Best IT Security Software for OAuth

Find and compare the best IT Security software for OAuth in 2024

Use the comparison tool below to compare the top IT Security software for OAuth on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Thinfinity Workspace Reviews
    Top Pick

    Thinfinity Workspace

    Cybele Software, Inc.

    14 Ratings
    See Software
    Learn More
    Thinfinity Workspace 7.0's Technical Highlights: - Progressive Web App (PWA) technology for a seamless user experience - Integrated Thinfinity VNC, VirtualUI, and z/Scope for maximum versatility - HTML5 terminal emulation supporting DEC terminals, TN 5220, and TN 3270 protocols - Robust enterprise-grade audit logs for security and compliance management - Proprietary VNC protocol for real-time monitoring and troubleshooting IMPROVE USER EXPERIENCE - Deliver business-critical apps, desktops and files from a single web portal. - Provide simplified remote browser access for your users, while confining them to only the resources that they need. SIMPLIFY IT AND AVOID VPNs - Forget traditional VPN deployments and complexities. - Enable access from Chromebooks, mobile devices or any computer with a Web Browser. Zero setup. KEEP YOUR BUSINESS SECURE - Use enterprise-grade encrypted connections. - Integrate with your existing and external identity platforms. - Apply 2FA or MFA policies with all identity providers.
  • 2
    Veeam Kasten Reviews
    Backup and restore applications to protect data. Your business must meet regulatory and corporate mandates. Load balancing, upgrades and load balancing can be done between cloud and on-premises. Veeam Kasten is a system that was specifically designed for Kubernetes. It provides enterprise operations teams with an easy-to use, scalable and secure backup/restore solution, disaster recovery and mobility of Kubernetes apps. Discovers Kubernetes apps and their dependencies automatically and seamlessly. Dynamic policies provide complete protection for rapidly changing applications. Manage stateful applications is made easy with an intuitive dashboard, Kubernetes native and REST APIs and CLI support. Deep integration with Kubernetes, databases and cloud infrastructure. Storage, CSI, authentication, OIDC, OAuth etc. Monitoring, logging and auditing.
  • 3
    OpenOTP Security Suite Reviews

    OpenOTP Security Suite

    RCDevs

    €1.85/User/M
    OpenOTP Security Suite is an enterprise-class security solution for two-factor authentication with U2F/OTP, federation and identity management (IAM). The solution combines mobile technologies with proven security standards to provide the best alternative for business and non-business users who need cost-effective solutions that support their users' mobility. It enables integration of a variety of third-party products and systems with MFA, even if they only support LDAP as an authentication backend. Try OpenOTP Security Suite if you are interested in: USER MOBILITY | PRIVACY | VPN AND WIFI SECURITY | SSO AND ADFS | FINE-GRAINED AUTHENTICATION POLICIES | ALL-IN-ONE SECURITY SOLUTIONS | EUROPEAN DATA STORAGE OpenOTP Security Suite is an enterprise-class European security solution designed for installation on-premises or in a private cloud. ++ Free Token App (and compatible with most existing hardware and software tokens) ++ Free 30-day Trial ++ Freeware (<25 users)
  • 4
    SyncTree Reviews

    SyncTree

    Ntuple

    Free/1Month/3,000 Call
    SyncTree strives to be a "Super Connecting Platform" that can easily connect any services you want. With SyncTree, which consists of SyncTree STUDIO, a solution for building backend business logic with block coding, and Block Store, a platform for buying and selling pre-made backend function blocks like App Store, you can organically utilize data and connect services to achieve unlimited service expansion.
  • 5
    IriusRisk Reviews
    IriusRisk is an open Threat Modeling platform that can be used by any development and operations team – even those without prior security training. Whether your organization follows a framework or not, we can work with all the threat modeling methodologies, such as STRIDE, TRIKE, OCTAVE and PASTA. We support organisations in financial services, insurance, industrial automation, healthcare, private sector and more. IriusRisk is the industry's leading threat modeling and secure design solution in Application Security. With enterprise clients including Fortune 500 banks, payments, and technology providers, it empowers security and development teams to ensure applications have security built-in from the start - using its powerful threat modeling platform. Whether teams are implementing threat modeling from scratch, or scaling-up their existing operations, the IriusRisk approach results in improved speed-to-market, collaboration across security and development teams, and the avoidance of costly security flaws.
  • 6
    Authentiq Reviews
    Strong authentication without passwords Secure authentication options can be added to any website or app. It's simple and easy. Authentiq Connect allows users to decide when to increase their security and whether they want to use a second factor such as TOTP (e.g. Google Authenticator or U2F (e.g. Yubikey, or you can go passwordless right away with AuthentiqID. Authentiq Connect works with OAuth 2.0, OpenID Connect and is easy to add a social network button on a site. Authentiq Connect works with OAuth 2.0, OpenID Connect. All you have to do is add a social network button on a site. You can have the passwordless experience that you want without locking yourself in. Authentiq ID allows you to use your smartphone to authenticate online, share your identity details securely, and sign out again remotely. It also replaces Google Authenticator with more secure TOTP authentication. This makes it a one-stop-app that is suitable for everyone.
  • 7
    Ubisecure Reviews
    The Ubisecure Identity Platform helps organisations manage the many Digital Identity risks and opportunities. Focused on European B2B and B2C scenarios, Ubisecure combines highly assured Organisation Identity and Individual Identity to reduce fraud and increase efficiency in global trade and supply chain. Ubisecure is now the #1 global issuer of Legal Entity Identifiers (LEI). The Identity platform enables organisations to de-risk homegrown user registration and login solutions, and enable Single Sign-On (SSO) across all platforms and devices. Simplified MFA, including TOTP and Bank ID / Reusuable eIDs, reduce fraud by verifying customer identities, and automated customer credential management workflows for your helpdesk. Advanced identity use cases like consolidation of identity data silos, and Identity Relationship Management & Delegation can increase operational effectiveness, manage data breaches, and reduce IT costs dramatically. Whether your business goals are increasing revenue and user engagement, meeting compliance, de-risking homegrown systems or reducing operational costs, Ubisecure identity management can help.
  • 8
    WWPass Reviews
    There is no need to remember, manage or reset passwords. All logins can be consolidated into one encrypted authentication token. The authentication token can be managed easily by the user. Log in using a universal digital identity that is international and trusted. If allowed, anonymity is permitted. All data is encrypted by the user using WWPass Key. There is no need to send SMS, OTP, or any other expensive adaptive authentication or login support. WWPass Key protects user identity. WWPass MFA provides strong customer authentication that is compliant with GDPR & NIST. Each user receives a unique key that allows them to log in to unlimited accounts and services without the need for passwords or usernames. Your WWPass Key is a universal key to the internet that allows you to log in to an increasing number of online services. Next-generation strong multifactor authentication without passwords or usernames. Secure access to any business application can be simplified and streamlined without the need for a username or password.
  • 9
    EthicalCheck Reviews

    EthicalCheck

    EthicalCheck

    $99 one-time payment
    You can submit API test requests via UI form. Or invoke EthicalCheck API by using cURL/Postman. Request input requires a public-facing OpenAPI URL, an API authentication token valid at least 10 minutes, an active license key and an email. EthicalCheck engine automatically creates custom security tests for APIs. It covers OWASP API Top 10 List. Automatically removes false negatives from the results. Creates a developer-friendly report and emails it to. According to Gartner APIs are the most common attack vector. API vulnerabilities have been exploited by hackers/bots, resulting in major security breaches across thousands of organizations. False positives are automatically separated from real vulnerabilities. Generate enterprise-grade penetration test reports. It can be shared with customers, partners, developers, and compliance teams. EthicalCheck works in the same way as a private bug bounty program.
  • 10
    OnzAuth Reviews

    OnzAuth

    OnzAuth

    $50 per month
    Implement authentication in 5 minutes or less, simple support for magic link and WebAuthN, no passwords required, no callbacks needed. Our SDK is a vanilla Javascript Framework that can be used with any frontend language. Framework-specific documentation and support are coming soon. Developers shouldn't have to reinvent authentication over and again. We can solve both Authorization (Passwordless), and Authentication (Passwordless). You can integrate with our SDK in minutes or use any standard OAuth or JWT library in a variety languages.
  • 11
    Ory Reviews

    Ory

    Ory

    $29 per month
    The missing web-scale identity and access control API. Today, 10x your security and user experience. Build secure apps over the Ory Network to reach new customers in any region of the globe with the best login experiences ever. Login is much more than just a username and a password. It is dangerous and time-consuming to build it from scratch. Ory's API first microservice architecture allows projects to be integrated at any stage. Pay for usage and not features. Ory subscription plans include advanced multi-factor authentication. Plus, advanced permissions, SSO OAuth2, OIDC multi-tenancy and more. Ory is designed for high-performance and high-scale applications on any cloud. Ory is designed with developers in mind. It allows you to quickly create your own user experience, and integrate it within your software stack. Ory's focus is on open standards, and its automated data import capabilities make migrating to legacy systems simple.
  • 12
    Resmo Reviews

    Resmo

    Resmo

    $2 per month
    All-in-one platform to manage SaaS apps and access for modern IT teams. Streamline app discovery and access management, including user offboarding, identity security, cost tracking, and access reviews. With 100+ native integrations, you can actively scan for vulnerabilities and notify users. Review identity access permissions and OAuth risks. Find shared accounts, passwords that are weak, excessive permissions and externally shared files. Allow them to use the SaaS that they need to do their jobs quickly. Automated security checks will relieve your IT and security team of the burden. Offboard employees safely, leaving no dormant account behind. We empower your team so they can take responsibility for security without any roadblocks. This ensures a seamless, secure workflow. You can see which apps your employees are using to log in with their business accounts. SaaS adoption can empower your workforce while maintaining your SaaS security posture.
  • 13
    Auth.js Reviews
    Auth.js provides a flexible, secure authentication experience. It is an open-source library that integrates seamlessly with modern JavaScript Frameworks. It supports a variety of authentication methods including OAuth (e.g. Google, GitHub), Credentials, and WebAuthn. This allows developers to select the best approach for their application. Auth.js supports multiple frameworks such as Next.js (e.g., Google, GitHub), SvelteKit (e.g., Express), Qwik and SolidStart. This allows developers to implement authentication on different platforms. The library provides built-in support to popular databases such as Prisma, Drizzle ORM (Object Relational Mapper), Supabase (Supabase ORM), Firebase and TypeORM. This simplifies user data management. Signed cookies, CSRF validation, and encrypted JSON Web Tokens are all security features that ensure robust protection of user data. Auth.js has been designed to work efficiently in serverless environments. It also provides extensive documentation and examples.
  • 14
    Unikname Reviews

    Unikname

    Unikname

    €150 per year
    Integrating the next-generation strong authentication will protect your web accounts from phishing attempts. Protect the admin account for all websites you manage. Your clients can register without a password. The next-generation social authentication protects your privacy. Manage web access rights for your employees and partners easily. Install Unikname for all web environments in minutes! The dedicated dashboard allows you to manage trust certificates and web access. Manage access rights for admins and users. Unikname can be used as the default authentication method. Disable standard authentication. You can fine-tune Unikname's login button's style options. Unikname uses the most recent OAuth and OpenID Connect authentication protocols standards. Unikname allows you to generate a trust cert attached to your webdomain name.
  • 15
    TruffleHog Reviews

    TruffleHog

    Truffle Security

    TruffleHog scans your environment for secrets such as credentials and private keys. This allows you to protect your data from being compromised. Secrets can be found everywhere, so TruffleHog scans all code repositories. You can protect your secrets across all your environments with the support for custom integrations. TruffleHog was developed by a team of career security specialists. Security is our primary concern and passion. All features are designed with the best practices in mind. TruffleHog allows you to track and manage secrets through our intuitive management interface. It also provides links to where secrets were found. Secure OAuth workflows allow users to authenticate and you won't have to worry about password and username breaches.
  • 16
    Cypago Reviews
    Automated workflows with no-code reduce manual effort, lower costs and increase trust with customers. Using automated and simplified cross-functional processes, you can improve your security governance, risks, and compliance (GRC). You will learn everything you need to achieve and maintain compliance across all IT environments and security frameworks. Get a detailed, ongoing view of your compliance and risk. Automated processes can save thousands of hours in manual work. Put security policies and procedure into action to maintain accountability. Finally, a complete audit experience that includes audit scope generation, customization, 3600 evidence gathering across data silos and in-context gap analyses, as well as auditor-trusted reporting. Audits can be much easier and more efficient than what they are now. Enjoy instant insights into your employee and user base's access privileges and rights.
  • 17
    Escape Reviews
    Discover your API attack surface within minutes, find business logic weaknesses, and protect your application against even sophisticated attacks. No infrastructure or agent changes are needed. Fastest return on investment. In just 15 minutes, you can get a complete overview of your API's security posture. Powered by API security intelligence developed in-house by our research team. Supports all APIs in all environments. Escape's unique API security approach is achieved through agentless scanning. In minutes, you can get a complete picture of all your exposed APIs and their context. You can get key data about your exposed APIs including endpoint URLs and methods, response codes and metadata. This will help you identify potential security threats, sensitive data exposure and attack paths. 104+ security test, including OWASP and business logic, are included to ensure thorough coverage. Integrate Escape seamlessly with your CI/CD system like Github Actions, Gitlab CI or Gitlab CI to automate scanning.
  • 18
    AgentAuth Reviews

    AgentAuth

    Composio

    $99 per month
    AgentAuth is an authentication platform that enables AI agents to access over 250 applications and services from third parties in a secure and seamless manner. It provides comprehensive support for different authentication protocols and ensures reliable connections through automatic token refresh. The platform integrates seamlessly into leading agentic frameworks, such as LangChain CrewAI and LlamaIndex. This enhances the capabilities of AI Agents. AgentAuth offers a dashboard that provides complete visibility of all user-connected accounts. This allows for efficient monitoring and issue resolution. It also offers white labeling options that allow customization of the authentication to align with product branding or OAuth developer applications. AgentAuth is committed to high security standards. It complies with SOC 2 type II and GDPR.
  • 19
    Akamai Identity Cloud Reviews
    You can create seamless, personalized customer experiences that don't compromise security. Akamai Identity Cloud, a cloud-native SaaS solution, simplifies customer access and identity management (CIAM). Identity Cloud is designed for consumers and provides the infrastructure to manage millions of customers. It comes with customizable registration, authentication, SSO and consent management, easy integration to your MarTech ecosystem and powerful data analytics. Enhanced customer data protection simplifies compliance with privacy regulations without compromising customer experience. Identity Cloud is a solution for mission-critical applications where scale, performance and customer experience are paramount. SSO allows for omnichannel access and a variety of authentication methods including social login, directory service, and OIDC.
  • 20
    IDmission Reviews
    It is not enough to just verify identity solutions. Businesses must integrate identity solutions into their business processes in today's digital world. IDmission offers effortless end-to-end customer journeys using passive liveness biometrics, Identity-as-a-Service, and multi-factor authentication, coupled with our industry expertise. IDmission offers solutions to orchestrate digital transformations in companies that rely on ID verifications and identity. Our industry knowledge and standards-compliant security are used to create seamless customer journeys. IDmission offers solutions for complex applications that require identity and document authentication. IDmission offers more than just the best AI and biometric technologies in the industry. We take our technology and help customers organize their digital transformation.
  • 21
    Cloudentity Reviews
    Cloudentity improves development velocity, audit efficiency, and risk mitigation by advancing finely-grained authorization policy administration and delivering continuous transaction-level enforcement across hybrid and multi-cloud environments. Externalize authorization management empowers developers to create policy-as code, provide standardized controls, invoke contextual access, and enforce data exchange as close as possible to the service. Accelerate application delivery with security validation that includes full data lineage for compliance, audit, forensics, and validation. Cloudentity offers dynamic authorization governance that provides policy automation and adaptive control, ensuring zero trust between users, apps and services. Automate the inventory of APIs, services, and apps, as well as standardization and provisioning for authorization policies. This will simplify security verification.
  • 22
    Authorizer Reviews
    Build secure apps 10x quicker. Low-code tool and low-cost deployment. Own your user data on your preferred database. Authenticate users using multiple auth recipes. Authorize users according to their business roles. APIs compatible with OAuth2 and OpenID. Authentication and Authorization have never been so simple. Deploy a production-ready Authorizer using the available deployment options. Open Authorizer endpoint in your browser. Sign up for an admin account with a strong password. Configure environment variables via the dashboard. Authorizer object is instantiated using JSON object. Authorizer is ready to use and can be used in 3 minutes to create a digital experience that will blow your customers away. We'd rather you focus on your core business, and build things that matter. Auth with best-in-class services baked in. Secure session management implemented using HTTP-only cookies. Authorization Code flow for mobile-based authentication implemented.
  • 23
    Ploy Reviews
    Discover, protect, manage and manage your SaaS within minutes. Integrate within minutes to detect the SaaS applications that employees are using. Identify duplicate licenses and applications that are no more used by employees. Identify applications that access sensitive data, and identify supply chain risks. Ploy helps businesses save money on SaaS waste that can take many forms. Make sure employees are completely offboarded so that licenses don't get paid for unnecessarily. Ploy will also identify duplicate SaaS so you won't have to pay for Jira or Asana ever again. You can also de-provision any licenses that employees no longer need. You can see which apps employees have downloaded and how they authenticated. Ensure employees have been removed from the system to ensure your data is safe. Identify licenses that are no longer used by employees. Automate your onboarding and access process with Ploy workflows.
  • 24
    SecureFlag Reviews
    SecureFlag offers hands-on training using real development environments to meet enterprise training requirements. Over 150 vulnerabilities types are covered and 45+ technologies are supported. Each includes a fully configured environment for development. Writing secure software is now more important than ever, as more than 70% vulnerabilities are introduced during the development process. SecureFlag's approach to secure coding has been revolutionized. SecureFlag's labs allow participants to learn in virtualized environments, using the tools that they are familiar with. SecureFlag Labs teach participants to identify and fix the most common security issues through hands-on labs, rather than just by watching. The labs are run in virtualized environments that simulate real development environments. Participants learn with the same tools as they do at work. Engage your organization's developer communities and promote learning by engaging in fun competitions.
  • 25
    FortiTrust Identity Reviews
    FortiTrust Identity, a cloud subscription, simplifies identity management and access control in hybrid enterprise environments. FortiTrust Identity is a cloud-based subscription that integrates natively with the Fortinet Security Fabric. It provides a rich set security controls, centralized management of authentications for users and multi-factor authentication. FTI helps you begin your zero-trust journey by providing strong authentication and reliable user verification, as well as ease of use for end users. User-based licensing includes adaptive, multi-factor or passwordless authentication, identity federation, and SSO for hybrid enterprise environments. Ensure that the right people have access to your enterprise's data, applications, and resources. Verify another factor to increase the certainty of user identification.
  • Previous
  • You're on page 1
  • 2
  • Next