No more typing reviews! Try our Samantha, our new voice AI agent.

RSA Adaptive Authentication vs Thales Authenticators comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

RSA Adaptive Authentication
Ranking in Authentication Systems
24th
Average Rating
6.8
Number of Reviews
6
Ranking in other categories
No ranking in other categories
Thales Authenticators
Ranking in Authentication Systems
11th
Average Rating
8.0
Reviews Sentiment
7.6
Number of Reviews
5
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2026, in the Authentication Systems category, the mindshare of RSA Adaptive Authentication is 1.6%, up from 0.6% compared to the previous year. The mindshare of Thales Authenticators is 2.4%, up from 2.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems Mindshare Distribution
ProductMindshare (%)
Thales Authenticators2.4%
RSA Adaptive Authentication1.6%
Other96.0%
Authentication Systems
 

Featured Reviews

Directorc4e7 - PeerSpot reviewer
Director of Cyber Security at a financial services firm with 1,001-5,000 employees
We need better ease of use; the product is overly complicated
There are many use cases that we have defined based on our business needs Ingestion of logs and raising alert space on those logs are the most valuable features. The product is basically unusable. We need better ease of use; it's overly complicated. It has taken years to implement. We used RSA…
Gustavo Merighi - PeerSpot reviewer
Automation and Telecommunications Analyst at Grupo Energisa
Has an easy-to-use management interface and a straightforward initial setup process
Our primary use cases include multifactor authentication for VPN connections and access to security tools like jump servers and firewalls. We also use it to enhance security measures in an enterprise environment The most valuable feature is the YAML 2.0 integration. It has an easy-to-use…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature is the stock tokens, which work the best for us."
"It has reduced false positives greatly in our fraud detection ability."
"Ingestion of logs and raising alert space on those logs are the most valuable features."
"One of the most valuable features is the fraud detection capability with minimal friction in the customer experience."
"The capability to manage your business policy related to security when required without vendor involvement."
"Risk Engine’s risk score, eFN, GeoIP, and device binding all coming together in the Policy Rules to decide when to escalate to MFA."
"Ingestion of logs and raising alert space on those logs are the most valuable features."
"Once we started adopting these products, we've seen the fraud losses go down considerably."
"The solution is scalable and stable."
"The most valuable feature of SafeNet Authentication Manager is authentication."
"I like how the solution allows me to support different types of hardware tokens and integrate with OTP."
"The technical support services are good."
"Scalable and stable."
"The solution has helped our organization by allowing all users to connect securely."
"We use this solution to log into virtual machines like VMware and VMware Horizon."
"I like how the solution allows me to support different types of hardware tokens and integrate with OTP."
 

Cons

"It's an okay solution. It's just old technology and it's time to move on."
"It has taken years to implement."
"RSA Adaptive Authentication lacks a mechanism to verify the identity of a new user in the Enrollment event workflow."
"The product is basically unusable. We need better ease of use; it's overly complicated."
"Reporting modules is one of the major areas that can be improved further."
"I would like to see a more adaptive type of solution, something that we could use on our web pages..."
"RSA Adaptive Authentication lacks a mechanism to verify the identity of a new user in the Enrollment event workflow."
"Reporting modules is one of the major areas that can be improved further."
"The scalability could improve, we have a lot of downtimes two years ago; this was in the cloud environment, because we purchased SafeNet Authentication Manager as a cloud service, and sometimes it was down for two or three hours."
"I'd like to see integration with other platforms."
"The stability could improve."
"The problem with SafeNet is that it's not integrated with Microsoft 365."
"Lacks integration with other platforms."
"The solution should allow for support of multi-tenant architecture."
"The solution should allow for support of multi-tenant architecture."
"The product could be improved by adding more features for sending tokens via SMS or phone calls."
 

Pricing and Cost Advice

"Customers need to deploy the solution in a very expensive infrastructure. RSA should should think about a less expensive infrastructure for customers because the solution costs around $100,000, and the infrastructure needed to support that solution may be even more expensive than that price."
"Keep the proxy service layer on premises. That consumes SaaS security services on the back-end."
"You may need to opt for second best if funding is low and the number of users is huge. However, the pricing is able to be negotiated if your user figures are huge."
"The pricing is $50 per head, yearly."
"There is an annual licensing fee."
"Thales is more expensive than its competitors."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
885,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
27%
Construction Company
10%
Comms Service Provider
10%
Healthcare Company
10%
Financial Services Firm
12%
Government
10%
Manufacturing Company
9%
Comms Service Provider
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Midsize Enterprise1
Large Enterprise6
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What needs improvement with Thales Authenticators?
Currently, the solution fulfills our requirements. We are very satisfied with its features, and do not have any specific ideas for improvement right now. Perhaps, in the future, three-factor authen...
What is your primary use case for Thales Authenticators?
Our employees, whether working on-site or remotely, use Thales Authenticators for two-factor authentication to log in to their laptops or PCs. This is our primary use case.
What advice do you have for others considering Thales Authenticators?
From our past years of experience, the solution is very smooth, and we have had a good experience with it. We would definitely recommend Thales to others for its reliability and features. I'd rate ...
 

Also Known As

No data available
Gemalto Ezio, Ezio, Gemalto Authenticators, SafeNet Authentication Manager
 

Overview

 

Sample Customers

ADP, Ameritas, Partners Healthcare
Standard Chartered Bank (SCB)
Find out what your peers are saying about RSA Adaptive Authentication vs. Thales Authenticators and other solutions. Updated: March 2026.
885,311 professionals have used our research since 2012.