Related Products
|
||||||
About
Google Authenticator generates 2-Step Verification codes on your phone. 2-Step Verification provides stronger security for your Google Account by requiring a second step of verification when you sign in. In addition to your password, you’ll also need a code generated by the Google Authenticator app on your phone. You can use your Google Account to more easily and securely sign in to thousands of sites and services on the web, while keeping your privacy choices transparent in one place. Protect your Google Account with Security Checkup. This detailed tool provides you with personalized and practical recommendations to help you strengthen the security of your Google Account. Hacked passwords are more common than you think. Two-step verification protects you from unauthorized access to your account. To do this, it requests a second step after entering the password.
|
About
Go passwordless. Enter your username and confirm your sign-in with your phone. It’s that easy! Passwords can be forgotten, stolen, or compromised. With Authenticator, your phone provides an extra layer of security on top of your PIN or fingerprint. Use Authenticator to sign-in to Outlook, OneDrive, Office, and more. Protect all of your accounts with two-step verification. The app also helps you secure all of your online accounts by using the industry standard time-based OTP (one-time password) codes.
|
About
Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
Anyone who wants to use 2-factor authentication
|
Audience
Anyone who wants to set up secure two-factor authentication
|
Audience
Companies, enterprises and businesses searching for a solution to manage their cybersecurity, protect your users, and keep their operations secure
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$5 per user per month
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationGoogle
Founded: 1998
United States
g.co/2step
|
Company InformationMicrosoft
Founded: 1975
United States
www.microsoft.com/en-us/account/authenticator
|
Company InformationPing Identity
Founded: 2001
United States
www.pingidentity.com
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
||||||
|
|
|||||
|
|
|||||
|
|
|
||||
Categories |
Categories |
Categories |
||||
Authentication Features
Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On
|
Authentication Features
Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On
|
Authentication Features
Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On
Cloud Security Features
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Identity Management Features
Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning
Single Sign On Features
Biometric
Credential Management
Identity Federation
Multifactor Authentication
Password Management
Policy Management
Social Sign On
User Management
|
||||
Integrations
Delinea Cloud Access Controller
Keeper Security
Keepnet Labs
Securden Endpoint Privilege Manager
Securden Password Vault
Securden Unified PAM
Securden Unified PAM MSP
SecureLink
Adaptive Security
BitTurk
|
Integrations
Delinea Cloud Access Controller
Keeper Security
Keepnet Labs
Securden Endpoint Privilege Manager
Securden Password Vault
Securden Unified PAM
Securden Unified PAM MSP
SecureLink
Adaptive Security
BitTurk
|
Integrations
Delinea Cloud Access Controller
Keeper Security
Keepnet Labs
Securden Endpoint Privilege Manager
Securden Password Vault
Securden Unified PAM
Securden Unified PAM MSP
SecureLink
Adaptive Security
BitTurk
|
||||
|
|
|