2022-04-25T07:48:00Z
NC
Content Manager at PeerSpot (formerly IT Central Station)
  • 127
Published:

Top 8 Single Sign-On (SSO) Tools 2022

Explore related topics
Product comparison that may be of interest to you
2
PeerSpot user
2 Comments
JT
CTO at NATIONAL MOTOR FREIGHT TRAFFIC ASSOCIATION INC
User
2022-06-03T14:09:26Z
Jun 3, 2022

It was interesting not to see Okta on this list. Did it make a broader list, but not the top tools?  


I have implemented Okta, and I have implemented a dual-headed Okta in the past with ease, so I was a little surprised. The other tool I use is Thycotic Secret Server for Admin passwords, though they are now part of a new company.  

rtechenthusiast85 - PeerSpot reviewer
Search Engine Optimization Specialist at LoginRadius
Vendor
Top 10
2022-08-17T10:26:16Z
Aug 17, 2022

SSO is an essential feature of an Identity and Access Management (IAM) access control platform. 


User identity authentication is important when it comes to understanding which permissions a user will have. 

Find out what your peers are saying about Azure Active Directory (Azure AD) vs. Keeper and other solutions. Updated: March 2023.
687,947 professionals have used our research since 2012.
Related Questions
Ronald Chavez - PeerSpot reviewer
Cloud Services
Feb 20, 2023
Hi everyone,  What do you think of the integration of Azure AD Services, Defender for Endpoint, and Intune as comprehensive security solutions? I have demoed these solutions together. There are as well other alternatives that integrate with SaaS services. Thank you for your help.
2 out of 4 answers
James OConnor - PeerSpot reviewer
Sr. Solutions Sales Executive - Commercial/Charity/Healthcare/SMB Individual Contributor at Hypertec Direct
Feb 15, 2023
I believe it is a good first step, and I would say even a requirement, but in no way is it a comprehensive security solution, even for endpoints.   There are many things that need to be addressed for security. In addition to this, there is XDR, MDR, more comprehensive AV for endpoints & Servers that stop attacks, Threat Hunting, Mitigation, PEN Testing, Security Training for end users, Multi-Factor Authentication (Microsoft's MFA is good but only for Microsoft products), Patch Management for Endpoints, Servers and Cloud Workloads, Network Access Control, Firewalls for On-Premise and Cloud server workloads, Network Segmentation, Password Management, Data Backups (3-2-1-1 Rule) with Immutable Backups, Power Backups, Physical Security, Monitoring, NOC/SOC services, and working towards a Zero Trust architecture...   But there are no single-point solutions that will make you secure, so don't get complacent. And you can outspend your profits if you do everything. Just remember it's best to have a layered approach that works together and looks at everything from a security perspective and how it integrates with your overall security plans and objectives to help identify holes and possible mitigations. Healthcare must do Risk Assessments by law, but I recommend that all companies of all sizes do at least annual risk assessments since there is so such thing as being too small or inconspicuous to be hit with malware or have a cyber security attack since much of the delivery is automated and not just by the script-kiddies of years gone by... Nation States are actively engaging in cyber warfare daily, along with terrorists, and opportunists looking to make big money from you...
Gaurav Chandola - PeerSpot reviewer
Senior Associate Specialist at a financial services firm with 1,001-5,000 employees
Feb 16, 2023
It depends on your company's infrastructure. Check with your cyber team whether you can sync your endpoints to Cloud using Azure AD as Azure Registered/ Azure Hybrid AD join/ Azure AD join, etc.        1. So, if the ask is only to enroll them in Intune to leverage defender/BitLocker services - go directly to Azure AD's join approach.        2. If you still want to manage patch management/mcm BitLocker but Defender via cloud, the approach should be Azure Hybrid AD join.         3. You can still use autopilot using both of these approaches. 
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot
Jan 10, 2023
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
2 out of 5 answers
BE
Control System Cybersecurity Analyst at a energy/utilities company with 201-500 employees
Jan 12, 2022
The pricing for the base solution was fine. There's a separate product they do for two-factor authentication. It's extra. There is OneLogin Adaptive, they changed the name of it, which was a bit too expensive for Adaptive two-factor authentication. Other than that, I thought the price was right. We were pretty frugal over at my company when I worked there. I can't recall if we purchased directly from OneLogin or from a reseller.
IgnacioMartinez - PeerSpot reviewer
Director of IT at a venture capital & private equity firm with 11-50 employees
Jun 22, 2022
The pricing is great and competitive. It's right around where Okta is, and maybe a little cheaper. I
Related Articles
NC
Content Manager at PeerSpot (formerly IT Central Station)
Jun 3, 2022
Top 8 Enterprise Password Managers Tools PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why. You can read user reviews for th...
See 1 comment
JT
CTO at NATIONAL MOTOR FREIGHT TRAFFIC ASSOCIATION INC
Jun 3, 2022
I am implementing Thycotic Secret Server (now Delinea) for my new company. This will be the second time I have implemented it.
Janet Staver - PeerSpot reviewer
Tech Blogger
May 31, 2022
If you are like the majority of other companies, you most likely use cloud environments or multi-cloud implementations. Even though cloud computing has become increasingly popular, it introduces security threats such as contract breaches, compliance problems, and APIs that are not secure or are misconfigured. Because most SaaS applications include large amounts of sensitive data, such as credit...
EB
Director of Community at PeerSpot (formerly IT Central Station)
May 30, 2022
Hi peers, This is our new bi-weekly Community Spotlight that includes recent contributions (questions, articles and discussions) by the PeerSpot community members.  Articles Check the top products and solutions below (selected based on peer reviews) or contribute your own article! Top Security Orchestration Automation and Response (SOAR) Solutions Top 8 Data Loss Prevention (DL...
Product Comparisons
Related Categories
Related Articles
NC
Content Manager at PeerSpot (formerly IT Central Station)
Jun 3, 2022
Top 8 Enterprise Password Managers 2022
Top 8 Enterprise Password Managers Tools PeerSpot’s crowdsourced user review platform helps tech...
Janet Staver - PeerSpot reviewer
Tech Blogger
May 31, 2022
How do I secure my SaaS application?
If you are like the majority of other companies, you most likely use cloud environments or multi-...
Download Free Report
Download our FREE report comparing Azure Active Directory (Azure AD) and Keeper based on reviews, features, and more! Updated: March 2023.
DOWNLOAD NOW
687,947 professionals have used our research since 2012.