No more typing reviews! Try our Samantha, our new voice AI agent.

RSA Adaptive Authentication vs Thales Authenticators comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

RSA Adaptive Authentication
Ranking in Authentication Systems
24th
Average Rating
6.8
Number of Reviews
6
Ranking in other categories
No ranking in other categories
Thales Authenticators
Ranking in Authentication Systems
11th
Average Rating
8.0
Reviews Sentiment
7.6
Number of Reviews
5
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2026, in the Authentication Systems category, the mindshare of RSA Adaptive Authentication is 1.6%, up from 0.6% compared to the previous year. The mindshare of Thales Authenticators is 2.4%, up from 2.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems Mindshare Distribution
ProductMindshare (%)
Thales Authenticators2.4%
RSA Adaptive Authentication1.6%
Other96.0%
Authentication Systems
 

Featured Reviews

Directorc4e7 - PeerSpot reviewer
Director of Cyber Security at a financial services firm with 1,001-5,000 employees
We need better ease of use; the product is overly complicated
There are many use cases that we have defined based on our business needs Ingestion of logs and raising alert space on those logs are the most valuable features. The product is basically unusable. We need better ease of use; it's overly complicated. It has taken years to implement. We used RSA…
Gustavo Merighi - PeerSpot reviewer
Automation and Telecommunications Analyst at Grupo Energisa
Has an easy-to-use management interface and a straightforward initial setup process
Our primary use cases include multifactor authentication for VPN connections and access to security tools like jump servers and firewalls. We also use it to enhance security measures in an enterprise environment The most valuable feature is the YAML 2.0 integration. It has an easy-to-use…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature is the stock tokens, which work the best for us."
"Ingestion of logs and raising alert space on those logs are the most valuable features."
"The capability to manage your business policy related to security when required without vendor involvement."
"The most valuable feature is the stock tokens. That works the best for us."
"Ingestion of logs and raising alert space on those logs are the most valuable features."
"It has reduced false positives greatly in our fraud detection ability."
"Our customer are seeing value from the product, as they experience cost reductions."
"Our customer are seeing value from the product, as they experience cost reductions. They can stop fraud from their customers, then their customers can have a better experience from their services."
"I like how the solution allows me to support different types of hardware tokens and integrate with OTP."
"We use this solution to log into virtual machines like VMware and VMware Horizon."
"Scalable and stable."
"The solution has helped our organization by allowing all users to connect securely."
"The solution is scalable and stable."
"The most valuable feature of SafeNet Authentication Manager is authentication."
"The technical support services are good."
"I like how the solution allows me to support different types of hardware tokens and integrate with OTP."
 

Cons

"The product is basically unusable. We need better ease of use; it's overly complicated."
"Better filters when searching for events. The current features for current filters when searching fraud events are not very comprehensive. You can only filter by certain fields in the transaction."
"Better filters when searching for events. The current features for current filters when searching fraud events are not very comprehensive."
"I think I would like to see them use more of our data, and give us more ability to control or configure how the protection patterns work for a specific business, and also provide more transparency into the methodology."
"It's an okay solution. It's just old technology and it's time to move on."
"The product is basically unusable. We need better ease of use; it's overly complicated."
"Reporting modules is one of the major areas that can be improved further."
"Reporting modules is one of the major areas that can be improved further."
"Lacks integration with other platforms."
"The solution should allow for support of multi-tenant architecture."
"The scalability could improve, we have a lot of downtimes two years ago; this was in the cloud environment, because we purchased SafeNet Authentication Manager as a cloud service, and sometimes it was down for two or three hours."
"The product could be improved by adding more features for sending tokens via SMS or phone calls."
"I'd like to see integration with other platforms."
"The problem with SafeNet is that it's not integrated with Microsoft 365."
"The solution should allow for support of multi-tenant architecture."
"The stability could improve."
 

Pricing and Cost Advice

"Keep the proxy service layer on premises. That consumes SaaS security services on the back-end."
"You may need to opt for second best if funding is low and the number of users is huge. However, the pricing is able to be negotiated if your user figures are huge."
"Customers need to deploy the solution in a very expensive infrastructure. RSA should should think about a less expensive infrastructure for customers because the solution costs around $100,000, and the infrastructure needed to support that solution may be even more expensive than that price."
"The pricing is $50 per head, yearly."
"Thales is more expensive than its competitors."
"There is an annual licensing fee."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
885,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
27%
Construction Company
10%
Comms Service Provider
10%
Healthcare Company
10%
Financial Services Firm
12%
Government
10%
Manufacturing Company
9%
Comms Service Provider
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Midsize Enterprise1
Large Enterprise6
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What needs improvement with Thales Authenticators?
Currently, the solution fulfills our requirements. We are very satisfied with its features, and do not have any specific ideas for improvement right now. Perhaps, in the future, three-factor authen...
What is your primary use case for Thales Authenticators?
Our employees, whether working on-site or remotely, use Thales Authenticators for two-factor authentication to log in to their laptops or PCs. This is our primary use case.
What advice do you have for others considering Thales Authenticators?
From our past years of experience, the solution is very smooth, and we have had a good experience with it. We would definitely recommend Thales to others for its reliability and features. I'd rate ...
 

Also Known As

No data available
Gemalto Ezio, Ezio, Gemalto Authenticators, SafeNet Authentication Manager
 

Overview

 

Sample Customers

ADP, Ameritas, Partners Healthcare
Standard Chartered Bank (SCB)
Find out what your peers are saying about RSA Adaptive Authentication vs. Thales Authenticators and other solutions. Updated: March 2026.
885,311 professionals have used our research since 2012.