Best Authlink Alternatives in 2025
Find the top alternatives to Authlink currently available. Compare ratings, reviews, pricing, and features of Authlink alternatives in 2025. Slashdot lists the best Authlink alternatives on the market that offer competing products that are similar to Authlink. Sort through Authlink alternatives below to make the best choice for your needs
-
1
Enterprise Process Center (EPC)
Interfacing Technologies
55 RatingsInterfacing's Digital Twin Organization software offers transparency and governance to improve quality, efficiency, and ensure regulatory compliance. A single platform allows you to map, analyze, and automate your processes, manage regulatory compliance, and assess risks. Interfacing's digital twin solution (Enterprise Process Center-EPC) is an enterprise management platform that allows companies to digitally transform their processes. It helps them streamline operations, improve productivity, and make things more efficient. Interfacing's digital platform - Rapid Application Development Tools (RAD) Tools, with its Low Code Development methodology, will optimize your technical resources and maximize transparency to allow for continuous improvement. Discover how our Low-Code Rapid Application Development module gives you all the tools needed to create and deploy custom, scalable, secure, mobile-ready applications in days vs. months! -
2
Unbound Crypto Asset Security Platform
Unbound Security
The only FIPS 140 L2 certified Multi-Party-computation (MPC) security platform for digital assets. Unbound's Crypto Asset Security Platform can be used to create multi-party risk-based approval policies, which adhere to local regulations. It can also integrate HSMs with offline signers into a single MPC-based platform. FIPS 140 L2 certified software that allows you to securely sign transactions and manage all your digital assets. Institutional investors don't have the choice between regulatory compliance, asset productivity, or peace of mind with Unbound CASP. One comprehensive system that protects digital assets in both "cold" and "hot" vaults. It uses MPC-based workflows to ensure the security of transfers between the vaults. CASP supports any approval policy structuring and any number of cryptographically valid signers. -
3
Hacken is one of the key players in the blockchain security field, with a track record of more than 2,000 audits for over 1,500 worldwide clients since 2017. Their clients include big names such as 1inch, Radix, NEAR Protocol, Sandbox, Wemix, Status, Aurora, ShapeShift, Unicrypt, Venom, Enjin, Status, and PolkaStarter, to name a few. Their team is powered by more than 150 global talents, including 60 top-class professional engineers dedicated to keeping projects safe. Trusted by industry giants like Coingecko and Coinmarketcap, Hacken's contributions have achieved wide recognition. Beyond Smart Contract Security Audits, Hacken offers a comprehensive suite of services, including Blockchain Protocol Audits, Penetration Testing, dApp Audits, Crypto Wallet Audits, Cross-Chain Bridge Audits, Bug Bounties, Proof of Reserves, CCSS Audits, and Tokenomics Audits & Design. From security audits and bug bounties to DORA Compliance, AML Monitoring, and Threat-Led Penetration Testing, Hacken delivers solutions that bridge innovation and compliance. Through collaborations with institutions like the European Commission and ADGM, Hacken sets security standards, fostering trust and resilience in the blockchain ecosystem.
-
4
Webacy
Webacy
$0Webacy is the ultimate layer of protection for your assets that you are responsible for. We've developed a super-simple solution that uses smart contracts to help secure your blockchain assets. Assess the risk to your wallet of potential compromises with our Risk Score. Wallet Watch allows you to monitor your transactions and approvals across all of your wallets in real-time. Panic Button allows you to act on potentially suspicious transactions with a single click. Our self-executing contract will allow us to expand our products into transaction firewalls via private RPC's and mempool interrupters, among others. Our Risk Score can be embedded into other products such as marketplaces, exchanges and payment methods. Webacy creates a safer web3 that is accessible to everyone. -
5
Notebook
Notebook
Zero-knowledge cryptography is used for anonymous KYC and soulbound credentials. Blockchain is the future of trust, according to us. Notebook allows you to protect your identity and data so that you can authenticate in a trustless world. Notebook uses Zero-Knowledge Proofs and fragmented identity to keep users anonymous. A Notebook is stored on-chain within a smart contract. This means that no one or corporation has access to your identity or data except you. A Notebook is the best way for summary statistics to be stored, such as credit score and bad-actor behaviour. Storing such metrics creates a fairer world where everyone is held accountable for their actions and believes in the greater good. An individual cannot create multiple Notebooks by using the PII data required to onboard. However, this does not compromise their privacy. The Notebook's identification system can be disassociated from the user's wallet addresses. This allows the same identity to be used across-chain. -
6
Lockchain
Lockchain
FreeLockchain's AI security data pipeline can help you prevent catastrophic events from occurring in digital assets. Lockchain aggregates data from on-chain and open source intelligence sources to give you insights into risks in advance. Receive alerts by email, Slack or Telegram that tell you what risk events are occurring right now and how they relate to your portfolio. Lockchain verifies on-chain data in order to ensure that your assets are located where the exchange claims they are. Monitor all custody platforms in one place. Lockchain's AI can interpret a wide range of data sources. Lockchain's 24/7 real-time automation and due diligence platform allows you to avoid catastrophic events in the digital asset world. Use Lockchain's database to gather security and trust information as part of your due-diligence process. Lockchain monitors current risk events and alerts you of additional impacts. Tell Lockchain which parts of your portfolio it should monitor. -
7
CYBAVO
CYBAVO
CYBAVO is a digital security company that protects digital assets. It was founded by pioneers and experts in the security and cryptocurrency industries. They have more than 20 years of experience in cybersecurity at the highest levels. CYBAVO's mission it to provide the best technologically advanced security for digital asset custodians. Our expertise in cybersecurity, decentralized technology, and blockchain technology allows us to empower blockchain companies by providing enterprise-ready crypto wallet management services that are secured with the most advanced technology. Our robust cryptographic scheme protects private keys and minimizes key loss. We use a shared responsibility model to minimize the risk. To theoretically gain access, an attacker must compromise at least three entities. Our solution is built on security. Our platform is secure from the operating system to the programming language level up to the strong enforcement of our transaction policies. -
8
UBIRCH
UBIRCH
UBIRCH is rethinking data security and has developed a revolutionary approach based upon established cryptography and blockchain technology. The UBIRCH solution can be easily integrated into IoT platforms or other system environments. It requires no additional hardware and consists only of two components: the Ubirch Nano Client (and the Ubirch Trust Service). We seal every data packet at the point of data capture with robust cryptography and block-chain technology before it is transferred from the digital to the physical world. This creates an unalterable "chainof trust" that ensures that IoT data cannot be altered, duplicated, or deleted at source. Any recipient can verify the data at any time, from anywhere. The Nano Client is one of the two components that make up the UBIRCH solution. It is a small, lightweight software library. -
9
SecureKloud
SecureKloud
SecureKloud, a cloud-native company, offers a variety of products, frameworks, and services that solve problems related to Blockchain, Cloud, Enterprise security and Decision Engineering. -
10
Bitfury
Bitfury
Exonum Enterprise is Bitfury's premier blockchain-as-a-service solution, designed to help governments and companies integrate blockchain into their operations. Crystal is a web-based software program that assists financial institutions and law enforcement in managing blockchain investigations. Exonum blockchains can help reduce inefficiencies, build trust, and increase security and trust across all sectors, including government, healthcare and education, real estate, retail, and insurance. Many governments face increased costs and inefficiency due to inefficient operations. Secure storage, retrieval and protection of government documents can be difficult and expensive. Blockchain-based systems can be used to verify these documents by providing public or private proof of veracity. -
11
GK8
GK8
GK8 is an enterprise-grade, digital asset custody, and management platform that allows institutions to harness the power of blockchain to create new revenue streams (i.e. custody as a service, DeFi, tokenization, staking, and more). We empower customers to control their own destinies while minimizing counter-party risk. GK8’s regulation-ready solution includes both a Cold Vault and an MPC Vault. Our unique Cold Vault is the only solution in the market that can create, sign, and send blockchain transactions without receiving input from the internet. It can be paired with our high-performance MPC wallet, for high-frequency automatic transactions. Our MPC can execute thousands of signatures per second, providing a decentralized, keyless infrastructure. Together, they are managed by our industry-leading policy engine which allows institutions to manage their crypto as they would their fiat. The solution grants institutions unparalleled scalability and agility without compromising security. GK8's out-of-the-box capabilities include universal support of all EVM-compatible layer-1 blockchains and generic smart contract support. GK8 clients can access the highest insurance cap in the industry (up to $1B per vault). -
12
Olympix
Olympix
Olympix, a DevSecOps pioneering tool, empowers developers to secure Web3 code proactively from the start. It integrates seamlessly into existing workflows and continuously scans for security vulnerabilities as developers are writing code. It offers quick-fix suggestions that can be implemented with a single click to reduce risks and increase productivity. Olympix built the first-of its-kind security intelligence data base by analyzing blockchains since their inception. This allows it to identify and prioritize smart contract vulnerability in real time. This proactive approach allows developers implement best practices right from the start, encouraging a security-first mentality throughout the entire development process. By assuming responsibility for security from the beginning, developers can avoid costly smart contract rewrites, and enable faster, safer deployment. Olympix’s intuitive design makes it easy to integrate security into coding. -
13
Kaspersky Blockchain Security
Kaspersky Blockchain Security
Blockchain-based technology is gaining popularity and can be used to solve many problems. It's not just about cryptocurrencies. Blockchain technology's many applications make it a key component in the establishment of business processes that can be applied even in manufacturing. Blockchain technology is used in IoT networks, workflow management system, cryptocurrency, and many other areas. It is an essential component and a state-of the-art standard for many businesses. A blockchain can pose risks because it is a security-driven measure. Comprehensive protection is crucial because blockchains contain sensitive information about specific users and businesses. Security breaches, identity compromises, and intrusions can be dealt with immediately. You can neutralize cyberattacks immediately, without waiting for them. -
14
Fireblocks
Fireblocks
You can build, manage and scale a profitable digital assets business. Fireblocks is a platform that allows you to store, transfer and issue digital assets across your entire ecosystem. Fireblocks DeFi API & Browser Extension allow you to securely access all DeFi protocols. This includes trading, lending/borrowing and yield farming. Multi-layer technology that combines the best in MPC cryptography and hardware isolation to protect investor and customer funds from cyber attacks, collusion, and human error. The only institution asset transfer network that allows you to move and settle assets 24 hours a day. Maximize your cash flow, reduce counterparty risk and unlock new revenue streams. The only insurance policy that covers assets in storage and transfer, as well as E&O, gives you peace of mind. -
15
Civic
Civic Technologies
$250 per monthCivic's compliance tools are available to meet KYC and AML requirements for decentralized finance (DeFi), public Blockchains, NFTs, businesses, and other financial services. Permissioned markets allow only qualified, trusted users to participate. Civic's compliance tools make it easy for liquidity providers, dApp developers and institutional participants to manage risk and build trust in the DeFi ecosystem. Civic Pass creates the conditions for greater checks and balances in the DeFi ecosystem. To access a permissioned marketplace, users must meet strict requirements. They are also monitored to ensure compliance with the rules. AI-powered identity verification is combined with human review to ensure that your users remain real. Bad actors are prevented from entering your organization by email and biometric verification, passcode protection, and email and liveness verification. -
16
Hypernative
Hypernative
Hypernative detects a wide range of attacks, but only alerts users to those that are important. Stop hackers before they cause any damage. Make your security unassailable. Minutes before the first hacking transaction, you can detect the vast majority of attacks. Use automated actions and alerts in order to protect your assets. Keep attackers away without affecting the experience of other users. You can prevent specific malicious interactions by identifying the wallets or contracts that interact as malicious or not. Before authorizing transactions, screen addresses and identify risks correctly. Address reputation across multiple chains. Hypernative protects you from zero-day vulnerabilities as well as frontend hacks and state actor threats. Hypernative protects against zero-day cyber threats, economic risks, and governance risks. It also protects digital asset managers, protocols, and Web3 applications. -
17
Blowfish
Blowfish
Blowfish makes fraud easy to spot and stop before it happens. With the blowfish security engine, join the top wallets that protect their users' funds. Machine learning and transaction analysis are used to detect fraud from multiple angles. Scan transactions using Solana to receive recommendations, tailored warnings, and human-readable simulation results that explain what the transaction will do. It is crucial to explain to users how the transaction will affect their crypto assets before they approve a blockchain transaction. It is also important to warn users if they interact with suspicious or malicious dApps or smart contracts. -
18
SlowMist
SlowMist
SlowMist Technology is a company that focuses on blockchain ecological security. It was founded in January 2018 and is based in Xiamen. It was founded by a team with more than ten years experience in first-line cyber security offensives and defensive combat. The team members have achieved world-class safety engineering. SlowMist Technology is an international blockchain security company. It serves many well-known and top-ranked projects around the globe through "threat detection to threat defense integrated security solutions tailored for local conditions". This includes: cryptocurrency exchange, crypto wallets, smart contracts, and the underlying public blockchain. There are thousands of commercial clients, with customers located in more than a dozen countries. -
19
PARSIQ
PARSIQ
$41 per monthConnect blockchain activity with off-chain apps or devices. Secure and monitor DeFi applications. Create custom event triggers to power real-time automations. Simple triggers can be created that send notifications for all blockchain transactions, even large scale. Complex workflows can be created that span multiple blockchains and other apps. You can add conditional logic, aggregate, format, and many other features. Monitor any activity. Our quick monitoring wizard makes it easy to create automation connections between apps and blockchains. PARSIQ helps small businesses and individuals keep Smart-Triggers accessible and organized. Larger enterprises have their own dedicated infrastructure and can customize their monitoring applications. PARSIQ offers all delivery services based on your needs, including emails and refrigerator smart-screen notifications. -
20
Allure Security
Allure Security
Allure Security protects brands by finding and stopping online brand impersonation attacks before customers fall victim. Our patented, artificial intelligence-powered engine finds more spoofed websites, social media accounts, and mobile apps more quickly and with greater accuracy than legacy approaches. Our unique, multi-pronged approach to managed response – blocklisting, decoy data, and end-to-end takedown – significantly reduces the lifespan of a scam and the damage it can do. -
21
BrandShield
BrandShield
1 RatingBrandShield is an online brand protection solution that protects against counterfeiting, phishing, and other forms of fraud. -
22
TuringCerts
Turing Chain
To ensure 100% authenticity of every certificate, the incorruptible, secure and trustworthy blockchain technology was adopted. HR departments can verify authenticity at any time and from anywhere using links shared by students. This makes personnel screening easier and more efficient. Students' learning portfolios can be properly saved, which will reduce the time and effort required to do paper work. Import background image and information. Send an email to the recepient automatically -
23
IQGeo
IQGeo
You can improve productivity and collaboration within your organization by providing an accurate, current view of complex network assets that is easily accessible by anyone, anyplace. Our award-winning software solutions are built on the IQGeo Platform, formerly myWorld. It transforms the ability of telecom operators and utility network operators design and manage complex network assets. Its mobile-first architecture creates an accurate digital twin of your physical operations, which can be securely shared with thousands field and office staff. This improves enterprise collaboration and increases operational productivity. IQGeo's enterprise-grade geospatial software is available to be used by contractors and mobile field crews. It provides the tools they need for streamlined construction and maintenance, and greatly improves field data quality. -
24
Elliptic
Elliptic
Training and certification in blockchain analytics for regulators, financial institutions, and crypto-businesses. Manage financial crime risk, ensure regulatory compliance, and grow with confidence. Our crypto compliance services and solutions are used by regulators, financial institutions, and crypto businesses to detect and prevent financial crimes in cryptoassets. Businesses can rely on blockchain analytics to provide accurate and actionable insights across more than 100 cryptoassets. Elliptic offers blockchain analytics for cryptoasset compliance. Your compliance team can manage risk across more than 100 cryptoassets and comply with regulatory requirements. Compliance is a competitive advantage that builds trust between regulators, customers, partners, and other stakeholders. It is crucial to have the best AML monitoring solutions. Also, it is important to invest in your team to develop the knowledge required to stay compliant. -
25
NuCypher
NuCypher
Manage secrets such IAM tokens and database credentials, as well as signing/encryption keys in dynamic environments. Access to sensitive data can be granted or revoked to an unlimited number of recipients. Encrypt data while protecting the confidentiality of the inputs. NuCypher's PRE network offers cryptographic access controls for distributed protocols and apps. NuCypher's NuFHE library allows secure, private computation on encrypted information by outsourced nodes. Fully Homomorphic Encryption is a type of encryption that allows for arbitrary, secure computations on encrypted data. This means that encrypted data can be processed without having to decrypt it first. The operations on encrypted data are performed as if they were being done on plaintext data. -
26
FYEO
FYEO
FYEO protects individuals and enterprises from cyber attacks through security audits, real time threat monitoring, decentralized identity management, anti-phishing and intelligence. Web3 auditing and security services for blockchains. Protect your employees and organization from cyberattacks using FYEO Domain Intelligence. Simple identity monitoring and password management services. End-user breach and phishing alarm system. Discover vulnerabilities and protect your application as well as your users. Identify and address the cyber risks within a company prior to taking on liability. Protect your company against ransomware, insider threats and malware. Our team collaborates with your development team in order to identify critical vulnerabilities before they are exploited by malicious actors. FYEO Domain Intelligence provides real-time cyber threat intelligence and monitoring to help secure your organisation. -
27
VIRNECT Twin
VIRNECT
Our team of specialists will help you create a digital replica of your facility if you want to take advantage of the power of a digital Twin. This replica will provide real-time information including worker locations, equipment status and facility data. This is your virtual command centre. This twin shows how the individual parts work together to create a complete asset. This allows you not only to confirm the durability and useability of individual components, but also to explore the entire system in detail. Similar to the Production Twin this type of digital twin lets you analyze the performance of your processes and maximize your facilities. To monitor real-time data and maximize productivity, create a model of your production process. -
28
CertiK Skynet
CertiK
CertiK Skynet, the intelligence engine behind Security Leaderboard's security scores, is CertiK Skynet. It provides 24/7 security analysis for smart contracts. Skynet combines dynamic and static technologies to provide an intelligence engine that is available 24 hours a day to verify the security and integrity of your smart contracts and projects. Users can quickly assess the security of a project by looking at the publicly available, human-readable security score. -
29
AIKON
AIKON
The Blockchain provides secure user Identities. Identity as a Service, GDPR & CCPA compliant Identity that connects businesses & users to the most important public Blockchains - Algorand EOS, Ethereum, and many more! One service allows you to manage all blockchains. AIKON connects your business to multiple blockchains cost-effectively and integrates with your existing technology stack. Your customers can seamlessly move to the blockchain. Login using email, phone, or social login. Companies can sign on behalf of users. It is an API-based solution that can be used out of the box. It works across all chains. Instead of training new skills, use existing engineers. All the features you need to ensure that your users are GDPR & CCPA-compliant. Blockchain-based infrastructure to keep data and access secure. It's easy to create native blockchain accounts. Your users can sign up using the familiar social, email, or SMS logins. -
30
KeyScaler
Device Authority
KeyScaler®, a purpose-built IAM platform that focuses on device identity and is compatible with IoT/Blockchain, is available. It allows customers secure registration, provisioning, and connection of devices to IoT applications, platforms, and services. The platform makes it easy to establish a solid, end-to-end security architecture for the IoT. It also delivers efficiencies at scale via security automation without the need for human intervention. This is due to the IoT's dynamic scale, where new devices are being provisioned constantly, and it quickly becomes difficult to manage without automation. The IoT requires a method of identification that starts with individual devices. These devices can be authenticated automatically and dynamically without any manual intervention. Device Authority has created a flexible protocol for interface with KeyScaler®, which allows for the delivery of automated PKI for IoT device - offering two options for device authentication. -
31
GE Digital Twin
GE Digital
Machine learning and advanced analytics can be used to reduce operational risks and costs. Digital twins are an integral part of digital transformation. They can create a precise virtual replica of physical assets and objects to increase productivity, streamline operations, and increase profits. Digital Twin is a software representation or a system of physical assets, systems, or processes that can be used to detect, prevent and predict, optimize, and maximize business value through real-time analytics. GE Digital is focused on three core areas: Asset and Network. As a strategy to improve system performance, monitor, simulate, and control assets, processes, or networks. Reduce asset- and process-related incidents to protect employees' health and safety and avoid unplanned downtime. -
32
Truebit
Truebit
Truebit is a blockchain-enhancement that allows smart contracts to securely execute complex computations in standard programming language languages at lower gas costs. Although smart contracts can correctly perform small computations, large computation tasks pose security threats for blockchains. Truebit addresses this problem by providing a trustless retrofitting oracle that correctly executes computation tasks. Any smart contract can issue a computation task via WebAssembly bycode to this oracle, while anonymous "miners," receive rewards for solving the task correctly. The protocol of the oracle guarantees correctness in two layers. There is a consensus layer where anyone can object if there are faulty solutions and an on-chain mechanism that incentivizes participation and ensures fair compensation. These components are formalized through a combination off-chain architecture and smart contracts on-chain. -
33
Consensys Diligence
Consensys
Security is crucial in the blockchain space. Our comprehensive smart contract audit service assists everyone, from startups to enterprises, in launching and maintaining their Ethereum blockchain applications. Our industry-leading collection of blockchain security analysis tools combined with hands-on review by our veteran smart contract auditors ensures that your Ethereum app is ready for launch and built for users. It is important to audit your code early in the development process to prevent potential vulnerabilities after launch. Our APIs offer affordable smart contract security options as well as the assurance that your code has been fortified. To eliminate any false results, veteran security auditors double-check your code manually. Our tools can be integrated into your development environment to allow you to perform continuous security analysis. Get a vulnerability report that includes an executive summary, vulnerability details, mitigation guidance, and mitigation guidance. -
34
Halborn
Halborn
We use deep security inspection and the most recent offensive security tactics to identify critical vulnerabilities in applications before they can be exploited. Our dedicated team of ethical hackers performs hands-on assessments to simulate the latest techniques and activities used by threat actors. Everything, from web apps to wallets or layer1 blockchains, is subject to our pentesting. Halborn performs a thorough analysis of the smart contracts of a blockchain application to identify security vulnerabilities, correct design flaws, and fix errors in the code. To ensure your DeFi platform or smart contract application is ready for mainnet, we perform both manual and automated analysis. Automate your security and development processes to save time and money. Our expertise includes automated scanning, CI/CD Pipeline design, Infrastructure as Code Cloud Deployment and SAST/DAST Integration. We also have the experience to help you build a DevSecOps culture. -
35
Scorechain
Scorechain
Scorechain has provided blockchain analytics and crypto compliance tools since 2015. It assists over 200 companies onboarding crypto-assets in their AML compliance needs. Scorechain Blockchain Analytics Suite covers nine major blockchains, including Bitcoin, Ethereum, XRP Ledger, Litecoin, Bitcoin Cash, Dash, Tezos, Tron, and BSC. Also, it offers full support for stablecoins (like USDT, USDC, DAI) and tokens (ERC20, TRC10/20, and BEP20). The fully customizable platform is available on UI and API and comes with reporting, transaction tracking, risk assessment, automatic red flags indicator, real-time alert features, and much more. Combined with Scorechain's Entity Directory, Investigation Tool, and Case Manager, the platform gives compliance officers a global view of their exposure to high-risk blockchain activities so that they can take appropriate risk mitigation measures. Scorechain's products allow traditional finance players and cryptocurrency companies to apply a risk-based approach to this new class of assets and fulfill all new regulatory requirements. -
36
CUBE3.AI
CUBE3.AI
Protect your smart contracts instead of pausing your application by blocking malicious transactions. Our advanced machine-learning (ML) algorithms continuously track your smart contracts and transactions, providing real-time risk assessments. This ensures that your web3 applications will be protected against vulnerabilities, exploits and compliance risks. Protect platform provides robust defenses against fraud, vulnerabilities, wallet hacks and cyber exploits. Our Real-Time Application Self-Protection SDK and API shields your web3 applications from malicious transactions. This ensures a secure environment for users. Cyber risks can be addressed proactively using watchlists and alerts. You can also use analytics, logs, reports and reports to help you. -
37
WillowTwin
Willow
WillowTwin™, a powerful software platform, was developed with deep knowledge of the real estate and infrastructure industry. It allows users to take proactive, data-driven decisions in real time to reduce expenses, increase profits, and better manage risks. Digital twins are a way to organize, store, and access data from real estate and infrastructure networks. WillowTwin™ makes data that was once hidden in proprietary systems accessible and understandable to users and owners of the built environment. This creates significant value for asset managers, asset owners, and occupiers. All spatial, static, as well as live system data are reported through a central and secure platform. Microsoft Azure backs data with a cloud-hosted and enterprise-grade repository. WillowTwin™, which is applicable to all asset types, has industry-specific features and requirements that can be used to support any project. -
38
ExchangeDefender
BlockSafe Technologies
There are two types of cold wallets for crypto exchanges: hot wallets and cool wallets. The wallets contain both the user's secret keys and those of the exchange. The majority of keys are kept offline in vaults (cold pocket). To facilitate transactions, a portion of the keys is stored offline in vaults (cold wallet). These servers are vulnerable to hacker attacks just like any other hacker attack. Exchange Defender is a set of two products that protect the internal systems and networks of the crypto exchange. These products are CryptoDefender™, (described earlier), and ProtectID®.™protects exchange's mobile devices and computers from keylogging, screen capture, and clickjack attacks. ProtectID®, which is two-factor out-of-band authentication, allows for access to the internal systems. -
39
AnChain.AI
AnChain.AI
Watch how our team used our CISO™, a solution that allows for quick tracking down and tracing these notoriously hacked funds. Our deep expertise in ransomware is combined with Machine-Learning-enabled tools to help institutions avoid regulatory liability. We are a leader in enabling developers to secure DeFi projects, DApps for mainstream acceptance. The Cryptocurrency Anti Money Laundering process is simple, quick, and preventive. AI-powered, behavior-based intelligence connects crypto to real-world entities. This allows your business to secure cryptocurrency assets, quantify risk and remain KYC/AML compliant. Interactive graph-based investigation tools enhance your analytics efforts to uncover complex entity relationships involving thousands upon thousands of addresses. -
40
Huawei Blockchain Service
Huawei Cloud
Blockchain Service (BCS), a highly accessible and secure blockchain platform, allows developers and enterprises to create, deploy and manage applications with the outstanding performance and cost-effectiveness offered by HUAWEI Cloud. Innovative technologies based upon Kubernetes were used to build the platform. It features security, simplicity, deployment in minutes and automatic multi-angle O&M O&M. Multiple consensus algorithms (10,000+ TPS), flexible switching, dynamic joining-in or quitting multi-role members and nodes, and container-based administration. You can manage and isolate all users, keys and permissions. There is multi-layer encryption, privacy assurance, and fully demonstrated cyber security infrastructure. To ensure transparency and fairness, we use decentralized, tamperproof, shared ledgers. -
41
Redefine
Redefine
A powerful firewall solution integrated into a revolutionary proactive system for risk mitigation. Our platform was designed with the DeFi investor as the main focus. We are the first to use active risk mitigation technology to offer unprecedented levels of DeFi security. Fully automated system that can instantly assess new DeFi opportunities. While DeFi platforms can offer lucrative returns, not all are good. DeFi's composable nature and smart contracts make it vulnerable. DeFi investing introduces new types financial risks such as impermanent losses and MEV strategies. Risk analytics engine that automates due diligence of platforms and contracts. It quantifies the risk using on-chain, offline-chain and time-based metrics. Know-your-own-transaction solution simulates the transaction in real-time and reflects the risks to the user before signing. -
42
Plug and play a variety of emerging and existing technologies into the IBSS Digital Twin. We empower you to choose the best-in-class sensors, systems and apps that fit your needs and work style through open APIs, pre-built connections, and interoperable protocols. You can make your own decisions and avoid vendor lock-in. IBSS unifies all spatial and static data into a single digital twin that is secure and centralised. IBSS twin offers apps, workflows and analytics that will help you do your best work. You can create healthier, more inclusive, and more environmentally-friendly buildings. The IBSS platform can help achieve your ESG goals, whether it's carbon reporting or energy efficiency, water quality, waste management, water quality, or carbon reporting. Each building is unique, but IBSS allows modular systems to be deployed quickly and at scale.
-
43
TomorrowThings
TomorrowThings
€15 per monthOur intelligent automation SaaS creates digital twins for your industrial assets at the push of a single button, saving you up to 90% on integration costs. AI allows you to create a digital replica of your technical assets with just one click. Create virtual replicas in real-time of physical assets, processes and even entire factories. Run simulations in order to practice different scenarios before they are implemented in reality. Make data-driven decisions, optimize production lines, and predict potential issues. Collect and analyze sensor and machinery data to gain valuable insights. Blueprints allow customers to connect machines in a matter of seconds, allowing them to collect and transmit data. This improves decision-making and operational efficiency while optimizing sustainability. The blueprint technology promotes plug-and-produce interoperability and supports plug-and produce integrations between machine manufacturers, and providers of industrial software. -
44
Cybellum
Cybellum
Cybellum sets a new standard in product security at scale. It eliminates cyber risk and facilitates compliance from the early stages of development through integration and production and while on the road. The Cybellum Cyber Digital Twins™, platform provides the infrastructure and means to create and maintain secure products on a large scale. Smart vulnerability management, compliance validation and continuous monitoring are key to minimizing risk for your customers and organization. You can quickly identify vulnerabilities and secure your vehicles through the lifetime of their software components by creating a detailed blueprint. -
45
lab-go
lab-go
The lab-go touchpoints guarantee unique certification of authentic thanks to a covering technology and proprietary algorithm. Create a new digital journey for your customers, by enabling exclusive content and promotions for them. This will increase their loyalty and enthusiasm. You are looking for a solution that certifies your products' authenticity and offers your customers a unique post-purchase experience. With lab-go, you can protect your product from counterfeiting while creating exclusive digital journeys for customers. Do you have a license for products or services? Learn how to maximize the value of your product or service by utilizing the lab-go platform. -
46
OnBrand
The Smart Group
Our software allows you to easily create, manage, and order local store marketing materials within a corporate identity framework. Multi-site businesses used to face high costs and inefficiency when executing brand-compliant advertising. Our software makes it easy to create, manage, and order local store marketing materials within the corporate identity framework. No design skills required for customization and modification of materials. To order custom printed items, use editable templates that are made just for you. One source of truth for approved brand assets, such as images, videos and PDF's - no more thumb drives and no more emailing assets. You can visualize and share everything, from signage to social media guidelines. -
47
Secure
Retransform
Secure is a platform that offers landlords and property managers the ability to make informed decisions using real-time data. Secure, with a focus on Data Analytics and Digital Twin, collects, manages and delivers extensive and diverse data in an easy to use format. Secure reports on data aggregated from disparate systems in your building, providing insights such as energy consumption and occupancy. Secure digital twin is a 3D replica of the building. It provides facility managers with complete remote visibility. It improves operational performance and increases efficiencies. Secure helps you manage your journey towards net-zero emissions by using smart technology. It provides a holistic view of your properties, and manages your energy consumption. -
48
ETAP ADMS
ETAP
Advanced Distribution Management System must provide flexible solutions to address the core requirements of the new digital grid. It must be able to provide resilience and reliability to the network, as well as the scalability and intelligence to intelligently and proactive assess the outcomes of operations and contribute to new requirements to minimize asset cost and optimize the network. ETAP ADMS is an intelligent and robust decision-support platform that uses a unified Digital Twin (electrical network) and a collection geospatial-based distribution system applications. This allows for reliable and secure management, control, visualization, optimization, and optimization of small to large distribution networks and smart grids. Integrated electrical asset information, network connectivity and visualization. Predictive analysis for future and what-if conditions. Advanced decision support analysis and adaptive optimization applications. -
49
Counterfake
Counterfake
Counterfake detects fake and counterfeit products in all digital channels. It does this by analyzing images, descriptions, comments, price, and any other information. This process is non-stop, and protects your brand 24/7. The most advanced digital brand-protection system protects your brand with its artificial intelligence-based intelligent infrastructure. Our unique system will provide better results with its detailed scans and analysis of fakes than any other possible substitute. Our service allows you to access all the data about your brand through our user-friendly interface. All data obtained through the smart scanning process is analyzed and simplified for the users on dashboards. The AI-based system will learn from smart scanning and improve the detection rates day by day. Your brand's process safety rate will increase each day. -
50
Acviss
Acviss Technologies
Acviss, a global leader in brand protection and counterfeiting, protects over 400 million products under 80+ brands. Acviss protects your supply chain from fake and fraudulent products online and offline! The end-toend system uses a unique approach for label production to ensure that products are non-replicable, and tamperproof. Our mobile-based tracking system allows customers to verify the authenticity and track the products throughout the supply chain. Our AI and Machine Learning algorithms scan the digital environment to detect and eliminate false listings, ads and offer that violate brand IPR. Our loyalty program allows brands to reward and engage their customers for remaining loyal. By providing real-time insight into customer interactions, brands can build a healthy relationship. Our Products • Certify Security codes that are unique and non-clonable can help you to help your customers