Share your experience using PlainID

The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.

Use our online form to submit your review. It's quick and you can post anonymously.

Your review helps others learn about this solution
The PeerSpot community is built upon trust and sharing with peers.
It's good for your career
In today's digital world, your review shows you have valuable expertise.
You can influence the market
Vendors read their reviews and make improvements based on your feedback.
Examples of the 83,000+ reviews on PeerSpot:

Senior IT Tech at PCSL
Reseller
Top 5Leaderboard
Strong security measures and easy initial setup
Pros and Cons
  • "The token-based two-factor verification (2FA) for user logins is valuable. It's the primary reason we use AuthPoint, and I find it very effective."
  • "My only concern is the segmentation of services, which I understand is common in SaaS."

What is our primary use case?

We had a client needing strong security measures for their VPN users. They already used WatchGuard VPN, so to add extra security, we recommended upgrading their basic subscription to include multi-factor authentication (MFA) with AuthPoint. It was seamless, applying the license, adding users, syncing with the local gateway, then Active Directory, and the user groups. And it was as easy as that.

I primarily use AuthPoint for the authentication feature, and it can also do mobile device authentication and more.

What is most valuable?

The token-based two-factor verification (2FA) for user logins is valuable. It's the primary reason we use AuthPoint, and I find it very effective.

What needs improvement?

I did reach out to WatchGuard for some features I'd like to see. I have a security license where AuthPoint could be used as a secondary authenticator for Office 365 users.

It would be great to leverage AuthPoint for external authentication for Office 365, especially since some users prefer familiar tools, even with Microsoft's recent 2FA rollout.

Additionally, I'm currently testing WatchGuard EDR, and I'd love to see full visibility into the cybersecurity status of assets, including vulnerabilities. 

For how long have I used the solution?

I have been using it since August this year. 

What do I think about the stability of the solution?

I faced no issue whatsoever. AuthPoint has been incredibly stable, with no lag, crashes, or downtime.

What do I think about the scalability of the solution?

Scaling is very simple. When I need to add users for our MFA (multi-factor authentication), I just purchase additional licenses from WatchGuard directly or through partners like Amazon. Entering the license key updates my subscription and expands my user base. We recently scaled from one user to ten, and I expect to have at least twenty in the near future.

How are customer service and support?

I have a couple of open cases right now as I explore the full potential of WatchGuard solutions and how they can help us. 

Their accuracy has been impeccable, and their speed is fantastic. They're very responsive and technically competent. When I faced an issue configuring my CMITsec (local machines not pulling licenses from the IPSec server), it was a simple fix. The support technician walked me through the steps, and identified a missing firewall rule on port 22, and it was resolved within 15 minutes. Case open, case closed! The issue was fixed quickly. 

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup with AuthPoint was very easy. I simply logged into WatchGuard Cloud, entered the license, and attached it to the necessary firewall. The wizards were clear and straightforward, with no guesswork involved. 

Once I configured the gateway and put it on a server, the configuration for specific features, like the Redis server, was clearly outlined. Everything went seamlessly.

It only took me around three hours! I needed a couple of support calls for questions that weren't explicitly covered in the instructions for advanced features, but the overall process was smooth and quick.

What about the implementation team?

I handled the deployment entirely in-house. As an SSP supporting our clients, we take care of these things ourselves.

It was just me for the deployment process. I'm the head IT assistant, so I manage these kinds of deployments.

What was our ROI?

We saw a very high ROI. Since we started reselling and using WatchGuard as our flagship, it's evolved beyond firewalls to a SaaS platform offering comprehensive cybersecurity. 

This allows us to sell its value and market the products to customers, earning profit through our markups. Additionally, WatchGuard's excellent support and service quality contribute to our company's overall return on investment. We trust them and they are reliable.

What's my experience with pricing, setup cost, and licensing?

The pricing seems great. It's tied to the firewall subscriptions, with one-year and three-year options available. 

My only concern is the segmentation of services, which I understand is common in SaaS. If I want most security features, like vulnerability scanning, it's not included in the basic package. It requires purchasing EDR, which gives endpoint detection but only limited asset management (physical hardware and software info, user list, malware) and no performance scanning. To get full features, I need Total Security, which combines everything into one payment.

What other advice do I have?

I'd suggest to read the documentation carefully. Reading the manuals is crucial. WatchGuard is detailed and clear, even for non-technical users. Its support team is also fantastic if you need further assistance. 

The manuals cover everything from basic setup to advanced features like Intrudy WebUI and console monitoring. It's truly simple and straightforward.

Overall, I would rate the solution a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate
PeerSpot user
Technical & Pre-Sales Manager at GateLock
Real User
Top 5Leaderboard
An excellent , stable security solution with strong approval features
Pros and Cons
  • "The approvals feature of this solution is very good; it is operated by just one button, and can be controlled from a mobile device if needed."
  • "We would like the zero trust feature of this solution to be completed, with more details added and more laptop management capability."

What is our primary use case?

We mainly use this solution to provide security for the devices on our clients network in the banking sector; to stop credential theft, or virus transfer from staff working remotely.

What is most valuable?

The approvals feature of this solution is very good; it is operated by just one button, and can be controlled from a mobile device if needed.

What needs improvement?

We would like the zero trust feature of this solution to be completed, with more details added and more laptop management capability.

We would also like more functionality to be given to the admin role of this product, with less permissions assigned to the end-user roles.

For how long have I used the solution?

We have been using this solution for around two years.

What do I think about the stability of the solution?

We have found this product to be stable, in our experience.

What do I think about the scalability of the solution?

This is an easily scalable solution.

How are customer service and support?

The support for this solution is very good.

How was the initial setup?

The initial setup of this solution was very easy, and the deployment only took 10 to 15 minutes.

What's my experience with pricing, setup cost, and licensing?

Licenses for this product are available in either 1, or 3 year terms. There is only one license option for this solution, and it is not customizable.

What other advice do I have?

We would recommend that businesses considering this solution make sure that they know the business needs that apply to this product, in detail. They should also ensure that they have set up the policies before activating the hardware tokens, and before activating the MFA's that will be in place.

I would rate this solution a nine out of ten.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner