Best Imprivata Alternatives in 2024
Find the top alternatives to Imprivata currently available. Compare ratings, reviews, pricing, and features of Imprivata alternatives in 2024. Slashdot lists the best Imprivata alternatives on the market that offer competing products that are similar to Imprivata. Sort through Imprivata alternatives below to make the best choice for your needs
-
1
1Password
1Password
16,056 Ratings1Password is a password manager that's secure, scalable, easy-to-use, and trusted by some of the most prestigious companies in the world. 1Password makes it easy to keep your employees safe online with its simple interface. Good security habits will become second nature once 1Password is a part of your employees' workflow. 1Password Advanced Protection now available with 1Password Business You can set Master Password policies, enforce two factor authentication across the entire team, limit access with firewall rules, review sign in attempts, and require that your team use the latest version 1Password. Our award-winning apps can be downloaded for Mac, iOS and Linux as well as Windows, Android, and Windows. 1Password syncs seamlessly between devices so that your employees have access to their passwords at all times. Your risk is reduced and your productivity increases when everyone uses 1Password. -
2
Cisco Duo
Cisco
1,279 RatingsSecure your workforce with powerful, simple access security. We are Cisco Duo. Our modern access security system is designed to protect all users, devices, applications, so you can focus on what you do best. Secure access for all users and devices, in any environment, from any location. You will enjoy the peace of mind that only total device visibility and trust can provide. A SaaS solution that natively protects all applications and is easy to deploy, scaleable and quick to respond to threats. Duo's access security protects all applications from compromised credentials and devices. It also provides comprehensive coverage that helps you meet compliance requirements. Duo integrates natively with applications to provide flexible, user friendly security that is easy to implement and manage. It's a win-win-win for administrators, users, and IT staff. Multi-factor authentication, dynamic device trust and adaptive authentication are key components of your zero-trust journey. Secure SSO is also a part of the mix. -
3
Auth0
Okta
779 RatingsAuth0 by Okta takes a modern approach to Identity and enables organizations to provide secure access to any application, for any user. Auth0 is highly customizable, and simple yet flexible. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is a part of Okta, The World’s Identity Company™. With Auth0, you can rapidly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with your own custom, secure, and standards-based unified login. With Universal Login, users are redirected to a central authorization server. Because authentication takes place on the same domain as the login, credentials are not sent across sources, increasing security and protecting against attacks like phishing and credential stuffing. OAuth 2.0 recommends that only external user agents (like the browser) should be used by native applications for authentication flows. Universal Login provides this in a secure manner while also enabling SSO. -
4
ManageEngine ADSelfService Plus
ManageEngine
107 RatingsBoth IT teams and end users are afflicted by password reset tickets. IT teams will often push more urgent issues down the queue to ensure that users don't have their work put on hold while their passwords reset. Password reset tickets can be costly if they aren't addressed promptly. Nearly 30 percent of all help desk tickets were caused by forgotten passwords. It is not surprising that large companies have spent more than $1 million to resolve password-related help desk requests. It is a good habit to change passwords regularly, as it helps prevent cyberattacks caused by stolen credentials. Security experts recommend that administrators ensure that users change their passwords regularly and have password expiration policies in place. -
5
The OptimalCloud
Optimal IdM
$2/user/ month The OptimalCloud from Optimal IdM provides a scalable and affordable Identity and Access Management Solution that meets the security and usability requirements of small, medium-sized and large enterprises. The OptimalCloud platform is available for both consumer and workforce deployments. Each pricing tier includes multi-factor authentication (MFA), because good security shouldn't be more expensive. The OptimalCloud integrates with over 11 thousand applications, making it easier to set up and configure. It also offers 24 x 7 x 365 support with a 99.99% uptime guarantee. -
6
Technology is essential for business. Without it, technology can't be trusted. Today's "work from anywhere" era means that managing and controlling access to every digital identity is crucial for the protection of your business as well as the data it runs on. Only SailPoint Identity security can help you empower your business and manage cyber risk from the explosion in technology access in the cloud enterprise. This will ensure that every worker has the right access to their job, no more, no lesser. Unmatched visibility and intelligence is achieved while automating and speeding the management of all user identities and entitlements. With AI-enhanced visibility, you can automate, manage, and govern access in real time. Allow business to operate in a cloud-critical and threat-intensive environment with speed, security, and scale.
-
7
FusionAuth
FusionAuth
$0 22 RatingsFusionAuth was built from the ground up to integrate with any app or language. Each feature (yes, every one) is exposed via an API which gives you total flexibility to handle any use cases. Every feature and acronym you need is included: registration & log-in, passwordless, MFA, SAML and OIDC. In seconds, you can comply with GDPR, HIPAA and COPPA requirements. FusionAuth can be installed on any platform, on any computer, and anywhere. FusionAuth Cloud, our fully managed SaaS hosting solution, allows you to host it yourself. -
8
MIRACL
17 RatingsProtect your users. Make their journey easier. MIRACL Trust provides a safer and smoother authentication experience. Only one step. No passwords. No problem. Multi-factor authentication is slow and cumbersome. MIRACL is a safer and more efficient alternative to traditional MFA. Logging in takes only 2 seconds and error rates as low at 1/10th of passwords. No passwords necessary. All you need is a PIN and you are in. Our cryptographic technology ensures that users' information is always safe. MIRACL Trust provides a simple login experience that puts users first and makes it easy to roll out your data quickly. -
9
Ping Identity
Ping Identity
$5 per user per monthPing Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow. -
10
Microsoft Entra ID
Microsoft
4 RatingsMicrosoft Entra ID, formerly known as Azure Active Directory, is a comprehensive cloud-based identity and access management solution that combines core directory service, application access management and advanced identity protection. Cloud identity and access management solutions connect employees, customers and partners with their apps, devices and data. Protect data and resources with adaptive access policies and strong authentication without compromising the user experience. Provide a quick, easy sign-in across your multicloud environment in order to keep your users productive and reduce time spent managing passwords. Manage all your identities, and access to your applications, in one central location, whether in the cloud, or on-premises. This will improve visibility and control. -
11
Passwordless, proximity login to desktop applications, Macs, PCs, Macs, websites and Macs. Active proximity-detection allows hands-free wireless 2FA and password management. IT administrators can allow users to log into their computers and websites dynamically using a physical key. This can be done either automatically, manually, by touch, pressing Enter, or with an PIN. You can easily log in, switch users, change computers, and log out without any passwords, touch, trouble, or hassle - all you need is a key. The computer locks automatically when a user leaves, preventing access to the computer or web passwords. Continuous authentication ensures that users are constantly being checked to make sure they have access. No more typing passwords. Administrators and compliance can now automate password protection from a central admin console. This allows them to enforce stronger passwords and 2FA and gives employees the ability to log in without having to interrupt their workflow. Helpdesk tickets for forgotten passwords/password resets will be reduced. Login and autolock with proximity
-
12
Ondato offers identity verification, business onboarding, customer data platform, due diligence, and authentication solutions tailored to fit in your everyday workflow. Our tools fit the entire customer lifecycle management, starting from onboarding and ending with continuous user monitoring. It's a one-stop solution whether you're worried about compliance or are looking for a more user-friendly data management platform.
-
13
PortalGuard
BIO-key International
BIO-key PortalGuard IDaaS, a cloud-based IAM platform, offers the most flexible options for multi-factor authentication and biometrics. It also allows customers to reset their passwords and provides a user-friendly interface. All this at a reasonable price. PortalGuard has been trusted by many industries, including education, finance, healthcare, and government, for over 20 years. It can be used to secure access for employees and customers, regardless of whether they are on-premises or remote. PortalGuard's MFA is unique because it offers Identity-Bound Biometrics with the highest levels of integrity and security. They are also more accessible than traditional authentication methods. -
14
GateKeeper Proximity Password Manager
Untethered Labs
$3/user/ month Proximity-based passwordless login for desktop applications, Macs, websites, PCs, Macs and Macs. Active proximity-detection allows hands-free wireless 2FA and password management. IT administrators can allow users to log into their computers and websites dynamically using a physical key. This can be done either automatically, manually, by touch, pressing Enter, or with an PIN. You can easily log in, switch users, change computers, and log out without any passwords, touch, trouble, or hassle - all you need is a key. The computer locks automatically when a user leaves, preventing access to the computer or web passwords. Continuous authentication ensures that users are constantly being checked to make sure they have access. No more typing passwords. Administrators and compliance can now automate password protection from a central admin console. This allows them to enforce stronger passwords, enforce 2FA and give employees the ability to log in without having to interrupt their workflow. Helpdesk tickets for forgotten passwords/password changes will be reduced. Login to enable auto-lock and presence detection -
15
Entrust Identity as a Service
Entrust
Cloud-based identity management (IAM), which includes multi-factor authentication (MFA), credential based passwordless access and single sign-on (SSO). Cloud-based multi-factor authentication provides secure access to all your users' apps, networks, devices, and accounts. Optimal user experience is achieved through adaptive authentication, proximity-based login, and adaptive authentication. Happy users won't try to bypass security measures. Everyone wins. This is easier than any other thing you have tried. The work-saving features, such as built-in provisioning tools, on-premises integrations, and cloud integrations, reduce the IT workload from deployment to everyday management. To move forward faster, you need strong IAM. Cloud-based Identity as a Service scales rapidly to accommodate new users, expanding use case, and evolving security threats. -
16
One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
-
17
Quicklaunch
Quicklaunch
$0.73 per month 1 RatingIt makes it easier for employees and students to access the apps they need to learn or work. Students and employees can reset their passwords at any time, which reduces the need for IT help. Increases cyber security by protecting user accounts against hacking and thwarting ransomware, phishing cyber attacks. -
18
RSA SecurID
RSA Security
2 RatingsRSA SecurID allows organizations of all sizes to reduce identity risk and ensure compliance without compromising user productivity. It provides users with easy access to their information and confirms that they are who they claim to be. RSA SecurID also provides unified visibility across all organizations' islands of identity and control. RSA SecurID combines multi-factor authentication with identity governance to address security concerns associated with providing easy access to dynamic user populations in complex environments. It assesses risk and business context to provide access and identity assurance. Digital transformation presents new challenges in authentication, access management, and identity governance for organizations. As a result, more users require access to more systems via more devices than ever before. RSA SecurID is a tool that helps organizations address these issues and protect their identity. -
19
ManageEngine AD360
Zoho
$595.00 /year AD360 is an integrated identity management (IAM), solution that manages user identities, controls access to resources, enforces security, and ensures compliance. AD360 allows you to perform all your IAM tasks using a simple and easy-to-use interface. All these functions are available for Windows Active Directory, Exchange Servers and Office 365. You can choose the modules that you need and get started addressing IAM issues across hybrid, on-premises, and cloud environments with AD360. You can easily provision, modify, and deprovision mailboxes and accounts for multiple users from one console. This includes Exchange servers, Office 365, G Suite, and Office 365. To bulk provision user accounts, you can use customizable templates for user creation and import data from CSV. -
20
Cloud IAM can be combined with deep context for risk-based authorization to provide secure, frictionless access for your workforce and consumers. Identity and access management cannot be separated as organizations modernize hybrid multicloud environments with a zero trust strategy. Cloud IAM strategies must use deep context to automate risk protection, and authenticate every user to any resource. Your business needs should be considered when designing your journey. As you design and tailor the cloud IAM architecture that will either replace or enhance your existing infrastructure, you can protect your investments and preserve on-premises applications. Your users expect one-click access from any device, to any application. New federated applications can be integrated to one sign-on (SSO), embed modern multifactor authentication (MFA), simplify logistics, and provide developers with consumable APIs.
-
21
Ilantus Compact Identity
Ilantus Technologies
It is the first time that an IAM solution is available that is comprehensive, deep, and easy to implement even by non-IT personnel. This includes Access Management, Identity Governance and Administration. You can implement the solution step by step and at your own pace with an online digital guidance system. Ilantus offers free implementation support, unlike other vendors. Seamless SSO with "no app left behind", including on-premise or thick-client apps. All web apps, whether they are federated, non federated or thick-client, legacy, custom, or other apps, will be included in your SSO environment. Support is also available for mobile apps and IOT devices. What is your homegrown app? This will not be a problem thanks to our interactive digital help guide. If you need help, you can call Ilantus' dedicated helpline, available 24 hours a day, Monday through Friday, and we will assist you with the integration. -
22
EmpowerID
EmpowerID
$2 per user per monthEmpowerID, the award-winning all-in-one identity management system and cloud security suite created by The Dot Net Factory LLC dba EmpowerID, is an award-winning product. EmpowerID is responsible for managing millions of on-premise and cloud identities for organizations all over the world. EmpowerID offers a wide range of solutions, including single sign-on, user creation, identity governance, group management and role mining. It also provides delegated identity administration, password management and privileged access management. It also provides an identity platform for developers. All solutions use a single, sophisticated role and attribute-based authorization engine to handle complex organizations and multi-tenant SaaS provider SaaS providers. We offer a fully customizable, highly scalable IAM infrastructure that is more cost-effective and faster for your business. -
23
1Kosmos
1Kosmos
1Kosmos allows citizens, customers, and workers to transact securely with digital services through passwordless access. The BlockID platform unites identity proofing with strong authentication to create a distributed digital identity that prevents identity fraud, account takeover, identity impersonation, and fraud while providing frictionless user experiences. BlockID is the only NIST-, FIDO2 and iBeta certified platform that performs millions upon daily authentications for some of the most important banks, telecommunications, and healthcare organizations around the globe. -
24
Axiom Protect
Axiom Protect
Multifactor security can be embedded to empower multiple IT systems (on-premise, hybrid, or cloud) according to the user's preference. Policies and settings provide central control to meet your business requirements and ensure regulatory compliance. All it takes is a few clicks to change default to custom Inbuilt Complex Password Source to External LDAP/Active Directory synchronized operator and user sources for consolidation. Trust can be strengthened and made more flexible by connecting users' devices. A business need is to have multiple users on one device or multiple devices for one user. If you have a great platform, it's easy. Everything is DATA. Data at rest and at transit security at mobile web, iOT device Server, files / database. You can choose from a variety of security grades, including different key lengths and algorithms. No expensive VPN. SDK and APIs are available. Pure 100% AI/DL facial biometrics provide 99%+ accuracy for building your EKYC or remote authentication. -
25
TrustBuilder
TrustBuilder
€ 10 per user /per year TrustBuilder is a European-based Access Management software vendor based in Europe, specializing in strengthening digital landscapes with identity-centric solutions. It's SaaS platform seamlessly integrates passwordless and deviceless Multifactor Authentication into a comprehensive Customer Identity and Access Management platform, combining airtight security with a frictionless user experience. Committed to enabling secure and efficient operations, TrustBuilder offers tailor-made solutions, empowering businesses to customize their cybersecurity defenses. -
26
Evidian
Eviden
Each of us expects the same level of convenience at work as at home in today's digital world. Evidian IDaaS allows your users to authenticate once and access all available web resources transparently. You can increase their satisfaction while also improving overall security level. Every suppressed (avoided), password is one less attack vector. Evidian IDaaS integrates on-premise and cloud applications to your Transparent SO. -
27
Accops HyID
Accops Systems
Accops HyID, a futuristic access and identity management solution, protects business applications and data against misuse by internal and external users. It manages user identities and monitors user access. HyID gives enterprises strong control over endpoints. It allows for contextual access, device entry control, and flexible policy framework. The MFA works with all modern and legacy apps as well as cloud and on-prem apps. It provides strong authentication using OTP sent via SMS, email, and app, biometrics, device hardware ID and PKI. Single sign-on (SSO), provides greater security and convenience. Organizations can monitor the security status of endpoints, including BYOD, and grant or deny access based upon real-time risk assessment. -
28
Google Cloud Identity
Google
$6 per user per monthUnified identity, access, app and endpoint management platform (IAM/EMM). This platform helps IT and security teams maximize end user efficiency, protect company data, transition to a digital workspace, and transition to it. Protect your organization using the BeyondCorp security model, and Google's threat intelligence signals. Security Center can control access to SaaS apps and enforce strong multi-factor authentication (MFA). This will protect user accounts, manage endpoints, investigate threats, and ensure that users are protected. Optimize efficiency by providing intuitive user experiences on endpoint devices. You can also unify user, access and app management from one console. Users can access thousands of apps using single sign-on (SSO), and manage their company accounts the same way as their personal Google accounts. Integrate your existing systems onto a trusted platform and transition to digital. Directory Sync allows you to extend your existing directory to the cloud. -
29
ForgeRock
ForgeRock
The only AI-driven platform that combines all aspects of identity, governance and access management to dramatically improve and scale, it is the only one in the industry. Digital access is essential for our personal, professional, and educational lives. It is essential to accelerate digital transformation, provide superior experiences, and ensure the highest level of security in order to meet customer demand and keep up with our competitors. ForgeRock helps people connect to the world safely and easily by helping organizations improve and scale their identity, governance and access management. ForgeRock is the only AI-driven platform that offers a full suite of AI-driven solutions. It is designed for all types of identities (consumers and workers, as well as things). ForgeRock's simple-to-use, comprehensive solutions will help you increase revenue, manage risk, increase workforce productivity, and lower costs. -
30
LastPass
LastPass
$4 per user per month 32 RatingsLastPass is the leader in password and identity management solutions, trusted by individuals and organizations of all sizes worldwide. Millions rely on LastPass daily to create, store, manage, and protect their most important credentials, keeping them secure, private and always within reach. With LastPass, anyone can effortlessly log in to life or work anytime, anywhere. -
31
Ory
Ory
$29 per monthThe missing web-scale identity and access control API. Today, 10x your security and user experience. Build secure apps over the Ory Network to reach new customers in any region of the globe with the best login experiences ever. Login is much more than just a username and a password. It is dangerous and time-consuming to build it from scratch. Ory's API first microservice architecture allows projects to be integrated at any stage. Pay for usage and not features. Ory subscription plans include advanced multi-factor authentication. Plus, advanced permissions, SSO OAuth2, OIDC multi-tenancy and more. Ory is designed for high-performance and high-scale applications on any cloud. Ory is designed with developers in mind. It allows you to quickly create your own user experience, and integrate it within your software stack. Ory's focus is on open standards, and its automated data import capabilities make migrating to legacy systems simple. -
32
IdentityX
Daon
Daon's IdentityX platform is multi-modal, vendor-agnostic, and future-proof. It addresses all aspects of customer identity lifecycle. Trust in digital identities is built on a user-centric, unified view of identity creation, management, and use. The IdentityX Platform offers the following core functions: Identity Establishment via account origination and digital boarding, Omni-Channel multi-factor authentication via mobile, web and call center authentication, Identity recovery and other device and account management functions. Daon's IdentityX Digital onboarding product allows for quick and accurate identification establishment for a variety of purposes, including Anti-Money Laundering checks (AML) or Know Your Customer (KYC). -
33
RAC/M Identity
OKIOK Data
RAC/M Identity™, a simple, efficient, IGA solution, allows organizations large and small, to understand and manage complex relationships between users as well as their access to digital assets. It is the foundation upon which you can build an IAM program that can handle your most difficult challenges, such as limited resources, tight timelines, tight budgets, tight timelines, complex technological and economic landscapes, and other constraints. RAC/M Identity™, which addresses the most difficult challenge IAM programs face, is also designed to maintain executive support. It automatically generates an IAM composite health score, which reflects the maturity of key IAM processes. This allows executive management to evaluate the progress made and the road ahead. Continuously identifying and remediating risky situations, such as orphaned or rogue accounts, and enforcing SOD rules, as well as quickly revoking any access, reduces risk. -
34
Nomidio
Nomidio
$3.88 per user per monthThe world's leading unified Identity and Authentication Service. Nomidio is a specialist in protecting identities. Our federated cloud of identity allows companies to eliminate unnecessary PII. We also enable secure customer identification for loan application, verification of customers to access accounts information, and many other purposes. The Nomidio Identity Cloud is an identity vault that is extremely secure and quantum-ready. The ID cloud provides multiple identity services to multiple organisations, eliminating the costly risk of companies propagating identity data as it is today. Our parent company's Quorum multiparty split-key cryptography is used to secure the identity data. Anyone wishing to decrypt any record will need the consent of other key fragment holders. Nomidio IDC, a lightweight, highly efficient biometric identity and authorization tool that is 100% SaaS, can be deployed in just minutes. -
35
Veridium
Veridium
Veridium is an AI-based Behavioral biometrics-powered Integrated Identity Platform that provides multi-factor authentication (MFA), digital ID verification and a truly enterprise-grade passwordless experience to employees and customers. It is low code, flexible, and agile. Customers can forget their passwords. This eliminates friction and provides greater security for online connections. We offer a single-step multi-factor authentication solution that offers increased security. Organizations also get higher levels of identity assertion. Veridium provides an end-to-end authentication platform that can handle all your WFH requirements and any VPN solution. It delivers strong, multi-factor, passwordless workforce authentication. -
36
Avatier Identity Anywhere
Avatier
$5.00/one-time/ user Identity Anywhere is the first identity management solution that uses Docker containers. It is the most portable, scalable, and secure on the market. Identity Anywhere can run on any cloud, on-premise, or private cloud instance hosted at Avatier using Docker container technology. Avatier Identity Management products bring together separate back office applications and assets to manage them all in one system. With a single digital dashboard, executives at all levels can achieve measurable business growth and higher profits. With military-grade self-service password reset, you can eliminate the #1 Help Desk request. Reduce costs Only pay for what you use. A great shopping cart experience will maximize company utilization. Non-compliance can result in fines, lawsuits and even jail time. -
37
Core Security Access Assurance Suite
Core Security (Fortra)
Access Assurance Suite, previously known as Courion is a core security identity governance and administration portfolio of solutions. It's an intelligent identity and access management software solution that enables organizations deliver informed provisioning, meet ongoing regulatory compliance and leverage actionable analytics to improve identity governance. Our identity management software, which is comprised of four industry-leading modules offers the best way to mitigate identity risk. It provides a complete solution for streamlining provisioning, reviewing access requests and managing compliance. Access to a web portal that allows end users to request access. Managers can approve, deny, or deny access. Core Access uses a shopping cart approach to manage access. It is more efficient than email forms, paper forms, or tickets. -
38
Oracle Identity Management
Oracle
Oracle Identity Management allows organizations to manage the entire lifecycle of user identities across all enterprise resources. This includes both inside and outside the firewall, as well as into the cloud. The Oracle Identity Management platform offers scalable solutions for identity governance and access management. This platform enables organizations to improve security, simplify compliance, and take advantage of business opportunities related to mobile and social access. Oracle Identity Management is part of the Oracle Fusion Middleware product family. This allows for greater agility, better decision making, and lower cost and risk in diverse IT environments. We now offer an innovative, fully integrated service, Oracle Identity Cloud Service, that provides all core identity and access management capabilities via a multi-tenant Cloud platform. -
39
ID.me simplifies how individuals prove & share their identity online. The ID.me secure digital identity network has over 98 million users, as well as partnerships with 30 states, 10 federal agencies, and over 500 name-brand retailers. The company provides identity proofing, authentication and community verification for organizations across sectors. ID.me is the only provider with video chat and is committed to "No Identity Left Behind" to enable all people to have a secure digital identity.
-
40
WWPass
WWPass
FreeThere is no need to remember, manage or reset passwords. All logins can be consolidated into one encrypted authentication token. The authentication token can be managed easily by the user. Log in using a universal digital identity that is international and trusted. If allowed, anonymity is permitted. All data is encrypted by the user using WWPass Key. There is no need to send SMS, OTP, or any other expensive adaptive authentication or login support. WWPass Key protects user identity. WWPass MFA provides strong customer authentication that is compliant with GDPR & NIST. Each user receives a unique key that allows them to log in to unlimited accounts and services without the need for passwords or usernames. Your WWPass Key is a universal key to the internet that allows you to log in to an increasing number of online services. Next-generation strong multifactor authentication without passwords or usernames. Secure access to any business application can be simplified and streamlined without the need for a username or password. -
41
miniOrange
miniOrange
$1 per user per month 1 RatingminiOrange offers a range of IAM products and solutions to secure both Identity anywhere and everywhere! Here are some of the major solutions from miniOrange: Single Sign-On (SSO): Enable SSO for web, mobile, and legacy apps with this robust solution which supports all IDPs and Authentication protocols. Multi-Factor Authentication (MFA): The only MFA solution in the market offering 15+ MFA methods including Push Notification, OTP verification, Hardware Token, Authenticator Apps, and many more. Customer Identity & Access Management (CIAM): Secure your customer identity and provide a seamless customer experience. CIAM enables you to safeguard customer privacy while providing them convenient access to your digital resources. User Provisioning: Sync all users automatically from your local directory to miniOrange. Effectively manage User Lifecycle for employees & customers. Adaptive Authentication: Tackle high-risk scenarios with ease with a solution that analyzes risk based on contextual factors and applies appropriate security measures. Universal Directory: A secure directory service that safeguards your sensitive information. It also allows you to integrate your existing directory into miniOrange. -
42
Deepnet DualShield
Deepnet Security
You are searching for an enterprise-grade 2-factor authentication (2FA), or multi-factor authentication(MFA) product that can protect all business applications and provide a wide range authentication methods, then you have come to the right place. Deepnet DualShield, a multi-factor authentication platform, unifies a variety authentication methods, protocols and solutions, as well as user experience, in one platform. DualShield offers self-service Password Recovery, Single Sign-On, Identity & Access Management, (IAM), and Adaptive Authentication. It is the most flexible and powerful multi-factor authentication system available. Deepnet DualShield is available on-premises or in a private cloud. This means that you have complete control over your user authentication system and can keep your users' credentials and identities safe. -
43
Mi-Token
Mi-Token
Multi-Factor Authentication, also known as MFA, is a method of determining if a user has the right to access a website, service, or application. Security experts no longer consider a simple username or password to be effective. MFA uses secure credentials to significantly reduce the chance of identity fraud or malicious attacks. Mi-Token with a one time password (OTP), greatly improves security for your login credentials. It is only valid for one transaction or login session. You can add a pin to the OTP by default. This makes your solution fully compliant for many industry standards, including the Payment Card Industry Standards Council's (PCI DSS 3.2). -
44
CyberArk Customer Identity
CyberArk
Your customers will be delighted by easy and secure access via your apps and websites. This will keep them loyal to you. Customers expect great digital experiences. The attack surface is becoming more permeable than ever. CyberArk Customer Identity allows you to securely open your apps and websites to customers. Easy integration, intuitive access controls, and frictionless sign on. All your privacy, consent, and identity verification in one platform. Pre-built widgets and APIs reduce development effort. Secure access to business apps for both human and machine identities. Secure access to machine identities within the DevOps pipeline. IT can be simplified and made easier while improving business security. Secure single sign-on access for your apps and services. -
45
PropelAuth
PropelAuth
$150 per monthDevelopers will find it easy to integrate and use the APIs. User management built-in for teams that interact with customers. Data and insights for executives and PMs. PropelAuth was built on the belief that a great authentication product should get out of your way. We give you the tools you need to make sure your users have a smooth and secure experience. Your team will be given a list of tasks and information to complete as soon as they begin onboarding new users. PropelAuth is a first class concept when it comes to organizations. Our UIs will help you get started quickly, or you can build your own using our APIs. Create your own roles or start with our defaults. We will even update existing users when you make changes. Integrating with identity providers like Okta or Azure AD is easy. We provide guides to help your users set up and test configuration. Set custom session durations for each organization, enforce MFA and more. We take care of the complexity, so you don't need to. -
46
CionSystems
CionSystems
Access to a privileged account is responsible for 74% of all breaches. Security gaps and risks have increased due to mass migration to remote workforce enterprise operations. Enterprise identity manager is a "out of the box" solution that dramatically simplifies, simplifies, and secures enterprise Active Directory deployments. It does not require any scripts or code. EIM allows rapid transition of Active Directory to manage large remote workforces. It provides real-time tracking and notifications of all changes. Active Directory is used by more than 90% of businesses worldwide. Complex cloud migration and synchronization can lead to security gaps. Cloud Office 365 simplifies the tedious task of managing Internet user accounts. It dramatically reduces the time needed to provision and de-provision users, provides real-time tracking and significantly reduces unused and untracked licensing costs. -
47
Rippling streamlines HR, payroll, IT, and spend management for global businesses. Effortlessly manage the entire employee lifecycle, from hiring to benefits administration to performance. Automate HR tasks, simplify approvals, and ensure compliance. Manage devices, software access, and compliance monitoring all from one dashboard. Enjoy timely payroll, expense management, and dynamic financial policies, empowering you to save time, reduce costs, and enhance efficiency in your business. Experience the power of unified management with Rippling today.
-
48
CyLock
Cybernexa
Cybernexa is a global leader in the field of information security. It has pioneered cutting-edge solutions like CyLock MFA and SSO. Our robust products, which are committed to innovation and meet the dynamic security requirements of today's mobile centric environment, address the dynamic needs of today’s mobile centric environment. CyLock MFA offers seamless integration and ensures multi-factor verification, while CyLock SSO simplifies the access to multiple systems. CyLock ADPass allows you to manage Active Directory in a secure manner. CyLock PKI encrypts data and helps protect it from unauthorized access. Beyond products, we offer comprehensive cybersecurity compliance services to ensure your organization is always ahead of the threats. Cybernexa offers unparalleled security innovation, global presence, and comprehensive services tailored for diverse sectors. -
49
midPoint
Evolveum
Choose the best. Join hundreds of other organizations who have tried midPoint, the open source leader in Identity Governance and Administration. You can choose what works best for you: midPoint can be used on-premise, in the hybrid cloud, or in the cloud. Enhance your security and efficiency by synchronizing, policing, and identity management. MidPoint's outstanding accountability, record-keeping capabilities, and data protection scope will help you meet the regulations. Advanced privacy and data protection mechanisms allow users to take control of the personal data they have been given by organizations. Users can now access their data via self-service, reset passwords, and manage their profiles. This will enhance the digital experience. Enjoy the comfort and scalability that midPoint cloud offers. Third-party experts can be hired to manage the seamless operation. This will save you valuable time and human resource. Get the most from the synergy. -
50
Able+
New Era Education
Able+ is a digital identity and access management system that will help you deliver your organization's digital strategy. It is a managed service that can be used from either the public cloud or private or hybrid infrastructure. It is easy to use and streamlines identity governance. It also improves productivity and satisfaction of users by enabling secure single-sign-on to applications.