Authentication tools

DeepNet Security DualShield

DeepNet Security DualShield

Strengths: Huge feature set, supports wide array of platforms, well documented. Weaknesses: Could possibly be overkill for smaller implementations, no syslog support we could find.
DigitalPersona Pro Enterprise

DigitalPersona Pro Enterprise

Strengths: Group policy-based management allows for great control, SSO, user self-registration and password reset. Weaknesses: Logging is inadequate without the Reports add-on.
Entrust IdentityGuard

Entrust IdentityGuard

Strengths: Cross-platform, SAML 2.0, Mobile Smart Credential technology, built-in auditing and reports generator. Weaknesses: No built-in support for biometric readers.
Imation Defender F200 Biometric Flash Drive

Imation Defender F200 Biometric Flash Drive

Strengths: FIPS 140-2, Level 3 validated, software is completely self-contained. Weaknesses: No USB 3.0.
PhoneFactor

PhoneFactor

Strengths: Exceedingly simple to deploy and use, product design philosophy allows for easy fraud detection. Weaknesses: Hosted solution, no workstation authentication.
SafeNet Authentication Service

SafeNet Authentication Service

Strengths: Full cloud-based option with no need for separate hardware. Weaknesses: Expensive.
SecureAuth IdP

SecureAuth IdP

Strengths: Full multifactor and single sign-on authentication management. Weaknesses: None that we found.
Swivel Secure Swivel Appliance

Swivel Secure Swivel Appliance

Strengths: Combines an already known PIN with a random security string for strong authentication. Weaknesses: Lack of PDF guides.
TeleSign 2FA

TeleSign 2FA

Strengths: Full, out-of-band, two-factor authentication through a user’s cell phone. Weaknesses: Requires modifying application code to deploy, which can be difficult for certain customers.
VASCO DIGIPASS GO 7 and IDENTIKEY Authentication Server

VASCO DIGIPASS GO 7 and IDENTIKEY Authentication Server

Strengths: Many ready-to-go integration options, along with a solid SDK for custom applications. Weaknesses: None that we found.

The SC Labs team took a look at some of the top authentication security tools on the market and detailed what the "strengths" and "weaknesses" were for each.

You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

POLL