Audience

Companies that want a 2-factor authentication solution

About Symantec VIP

Your key to one swipe two-step authentication. Two-factor authentication is easy to enable and prevents attacks. With just a swipe of a finger, or use of a security code, your information is secure. Your favorite websites offer secured authentication compatible with VIP. To begin, scan a QR code and security codes will be generated for that website every thirty seconds. With Symantec VIP both enterprise and end users can securely authenticate wherever and however they are accessing the services. With hundreds of supported websites and integrations that you can easily set up yourself, multi-factor authentication is a snap.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Broadcom
Founded: 1991
United State
vip.symantec.com

Videos and Screen Captures

Symantec VIP Screenshot 1
Other Useful Business Software
Auth0 for AI Agents now in GA Icon
Auth0 for AI Agents now in GA

Ready to implement AI with confidence (without sacrificing security)?

Connect your AI agents to apps and data more securely, give users control over the actions AI agents can perform and the data they can access, and enable human confirmation for critical agent actions.
Start building today

Product Details

Platforms Supported
Cloud
iPhone
iPad
Android
Training
Documentation
Support
Online

Symantec VIP Frequently Asked Questions

Q: What kinds of users and organization types does Symantec VIP work with?
Q: What languages does Symantec VIP support in their product?
Q: What kind of support options does Symantec VIP offer?
Q: What other applications or services does Symantec VIP integrate with?
Q: Does Symantec VIP have a mobile app?
Q: What type of training does Symantec VIP provide?

Symantec VIP Product Features

Authentication

Single Sign On
Self Service Portal
Policy Management
Out-of-Band Authentication
Mobile Authentication
Social Sign On
Multifactor Authentication
Knowledge-Based Authentication
Credential Management
Biometric