Try our new research platform with insights from 80,000+ expert users

RSA Adaptive Authentication vs UserLock comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

RSA Adaptive Authentication
Ranking in Authentication Systems
27th
Average Rating
6.8
Number of Reviews
6
Ranking in other categories
No ranking in other categories
UserLock
Ranking in Authentication Systems
25th
Average Rating
10.0
Number of Reviews
2
Ranking in other categories
Access Management (24th)
 

Mindshare comparison

As of January 2026, in the Authentication Systems category, the mindshare of RSA Adaptive Authentication is 1.2%, up from 0.6% compared to the previous year. The mindshare of UserLock is 1.1%, down from 1.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems Market Share Distribution
ProductMarket Share (%)
UserLock1.1%
RSA Adaptive Authentication1.2%
Other97.7%
Authentication Systems
 

Featured Reviews

Directorc4e7 - PeerSpot reviewer
Director of Cyber Security at a financial services firm with 1,001-5,000 employees
We need better ease of use; the product is overly complicated
There are many use cases that we have defined based on our business needs Ingestion of logs and raising alert space on those logs are the most valuable features. The product is basically unusable. We need better ease of use; it's overly complicated. It has taken years to implement. We used RSA…
Bill H. - PeerSpot reviewer
Information Technology at City Of Keizer
Affordable, easy to use, and integrates well with Active Directory
The product and service are already great as it is but if I could add one feature, I guess it would be nice to have another factor of authentication (two additional factors) like your phone and a token for example, for when people forget their phone at home. It’s not that I mind not having two factors, but I do get that question from time to time from some of our users who think it would be really useful. From what I’ve heard, they’re working on it and it should be coming in the next version so that’s great news.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Our customer are seeing value from the product, as they experience cost reductions. They can stop fraud from their customers, then their customers can have a better experience from their services."
"Risk Engine’s risk score, eFN, GeoIP, and device binding all coming together in the Policy Rules to decide when to escalate to MFA."
"The most valuable feature is the stock tokens. That works the best for us."
"The capability to manage your business policy related to security when required without vendor involvement."
"Ingestion of logs and raising alert space on those logs are the most valuable features."
"We mainly implemented UserLock for multi-factor authentication, but the user login insights are also nice."
"The most valuable features are two-factor authentication and real-time logon monitoring."
 

Cons

"RSA Adaptive Authentication lacks a mechanism to verify the identity of a new user in the Enrollment event workflow."
"Reporting modules is one of the major areas that can be improved further."
"Better filters when searching for events. The current features for current filters when searching fraud events are not very comprehensive. You can only filter by certain fields in the transaction."
"The product is basically unusable. We need better ease of use; it's overly complicated."
"I would like to see a more adaptive type of solution, something that we could use on our web pages..."
"It has taken years to implement."
"The product and service are already great as it is but if I could add one feature, I guess it would be nice to have another factor of authentication (two additional factors) like your phone and a token for example, for when people forget their phone at home."
"I would like to see UserLock add the ability to automatically create a group policy in Active Directory. That might streamline the setup process."
 

Pricing and Cost Advice

"Keep the proxy service layer on premises. That consumes SaaS security services on the back-end."
"The pricing is $50 per head, yearly."
"You may need to opt for second best if funding is low and the number of users is huge. However, the pricing is able to be negotiated if your user figures are huge."
"Customers need to deploy the solution in a very expensive infrastructure. RSA should should think about a less expensive infrastructure for customers because the solution costs around $100,000, and the infrastructure needed to support that solution may be even more expensive than that price."
"You will be hard-pressed to find better pricing."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
881,114 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Government
17%
Manufacturing Company
8%
Comms Service Provider
8%
University
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Midsize Enterprise1
Large Enterprise6
No data available
 

Overview

 

Sample Customers

ADP, Ameritas, Partners Healthcare
Barclays, US Department of Justice, National Bank of Kuwait, Turkish Aerospace, New York Albany School District, Regtransfers, University of Kent, Camden City School District, Oklahoma City Public Schools, Bank of Cyprus, Detran-PE: Pernambuco State Traffic Department
Find out what your peers are saying about RSA Adaptive Authentication vs. UserLock and other solutions. Updated: December 2025.
881,114 professionals have used our research since 2012.