Capterra’s researchers use a mix of verified reviews, independent research and objective methodologies to bring you selection and ranking information you can trust. While we may earn a referral fee when you visit a provider through our links or speak to an advisor, this has no influence on our research or methodology.
Capterra carefully verified over 2 million reviews to bring you authentic software and services experiences from real users. Our human moderators verify that reviewers are real people and that reviews are authentic. They use leading tech to analyze text quality and to detect plagiarism and generative AI. Learn more.
Capterra lists all providers across its website—not just those that pay us—so that users can make informed purchase decisions. Capterra is free for users. Software and service providers pay us for sponsored profiles to receive web traffic and sales opportunities. Sponsored profiles include a link-out icon that takes users to the provider’s website. Learn more.
ESET Secure Authentication provides an easy way for businesses of all sizes to implement MFA across commonly utilized systems such as VPNs, Remote Desktop, Office 365, Outlook Web Access, operating system login and more.
Provider
ESET
Located In
United States
Foundation
1987
Open API
Yes
Training
Webinars, Documentation
Support
Chat, Phone Support, Email/Help Desk
Small to medium-sized businesses who need a rock-solid authentication solution that is fully compliant with all regulations and is easy to deploy.
Content Source: ESET Secure Authentication
Green rating bars show the winning product based on the average rating and number of reviews.
ESET Secure Authentication Reviews
Pros
Key pairing to each user with a simple key is very interesting and there can be reliable and effective secure access management which is what we like best.
This is a great product to solve the security concerns we were seeking when connecting remote users. The setup was fairly straightforward and easy.
This is a great product to solve the security concerns we were seeking when connecting remote users. The setup was fairly straightforward and easy.
The ease of setup makes this product better than the competition.
Cons
I also know from talking with counterparts when ours does not work theirs does not a well for the most part.
I have found that all problems go away if I just disable the software for a week and just wait for someone at ESET to discover they need to reboot a server and the problem goes away.
When it works fine, when it does not I have found support is useless. I have found functions on the app for Android that tech support does not know about and told them.
I found that ESA was having a problem recognizing users in the VPN group that didn't have 2FA enabled.
"Perfect application"
Overall: It's perfect tool for authentication
Pros: ESET has secure authentication and high level encryption. Two factor and dingle based authentication are an amazing feature of it.
Cons: Slight has higher cost but I terms of feature it is the best application
"Prevent unauthorized system access with ESET."
Overall: If it weren't for the only cons that I put above, it would be the best program I've had in double authentication, it's a real lock that you can trust so that nobody accesses your information in a violent way.It protects very well the information that we have in the databases about our collaborators in human resources, it is really true that it also prevents unauthorized departments from snooping on information that does not correspond to them by faculties.
Pros: We precisely grant the servers and their access to only authorized personnel, the easiest way we have is to have implemented this program, it is very fair to say that when starting it and installing it, the coding is very simple, just like the setup.Key pairing to each user with a simple key is very interesting and there can be reliable and effective secure access management which is what we like best
Cons: In the sense of aspects that I dislike within the software, I think what it could indicate is that it blocks some IPs by default, I think this is somewhat distressing when you do not initially know that the program does this by default and you do not know how to solve it immediately, The other thing is that push notifications often get stuck when you read too much information or the servers are very large.
Vendor Response
"Love it when it works"
Overall: Once again love it when it works, gets slow at times, and give up for a week if it breaks. --- see above
Pros: Simple for users to use, on premise based
Cons: When it works fine, when it does not I have found support is useless. I have found functions on the app for Android that tech support does not know about and told them. Reinstalling is not always an option. Tech support always wants me to run all kinds of different diagnostics on our server, it is NEVER our server. It seems like ESET does not know what both hands are doing, the problems are always on some server there the techs do not know about. I have found that all problems go away if I just disable the software for a week and just wait for someone at ESET to discover they need to reboot a server and the problem goes away. I also know from talking with counterparts when ours does not work theirs does not a well for the most part. Not our server...
"Second Level Authentication"
Overall: Remote Desktop is more secure
Pros: The ability to be integrated into windows OS
Cons: PUSH NOTIFICATIONS ARE SOMETIMES DELAYED. Server IP addresses are not US.. Layer 7 filtering does not work. s
"A good partner of double layer authentication in security."
Overall: I have done very well using the program, it came at an essential moment for me in which I needed to be able to give extra security to the files with which I work so that attendees could enter only what is allowed and prevent misunderstandings.
Pros: It is especially for large companies with professionals who have sensitive data, this eset generates a tool capable of covering all the essential files and data in the eyes of the curious and thus being able to provide an information security barrier. This is stable and does not have problems with passwords or its extension like other softs.
Cons: At the beginning it is quite difficult to enter and interleave everything in the same system, you have to generate a scheme when you have a lot of data and different departments as well.
Vendor Response