Browse Software
List Your Product
Loading...
HashiCorp Vault logo

HashiCorp Vault

  Add to Compare

91% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

RSA SecurID logo
Visit Website

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

CyberArk Conjur logo
Visit Website

Overview

Description RSA SecurID is an identity and access management software that offers a seamless access experience to users by using two-factor authentication for protecting networks. Right from the ground to the cloud, this software uses identity insights, threat intelligence and business context for delivering a safe and secure access to all your users across all your applications and gadgets. It provides a one-powerful suite-of-solutions through a range of features which include multi-factor authentication, identity governance, risk based access management and user lifecycle management, all in one loop. In this era of growing cyber crimes, RSA SecurID provides an analytically-driven insight to prioritize identity risks and protects assets accordingly through successfully designed Identity and access management programs which monitor complete control over who gets access to what. Undoubtedly, it offers a complete solution for security and control to keep ahead of growing threats. Read more CyberArk Conjur is an open-source interface to control, authenticate, and audit access across tools, containers, applications, and cloud environments through secrets management. It helps organizations implement secret management best practices, including the least privilege, role-based access control (RBAC), strong authentication, credential rotation, management, and audit. Users can easily audit, secure, store, and fetch secrets across containerization, secure CI/CD tool stacks, and cloud platforms to spend less time learning the tool and more time delivering value. The platform provides resiliency and consistency through security policy as code, enabling operations and DevOps teams to restore access policies for applications and microservices from the last known state. Conjur secures access to tools, applications, critical infrastructure, and other sensitive data by closely controlling secrets through granular Role-Based Access Control. When requested access, the platform authenticates the application and performs the authorization check before securely distributing the secret. CyberArk Conjur offers the Secret-less capability, enabling applications to securely connect to protected services and resources without fetching, managing or handling secrets. Read more
Pricing Options
  • Free Trial Not Available
  • RSA SecurID Offers Custom plan.
  • Free Trial Not Available
SW Score & Breakdown

91% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    98%
  • Reviews
    96%
  • Momentum
    64%
  • Popularity
    66%

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    80%
  • Reviews
    68%
  • Momentum
    62%
  • Popularity
    69%

Features

Total Features
10 Features
5 Features
Common Features for All
    API Access Management Ensures that calls with authenticated access can enter APIs
    Access Request Management Helps to view and manage access requests submitted by the personnel
    Account Management Helps to manage user accounts within organisations
    Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed
    Multi-factor Authentication Uses more than one method to verify a user's identity for a login
    Password Management Enables the administrator to manage, authenticate and reset passwords
    Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys
    Role Management Helps regulate access to systems, based on individual roles
    Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
    User Activity Monitoring Monitors and records user activities in the enterprise
  • + 7 More - Show Less
    • API Access Management Ensures that calls with authenticated access can enter APIs
      Access Request Management Helps to view and manage access requests submitted by the personnel
      Account Management Helps to manage user accounts within organisations
      Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed
      Multi-factor Authentication Uses more than one method to verify a user's identity for a login
      Password Management Enables the administrator to manage, authenticate and reset passwords
      Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys
      Role Management Helps regulate access to systems, based on individual roles
      Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
      User Activity Monitoring Monitors and records user activities in the enterprise
  • + 2 More - Show Less
  • Technical Details

    Organization Types Supported
    • Large Enterprises
    • Medium Business
    • Small Business
    • Large Enterprises
    • Medium Business
    • Small Business
    Platforms Supported
    • SaaS/Web/Cloud
    • Mobile - Android
    • Mobile - iOS
    • Installed - Windows
    • Installed - Mac
    • SaaS/Web/Cloud
    • Mobile - Android
    • Mobile - iOS
    • Installed - Windows
    • Installed - Mac
    Modes of Support
    • 24/7 (Live rep)
    • Business Hours
    • Online
    • 24/7 (Live rep)
    • Business Hours
    • Online
    API Support
    • Available
    • Available

    Reviews & Ratings

    User Rating
    4.4/5 366 user ratings
    4.8/5 2 user ratings
    Ratings Distribution
    • Excellent

      45.6%
    • Very Good

      44.8%
    • Average

      9.3%
    • Poor

      0.3%
    • Terrible

      0%
    • Excellent

      77.8%
    • Very Good

      22.2%
    • Average

      0%
    • Poor

      0%
    • Terrible

      0%
    Review Summary

    RSA SecurID Access is lauded for its robust authentication mechanisms, multi-factor authentication options, and ease of use. It is praised for enhancing security posture, streamlining access management, and providing secure remote access. Users value its integration capabilities, centralized management console, and strong customer support. However, some reviewers mention occasional glitches, a learning curve for advanced features, and the need for better documentation. Overall, RSA SecurID Access is recognized for its effectiveness in safeguarding access and improving security.

    Not Available
      Read All User Reviews Read All User Reviews

    AI-Generated from the text of User Reviews

    Pricing

    Pricing Options
    • Free Trial Not Available
    • RSA SecurID Offers Custom plan.
    • Free Trial Not Available
    Pricing Plans
    Monthly Plans Annual Plans

    RSA SecurID Custom

     
    View Detailed Pricing
    Not Available

    Screenshots & Videos

    Videos Video Thumbnail
    + 2 More
    Not Available

    Vendor information

    Company Details Located in: Bedford, Massachusetts Located in: Newton, Massachusetts
    Contact Details

    +1 800-995-5095

    https://www.rsa.com/en-us/products/rsa-securid-suite

    1-888-808-9005

    https://www.conjur.org/

    Social Media Handles

    We understand SaaS better

    SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

    icon

    Buyers

    Looking for the right SaaS

    We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

    icon

    Makers

    Want more customers?

    Our experts will research about your product and list it on SaaSworthy for FREE.

    Get Listed