# Entrust Identity as a Service Software Pricing, Alternatives & More 2026 | Capterra

> With the help of Capterra, learn about Entrust Identity as a Service Software - reviews, pricing plans, popular comparisons to other Authentication products and more.

Source: https://www.capterra.com/p/183377/IntelliTrust/alternatives

---

# 

 Entrust Identity as a Service Software Review 2026: Features, Reviews, Integrations, Pros & Cons

Last updated on March 13, 2026

Provider data verified by our Software Research team, and reviews moderated by our Reviews Verification team.

[Description](#description)[Use cases](#use-cases)[Alternatives](#alternatives)[Features](#features)[Pricing](#pricing)[Integrations](#integrations)[Support](#support)[Reviews](#reviews)

Entrust Identity as a Service

## What is Entrust Identity as a Service?

The Entrust Identity as a Service cloud IAM service secures access to devices, applications and resources with an analyst top-rated identity solution that has been proven across critical banking, government and healthcare infrastructures for more than 25 years. Point-and-click provisioning and out-of-the-box integrations with a variety of on-premises and cloud applications makes the Entrust IDaaS solution easy to deploy, so you can be up and running in under 30 minutes.

## What is Entrust Identity as a Service used for?

[Multi-Factor Authentication](https://www.capterra.com/multi-factor-authentication-software/)[Authentication](https://www.capterra.com/authentication-software/)[Identity Management](https://www.capterra.com/identity-management-software/)

Top alternative

Featured

Overall rating

Based on 4 user reviews

Reviews sentiment

Positive

\-

Neutral

\-

Negative

\-

Starting price

$2

Per User, Per Month

Free trial  
available

Capterra Shortlist charts the highest-rated and most popular products...

Our "Best of" badge program showcases products with the highest ratings...

Our "Best of" badge program showcases products with the highest ratings...

Do you work for Entrust Identity as a Service?[Manage this product listing](https://digitalmarkets.gartner.com/get-listed/claim-bx?url=http://www.entrust.com&name=Entrust Identity as a Service)

## Compare with a popular alternative

Capterra selects software alternatives based on relevant features, verified user reviews and user interactions. Placement may be influenced by client status.

### Entrust Identity as a Service

5.0 (4)

VS.

[4.7 (929)](https://www.capterra.com/p/119653/Okta/reviews/)

Starting Price

$2

Per User, Per Month

Starting Price

$6

Per User, Per Month

Free Trial

Free Version

Pricing Options

Free Trial

Free Version

Ease Of Use

5.0 (4)

Ease Of Use

4.6 (913)

Value For Money

4.5 (2)

Value For Money

4.5 (475)

Customer Service

5.0 (2)

Customer Service

4.5 (494)

## Entrust Identity as a Service alternatives

[4.6 (264)](https://www.capterra.com/p/175092/JumpCloud-DaaS/reviews/)

Starting price

$3.00

Per User, Per Month

[4.6 (34)](https://www.capterra.com/p/268487/ManageEngine-AD360/#reviews)

Starting price

Contact vendor for pricing

Highest Rated

[4.9 (4,603)](https://www.capterra.com/p/172127/Rippling/reviews/)

Starting price

$8.00

Per User, Per Month

[4.7 (137)](https://www.capterra.com/p/154900/Auth0/reviews/)

Starting price

Contact vendor for pricing

## Features

Features with the highest number of reviews are displayed first. Those that have no reviews appear next, sorted alphabetically.

Authentication

5.0 (2)

100.00% of 2 reviewers that rated this feature as important or highly important

Verify the identity of users/devices to enable secure access

Mobile Authentication

5.0 (2)

100.00% of 2 reviewers that rated this feature as important or highly important

Verify user identity through mobile devices

Secure Login

5.0 (2)

100.00% of 2 reviewers that rated this feature as important or highly important

At least a username and password is required to access the system

Two-Factor Authentication

5.0 (2)

100.00% of 2 reviewers that rated this feature as important or highly important

Extra layer of security that requires not only a password and username but also something specific to that user

Access Management

5.0 (1)

0.00% of 1 reviewers that rated this feature as important or highly important

Control and manage access to company resources

Alerts/Notifications

5.0 (1)

0.00% of 1 reviewers that rated this feature as important or highly important

Alerts or notifications of various types such as pop-up messages, sounds, banners, or badges

Entrust Identity as a Service 65 features

Verify user access rights within systems to confirm each user has appropriate and authorized access to resources

Regulate who can view information within the system

Define levels of authorization for access to specific files or systems

Control and manage access to company resources

Integrates with Active Directory

Dashboard to view the status of ongoing processes, identify current incidents and track past activities

Track and document all activities across devices, networks, and other systems

Alerts or notifications of various types such as pop-up messages, sounds, banners, or badges

Application programming interface that allows for integration with other systems/databases

Track, manage and store the applications of potential future members, customers or candidates

Plan, schedule, and execute organization's accounts and assets to ensure compliance with policies and laws

A record of all activities within the system, including user access, changes made, etc.

Verify the identity of users/devices to enable secure access

Automatically create schedules based on business needs or employee availability and qualifications

Identify or authenticate a person's identity through biological data such as fingerprints or facial patterns.

Track and manage adherence to policies for any service, product, process, or supplier

Configure existing workflows to meet your organization's needs

Manage usernames, account numbers, passwords, biometric data, public access keys, and other documentation

Add customized logos and colors to align with company branding

Alter the layout and content of reports

Pre-designed layouts that can be customized to match preferences and requirements

Process of checking different types of data for accuracy to avoid errors or inconsistencies

Process of familiarizing new employees with the company, their position, and responsibilities

Passwords are stored in an encrypted format

A chronological record of actions or occurrences within a network, software, or process

Identify and prevent suspicious activity

Compliant with HIPAA, which sets standards for sensitive patient data protection

Only allow access from specified IP addresses

Accounts held by members of an organization

Access software remotely via mobile devices

Notifications via mobile devices

Verify user identity through mobile devices

Request two or more credentials to prove user's identity before granting access to systems

Manage and support multiple languages

Allow multiple users with individual logins and varying permissions to use the same account, software, portal, or service

Generate and store passwords in an encrypted database and assist in retrieving lost or forgotten passwords

Set and enforce password security requirements such as length, character sets, and regular password changes

Store, process, and transmit cardholder data in compliance with the Payment Card Industry Data Security Standard (PCI DSS)

Create, manage, and track policies and procedures within an organization

Trigger clickable pop-up messages

Receive data and information in real time

Active monitoring of systems, applications, or networks

Notifications that are delivered to users as soon as an event occurs

Active reporting of data and metrics

Access work applications remotely, for when working away from the office and/or traveling

Collection, analysis, and representation of numerical data and generation of reports to understand various patterns

View and track pertinent metrics to find patterns and gain insights from data

Notifying as a warning or reminder of a potential or imminent hazard

Initiate collection and analysis of known risks

Set & manage permission levels based on user roles and restrict access to only authorized individuals

Automates and streamlines business processes by creating a sequence of predefined rules and actions that govern the flow of work

Securely stores data to prevent data loss or breaches

At least a username and password is required to access the system

Systematic evaluation of the security of a company's overall security system and situation

Online portal through which end users can access the system, manage tasks, or obtain information

Enable end users to request access or request changes to their account privileges

Allow users to access multiple services after entering their login credentials once

Security protocol that ensures secure, encrypted communication over the internet, safeguarding sensitive data from unauthorized access

Track the status over time for a request, process, asset, or transaction

Set up connections to third-party platforms to improve business processes

Extra layer of security that requires not only a password and username but also something specific to that user

Store, modify, and track user accounts and access in a centralized directory

Manage user accounts, profiles, roles, permissions, and other details across applications, devices or networks

Create, modify, disable, or delete user accounts and their profiles across IT infrastructures

Create, design and manage workflows for repetitive tasks

Get Advice

We can help you find the software with the features you need.

Features

4.5 (4)

4.5

Based on 4 reviews

## Pricing

Value for money

4.5 (2)

Free Trial

Basic

$2.00

Per User,Per Month

Value for money

4.5 (2)

4.5

Based on 2 reviews

## Integrations

[

Slack](https://www.capterra.com/p/135003/Slack/)[

Dropbox Business](https://www.capterra.com/p/143068/Dropbox-Business/)[

Google Workspace](https://www.capterra.com/p/247901/Google-Workspace/)[

Microsoft 365](https://www.capterra.com/p/227157/Microsoft-365/)[

Docusign](https://www.capterra.com/p/121506/Docusign/)[

Evernote Teams](https://www.capterra.com/p/154969/Evernote-Business/)[

Webex Suite](https://www.capterra.com/p/237272/Webex/)[

GitHub](https://www.capterra.com/p/129067/GitHub/)

Connect with a Capterra advisor for a free 15-minute consultation

Get a personalized software list aligned to your business needs with guidance from our expert advisors. Our team has helped 1 million+ businesses like yours find options that fit their needs.

## Support, customer service and training options

Customer Service

5.0 (2)

Support

-   Email/Help Desk
-   FAQs/Forum
-   Knowledge Base
-   Phone Support
-   24/7 (Live rep)
-   Chat

Training

-   In Person
-   Live Online
-   Webinars
-   Documentation
-   Videos

Deployment

-   Web
-   Android
-   iPhone/iPad

Typical users

-   Freelancers
-   Small businesses
-   Mid size businesses
-   Enterprises

Customer Service

5.0 (2)

5.0

Based on 2 reviews

## User reviews

Overall rating

5.0

Based on 4 reviews

Filter by rating

5(4)

4(0)

3(0)

2(0)

1(0)

Mentioned topic

Sorted by most recent

AU

Anonymous User

Project Manager

Information Technology and Services

### "Authentic very Advance application"

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

5.0

5.0

Customer Service

5.0

5.0

Likelihood to Recommend

9/10

January 14, 2023

I am a very happy and satisfied user of this product since more than 5+ years.

Pros

I am using entrust since more than 5 years now.I am using two factor authentication , Its very easy to use and very secured.It's installable software in system as well as in mobile, SO can login easily and keep the identity very confidential.Very secured in terms to login into virtual machines & Remote machines.Secured authentication mentions prevents the misuse.

Cons

There is nothing like i didn't liked in this product, As it works very well with my requirement.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

TP

TeHilla P.

Student

Health, Wellness and Fitness

### "Provides A Feeling of Security "

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

4.0

4.0

Customer Service

0.0

0.0

Likelihood to Recommend

10/10

June 28, 2022

I used Entrust Identity as additional authentication for my online banking. My bank has incorporated this software into their services and it makes me feel safe when navigating online banking. It is very easy to use and makes me feel like my banking information has an extra layer of protection

Pros

Easy to Use Available via mobile app Can manage multiple identities at once

Cons

When I switched phones and restored the data from the iCloud, the app was redownloaded but the identities vanished.

Review source

Non-incentivized review: any software user can leave a review for any product listed on our site. All submitted reviews are subject to our verification process prior to publication.

TP

Tatiana P.

Sales Support Associate

Financial Services

### "Excellent Security and Authentication Tool "

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

5.0

5.0

Customer Service

0.0

0.0

Likelihood to Recommend

10/10

March 18, 2022

Pros

Super easy to use. After logging in with Cisco, I login to Entrust for multi-level authentication and almost instantaneously I get connected! Very user-friendly!

Cons

Nothing not to like, honestly. I don't know if this platform could get any easier!

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

AU

Anonymous User

IT Support Specialist

Telecommunications

### "Very good and secure!"

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

4.0

4.0

Customer Service

5.0

5.0

Likelihood to Recommend

9/10

September 6, 2018

The benefits I've had with this software have been several, improving security company 100%, the IDs safer than I could find in the market right now.

Pros

What I do like most about this software is the easy configuration and management of it but above all the security it has.

Cons

Well , for the time being , i think is up to date.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

Independent research methodology

Capterra's researchers use a mix of verified reviews, independent research and objective methodologies to bring you selection and ranking information you can trust. While we may earn a referral fee when you visit a provider through our links or speak to an advisor, this has no influence on our research or methodology.

[Learn more](https://www.capterra.com/resources/proprietary-data-research/)

How Capterra verifies reviews

Capterra carefully verified over 2.5 million+ reviews to bring you authentic software experiences from real users. Our human moderators verify that reviewers are real people and that reviews are authentic. They use leading tech to analyze text quality and to detect plagiarism and generative AI.

[Learn more](https://www.capterra.com/resources/how-we-verify-reviews/)

How Capterra ensures transparency

Capterra lists all providers across its website—not just those that pay us—so that users can make informed purchase decisions. Capterra is free for users. Software providers pay us for sponsored profiles to receive web traffic and sales opportunities. Sponsored profiles include a link-out icon that takes users to the provider's website.

[Learn more](https://www.capterra.com/resources/how-we-ensure-transparency/)