Delinea Authentication Service vs Thales Authenticators comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Delinea Authentication Service and Thales Authenticators based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems.
To learn more, read our detailed Authentication Systems Report (Updated: April 2024).
767,995 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pricing and Cost Advice
Information Not Available
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
767,995 professionals have used our research since 2012.
Questions from the Community
Ask a question

Earn 20 points

Top Answer:We use this solution to log into virtual machines like VMware and VMware Horizon.
Top Answer:The problem with SafeNet is that it's not integrated with Microsoft 365. That was the breaking point for us. The security is a little bit redundant because if you have already unlocked your phone… more »
Top Answer:We use this solution to log into virtual machines like VMware and VMware Horizon. The solution is deployed on a hybrid cloud.
Ranking
30th
Views
181
Comparisons
139
Reviews
0
Average Words per Review
0
Rating
N/A
17th
Views
1,810
Comparisons
1,578
Reviews
1
Average Words per Review
406
Rating
8.0
Comparisons
Also Known As
Centrify Authentication Service
Gemalto Ezio, Ezio, Gemalto Authenticators, SafeNet Authentication Manager
Learn More
Overview

Cloud-ready Zero Trust Privilege is designed to handle requesters that are not only human but also machines, services and APIs. There will still be shared accounts, but for increased assurance, best practices now recommend individual identities, not shared accounts, where least privilege can be applied. Delinea Authentication Service allows properly verifying who requests privileged access. This can be achieved by leveraging enterprise directory identities, eliminating local accounts and decreasing the overall number of accounts and passwords, therefore reducing the attack surface.

Offering the broadest range of authentication methods and form factors, Thales allows customers to address numerous use cases, assurance levels, and threat vectors with unified, centrally managed policies—managed from one authentication back end delivered in the cloud or on premise.

Sample Customers
GOGO
Standard Chartered Bank (SCB)
Top Industries
VISITORS READING REVIEWS
Computer Software Company20%
Financial Services Firm12%
Wholesaler/Distributor9%
Insurance Company7%
VISITORS READING REVIEWS
Computer Software Company18%
Financial Services Firm14%
Government10%
Comms Service Provider10%
Company Size
VISITORS READING REVIEWS
Small Business22%
Midsize Enterprise22%
Large Enterprise57%
VISITORS READING REVIEWS
Small Business23%
Midsize Enterprise12%
Large Enterprise66%
Buyer's Guide
Authentication Systems
April 2024
Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems. Updated: April 2024.
767,995 professionals have used our research since 2012.

Delinea Authentication Service is ranked 30th in Authentication Systems while Thales Authenticators is ranked 17th in Authentication Systems with 4 reviews. Delinea Authentication Service is rated 0.0, while Thales Authenticators is rated 7.8. On the other hand, the top reviewer of Thales Authenticators writes "Responsive support, effective authentication, but stability could improve". Delinea Authentication Service is most compared with BeyondTrust Active Directory (AD) Bridge, Fortinet FortiAuthenticator and Silverfort, whereas Thales Authenticators is most compared with Yubico YubiKey, Microsoft Entra ID, Cisco Duo, Atalla Hardware Security Module and Utimaco SecurityServer.

See our list of best Authentication Systems vendors.

We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.