2021-05-21T06:35:20Z

What is your primary use case for RSA SecurID Access?

Miriam Tover - PeerSpot reviewer
  • 0
  • 5
PeerSpot user
5

5 Answers

Chandan Tripathi - PeerSpot reviewer
Real User
Top 10
2023-09-29T13:43:33Z
Sep 29, 2023

We use it to make logins more secure by using multifactor authentication, making it easier to access various digital resources with a single sign-on.

Search for a product comparison
HW
Reseller
Top 5
2023-07-21T07:11:08Z
Jul 21, 2023

I have telecom customers in Indonesia primarily using this solution. They use RSA SecurID Access for adaptive authentication capabilities.

Santhosh Rajamanickam - PeerSpot reviewer
Consultant
Top 10
2023-05-11T12:57:33Z
May 11, 2023

Currently, we do not have any additional sensitive servers, but we were recently tasked with implementing two-factor authentication for all of our servers. To accomplish this, we evaluated multiple vendors and found that RSA SecurID Access was the most compatible solution. Furthermore, RSA SecurID Access is well-established in the industry, making it the preferred choice for our needs.

Justine Sabordo - PeerSpot reviewer
Reseller
Top 10
2023-05-11T09:56:00Z
May 11, 2023

The use case depends on the requirements of the customer. If they have on-premise and cloud requirements, it's the best use case instead of using Microsoft, which only supports cloud applications. Our company also offers Microsoft Authenticator and Office 360. We can compete with Microsoft in terms of cloud-only use cases or when the company has requirements beyond just user needs.

RG
Real User
2021-05-21T06:35:20Z
May 21, 2021

We mainly use this solution for multifactor authentication.

Find out what your peers are saying about RSA, Yubico, Microsoft and others in Authentication Systems. Updated: March 2024.
765,386 professionals have used our research since 2012.
Authentication Systems
Authentication is the most fundamental component of access management and is part of security requirements in the digital world. It verifies the identity of users trying to access systems and data by validating their credentials.
Download Authentication Systems ReportRead more