
SecureAuth
4.7
(30 reviews)
2 Factor and SSO solution
2
Okta Adaptive Multi-Factor Authentication Logo
Okta Adaptive Multi-Factor Authentication
4.4
(13 reviews)
Okta's Adaptive Multi-Factor Authentication is designed to be a security solution for all applications.
3
Apache Sentry Logo
Apache Sentry
3.9
(4 reviews)
Apache Sentry is a system for enforcing fine grained role based authorization to data and metadata stored on a Hadoop cluster.
4
RSA SecurID Risk-Based Authentication Logo
RSA SecurID Risk-Based Authentication
4.2
(3 reviews)
RSA SecurID Risk-Based Authentication is designed to enhance the traditional username and password log-in experience with a risk scoring engine that validates the legitimacy of user access requests.
5
ThreatMetrix Logo
ThreatMetrix
4.3
(2 reviews)
ThreatMetrix is a digital identity company that provides cloud solutions for authenticating digital personas and transactions on the internet.
6
IBM Security Risk Based Authentication Logo
IBM Security Risk Based Authentication
4.0
(1)
IBM Security Risk Based Authentication Solution provides transparent evidence-based fraud protection coupled with user access management.
7
Forcepoint Insider Threat Logo
Forcepoint Insider Threat
0 reviews
Insider Threat Protect intellectual property and detect insider threats to data and critical systems with user analytics, behavior profiling and rich context to user actions.
8
Pindrop Security Logo
Pindrop Security
0 reviews
Pindrop solutions identify fraudsters based on anomalies in their calls, allowing us to detect spoofing, forwarding, suspicious call origins, and other indications of fraud.
9
NuDetect Logo
NuDetect
0 reviews
NuDetect provides solutions designed to prevent high-risk account creation by detecting unwanted users, anomalies, and automation.
10
Preempt Platform Logo
Preempt Platform
0 reviews
At the heart of the Platform are a set of core capabilities including multi-dimensional data analysis, behavioral analytics, continuous risk assessment, adaptive response enforcement and a robust and flexible policy engine. These capabilities help to power the Platform for delivering a scalable set of applications that help customers prevent threats and support broad set of use cases. The applications include:
Show more
Kate from G2 Crowd

Learning about RSA Adaptive Authentication?

I can help.
* We monitor all RSA Adaptive Authentication reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.