Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • FusionAuth Reviews & Ratings
    178 Ratings
    Company Website
  • Auth0 Reviews & Ratings
    1,037 Ratings
    Company Website
  • 1Password Reviews & Ratings
    16,573 Ratings
    Company Website
  • Frontegg Reviews & Ratings
    383 Ratings
    Company Website
  • ManageEngine ADSelfService Plus Reviews & Ratings
    122 Ratings
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    2,263 Ratings
    Company Website
  • Uniqkey Reviews & Ratings
    181 Ratings
    Company Website
  • Proton Pass Reviews & Ratings
    31,996 Ratings
    Company Website
  • Cerberus FTP Server Reviews & Ratings
    159 Ratings
    Company Website
  • Thinfinity Workspace Reviews & Ratings
    14 Ratings
    Company Website

What is Entrust Identity Essentials?

Multi-factor authentication (MFA) is a quick and economical solution that enables organizations using Windows to implement a Zero Trust framework effectively. Begin by adopting a user-friendly and easily deployable on-premises MFA system, which can later be transitioned to a cloud-based Identity as a Service if needed. This transition ensures a smooth integration between the two systems, offering a seamless user experience along with three additional authentication alternatives: mobile push notifications, device fingerprinting, and grid cards. With just one license, you can secure and enhance your digital operations. Furthermore, adaptive authentication and self-service password resets help minimize user friction, allowing for tailored authentication strategies based on specific user needs and requirements. There is also a wide variety of authentication methods available, including SMS, voice calls, email, and one-time passwords (OTP). Additionally, users have the option to utilize smartphone biometrics such as fingerprint or facial recognition for added security. To maintain email security, ActiveSync for Outlook restricts unauthorized devices from accessing users' email without requiring Mobile Device Management (MDM) integration, ensuring a robust protective measure is in place. Overall, these features collectively strengthen the security posture of organizations while enhancing user convenience.

What is Akamai MFA?

Make it easy to resist phishing threats by using mobile push notifications for authentication. Protect employee accounts from takeover attempts and prevent data breaches by utilizing phish-proof multi-factor authentication (MFA). Minimize the risk of bypassing MFA by adopting the highest standards in multi-factor authentication. Integrate end-to-end encryption to make sure MFA remains impervious to phishing attacks. Move away from cumbersome physical security keys and welcome a smooth adoption experience through self-service enrollment paired with a user-friendly mobile app interface. Attain superior authentication with FIDO2, which boosts security without the need for extra hardware. This approach lightens the load for administrators, providing FIDO2 MFA security accessible on any smartphone, countering phishing threats with simple push notifications. You can select from various authentication options, such as secure push notifications, standard push notifications, TOTP, and SMS. This solution works seamlessly with top identity providers and identity management systems to create a unified MFA experience. It automates the user provisioning process, ensuring that any changes made in the identity provider are promptly reflected. Furthermore, detailed reporting features equip administrative teams with vital insights into authentication activities, enhancing their situational awareness and response readiness. By making the authentication experience more straightforward, organizations can dramatically improve their security posture while simultaneously lowering operational complexity. Ultimately, a simplified authentication framework empowers organizations to focus more on their core missions, knowing their security measures are robust and effective.

Media

Media

Integrations Supported

Microsoft Azure
Akamai
Amazon Web Services (AWS)
Bravura Identity
CyberArk Conjur
CyberArk Machine Identity Security
Delinea Privilege Manager
Entrust Identity as a Service
Entrust Instant ID
Entrust IoT Agent
Gigamon
HashiCorp Boundary
IBM Cloud
Microsoft 365
Okta
Palo Alto Networks AutoFocus
RadiantOne
VaultCore
k0rdent

Integrations Supported

Microsoft Azure
Akamai
Amazon Web Services (AWS)
Bravura Identity
CyberArk Conjur
CyberArk Machine Identity Security
Delinea Privilege Manager
Entrust Identity as a Service
Entrust Instant ID
Entrust IoT Agent
Gigamon
HashiCorp Boundary
IBM Cloud
Microsoft 365
Okta
Palo Alto Networks AutoFocus
RadiantOne
VaultCore
k0rdent

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Free
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Entrust

Date Founded

1969

Company Location

United States

Company Website

www.entrust.com/products/iam/identity-essentials

Company Facts

Organization Name

Akamai

Date Founded

1998

Company Location

United States

Company Website

www.akamai.com/products/akamai-mfa

Categories and Features

Popular Alternatives

Popular Alternatives

Deepnet DualShield Reviews & Ratings

Deepnet DualShield

Deepnet Security
FortiToken Reviews & Ratings

FortiToken

Fortinet