Coming October 25: PeerSpot Awards will be announced! Learn more

RSA Adaptive Authentication vs i-Sprint AccessMatrix Universal Authentication Server comparison

Cancel
You must select at least 2 products to compare!
Executive Summary

We performed a comparison between i-Sprint AccessMatrix Universal Authentication Server and RSA Adaptive Authentication based on real PeerSpot user reviews.

Find out in this report how the two Authentication Systems solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.

633,952 professionals have used our research since 2012.
Ranking
58th
Views
25
Comparisons
14
Reviews
0
Average Words per Review
0
Rating
N/A
20th
Views
642
Comparisons
482
Reviews
0
Average Words per Review
0
Rating
N/A
Buyer's Guide
Authentication Systems
September 2022
Find out what your peers are saying about Cisco, Fortinet, Microsoft and others in Authentication Systems. Updated: September 2022.
633,952 professionals have used our research since 2012.
Comparisons
Learn More
Overview

AccessMatrix™ Universal Authentication Server (UAS), is a comprehensive and versatile authentication server that enable organizations to centralize all its authentication schemes in a single unified platform. It is a future-proof authentication infrastructure that supports multiple authentication mechanisms (such as passwords, OTP, biometrics) for strong authentication and authorization requirements.

UAS offers the freedom for organizations to deploy various authentication methods from different vendors under one platform, and manage it as a holistic security approach. This means organizations will not be restricted or locked to a specific hardware or software authentication solution. The use of Pluggable Authentication Module (PAM) approach also allows organizations to have ease of adding new methods when available on top of their existing scheme.

RSA Adaptive Authentication is a risk-based two-factor authentication solution providing cost-effective protection for an entire user base. Adaptive Authentication secures online portals, SSL VPNs, and web access management portals for different types of organizations in the healthcare, insurance, enterprise, government, financial services, and other industries. Based on the transparent two-factor authentication technology, Adaptive Authentication works behind the scenes to authenticate end users and transactions based on individual end user and device profiles. In addition, Adaptive Authentication uses the RSA Risk Engine to estimate the level of risk for the specific activity and uses information collected from the RSAeFraudNetwork (a cross-organization, cross-application, cross-border online fraud network) to identify fraudulent activities. The Policy Manager determines what actions must be performed, depending on the risk score and other parameters.
Offer
Learn more about i-Sprint AccessMatrix Universal Authentication Server
Learn more about RSA Adaptive Authentication
Sample Customers
AmBank Group, Cathay United Bank
ADP, Ameritas, Partners Healthcare
Top Industries
No Data Available
VISITORS READING REVIEWS
Financial Services Firm26%
Computer Software Company24%
Comms Service Provider8%
Manufacturing Company5%
Company Size
No Data Available
REVIEWERS
Midsize Enterprise14%
Large Enterprise86%
VISITORS READING REVIEWS
Small Business20%
Midsize Enterprise9%
Large Enterprise70%
Buyer's Guide
Authentication Systems
September 2022
Find out what your peers are saying about Cisco, Fortinet, Microsoft and others in Authentication Systems. Updated: September 2022.
633,952 professionals have used our research since 2012.

i-Sprint AccessMatrix Universal Authentication Server is ranked 58th in Authentication Systems while RSA Adaptive Authentication is ranked 20th in Authentication Systems. i-Sprint AccessMatrix Universal Authentication Server is rated 0.0, while RSA Adaptive Authentication is rated 0.0. On the other hand, i-Sprint AccessMatrix Universal Authentication Server is most compared with , whereas RSA Adaptive Authentication is most compared with ThreatMetrix, RSA Authentication Manager and Fortinet FortiAuthenticator.

See our list of best Authentication Systems vendors.

We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.