Best Assently CoreID Alternatives in 2024
Find the top alternatives to Assently CoreID currently available. Compare ratings, reviews, pricing, and features of Assently CoreID alternatives in 2024. Slashdot lists the best Assently CoreID alternatives on the market that offer competing products that are similar to Assently CoreID. Sort through Assently CoreID alternatives below to make the best choice for your needs
-
1
Auth0
Okta
783 RatingsIdentity is complex. It is important to deal with it. Rapidly integrate authorization and authentication for web, mobile, legacy, and legacy applications to allow you to focus on your core business. Many people believe that identity is too expensive and can't be saved. Auth0 users see a positive impact on their bottom line. You can authenticate users across all your applications using your own secure, standards-based, and custom unified login. Users are redirected to a central authorization site with Universal login. The authentication takes place on the same domain that the login. This increases security and protects against attacks like phishing or man-in-the middle. OAuth 2.0 recommends that native applications should only use external user agents (such the browser) for authentication flows. Universal login allows you to do this securely while also enabling SSO. -
2
Authentication Cloud is faster, easier, & more user-friendly. Customers can access your online services without the need for passwords or expensive SMS fees. The Nevis Authentication Cloud will allow you to provide maximum security and a seamless user experience for your customers in no time. Authentication as a service is faster, easier, and more user-friendly. Customers can access your online services without the need for passwords or expensive SMS fees. The Nevis Authentication Cloud will allow you to offer maximum security and a seamless user experience to your customers in no time. The Authentication Cloud from Nevis will allow you to offer maximum security and a seamless user experience to your customers in no time. In today's mobile world, remembering complex passwords for individual accounts is no longer an option. New password-free authentication options such as fingerprint and face ID are faster, more convenient, and significantly safer for all parties.
-
3
ManageEngine ADManager Plus
ManageEngine
348 RatingsADManager Plus is an easy-to use Windows Active Directory (AD), management and reporting solution that aids AD administrators and help desk personnel in their day to day activities. The software has a web-based GUI that is intuitive and central. It handles complex tasks such as bulk management of user accounts, other AD objects, and delegate role-based access for help desk technicians. It also generates a comprehensive list of AD reports, which are essential to satisfy compliance audits. The Active Directory tool also includes mobile AD apps that enable AD technicians and administrators to perform user management tasks on the go, right from their mobile devices. -
4
MIRACL
19 RatingsProtect your users. Make their journey easier. MIRACL Trust provides a safer and smoother authentication experience. Only one step. No passwords. No problem. Multi-factor authentication is slow and cumbersome. MIRACL is a safer and more efficient alternative to traditional MFA. Logging in takes only 2 seconds and error rates as low at 1/10th of passwords. No passwords necessary. All you need is a PIN and you are in. Our cryptographic technology ensures that users' information is always safe. MIRACL Trust provides a simple login experience that puts users first and makes it easy to roll out your data quickly. -
5
StrongDM
StrongDM
72 RatingsAccess and access management today have become more complex and frustrating. strongDM redesigns access around the people who need it, making it incredibly simple and usable while ensuring total security and compliance. We call it People-First Access. End users enjoy fast, intuitive, and auditable access to the resources they need. Administrators gain precise controls, eliminating unauthorized and excessive access permissions. IT, Security, DevOps, and Compliance teams can easily answer who did what, where, and when with comprehensive audit logs. It seamlessly and securely integrates with every environment and protocol your team needs, with responsive 24/7 support. -
6
Frontegg is a developer platform that enables self-service, security and enterprise-capabilities through a rich user-management interface, freeing up creativity and differentiation. Frontegg's platform provides more than just authentication and SSO via an embedded login-box. It also offers an Admin Portal that serves as the Settings area for your users. The Admin Portal lets your users manage all aspects of their accounts. Users can assign roles and permissions to users and teams, create and assign roles and permissions, view audit logs, subscribe for webhooks, and more. Frontegg interfaces can be embedded within your app as a UI layer and become a customer-facing management interface. This interface is available for both personal and workspace level. Frontegg can also power-up your backend with rich SDKs that are available in various languages and frameworks.
-
7
Cisco Duo
Cisco
$3 per user per month 12 RatingsSecure your workforce with powerful, simple access security. We are Cisco Duo. Our modern access security system is designed to protect all users, devices, applications, so you can focus on what you do best. Secure access for all users and devices, in any environment, from any location. You will enjoy the peace of mind that only total device visibility and trust can provide. A SaaS solution that natively protects all applications and is easy to deploy, scaleable and quick to respond to threats. Duo's access security protects all applications from compromised credentials and devices. It also provides comprehensive coverage that helps you meet compliance requirements. Duo integrates natively with applications to provide flexible, user friendly security that is easy to implement and manage. It's a win-win-win for administrators, users, and IT staff. Multi-factor authentication, dynamic device trust and adaptive authentication are key components of your zero-trust journey. Secure SSO is also a part of the mix. -
8
Microsoft Entra ID
Microsoft
4 RatingsMicrosoft Entra ID, formerly known as Azure Active Directory, is a comprehensive cloud-based identity and access management solution that combines core directory service, application access management and advanced identity protection. Cloud identity and access management solutions connect employees, customers and partners with their apps, devices and data. Protect data and resources with adaptive access policies and strong authentication without compromising the user experience. Provide a quick, easy sign-in across your multicloud environment in order to keep your users productive and reduce time spent managing passwords. Manage all your identities, and access to your applications, in one central location, whether in the cloud, or on-premises. This will improve visibility and control. -
9
FusionAuth
FusionAuth
$0 22 RatingsFusionAuth was built from the ground up to integrate with any app or language. Each feature (yes, every one) is exposed via an API which gives you total flexibility to handle any use cases. Every feature and acronym you need is included: registration & log-in, passwordless, MFA, SAML and OIDC. In seconds, you can comply with GDPR, HIPAA and COPPA requirements. FusionAuth can be installed on any platform, on any computer, and anywhere. FusionAuth Cloud, our fully managed SaaS hosting solution, allows you to host it yourself. -
10
OneWelcome
OneWelcome
OneWelcome Cloud Identity Platform allows you to manage all your use cases, including gig workers, B2C and B2B. You can expand this core platform with a variety of identity apps to suit your organization's needs. OneWelcome handles the European complexity of eID's and privacy laws, GDPR regulations, as well as languages, for you. Our goal is to lower the barrier for any European citizen and company who wants to connect. Your customers will have seamless, secure, and privacy-protected access. Protect and connect your business-to-business ecosystem. Manage and delegate access to suppliers, business partners, and your extended workforce. Get in touch with us to learn more about the OneWelcome Cloud Identity Platform and how it can help your business. -
11
Ping Identity
Ping Identity
$5 per user per monthPing Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow. -
12
SecureAuth
SecureAuth
$1 per monthSecureAuth makes it easy and seamless to create digital experiences that support Zero Trust initiatives. SecureAuth provides a frictionless user experience that protects employees, contractors, and partners. This helps to reduce business risk and increase productivity. Secure, secure, and unified customer experiences will enable you to support your digital business initiatives. SecureAuth uses adaptive risk analytics to analyze hundreds of variables such as human patterns, device fingerprinting and geolocation to create each user’s digital DNA. This allows for continuous authentication in real-time, ensuring the highest level security possible throughout the digital journey. -
13
Simeio
Simeio
Simeio offers the best Identity and Access Management (IAM), which engages securely with anyone, anywhere and anytime with an unmatched "service first" philosophy. We can help you protect your customers, partners, and employees identities. Our job is to make access easy, reliable, and secure, wherever you are, in all areas of banking, hospitality and healthcare, as well as government and universities. We can also protect your brand reputation by protecting identities. To create a platform of exceptional reliability and security, we partner with, leverage, and interoperate solutions from the industry's most trusted businesses. Yes, our work is complex and specialized. You can let us handle all the complexity. We simplify the way your company manages identity. -
14
CoreOne Suite
ITSENSE
CoreOne Suite: Who uses it? CoreOne Suite is an identity management and access management software designed for medium and large businesses. CoreOne Suite is compatible with both enterprise IAM and customer IAM environments. What is CoreOne Suite? CoreOne Suite is a Swiss Identity and Access Management Software for Enterprise IAM and Customer IAM Solutions. Unique IT operations management functions extend the reach of identity management and access management for greater efficiency and security. CoreOne Suite allows organizations to achieve sustainable compliance and reduce risks. -
15
Cloud IAM can be combined with deep context for risk-based authorization to provide secure, frictionless access for your workforce and consumers. Identity and access management cannot be separated as organizations modernize hybrid multicloud environments with a zero trust strategy. Cloud IAM strategies must use deep context to automate risk protection, and authenticate every user to any resource. Your business needs should be considered when designing your journey. As you design and tailor the cloud IAM architecture that will either replace or enhance your existing infrastructure, you can protect your investments and preserve on-premises applications. Your users expect one-click access from any device, to any application. New federated applications can be integrated to one sign-on (SSO), embed modern multifactor authentication (MFA), simplify logistics, and provide developers with consumable APIs.
-
16
cidaas
WidasConcepts
Cidaas is the best solution for fast and secure identification management. Using cidaas, you can create one identity per user across all channels. cidaas, which is based on OAuth2.0 standards and OpenID Connect standards provides strong API security. It also integrates Bot Net Detection with Fraud Detection to ensure a secure journey through all your business channels. This is how modern identity and access management works. Comprehensive feature set allows for easy integration and implementation of all systems and use cases. We handle it so that you can concentrate on your core business. You don't have to worry about maintenance and operation. Users don't have to worry about pins and passwords. They are an unattractive barrier to digital access and make it difficult for them. Passwordless authentication secures your digital applications and offers your customers a unique customer experience. The login is the first thing that your users see. -
17
Ubisecure
Ubisecure
The Ubisecure Identity Platform helps organisations manage the many Digital Identity risks and opportunities. Focused on European B2B and B2C scenarios, Ubisecure combines highly assured Organisation Identity and Individual Identity to reduce fraud and increase efficiency in global trade and supply chain. Ubisecure is now the #1 global issuer of Legal Entity Identifiers (LEI). The Identity platform enables organisations to de-risk homegrown user registration and login solutions, and enable Single Sign-On (SSO) across all platforms and devices. Simplified MFA, including TOTP and Bank ID / Reusuable eIDs, reduce fraud by verifying customer identities, and automated customer credential management workflows for your helpdesk. Advanced identity use cases like consolidation of identity data silos, and Identity Relationship Management & Delegation can increase operational effectiveness, manage data breaches, and reduce IT costs dramatically. Whether your business goals are increasing revenue and user engagement, meeting compliance, de-risking homegrown systems or reducing operational costs, Ubisecure identity management can help. -
18
Amazon Cognito
Amazon
1 RatingAmazon Cognito allows you to quickly add user signup, sign in, and control access to your web and mobile applications. Amazon Cognito supports millions of users. It also supports sign-in with social identity providers such as Amazon, Google, and Amazon. Enterprise identity providers via SAML 2.0 are supported. Amazon Cognito User Pools offer a secure user directory that can scale to hundreds of millions. User Pools can be set up quickly and easily without the need to worry about setting up server infrastructure. Amazon Cognito allows users to sign in via social identity providers like Amazon, Facebook, and Amazon. Enterprise identity providers like Microsoft Active Directory via SAML are also possible. Amazon Cognito User Pools, a standards-based Identity Provider, supports identity and access management standard, such as Oauth 2.0 and SAML 2.0. HIPAA compliant and eligible for PCI DSS, SOC and ISO/IEC 27017. ISO/IEC 27018 and ISO 9001. -
19
TrustBuilder
TrustBuilder
€ 10 per user /per year TrustBuilder is a European-based Access Management software vendor based in Europe, specializing in strengthening digital landscapes with identity-centric solutions. It's SaaS platform seamlessly integrates passwordless and deviceless Multifactor Authentication into a comprehensive Customer Identity and Access Management platform, combining airtight security with a frictionless user experience. Committed to enabling secure and efficient operations, TrustBuilder offers tailor-made solutions, empowering businesses to customize their cybersecurity defenses. -
20
One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
-
21
Airlock
Airlock
Airlock's Secure Access Hub protects apps, APIs, and data from identity theft. Airlock combines security and convenience. It offers customers a seamless customer journey with single sign-on, social login, comprehensive user self service, consent management, and comprehensive user self-services. Reacting quickly is key to being in tune with the market. The Airlock Secure Access hub provides all necessary security functions, including registration, authentication, and self-services. You can focus all your IT resources on your business processes so you can use your IT resources more effectively. The Airlock Secure Access hub helps you meet all international compliance standards, including GDPR, PSD2, PCI–DSS and OWASP. The compliance of regulations is made easier by the inclusion of access policies onto applications and services. -
22
Cipherise for developers. All you need to create powerful and user-friendly authentication. Your users will have the best experience possible. Multi-Factor Authentication. MFA is simple and highly secure, which is almost invisible to end users. No complex passwords. No more complicated passwords, usernames, or credential sharing Omni Channel. The user experience is consistent regardless of whether it's on a mobile, tablet, laptop, or PC. Hackers are no longer able to access centralized credential Honeypots. Bi-Directional authentication. Before the user authenticates to it, the service authenticates to them. Mobile Native. Mobile Native. Protect your valuable IP and Content. We make it easy for your customers to sign up and access your content from any device.
-
23
Google Cloud Identity
Google
$6 per user per monthUnified identity, access, app and endpoint management platform (IAM/EMM). This platform helps IT and security teams maximize end user efficiency, protect company data, transition to a digital workspace, and transition to it. Protect your organization using the BeyondCorp security model, and Google's threat intelligence signals. Security Center can control access to SaaS apps and enforce strong multi-factor authentication (MFA). This will protect user accounts, manage endpoints, investigate threats, and ensure that users are protected. Optimize efficiency by providing intuitive user experiences on endpoint devices. You can also unify user, access and app management from one console. Users can access thousands of apps using single sign-on (SSO), and manage their company accounts the same way as their personal Google accounts. Integrate your existing systems onto a trusted platform and transition to digital. Directory Sync allows you to extend your existing directory to the cloud. -
24
CoffeeBean Identity and Access Management
CoffeeBean Technology
CoffeeBean Identity and Access Management provides a complete solution in the areas IAM (Identity and Access Management), and CIAM ("Customer Identity and Access Management") respectively. This platform has several modules: Single Sign-On (SSO), Multiple-Factor Authentication (2FA or 2FA), Adaptive Authentication and Directory Services. It also offers Lifecycle Management. -
25
Intercede
Intercede
MyID®, credential management software, allows governments and large corporations to issue and manage digital identity using the most secure method for multi-factor authentication to citizens and large workforces. MyID allows millions of people to securely authenticate themselves to the data, systems, and networks they need. MyID makes it easy for those responsible for information security to integrate and manage digital identity management and issuance. MyID allows seamless, secure access to company networks, systems, and resources for citizens and employees using multi-factor authentication via a variety devices. MyID®, a cyber secure credential management solution, is able to address the ever-growing threats of cyber terrorism and identity fraud. MyID is the best choice for data management. MyID software is distinguished by its reliability, security, and interoperability. -
26
aapi
aapi
$4 per user per monthTo make identity experiences more seamless and compliant, secure, compliant, as well as productive, you can act on identity events in other apps. Automate embed the right real-time actions for users or teams to efficiently act upon data in downstream apps. Next-generation granular access to specific functions of apps. This surpasses existing PAM or CASB solutions and provides true zero trust. Aapi responds to events such as identity provisioning or suspicious activity. It automates identity, application, security, and security responses. Using aapi, users and teams can automatically embed correct real-time actions in their chosen app. Access to the data is protected by your IAM. Your IAM gives users access to the features they require within apps, but keeps everything else secure and safe. -
27
OpenText IAM
OpenText
Digital transformation can bring many benefits and new sources of value. However, it also presents a huge challenge: ensuring secure access to information both within and outside the firewall. IT must manage access to cloud-based and internal applications by employees, customers, and trading partners. Every person, device, and system in the digital economy requires a digital identity. OpenText Identity and Access Management Platform (IAM) helps enterprises manage all digital identities that request access. OpenText IAM makes information access manageable, visible, and governable. Identity and access management manages user accounts, roles, and access rights for specific users, systems, and devices. The best IAM solutions manage employee identities within an organisation as well as across an extended business ecosystem that includes customers and partners. IAM is also necessary to manage IoT devices' identities. -
28
CyberArk Customer Identity
CyberArk
Your customers will be delighted by easy and secure access via your apps and websites. This will keep them loyal to you. Customers expect great digital experiences. The attack surface is becoming more permeable than ever. CyberArk Customer Identity allows you to securely open your apps and websites to customers. Easy integration, intuitive access controls, and frictionless sign on. All your privacy, consent, and identity verification in one platform. Pre-built widgets and APIs reduce development effort. Secure access to business apps for both human and machine identities. Secure access to machine identities within the DevOps pipeline. IT can be simplified and made easier while improving business security. Secure single sign-on access for your apps and services. -
29
IAM Cloud
IAM Cloud
$2.40 per monthIAM Cloud's leading cloud storage management tool. It allows secure, direct access (no sync), to OneDrive for Business and MS Teams as well as SharePoint Online. It is great for both desktop and VDI environments. Our secure and simple sign-on platform. Provides single sign-on (SSO), multi-factor authentication (MFA), Surp4ss! Password management, basic identity sync and provisioning from Active Directory. All the features you want from an SSO solution, without the premium price. IAM Cloud is an identity company. IDx allows you to connect & sync identities across multiple systems, allowing for full automation of the Joiner, Mover, and Leaver processes. IDx can integrate with custom-built, cloud-based, and on-prem HR, ERP, CRM, MIS, and Directory systems. Cloud-based data migration. Office 365 supports both to-the cloud and from-cloud -to-cloud migrations. Combine multiple Office 365 tenancies in one tenant. Split tenancies. -
30
WSO2 Identity Server
WSO2
WSO2 Identity Server API-driven is built on open standards and offers the option of cloud, hybrid, or on-premise deployments. It is highly extensible and can support complex IAM requirements. WSO2 Identity Server allows you to do single sign-on as well as identity federation. It is backed up by strong and adaptive authentication. Securely expose APIs and manage identities by connecting with heterogeneous user accounts. Open-source IAM can be used to innovate quickly and to build secure Customer IAM solutions (CIAM) to deliver a user-friendly experience. -
31
TraitWare is a Real Passwordless Multifactor Authentication (MFA) that allows for True Zero Trust Access. TraitWare's plug-and-play, enterprise-class, patented solution combines Passwordless MFA (Multi-factor authentication) and SSO. This eliminates the need for usernames or passwords, reduces friction, and increases security for your company. You'll also save up to 60% on support budgets. Our QR solution can eliminate the need to create a username. Our software is easy to use and virtually eliminates the vulnerabilities associated with password logins and usernames. We eliminate the possibility of phishing usernames and passwords by replacing them. Our QR scan or Direct login ties a user directly to the login, eliminating credential sharing or theft.
-
32
AU10TIX
AU10TIX
AU10TIX is an Israeli identity management company. It is based in Israel. Their mission is to eradicate fraud and create a safer and more inclusive world. The company offers critical, modular solutions that verify and link digital and physical identities to ensure businesses and customers can connect securely. AU10TIX has been a preferred partner for major global brands in customer onboarding and customer verification automation over the past decade. AU10TIX elevates authentication and verification to a new level of scalability. Deep learning is all about the input. The more you feed it, it becomes smarter. This allows you to scale consumer onboarding, and exponentially scale your company. Fortune 500 companies can rely on AU10TIX to eliminate fraud and focus on growth. -
33
RadiantOne
Radiant Logic
Transform your existing infrastructure into an asset for the entire company with a platform that makes identity a business enabler. RadiantOne is a cornerstone for complex identity infrastructures. Using intelligent integration, you can improve your business outcomes, security and compliance posture, speed-to-market and more. RadiantOne allows companies to avoid custom coding, rework and ongoing maintenance in order to integrate new initiatives with existing environments. The deployment of expensive solutions is not on time or within budget, which negatively impacts ROI and causes employee frustration. Identity frameworks which cannot scale are a waste of time and resources. Employees struggle to provide new solutions for users. Rigid and static systems cannot meet changing requirements. This leads to duplication of efforts and repeated processes. -
34
Approw
Approw
$19 per monthApprow is an easy to use, adaptable authorization and authentication platform that can be used with many on-premises applications. Approw focuses on identity and creates a social infrastructure to allow identity sharing across all SaaS users and software. This helps companies create a secure modern IT infrastructure that protects their business and redefines the user experience. Multi-factor authentication (MFA), a simple and effective security method that goes beyond usernames or passwords, adds an additional layer of security. U-Shield is for banks, and off-site login requires SMS verification. Empower Approw applications can quickly enable multifactor authentication (MFA) and improve access security and authentication levels. Multi-factor authentication that is "adaptive" can be used in lieu of traditional multi-factor authentication. It can also choose to use different MFA methods depending on the security situation. -
35
ManageEngine AD360
Zoho
$595.00 /year AD360 is an integrated identity management (IAM), solution that manages user identities, controls access to resources, enforces security, and ensures compliance. AD360 allows you to perform all your IAM tasks using a simple and easy-to-use interface. All these functions are available for Windows Active Directory, Exchange Servers and Office 365. You can choose the modules that you need and get started addressing IAM issues across hybrid, on-premises, and cloud environments with AD360. You can easily provision, modify, and deprovision mailboxes and accounts for multiple users from one console. This includes Exchange servers, Office 365, G Suite, and Office 365. To bulk provision user accounts, you can use customizable templates for user creation and import data from CSV. -
36
OneLogin, a trusted identity management (IAM), solution for modern enterprises, helps you secure company information and empower your employees. OneLogin is a great solution for companies that want to simplify business logins and strengthen enterprise security. OneLogin features include single sign-on (SS), user provisioning, unified directory, user provisioning and adaptive authentication. Compliance reporting is also available.
-
37
System Frontier
Noxigen
$29/year PowerShell web front-end with role-based access control, auditing, and remote management tools. You can delegate granular permissions for managing servers, workstations, network devices, and user accounts. Privileged Access Management -
38
LoginRadius
LoginRadius
3 RatingsLoginRadius allows businesses to provide a pleasant customer experience without compromising security. Companies can use our customer identity platform to offer a simplified login process, protect digital accounts, and comply with data privacy regulations. LoginRadius has over 3,000 users and 700 million monthly visitors worldwide. Registration services, adaptive security, integrations with third-party apps, and customer insights are some of the key platform features. Gartner, KuppingerCole and Computer Weekly have named the company an industry leader in customer identification and access management (CIAM). Microsoft is a major technology investor and partner. LoginRadius has its headquarters in Vancouver, Canada. There are additional offices in Toronto, USA and Australia. LoginRadius Services: API Authentication OAuth Data Management Secure Login One Sign On SAML SSO Sign up for social media Two Factor Authentication -
39
RapidIdentity
Identity Automation
Identity Automation is the most flexible, fully-integrated, full-lifecycle solution for identity, access, governance and administration. RapidIdentity, the company's flagship product is designed to help organizations increase their business agility, embrace security and provide a better user experience. RapidIdentity is a great tool for organizations that want to improve security, reduce risk of data breaches and lower IT costs. -
40
Authress
Rhosys
$1.10 per monthAuthress, Authorization API to your application. Authorization can be complicated quickly. Even though it seems simple, there are many hidden complications involved in authorization. It is not something you want to do on your own. It takes time to get authorization right. In simple cases, it takes an average of 840 hours to implement authorization logic. This number increases rapidly as you add more features to your app. Your application is your biggest security vulnerability. If you don't have the right skills, your doors are open to malicious attacks. You run the risk of compromising user data, non-compliance to local regulations, and major business losses. Features: Secure authorization API. Instead of creating your own authorization logic, call our API. Written by developers for developers. Granular permissions. Define multiple levels and group them by user role. You can be as specific as you like; Identity provider integrations; Simply call an API to connect any ID provider. -
41
Fischer Identity
Fischer International Identity
Fischer helps organizations build a secure, predictable, and effective Global Identity®. Architecture. The number one priority is now to secure an Identity Program. Fischer Identity offers hardware and software solutions, as well as Global Identity®, Services to protect and control information technology resources. Our plug-and-play automation allows for predictable, secure provisioning that will provide your identities with the access they require on day one. You can also deprovision access as needed. Automating Fischer's way will eliminate the need for professional services. Our governance model gives you the control you need in order to ensure compliance throughout your business. You will always know who has what access, how they got it, and what you can do to correct any issues. -
42
Tappd(in) Community Bundle
IDENTOS
A mobile app that allows you to engage your community members can be customized to reflect the brand of your community. Your users digital pass – The wallet allows password-less authentication and personal data sharing to control any service within your app or digital ecosystem. Built on open standards and the FPX Open-Specification. Trusted connectivity is achieved by the user-centric access network. You can easily eliminate the technical hurdles in realizing your vision of digital connectivity. Tappd(in), Community Bundle allows you to create a seamless experience that delivers real business value. Create an immersive, connected experience your community will want to continue to tap into. Users can decide when, where, and how they want to tap into data sharing between digital service providers. -
43
LoginTC
Cyphercor
$3/month/ user Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more. LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more. LoginTC can help you reduce your insurance costs and meet compliance regulations with ease. -
44
maat.ai
MAAT.ai
It is vital to protect our digital identity, especially in this age of internet fraud and theft. This is why maat.ai was created. It is a platform that uses blockchain, advanced encryption and high-security servers. It allows people to identify themselves and manage information with confidence and security. You can use the maat.ai business platform to share information and request official documents from customers, employees, suppliers, and users in a safe and practical way. We verify the identity and validity of your clients through biometrics and Facial Maatch. Your safety is paramount to our team. All files are encrypted and stored on high security servers. All transactions are confidential and are recorded on the Blockchain. -
45
Boku Identity
Boku
Boku is a mobile identity service that offers the best in class. It will protect your business against account takeovers, fake identities, and compromised numbers. All this while providing a seamless user experience. Boku Authenticate will help you protect yourself against account takeovers (ATOs), which target your customer's mobile number. It streamlines your verification methods of mobile number possession. Boku Authenticate will use its built-in connectivity with the mobile operators' wireless network to verify mobile number possession on the device. The solution is seamless and secure. Boku Authenticate will reduce user friction and provide the best defense against ATOs. -
46
Symantec IGA
Broadcom
Although user experience and instantaneous access have become the norm, the IT infrastructure supporting these efforts has grown exponentially more complex. IT organizations are under constant pressure to reduce operational costs while still complying with increasing numbers of industry and government regulations. IT organizations must allow more people to access different applications in a shorter time span, while still being accountable to a multitude of parties who control access. Identity governance and administration technologies today must be able provide broad provisioning support for both on-premises as well as cloud apps. They also need entitlements certification to verify that privileges are appropriate. All this while scaling to store millions. -
47
Strivacity
Strivacity
$500 per monthStrivacity quickly adds secure customer access management (CIAM), to your online properties. This allows you to grow your revenue, comply with rapidly-changing privacy regulations, and personalize your service using the insights you get into your customers' interactions with you. We can integrate into your existing app to allow your customers to self-service their accounts. This will allow you to scale your business as fast as possible. It's okay if your CIAM solution is no longer sufficient. Clicks (not codes) are used to reduce your TCO, and get your customers where you want them to go. Our Isolation By Design™, architecture protects regulated data and meets privacy standards such as GDPR and CCPA. Add in legal and security requirements, and the focus often drifts to the "C" (aka customers). Strivacity helps you keep your customers' focus by providing a single solution that meets all of their needs, goes live quicker, and doesn't require a team of developers or consultants to maintain it. -
48
ScriptMe
ScriptMe AB
$45/month The fastest, easiest, and most secure method to transcribe and subtitle your audio and video. Save money and time by leveraging the power of AI. The job can be done in a few clicks. Hand-transcription is slow and expensive. We use artificial intelligence and powerful editing and export tools to automate this process. So you can concentrate on the things that really matter. Minutes to convert hours of audio/video into a ready-to-use transcription. We support English, Swedish and Spanish. We also support Danish, Norwegian, Finnish and German. ScriptMe’s intuitive subtitle editing page allows you to easily customize your subtitles. Trim and design your subtitling with precision. Choose the perfect color, font, and background for your project. -
49
Saviynt
Saviynt
Saviynt offers intelligent identity access management and governance to cloud, hybrid, and on-premise IT infrastructures in order to accelerate enterprise digital transformation. Our platform integrates seamlessly with the most popular IaaS, PaaS and SaaS applications, including AWS Azure, Oracle EBS and SAP HANA. Gartner awarded the Trust Award to our IGA 2.0 advanced risk analysis platform and named it an industry leader. -
50
Visual Guard
Novalys
1.55/month/ user Visual Guard is an advanced identity and access management (IAM) tool. It offers a complete solution to secure sensitive applications and data. Visual Guard facilitates the implementation of robust, standards-compliant security policies, with centralized management of users and permissions, User management : Create, modify & delete user accounts Integrate with LDAP or Active Directory directories Automatic synchronization of user information Access control : Fine-grained access rights to features and resources Permission and Role Management Multi-factor authentication (MFA) Single Sign-On (SSO) Security Audit and Monitoring : Permission Matrix Detailed logs Historical & Real-time Graphs Integration: Compatibility with major development platforms, frameworks, and protocols. APIs for integration of authentication and authorization features into custom applications Benefits : Simplified access management Enhanced data security Improved regulatory compliance Reduce identity management cost Visual Guard is the ideal tool for organizations seeking to optimize their IT security strategy, while ensuring efficient and effective identity management.