We changed our name from IT Central Station: Here's why

Top 8 Authentication Systems Tools

Duo SecurityFortinet FortiAuthenticatorMicrosoft AuthenticatorFronteggFortinet FortiTokenPingIDSymantec VIP Access ManagerEntrust IdentityGuard
  1. leader badge
    The multi-factor authentication process and the geo-locking features are great.The push notifications and the integrations they offer are valuable. Their mobile app is very useful. It is very easy to use.
  2. leader badge
    This is a scalable product.The most valuable features are the performance and ease of use.
  3. Find out what your peers are saying about Cisco, Fortinet, Microsoft and others in Authentication Systems. Updated: January 2022.
    564,599 professionals have used our research since 2012.
  4. It has been stable, and we haven't had any issues since we started to use it.
  5. It has Audit Log and many cool features that if we were to develop them by ourselves, it would require a lot of research and development resources. Frontegg gives us everything we need to ensure that our customers have a safe and reliable authentication system in which they can also manage some of the features and roles by themself which gives them more control over their environment.
  6. The integrated Fortinet security with the app that allows you to easily do the two-factor authentication is most valuable.Its ease of use is most valuable. It is simple to use and can be deployed out-of-the-box. It is quite a mature product with all the required features.
  7. It's pretty stable as a product.The solution is stable. We haven't experienced any bugs or glitches.
  8. report
    Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
    564,599 professionals have used our research since 2012.
  9. Other than it provides us with remote access, so it's fairly easy to install, fairly easy to set up, and provides us the ability to get into our corporate environment.

Authentication Systems Articles

Shibu Babuchandran
Regional Manager/ Service Delivery at ASPL Info Services
Dec 16 2021
Does access control terminology puzzle you? Many people often mistake PIM, PAM, and IAM – privileged identity management, privileged access management, and identity and access management. Oftentimes, they also believe that privileged access management (PAM) and privileged account management (al...
Read More »
Find out what your peers are saying about Cisco, Fortinet, Microsoft and others in Authentication Systems. Updated: January 2022.
564,599 professionals have used our research since 2012.