Symantec Advanced Authentication vs UserLock comparison

Cancel
You must select at least 2 products to compare!
Broadcom Logo
334 views|204 comparisons
77% willing to recommend
IS Decisions Logo
1,230 views|907 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Symantec Advanced Authentication and UserLock based on real PeerSpot user reviews.

Find out in this report how the two Authentication Systems solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Symantec Advanced Authentication vs. UserLock Report (Updated: May 2024).
771,157 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"One of the most valuable aspects is its remarkable stability.""It tells us exactly what we want in terms of authentication to various applications and provides protection for users who access them.""One of the most valuable features of this solution is that it's a strong authentication solution that's able to integrate with applications.""Rules on Risk Authentication are very good."

More Symantec Advanced Authentication Pros →

"We mainly implemented UserLock for multi-factor authentication, but the user login insights are also nice.""The most valuable features are two-factor authentication and real-time logon monitoring."

More UserLock Pros →

Cons
"Urgent improvement is necessary to ensure that support responses are faster and more effective, aligning with the demands of MFA implementation.""We have seen quite a few issues with bugginess. It is indeed pretty buggy and we have had to install some fixes.""This solution could be improved with risk-based authentication. I think that this product has everything that most customers are looking for, but modern technology has people looking for security tools with risk-based authentication, which they have a separate tool for. If they could integrate this, it would improve Symantec Advanced Authentication. They have to look at what's newly trending and how things are moving forward, and then adapt and adopt those features. Symantec's technical support should also be improved, in terms of response time.""Advanced Authentication talks about the Device ID. But how the device ID is captured, I want to know more about that."

More Symantec Advanced Authentication Cons →

"I would like to see UserLock add the ability to automatically create a group policy in Active Directory. That might streamline the setup process.""The product and service are already great as it is but if I could add one feature, I guess it would be nice to have another factor of authentication (two additional factors) like your phone and a token for example, for when people forget their phone at home."

More UserLock Cons →

Pricing and Cost Advice
  • "There are eventually going to be implementation costs. Sometimes you're required to have custom code developments there, so that has to be part of the implementation price."
  • "The price is reasonable."
  • More Symantec Advanced Authentication Pricing and Cost Advice →

  • "You will be hard-pressed to find better pricing."
  • More UserLock Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
    771,157 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:One of the most valuable aspects is its remarkable stability.
    Top Answer:There has been a need for aggressive development to modernize the product and align it with contemporary security requirements. While the rebranding has been a step forward, further enhancements are… more »
    Ask a question

    Earn 20 points

    Ranking
    18th
    Views
    334
    Comparisons
    204
    Reviews
    1
    Average Words per Review
    770
    Rating
    7.0
    21st
    Views
    1,230
    Comparisons
    907
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Comparisons
    Also Known As
    CA Advanced Authentication, CA Strong Authentication, CA Risk Authentication, Arcot WebFort, Arcot RiskFort
    Learn More
    Overview

    CA Advanced Authentication provides a secure, user-convenient and cost-effective way to protect online and mobile applications. The solution consists of two components:  CA Risk Authentication allows the enterprise to silently and transparently collect data and assess risk based on device identification, location and user behavior, among other factors, and CA Strong Authentication provides a wide variety of software-based, two-factor authentication credentials and technology to make passwords more secure.  Together they enable an intelligent, layered security approach to protect user identities and organizational data.

    Take the assessment


    Two Factor Authentication & Access Management for Windows Active Directory.

    UserLock helps administrators to manage and secure access for every user, without obstructing employees or frustrating IT.

    Two Factor Authentication on Windows logon, RDP, IIS and VPN connections. UserLock supports 2FA using authenticator applications which include Google Authenticator, Microsoft Authenticator and LastPass Authenticator, or programmable hardware tokens such as YubiKey and Token2.

    Single Sign-On: Secure and frictionless access to Microsoft 365 and other Cloud Applications, using on-premise Active Directory credentials.

    Access Restrictions: Using the contextual information around a user’s logon, UserLock will authorize, deny or limit how a user can access the network, once authenticated.

    Access Monitoring: Track and alert on all users’ logon and logoff activity in real-time. Interact remotely with any session and respond to login behavior. 

    Access Auditing: Record and report on all user connection events to provide a central audit across the whole network.

    Sample Customers
    Global bank, Large Filipino Bank and SK Infosec
    Barclays, US Department of Justice, National Bank of Kuwait, Turkish Aerospace, New York Albany School District, Regtransfers, University of Kent, Camden City School District, Oklahoma City Public Schools, Bank of Cyprus, Detran-PE: Pernambuco State Traffic Department
    Top Industries
    VISITORS READING REVIEWS
    Financial Services Firm25%
    Comms Service Provider13%
    Real Estate/Law Firm13%
    Computer Software Company11%
    VISITORS READING REVIEWS
    Government10%
    Computer Software Company9%
    Construction Company8%
    Financial Services Firm8%
    Company Size
    REVIEWERS
    Small Business22%
    Large Enterprise78%
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise6%
    Large Enterprise67%
    VISITORS READING REVIEWS
    Small Business40%
    Midsize Enterprise12%
    Large Enterprise48%
    Buyer's Guide
    Symantec Advanced Authentication vs. UserLock
    May 2024
    Find out what your peers are saying about Symantec Advanced Authentication vs. UserLock and other solutions. Updated: May 2024.
    771,157 professionals have used our research since 2012.

    Symantec Advanced Authentication is ranked 18th in Authentication Systems with 9 reviews while UserLock is ranked 21st in Authentication Systems. Symantec Advanced Authentication is rated 7.8, while UserLock is rated 10.0. The top reviewer of Symantec Advanced Authentication writes "Ensures robust security features and ease of deployment, although it may lack some of the more modern authentication options ". On the other hand, the top reviewer of UserLock writes "Affordable, easy to use, and integrates well with Active Directory". Symantec Advanced Authentication is most compared with Thales Authenticators and OneSpan DIGIPASS, whereas UserLock is most compared with Cisco Duo, Microsoft Entra ID, Fortinet FortiAuthenticator, Silverfort and AlertEnterprise Enterprise Guardian. See our Symantec Advanced Authentication vs. UserLock report.

    See our list of best Authentication Systems vendors.

    We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.