UserLock vs i-Sprint AccessMatrix Universal Access Management comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between i-Sprint AccessMatrix Universal Access Management and UserLock based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems.
To learn more, read our detailed Authentication Systems Report (Updated: April 2024).
769,630 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The feature that I have found the most valuable is that they are open to connecting with any token. For example, a year ago, we were looking for a soft token, and we started to look for alternatives. They are open to connecting with any token that we looking for.""The solution has high support capability."

More i-Sprint AccessMatrix Universal Access Management Pros →

"We mainly implemented UserLock for multi-factor authentication, but the user login insights are also nice.""The most valuable features are two-factor authentication and real-time logon monitoring."

More UserLock Pros →

Cons
"The tool needs to improve its cloud capability.""The user interface is not quite good and easy to use. There are a lot of menus, and the look and feel is not modern like a modern app."

More i-Sprint AccessMatrix Universal Access Management Cons →

"The product and service are already great as it is but if I could add one feature, I guess it would be nice to have another factor of authentication (two additional factors) like your phone and a token for example, for when people forget their phone at home.""I would like to see UserLock add the ability to automatically create a group policy in Active Directory. That might streamline the setup process."

More UserLock Cons →

Pricing and Cost Advice
  • "I would rate the solution's pricing a three out of ten. The tool's licensing is monthly."
  • More i-Sprint AccessMatrix Universal Access Management Pricing and Cost Advice →

  • "You will be hard-pressed to find better pricing."
  • More UserLock Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
    769,630 professionals have used our research since 2012.
    Questions from the Community
    Ranking
    40th
    Views
    152
    Comparisons
    105
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    21st
    Views
    1,230
    Comparisons
    907
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Comparisons
    Also Known As
    AccessMatrix Universal Access Management, i-Sprint Innovations AccessMatrix, AccessMatrix
    Learn More
    Overview

    AccessMatrix is a suite of integrated ICAM (Identity, Credential, Access Management and Versatile Authentication solutions) that enable organizations to effectively deploy versatile authentication, unified single sign-on, secure credential management services, flexible identity & role administration, externalized authorization, and provide comprehensive data analytics of access to important information assets.

    Two Factor Authentication & Access Management for Windows Active Directory.

    UserLock helps administrators to manage and secure access for every user, without obstructing employees or frustrating IT.

    Two Factor Authentication on Windows logon, RDP, IIS and VPN connections. UserLock supports 2FA using authenticator applications which include Google Authenticator, Microsoft Authenticator and LastPass Authenticator, or programmable hardware tokens such as YubiKey and Token2.

    Single Sign-On: Secure and frictionless access to Microsoft 365 and other Cloud Applications, using on-premise Active Directory credentials.

    Access Restrictions: Using the contextual information around a user’s logon, UserLock will authorize, deny or limit how a user can access the network, once authenticated.

    Access Monitoring: Track and alert on all users’ logon and logoff activity in real-time. Interact remotely with any session and respond to login behavior. 

    Access Auditing: Record and report on all user connection events to provide a central audit across the whole network.

    Sample Customers
    IRAS, Singapore Bank
    Barclays, US Department of Justice, National Bank of Kuwait, Turkish Aerospace, New York Albany School District, Regtransfers, University of Kent, Camden City School District, Oklahoma City Public Schools, Bank of Cyprus, Detran-PE: Pernambuco State Traffic Department
    Top Industries
    No Data Available
    VISITORS READING REVIEWS
    Computer Software Company10%
    Government10%
    Financial Services Firm9%
    Construction Company8%
    Company Size
    No Data Available
    VISITORS READING REVIEWS
    Small Business39%
    Midsize Enterprise12%
    Large Enterprise48%
    Buyer's Guide
    Authentication Systems
    April 2024
    Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems. Updated: April 2024.
    769,630 professionals have used our research since 2012.

    i-Sprint AccessMatrix Universal Access Management is ranked 40th in Authentication Systems with 2 reviews while UserLock is ranked 21st in Authentication Systems. i-Sprint AccessMatrix Universal Access Management is rated 8.0, while UserLock is rated 10.0. The top reviewer of i-Sprint AccessMatrix Universal Access Management writes "A stable and scalable solution with reasonable pricing ". On the other hand, the top reviewer of UserLock writes "Affordable, easy to use, and integrates well with Active Directory". i-Sprint AccessMatrix Universal Access Management is most compared with CyberArk Privileged Access Manager, whereas UserLock is most compared with Cisco Duo, Microsoft Entra ID, Fortinet FortiAuthenticator, Silverfort and AlertEnterprise Enterprise Guardian.

    See our list of best Authentication Systems vendors and best Access Management vendors.

    We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.