Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. View our editorial policy here.

1Eight RSA SecurID Alternatives

PhoneFactorA smartphone-based out-of-band authenticator, PhoneFactor is gunning for former SecurID customers. The company is offering up to $5 of credit per SecurID token swapped out, along with deployment assistance for customers willing to make the transition.

2No Title

CA Arcot ID A Arcot ID is a software-based token that adds the flexibility of being able to use it on multiple devices. As an added benefit, CA is gunning for RSA customers with a token swap-out program that could be the added sweetener that many organizations looking for an excuse to switch really need to pull the trigger.

3No Title

Iron KeyDesigned specifically for the financial industry, IronKey Trusted Access for Banking is a USB device that creates a locked-down virtual environment on banking customer’s machines to provide an encrypted connection to the online application. It protects against DNS attacks, keyloggers and more. This can actually be used in conjunction with SecurID, offering another layer of support for those who don’t want to (or can’t) switch but are still concerned.

4No Title

CryptoCardRather than holding on to the token seed data itself, CryptoCard offers customers the ability to manage that sensitive information themselves. Additionally, the solution gives customers the ability to reseed their tokens at will–not theoretically as secure, but definitely more convenient.

5No Title

Vasco DIGIPASS GORSA customers used to the typical keyfob token will be comfortable with DIGIPASS GO’s familiar form. In this line VASCO offers a range of one time password options, from time and event-based authentication to standard bank account authenticators. DIGIPASS also offers a number of other authentication choices, including PKI and software-based authenticators.

6No Title

AdmitOneSecurityAdmitOneSecurity offers a unique approach on strong authentication, verifying user identity by the keystroke dynamics of every user. The rhythm with which we type is unique to every user, a fact that AdmitOneSecurity uses to analyze sign-ins and prevent fraudulent authentication.

7No Title

SecureAuthSince April SecureAuth has been touting its Quick Start program as a way to transition customers away from SecurID token environments onto its SecureAuth Identity Enforcement Platform (IEP), which integrates security token service, multiple two-Factor Authentication options, single sign on, and identity management services in a single solution for cloud and on-premise applications and resources.

8No Title

Trusted Computing GroupNot a specific vendor product per se, the trusted platform modules (TPMs) built into nearly all endpoints today are little receptacles designed to hold cryptographic keys and offer hardware authentication. The Trusted Computing Group has long evangelized the idea that proper use of TPMs to establish trusted connections between the TPM-enabled machine and the remote application is the best way to solve many authentication problems in the future.

Subscribe for updates!

You must input a valid work email address.
You must agree to our terms.