73 results
Why Capterra is free
Routee is an omnichannel Web and API cloud that offers secure, reliable, flexible and easily integrated Two-Factor Authentication solutions for your business. Routee uses GSM protocols to protect your business with 2 factor SMS, Voice, Viber or missed call. Unlike others, we offer fallback options. No matter which network provider your company uses or which service provider your customers subscribe to, our Fallback services ensure you can always send two-factor authentication messages securely. Learn more about ROUTEE Pin code generation, Intelligent failover, Adaptive routing, multi-language options, Global delivery, 24/7 support Learn more about ROUTEE
Online Identity Verification Service developed for fast-growing companies. 5 min to integrate, a few secs to verify your users via in depth checks (document authentication, liveness, IP, email, ...). With Mati, comply with local and international KYC / AML regulations, start in a few minutes to decrease fraud on your platform and add a layer of trust to your community. Fast, Secure & Highly Accurate. Unlock The Digital Identities Of Your Users With Artificial Intelligence. Learn more about Mati Online identity verification service for fast-growing companies. Increase safety on your product, and comply with KYC / AML laws. Learn more about Mati
LastPass business solutions help teams & businesses take control of their password practices, enable secure password sharing, and eliminate the password obstacles that waste valuable time and resources while endangering the business. LastPass Enterprise offers advanced security features, automated provisioning options, like Active Directory sync, and additional integrations for a more customized experience, helping businesses be more secure, maintain compliance, and increase productivity. LastPass business solutions help businesses take control of their password management with SSO, password management, and MFA.
Okta is the leading provider of identity for the enterprise. The Okta Identity Cloud connects and protects employees of many of the worlds largest enterprises. It also securely connects enterprises to their partners, suppliers and customers. With deep integrations to over 5,000 apps, the Okta Identity Cloud enables simple and secure access from any device. Thousands of customers, including Experian, 20th Century Fox, LinkedIn, and Adobe trust Okta to work faster, boost revenue and stay secure. Cloud-based solution that helps businesses manage workforce via multi-factor authentication, meta-directory, single sign-on and more.
Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based trusted access solution protects access to all applications for any user and device, from anywhere. Duo's multi-factor authentication (MFA) solution is easy to use, administer and deploy, while providing complete endpoint visibility and control. This combination of user and device trust builds the foundation for a zero-trust security model. Duo Security's multi-factor authentication gives your users easy, one-tap access to applications, securing against credential theft.
Strong authentication solution that allows you to manage the full authentication lifecycle, access corporate applications and resources securely. Solution that allows you to manage the full authentication lifecycle, access corporate applications and resources securely.
Designed for companies with 100+ users, OneLogin provides a cloud-based identity and access management (IAM) solution that offers simple single sign-on (SSO) making it easier for companies to secure and manage access to web applications both in the cloud and behind the firewall. Does your company have three or more SaaS or internal web apps? If so, then you will benefit from the security of OneLogin's cloud-based single sign-on solution. Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial.
JumpCloud Directory-as-a-Service is Active Directory and LDAP reimagined. JumpCloud securely manages and connects your users to their systems, applications, files, and networks. JumpCloud manages users and their systems whether Mac, Linux, or Windows and provides access to cloud and on-prem resources such as Office 365, G Suite, AWS, Salesforce, and Jira. The same login connects users to networks & file shares via RADIUS and Samba, respectively, securing your organizations WiFi. JumpClouds Directory-as-a-Service securely manages and connects your users to their systems, applications, files, and networks.
Enterprise-grade identity assurance solution that helps organizations efficiently manage access requirements using various authentication methods. Enterprise-grade identity assurance solution designed to efficiently manage access requirements using various authentication methods.
ADSelfService Plus adds an additional layer of protection to your critical network resources by enabling two-factor authentication for remote and local Windows logins. Additionally, this solution also secures Active Directory and enterprise applications' password resets by forcing users to prove their identity using supported second factors such as OTPs through SMS and email, Google Authenticatior, Mobile Authenticator, and more. ADSelfService Plus helps administrators in enhancing Windows logon security by enforcing two-factor authentication.
Only Avatier delivers a private instance, cloud-independent, or on-premise Identity Management platform in just minutes, using secure Docker containers. This enables organizations to scale and innovate faster, conquer and embrace change, and to dominate their competition. Avatier manages access to all business apps & assets together to manages them as one. Only Avatier delivers an Identity Management platform in just minutes with native login support in any cloud or on-premise.
FusionAuth provides authentication, authorization, and user management for any app. Built for developers, FusionAuth easily integrates with any language and framework and can be deployed anywhere in minutes. Every feature is exposed as an API giving you complete flexibility to handle any use case. FusionAuth is the only authentication, authorization, and user management built for devs. It works with any app, using any framework.
Protect company data with secure access to business apps. Password-related breaches are the leading cause of data loss. Protect your company data by ensuring that only authorized people are given secure access to sensitive applications and information, using AuthAnvil's complete and integrated Identity and Access Management (IAM) solutions. Features: Multi-Factor Authentication, Single Sign On, Password Automation, Credentials Management, Identity as a Service The #1 Authentication Suite. AuthAnvil multi-factor authentication and single sign-on solutions. See what AuthAnvil can do you for.
Two-Factor Authentication & Access Management for Windows Active Directory. By adding two-factor authentication, contextual restrictions and real-time insight around logons, UserLock helps administrators to secure, monitor and respond to all users' access, UserLock reduces the risk of external attacks and internal security breaches while helping to address regulatory compliance. UserLock offers two-factor authentication, contextual restrictions and real-time insight around all Active Directory logins.
Auth0 is a flexible, drop-in solution to add authentication and authorization services to custom-built applications. Any organization can avoid the cost, time, and risk that comes with building a DIY solution to authenticate and authorize users. Auth0 secures more than 100 million logins each day, helping enterprises deliver trusted and elegant digital experiences to their customers. Cloud-based tool that helps businesses of all sizes manage users' profiles such as authentication details, locations, devices and more.
User and identity management solution with social login, multi-factor authentication, and permissions management functionality. User and identity management solution with social login, multi-factor authentication, and permissions management functionality.
Automated proximity-based authentication into computers and websites. Passwordless login and auto-lock PCs. Automated proximity-based authentication into computers and websites. Passwordless login and auto-lock PCs.
Ping Identity is pioneering Intelligent Identity. We help enterprises achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The Ping Intelligent Identity (TM) platform provides customers, employees, partners and, increasingly, IoT, with access to cloud, mobile, SaaS and on-premises applications and APIs, while also managing identity and profile data at scale. Ping Identity (NYSE: PING) offers intelligent identity capabilities like SSO and MFA for workforce, customer and partner use cases.
Protectimus Solutions provides a powerful multi-factor authentication service. We offer 2FA SaaS platform and on-premise version of the product which supports a great variety of TOTP tokens and program tokens for OTP delivery. Powerful multi-factor authentication solution.
ESET Secure Authentication provides an easy way for businesses of all sizes to implement MFA across commonly utilized systems such as VPNs, Remote Desktop, Office 365, Outlook Web Access, operating system login and more. A simple, effective way for businesses of all sizes to implement multi-factor authentication across commonly utilized systems.
PixelPin is the pioneer of image-based authentication, providing businesses and their users with a secure, personal and user-friendly mean of logging into their online accounts. With PixelPin, users don't have to remember complicated alpha-numeric passwords, now they can log in to any account by pressing 4 points on their favourite picture. Is that simple! PixelPin can be easily integrated on any application or system and works on any deviceon any device using a touch screen or mouse. Non-biometric, non-password software solution that enables users to login using a personal picture and selecting 4 points.
B2B email prospecting tool that aids in filling pipeline. B2B email prospecting tool that aids in filling pipeline.
Mobile based protection from phishing attacks and other malicious activities. Mobile based protection from phishing attacks and other malicious activities.
Today's workforce expects flexibility and mobile has been the technology that empowers employees to work wherever and whenever they want. Use cases like seamlessly providing secure access to business-critical resources, resetting an Active Directory password or simply comply with the expiration policies either required the employee to use a computer or forced organizations to come up with non-standard workarounds. Hypergate turns your mobile device in a fully-fledged Active Directory client. Hypergate Authenticator is a managed application on the mobile device that delivers a seamless and secure Single Sign-On solution.
AuthX provides you with secure & seamless log-in capabilities. We make logging in easy, enabling you to focus on your business. Our enterprise class authentication solutions provides anywhere access to any applications and any user. AuthX provides multi-factor authentication (MFA) solution, biometric authentication, AD integration and Push Authentication that is easy to use and deploy, all while providing visibility, transparency and control. Start using AuthX today! Provides secure & seamless multi-factor log-in capabilities. We make logging in easy, enabling you to focus on your business.
DruID is a customer identity and access manager that helps companies to capture, validate and authenticate consumer identities in B2C environments, in order to provide an improved CX, increase your consumer knowledge, guarantee data security and increase the efficiency of marketing actions in a steady way. DruID is a secure Customer Identification and Access Management solution focused on user identification, activation and acquisition.
You can use Specops Password Policy to enforce password rules, remove leak passwords and meet compliance requirements. Specops Password Policy extends the functionality of Group Policy and allows you to configure a different set of rules for different types of users. Specops Password Policy is a component of the Specops Password Management solution. Specops Password Management addresses both security and flexibility needs by enabling organizations to reach their appropriate level Specops Password Policy helps you increase password security in your Active Directory environment.
Open source provisioning solution for real-time user management lifecycle automation. Open source provisioning solution for real-time user management lifecycle automation.
Open source identity & access governance product, featuring web & enterprise single sign on, privileged account management. Open source identity & access governance product, featuring web & enterprise single sign on, privileged account management.
Simple, Secure and Customizable Identity & Access Control. Aerobase is based on standard protocols and provides support for OpenID Connect, OAuth2, and SAML2. Open Source Identity & Access Management
The IntelliTrust cloud authentication service secures access to devices, applications and resources with an analyst top-rated solution that has been proven across critical banking, government and healthcare infrastructures for more than 25 years. Point-and-click provisioning and out-of-the-box integrations with a variety of on-premises and cloud applications make the IntelliTrust cloud authentication service easy to deploy, so you can be up and running in under 30 minutes. Secure access to apps with handsfree, passwordless authentication that makes users happy, unburdens IT staff & drives digital growth.
Our unique multi-factor authentication (MFA) solution not only helps to reduce the likelihood of network disruptions and data breaches arising from lost or stolen credentials, but we deliver this important capability entirely from the Cloud for easy set-up and management. AuthPoint goes beyond traditional 2-Factor Authentication (2FA) by considering innovative ways to positively identify users, and our large ecosystem of 3rd party integrations means that you can use MFA to protect access. WatchGuard;s cloud-based MFA solution, AuthPoint, protects access to the network, VPNs, and Cloud applications.
Out of band multi factor authentication solution that employs secondary channel communication to defend your application.With CyLock MFA you can be assured your enterprise services, apps, employees and end-users are being protected by the latest in second factor authentication technology. Out of band multi factor authentication solution that employs secondary channel communication to defend your application.
VaultCore is the world's only encryption key management solution to automate the key lifecycle process, deliver the capacity to support hundreds of millions of keys, and offer seamless network integration to safeguard assets from attack on devices and infrastructure. Serving the banking/financial, healthcare, data storage, telecomm, energy, IT, and transportation industries, VaultCore is most recognized for it's scalability, interoperability, powerful automation, and ease of use. Powerful key management encryption tool providing full control & security of the entire key lifecycle from enterprise to endpoint.
(0 reviews)
View Profile
Security services solution that offers dual factor authentication, adaptive access control, and transaction signing. Security services solution that offers dual factor authentication, adaptive access control, and transaction signing.
(0 reviews)
View Profile
Identity and provisioning management solution for users rights administration and authorization management. Identity and provisioning management solution for users rights administration and authorization management.
(0 reviews)
View Profile
MIRACL Trust® ID Deploy secure Multi Factor Authentication (MFA, 2FA, 2+FA). A PIN code replaces the Username/Password, eliminating GDPR risk and meeting PSD2 SCA dynamic linking requirements. More secure than SMS 2-step, much cheaper and no user frustration. Mobile and Desktop friendly SaaS/Cloud integrates to any IAM platform. MIRACL Trust® ID replaces passwords with user friendly, single step MFA that's affordable for large networks of users.
(0 reviews)
View Profile
Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites. Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites.
(0 reviews)
View Profile
Identity is now at the center of cybersecurity threat mitigation. As passwords were identified as the largest single threat vector, multifactor authentication and management of cryptographic digital identities have become standard practice. ActivOne provides large global organizations a scalable solution to dramatically raise security defenses while providing a convenient user experience for employees, and contractors. Credential management and user authentication software solutions designed to secure and manage identities.
View Profile
Multi-factor authentication solution for preventing fraud through various authentication methods. Multi-factor authentication solution for preventing fraud through various authentication methods.
(0 reviews)
View Profile
Mobile authentication framework that includes biometric SDKs for commercial enterprises and banks to enable secure login to their mobile applications using biometric authentication from mobile devices of their employees and customers. Web-based authentication solution that provides biometric authentication through identity proofing, document authentication and more.
(0 reviews)
View Profile
Biometric-based authentication solution that integrates the mobile SDK and biometric capabilities and allows enterprises to replace passwords with biometrics to verify user identity and access company's critical assets. Biometric authentication solution that allows enterprises to replace passwords with biometrics to access company's critical assets.
(0 reviews)
View Profile
Multi-factor authentication solution that helps you create your own trusted enterprise network of users, devices, and applications. Multi-factor authentication solution that helps you create your own trusted enterprise network of users, devices, and applications.

NCP

(0 reviews)
View Profile
NCP develops universally applicable software components enabling end devices to easily and securely connect to the corporate network via public networks in conjunction with a fully automated central remote access VPN management. NCP's Secure Communication Products are made for many different scenarios e.g. mobility, M2M, IIoT and classic VPN scenarios. NCP offers solutions for professional work in a VPN, VPN client/server components, central VPN management and software for IIoT.
View Profile
Allows for single sign-on and strong multi-factor authentication to protect your enterprise from threat vulnerabilities and control access to cloud, on-premises, and mobile applications. Allows for single sign-on and strong multi-factor authentication to control access to cloud, on-premises, and mobile applications.
(0 reviews)
View Profile
Strengthens the security of online accounts via two-factor authentication (2FA) after standard user name & password. Strengthens the security of online accounts via two-factor authentication (2FA) after standard user name & password.
(0 reviews)
View Profile
Onegini is a strong CIAM vendor with a very complete solutions offering. USP's such as Web and Mobile (other than competitors not just an authenticator app, but a strong end to end mobile security platform, allowing companies to create customer apps with tier one bank grade security), Saas and On premise, Flexible Boarding functionality, Strong integration options for IOT, out of the box canned use case, continious security fraud detection, GDPR ready, and PSD2 enabler. Onegini Connect allows you to connect, manage, and engage with your customers. Start accelerating customer onboarding and access now!
(0 reviews)
View Profile
Combines device intelligence, behavioral analytics, and real-time decisions to stop fraud before it starts. Combines device intelligence, behavioral analytics, and real-time decisions to stop fraud before it starts.
Founded in 2006, VEXXHOST Inc. is a Canadian cloud computing provider offering OpenStack powered public cloud, private cloud and OpenStack consulting services to its customers. Other cloud solutions involve Openstack Upgrades, Kubernetes Enablement and Managed Zuul. From small businesses to governments in over 150 different countries, VEXXHOST delivers high-level expertise to help clients optimize their cloud infrastructure. VEXXHOST provides Private Cloud and Public Cloud services using OpenStack platform along with several powerful cloud solution offerings
(0 reviews)
View Profile
OpenOTP is an enterprise user authentication solution based on open standards. OpenOTP provides many (highly configurable) authentication schemes for your Domain users. It supports the combinations of single-factor and multi-factor user access with OTP technologies and FIDO U2F. The OpenOTP solution is composed of several components including WebADM sever, RADIUS Bridge and Self-Service applications. OpenOTP supports VPNs, Citrix, Web SSO, ADFS, Linux, Microsoft, Wifi, Web applications and more OpenOTP is a Multi-Factor authentication solution based on open standards.
(0 reviews)
View Profile
Avencis SSOX, a France Cybersecurity labelled solution, is a solution for access control and unified strong authentication (SSO) which guarantees the security of connections while also improving user experience. Avencis SSOX enables more robust primary authentication supporting multiple authentication methods and provides advanced features in terms of password safe, identity aggregation and all access traceability. Avencis SSOX is a solution for access control and unified strong authentication (SSO).
(0 reviews)
View Profile
Helps companies protect data, applications and networks by providing trusted access for employees via two-factor authentication. Helps companies protect data, applications and networks by providing trusted access for employees via two-factor authentication.
(0 reviews)
View Profile
User authentication tool that uses smartphone/tablet camera to capture user fingerprints. User authentication tool that uses smartphone/tablet camera to capture user fingerprints.
(0 reviews)
View Profile
Secure authentication solution built to simplify login and payment workflow with the use of biometrics and multi-factor authentication. Secure authentication solution built to simplify login and payment workflow with the use of biometrics and multi-factor authentication.
(0 reviews)
View Profile
A digital credential platform that enables organizations to offer a decentralized, self-sovereign identity solution for their users. A digital credential platform that enables organizations to offer a decentralized, self-sovereign identity solution for their users.
(0 reviews)
View Profile
Behaviosec is a behavioral biometrics tool that tracks activity to ensure your accounts are kept safe. Behaviosec is a behavioral biometrics tool that tracks activity to ensure your accounts are kept safe.
(0 reviews)
View Profile
Authenticate actual identities with behavioral, environmental, and contextual factors. Authenticate actual identities with behavioral, environmental, and contextual factors.
(0 reviews)
View Profile
Multi-factor and passwordless authentication to websites and applications. Multi-factor and passwordless authentication to websites and applications.
(0 reviews)
View Profile
Offers OEM partners a robust, accurate and readily scalable, API driven system for remote, voice biometric-based ID verification and/or identification, for integration with any telephony-related application to help businesses increase security, improve customer satisfaction, and differentiate their brand, enabling end users to improve key performance indicators and get an ROI across all important operational metrics. Offers remote, voice biometric-based ID verification and/or identification, for integration with any telephony-related application.
We are an identity fraud, authorization & authentication company, solving the challenges that organizations face in getting their users on to & interacting with their digital platforms. Whether it's your customers or your workforce, Callsign helps your users get on with their digital lives in the most seamless way possible checked, verified and safe, because we enhance, rather than block, user experience. A Customer Friendly, Identity Fraud, Authentication & Authorization Platform
(0 reviews)
View Profile
SUBROSA is a patented photo/digital image-based authentication and encrypted key generation software more secure than PINS or user-generated passwords. Users can choose from a selection of photos or their own personal photos, then choose a customized tile pattern that is personal to them. The chosen tile pattern is converted into 65,000+ character long, randomized, encrypted key as their password. This allows users to exceed password best practices in being very strong, random, and encrypted. SUBROSA is an authentication gateway that can be seamlessly integrated into distributed applications as a password replacement.
(0 reviews)
View Profile
Secure and convenient passwordless authentication. Secure and convenient passwordless authentication.
View Profile
Strong suite of multi-factor authentication and transaction confirmation. Strong suite of multi-factor authentication and transaction confirmation.
(0 reviews)
View Profile
Phonexia Voice Verify is a market-leading voice verification solution for contact centers in banks and insurance, telco, and utilities companies, as well as for conversational AI interfaces, such as voicebots. Powered by cutting-edge artificial intelligence, it can already verify clients with over 90% accuracy after only 3 seconds of speech (based on the NIST SRE16 dataset). The solution is quick to evaluate via a demo and sandbox, and a PoC can be finished in a matter of weeks. Phonexia Voice Verify is a highly accurate and extremely fast voice verification solution for contact centers
Verimatrixs Passwordless Authentication solution complements existing solutions with password-less, two-factor or multi-factor authentication (2FA/MFA) and transaction-authorization capabilities. Deployed on premises or in a SaaS model, the solution enables consumers to use a secure smartphone app and biometrics instead of or in addition to passwords when accessing any digital channel. Complements existing solutions with password-less, two-factor or multi-factor authentication and transaction-authorization capabilities
(0 reviews)
View Profile
Provides user behavior, online fraud attack trained models to enable risk-based authentication to stop cybercriminal access. Provides user behavior, online fraud attack trained models to enable risk-based authentication to stop cybercriminal access.
(0 reviews)
View Profile
Enhance your existing IAM solution with zero-knowledge multi-factor biometric authentication. Bring the convenience of facial recognition to your workforce authentication journeys while leaving behind any related GDPR concerns. Zero-Knowledge Biometric Authentication and Personal Identity Management Platform.
(0 reviews)
View Profile
All the tools and the support team you need to offer an amazing Guest Wi-Fi experience Deployed in 1,500+ properties in 70+ countries Integrated with the major PMS/CRS/CRM vendors Conference tool integrated with major WAP controllers Authentication and data collection through Social Networks (Facebook, LinkedIn, Twitter) User-friendly editor for Login Portal and marketing Campaigns Redundant gateways and authentication servers Dashboard and API for Monitoring, Reporting & Analytics Robust Guest Internet Access Management
(0 reviews)
View Profile
Biometric authentication software. Biometric authentication software.
(0 reviews)
View Profile
Go passwordless to eliminate PUSH attacks and 2FA breaches. Go passwordless to eliminate PUSH attacks and 2FA breaches.
(0 reviews)
View Profile
Octopus Authentication is a high-assurance, passwordless authentication system engineered to address the diverse authentication needs of real-world enterprises. Strong passwordless authentication that works across all business systems and applications.
(0 reviews)
View Profile
Passwordless authentication that improves security and login experience. Passwordless authentication that improves security and login experience.
(0 reviews)
View Profile
Customer authentication solution with customer registration, messaging, QR payments, tokenization, and digital identity verification. Customer authentication solution with customer registration, messaging, QR payments, tokenization, and digital identity verification.