Our customers primarily use the product for VPN access to secure their VPN connections and protection for on-premise applications. One notable advantage of the solution is its capability to protect legacy authentication systems that utilize older security protocols.
The platform significantly enhances security by reducing the risk of attacks involving stolen accounts or credentials. This reduction in security breaches results in cost savings and lessens the financial damage for our customers.
The product's capabilities to protect cloud environments need improvement. Additionally, a more advanced management console or portal for cloud applications and more comprehensive documentation for end users would be beneficial.
I have been working with RSA Authentication Manager for approximately four years.
I rate the product stability a nine.
The platform is highly scalable.
The technical support services are good. However, there is always room for improvement.
The initial setup process is relatively straightforward. It involves uploading the software image and configuring the network. The availability of integration documentation also facilitates an easier deployment process. It is typically deployed in a hybrid setup, with some customers using it on-premises and others protecting their cloud environments. It usually takes two to three days to complete if there are no significant issues.
The solution is costly. However, it is reasonable given its quality and features. It offers value for money, similar to other high-end products.
RSA Authentication Manager is a robust solution that provides comprehensive protection for both on-premise and cloud-based applications. It is well-suited for enterprises seeking extensive protection across various environments.
The hardware token feature stands out as particularly effective. It is straightforward and user-friendly, making it ideal for non-technical users, including older individuals who may need to become more familiar with complex technologies.
The risk-based authentication feature adapts and learns from various parameters or attributes, allowing for a more refined authentication policy. It helps maintain a secure environment by tailoring authentication measures based on user location or device.
I rate it an eight out of ten.