Home/Identity and Access Management (IAM) Software/Cognito vs Idaptive Next-Gen AccessUpdated on: March 28, 2024

Compare Cognito vs Idaptive Next-Gen Access

85% The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More Remove
90% The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More Remove
Visit Website

Visit Website

ADD PRODUCT
85% The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More Remove
90% The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More Remove
Visit Website

Visit Website

Overview

Summary

Cognito is an Identity and Access Management software that comes with an identity verification service and needs just a phone number to begin verifying your customers, which in turn assists you in streamlining your flow and cutting down troublesome inputs. It helps minimize manual review to the maximum while increasing match rate through highest quality regulated data on the market. It slowly gathers all required data from customers to verify them with the least information provided, without compromising on security and adhering to the strictest standards and best policies prevalent in the industry. It even automates compliance processes with the assistance of modern systems, helps verify age of customers if you happen to sell age-restricted goods and services and even enables real-time sanction screening while dealing with potential customers. It makes sharing links and creating new verification links possible, without writing codes, through its powerful and intuitive dashboard. Last, but not the least, the data that Cognito software provides is primary and hundred percent up-to-date. ..show more

Idaptive provides Next-Gen Access solutions to enterprises to protect them from unauthorized data access, cyber-attacks, and data breaches. It follows a Zero Trust and Security First approach to regulate access of each of the users by verifying them and validating their devices. The Multi-Factor Authentication creates an additional layer of security before any access is granted to applications. The software can monitor the network, device, and learn user behavior context to assign risk levels to each accessed event. By securely authenticating every access with a wide range of supported factors that also includes FIDO2 keys, virtual and hardware tokens, etc, Idaptive eliminates the need of using passwords. Admins can route application access requests, create application accounts, revoke access whenever necessary, etc easily. Enterprises can frame centralized policy management and secure endpoints that are used to access enterprise resources. With device security management, institutions can also extend enterprise authentication services to the cloud without duplicating identities. One can even select trusted devices to limit access to certain information and applications. If needed, data sets can be locked and deleted within minutes in the case of cyberattacks. Besides, there are several other security features as well that can be implemented to build robust cybersecurity within an organization. ..show more

Features

API Access Management Ensures that calls with authenticated access can enter APIs

Access Request Management Helps to view and manage access requests submitted by the personnel

Account Management Helps to manage user accounts within organisations

Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed

Multi-factor Authentication Uses more than one method to verify a user's identity for a login

Password Management Enables the administrator to manage, authenticate and reset passwords

Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys

Role Management Helps regulate access to systems, based on individual roles

Single Sign-On (SSO) Permits one set of login credentials to access multiple applications

Social Sign On Allows users to sign on using credentials of social networking services

User Activity Monitoring Monitors and records user activities in the enterprise

TECHNICAL DETAILS

Access Monitoring

24/7 (Live rep)

Business Hours

Online

Contact Number/Address

Palo Alto, California

Santa Clara, California

API

N/A

N/A

Deployment

SaaS/Web/Cloud

Mobile - Android

Mobile - iOS

Mobile - Windows

Mobile - BlackBerry

Installed - Windows

Installed - Mac

Customers

Individuals

Freelancers

Large Enterprises

Medium Business

Small Business

Pricing

Pricing Model

Free Trial

Freemium

One-time license

Open-source

Subscription

Quotation Based

Plans

Flow
$2.49 /User/Month

Growth

  • $2.49 per verified user
  • With monthly volume commitment

Base Fee - $0.50

  • When a user starts a verification
  • Email, phone, IP address risk
  • Device fingerprinting
  • Global SMS verification
  • Workflow management
  • Hosted verifications

Verification Fee - $1.99

  • When a user completes a verification
  • Lightning PII verification
  • Lightning address verification
  • ID document reading
  • ID document anti-fraud
  • Selfie checks
Identity
$0.99 /User/Month

Growth

  • $0.99 per identity

Search Fee - $0.99

  • When a user starts a verification
  • Phone number linked to identity
  • Full name verification
  • Age verification
  • Address verification
  • SSN verification
  • Death record checks
  • Address cleansing
  • Industry-leading match rates
  • Simple integration and docs
  • Customer scoring system
Screening
$0.1 /User/Month

Growth

  • $0.59 per initial screening
  • $0.10 per user rescanned per month

Screening Fee $0.59

  • When a user starts a screening
  • Automated global screening
  • International matching algorithms
  • Politically exposed persons screening
  • Compliance CRM and API
  • Four eyes review system
  • Audit trails for all actions
  • API-driven compliance

Monthly Rescan Fee $0.10

  • Customer must be enrolled in a program that has rescans enabled
  • Automated recurring screening
  • Escalation systems and auto-assignment
  • New customer hit reviews
View Price Page
Single Sign-on
Others

STANDARD SSO: $2 per user per month
Features

  • Idaptive App Catalog
  • Desktop SSO
  • Role-based access policy
  • B2B federation
  • MFA using OATH tokens and security questions
  • MFA using a third-party RADIUS server
  • Cloud Directory
  • Integrations to AD, LDAP, and Google Cloud Directory
  • Custom user attributes
  • Directory APIs
  • Browser-based SSO portal
  • Idaptive mobile app
  • Self-service password update and reset for AD accounts
  • Self-service AD account unlock
  • Self-service AD profile updates
  • Administrator reports
  • SIEM integration

ADAPTIVE SSO: $4 per user per month (Plus add-ons)

Features

  • Includes features of STANDARD SSO
  • Includes Add-ons

Add-ons: $36 per user per year

  • Location context
  • Device context
  • Network context
  • Time-based context
  • User behavior risk context
Multi-factor Authentication
Others

STANDARD MFA: $2.5 per user per month
Features

  • Workstation (PC and Mac)
  • Virtual desktop login
  • VPN login
  • Web apps login
  • RADIUS server
  • Third-party IDPs
  • On-prem web app MFA (requires SSO and App Gateway add-on)
  • Cloud Directory
  • Integrations to AD, LDAP, and Google Cloud Directory
  • Custom user attributes
  • Directory APIs
  • Email OTP
  • Physical FIDO U2F-based keys
  • Hardware OTP Tokens
  • KBA(Security Questions)
  • OATH-based mobile authenticator apps
  • Mobile push notifications
  • Derived credentials
  • Smart cards
  • Offline OTP
  • SMS-based OTP
  • Phone call
  • Wearable as a token

ADAPTIVE MFA: $5 per user per year

Features

  • Includes features of STANDARD MFA
  • Location context
  • Device context
  • Time-based context
  • Network context
  • User behavior risk context
  • Rich insights
  • Incident investigation
  • Risk modeling
  • Response orchestration and automation
  • Third-party threat ingestion
Lifecycle Management
Others

STANDARD LCM: $3.5 per user per month
Features

  • Pre-integrated app provisioning and de-provisioning
  • AD, LDAP, Google Cloud Directory, and Idaptive Cloud Directory synchronization
  • AD synchronization and license management for Office 365
  • Self-service app request and approval
  • Create, update, and deactivate accounts in applications
  • Manage entitlements
  • Reporting
  • SIEM integration

ADVANCED LCM: $7 per user per year

Features

  • Includes features of STANDARD LCM, plus
  • Workday
  • SAP SuccessFactors
  • Bamboo HR
  • Ultimate Software's UltiPro
  • SCIM-based provisioning
  • SCIM server
Mobile Devices
Others

DEVICE CONTEXT: $2 per user per month
Features

  • Detect and block rooted or jailbroken devices
  • Automated certificate management
  • Device location
  • Remote enable or disable SSO
  • BYOD self-service enrollment

DEVICE SECURITY: $9 per user per year

Features

  • Includes features of DEVICE CONTEXT, plus
  • Remote lock
  • Remote wipe
  • Disk encryption
  • 802.1x
  • Proxy
  • VPN
  • Security
  • Passcode
  • Mobile app management add-on ($4 per user/per month)
    • Deploy, manage, and remove apps
    • Deploy custom apps
    • Deploy apps from managed Google Play store
    • Control app updates
Endpoint Management
Others

ENDPOINT CONTEXT: $2 per user per month

Features

  • Automated certificate management
  • Device location
  • Remote enable or disable SSO
  • BYOD self-service enrollment

ENDPOINT SECURITY: $10 per user per month

Features

  • Includes features of ENDPOINT CONTEXT, plus
  • Remote lock
  • Remote wipe
  • Security and privacy
  • WiFi settings
  • VPN settings
  • FileVault management
  • Application restrictions
  • Preferences restrictions
  • Media access
View Price Page

SCREENSHOTS

Cognito Screenshots
Idaptive Next-Gen Access Screenshots

ALTERNATIVES

Top alternatives to Cognito

AWS Amplify
AWS Amplify
Firebase
Firebase
Incognito for Slack
Incognito for Slack
Keycloak
Keycloak
Auth0
Auth0

Top alternatives to Idaptive Next-Gen Access

Okta
Okta
JumpCloud
JumpCloud
Ping Identity
Ping Identity
OneLogin
OneLogin
RSA SecurID
RSA SecurID