Best Meeco Alternatives in 2024
Find the top alternatives to Meeco currently available. Compare ratings, reviews, pricing, and features of Meeco alternatives in 2024. Slashdot lists the best Meeco alternatives on the market that offer competing products that are similar to Meeco. Sort through Meeco alternatives below to make the best choice for your needs
-
1
Access & Subscriptions Made Simple. Access and Subscription Management can be combined into a single, simple, secure solution. Simplify your operations, save time, and improve security. Manage the entire lifecycle of access, from onboarding through to offboarding. Flexible authorization and subscription plans will give your customers, business partners, and employees secure and easy access to your products, subscriptions, and data. Making the exchange of data secure and simple We integrate Access and Subscription Management into a single straightforward solution that equips businesses with the tools needed to sell products and share data online. Moreover, our users require just one login to access any product, subscription, or data from organizations utilizing Veriam. Veriam makes everything easier by merging access and subscriptions into a unified secure platform, optimizing operations and aiding companies in growth. With Veriam, businesses can effortlessly sell products and share data online, while users benefit from a singular login for all products and services from any Veriam-connected organization.
-
2
Ping Identity
Ping Identity
$5 per user per monthPing Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow. -
3
SAP CIAM
SAP
With customer identity and access management software (CIAM), you can turn unknown visitors into loyal buyers. Reducing friction at the point where you register and delivering personalized, trusted engagements throughout your customer journey will help to reduce friction. Based on first-party data, you can create relevant customer experiences. SAP Customer Identity and Access Management solutions B2C allow you to create rich, central customer profiles and synchronize these with all your digital properties. Flexible registration and social authentication screens allow you to provide hassle-free customer service. Each case can be customized with flow and flows that can be customized for each business. Federated standards and options ensure that every interaction touchpoint is protected, including single-sign-on, risk-based and multifactor authentication. Personalize customer experiences by centralizing their profile data in a dynamic, indexed database and enabling bidirectional flows to other customer engagement solutions. -
4
IBM Verify
IBM
Cloud IAM can be combined with deep context for risk-based authorization to provide secure, frictionless access for your workforce and consumers. Identity and access management cannot be separated as organizations modernize hybrid multicloud environments with a zero trust strategy. Cloud IAM strategies must use deep context to automate risk protection, and authenticate every user to any resource. Your business needs should be considered when designing your journey. As you design and tailor the cloud IAM architecture that will either replace or enhance your existing infrastructure, you can protect your investments and preserve on-premises applications. Your users expect one-click access from any device, to any application. New federated applications can be integrated to one sign-on (SSO), embed modern multifactor authentication (MFA), simplify logistics, and provide developers with consumable APIs. -
5
Ondato offers identity verification, business onboarding, customer data platform, due diligence, and authentication solutions tailored to fit in your everyday workflow. Our tools fit the entire customer lifecycle management, starting from onboarding and ending with continuous user monitoring. It's a one-stop solution whether you're worried about compliance or are looking for a more user-friendly data management platform.
-
6
Ontology
Ontology
Ontology supports identity authentication as well as data collaboration between vehicles, users, and third parties. Only the owner can access, use and store data. A number of cryptographic algorithms have been implemented through the Ontology Trust Framework, Self-Sovereign Data Storage to protect user identity as well as data privacy security. Every data exchange operation needs authorization. Authorization protocols and cryptographic algorithms can be used to achieve selective exchange. Blockchain can be used to trace, authorize and authenticate personal data. We integrate TEE technology in some cases to support data processing and analysis without privacy disclosure. It is time to take back control of your digital identity. ONT ID allows you to take control of your private data. You control when and if your data is available to others. -
7
Airlock
Airlock
Airlock's Secure Access Hub protects apps, APIs, and data from identity theft. Airlock combines security and convenience. It offers customers a seamless customer journey with single sign-on, social login, comprehensive user self service, consent management, and comprehensive user self-services. Reacting quickly is key to being in tune with the market. The Airlock Secure Access hub provides all necessary security functions, including registration, authentication, and self-services. You can focus all your IT resources on your business processes so you can use your IT resources more effectively. The Airlock Secure Access hub helps you meet all international compliance standards, including GDPR, PSD2, PCI–DSS and OWASP. The compliance of regulations is made easier by the inclusion of access policies onto applications and services. -
8
Concordium
Concordium
FreeA blockchain that is compliant with today's and future economies. This allows for both private and public transactions. This allows for high throughput, fast transactions, predictable fees, and high throughput. This allows developers, traders, and businesses to harness the true potential of blockchain. Concordium's decentralised blockchain technology has layer-one ID. It offers forward-thinking companies, developers and traders cryptocurrency unrivalled security and transparency, as well as compliance with regulations if and when they are introduced. Utilizing zero-knowledge-proofs (ZKP) allows parties to verify information without exchanging or storing that information on-chain other than hash functions, so users can trust that their confidential business will become no one else's business. -
9
Accredify
Accredify
Accredify's TrustTech technology, which is globally recognized and awarded, simplifies the exchange of digital data and identity while enhancing trust within your organization. Data shared via digital channels is essential to our society, but not all data can be trusted. As AI-driven deepfake documents and data have become more prevalent, it is essential that organisations establish digital trust. There is a global crisis of trust, where individuals, businesses and governments are all suffering the consequences of an increase in unreliable data. Legacy systems of information sharing are faced with a trade-off in terms of accessibility and security. Enhanced accessibility can mean a relaxation of security protocols. This opens up more opportunities for malicious actors to access and manipulate sensitive data. -
10
GlobaliD
GlobaliD
Portable, private, and secured identity. Claim your GlobaliD to get verified, join groups, communicate, and get paid online. GlobaliD is a universal identity platform that ties users to unique names, transcends borders, and transcends institutions. We create a self-sovereign identity platform which enables people and businesses to take action every day. GlobaliD's privacy- and security solutions allow you to win customers' trust and protect their data without compromising your user experience. Our platform provides a single sign-on and easy onboarding experience. It also empowers users to build digital reputations, and maintain consent-based control of their personal data. Our solutions relieve our partners of the responsibility of data storage and security while maintaining compliance and data integrity. GlobaliD's fully-featured platform can do it all, from identity management to data security and messaging. -
11
Trust Stamp
Trust Stamp
1 RatingAI-powered identity solutions that combine biometrics, privacy and cybersecurity to reduce fraud and reach more users worldwide. Trust Stamp provides trusted identity systems that are at the heart of the way individuals and organisations transact in the connected world. Trust Stamp's groundbreaking innovations in biometrics, data protection, and identity management allow people to have more access with identities that can be shared and stored safely. Our identity technology can be used to open a bank or access a public service. Both the individual and the organisation gain greater levels of security and confidence in their data and their systems. Trust Stamp's solutions improve all aspects of an identity system. -
12
CoffeeBean Identity and Access Management
CoffeeBean Technology
CoffeeBean Identity and Access Management provides a complete solution in the areas IAM (Identity and Access Management), and CIAM ("Customer Identity and Access Management") respectively. This platform has several modules: Single Sign-On (SSO), Multiple-Factor Authentication (2FA or 2FA), Adaptive Authentication and Directory Services. It also offers Lifecycle Management. -
13
WWPass
WWPass
FreeThere is no need to remember, manage or reset passwords. All logins can be consolidated into one encrypted authentication token. The authentication token can be managed easily by the user. Log in using a universal digital identity that is international and trusted. If allowed, anonymity is permitted. All data is encrypted by the user using WWPass Key. There is no need to send SMS, OTP, or any other expensive adaptive authentication or login support. WWPass Key protects user identity. WWPass MFA provides strong customer authentication that is compliant with GDPR & NIST. Each user receives a unique key that allows them to log in to unlimited accounts and services without the need for passwords or usernames. Your WWPass Key is a universal key to the internet that allows you to log in to an increasing number of online services. Next-generation strong multifactor authentication without passwords or usernames. Secure access to any business application can be simplified and streamlined without the need for a username or password. -
14
Evernym Verity
Evernym
$1,000 per monthThe first enterprise-grade verifiable credential platform was created to be easy to use and interoperable. Our decentralized protocol platform to issue and verify digital credentials. Our mobile wallet app for sharing and holding digital credentials. SSI wallet functionality embedded for existing apps. Digitally issue digital verifiable credentials directly into SSI-based wallets. It is easy to verify credentials stored in SSI wallets. Integrate with back-end systems easily using REST APIs or SDKs in three languages. With enterprise-grade architecture, you can build for scale and support millions of users. Your credential architecture can be future-proofed by being compliant with new open standards such as Hyperledger Aries and W3C DIDs. Customers and end users can manage all their digital credentials from their phones. -
15
HYPR
HYPR | The Passwordless Company
$4.00 per user/month HYPR is The True Passwordless Company with cutting edge technology and backed up by major investment partners. The HYPR Cloud Platform allows Passwordless Authentication across an enterprise workforce. It combines the security and convenience of a smartcard with the convenience of a smartphone. With HYPR, businesses can eliminate customer passwords and provide a superior login experiences for your customers as well. Consumer-grade usability increases the productivity of your employees and reduces friction for your customers. -
16
Peer Mountain
Peer Mountain
Peer Mountain does more than just give users ownership and control of their cryptographically secured identities. It is a complete application ecosystem that facilitates secure exchange of digital and tangible services. Gain assurance that independent audits are reliable and secure and that claims are verified. Share and validate encrypted data only in accordance with transaction requirements. Segment services across Peer Mountain deployments in a transparent and secure manner. Control your data with a distributed system which makes hacking impossible. Peer Mountain is a service provider for consumers who are interested in self-sovereign identities, service providers that need reliable, continuous compliance, and trust providers that offer validation services and need interoperability. -
17
CyberArk Customer Identity
CyberArk
Your customers will be delighted by easy and secure access via your apps and websites. This will keep them loyal to you. Customers expect great digital experiences. The attack surface is becoming more permeable than ever. CyberArk Customer Identity allows you to securely open your apps and websites to customers. Easy integration, intuitive access controls, and frictionless sign on. All your privacy, consent, and identity verification in one platform. Pre-built widgets and APIs reduce development effort. Secure access to business apps for both human and machine identities. Secure access to machine identities within the DevOps pipeline. IT can be simplified and made easier while improving business security. Secure single sign-on access for your apps and services. -
18
SelfKey
SelfKey
Your data is yours alone. The SelfKey wallet is not custodial. You have full control over your data, documents, and digital assets. SelfKey cannot steal or lose your identity data and digital assets. Securely store and manage digital assets and identity documents. You can access multiple marketplaces to find and sign up. The SelfKey Marketplace allows you to open a bank account, start a business, or have documents notarized. The SelfKey Marketplace, powered by the KEY token, is priced against USD and offers access to a wide range of services with full transparency about documentation requirements, cost, as well as the total processing time. Explore global options for wealth management, corporate banking, individual banking and wealth management. Your SelfKey wallet allows you to apply for an international bank account. With just one click, you can send your identification documents and data (KYC). -
19
Affinidi
Affinidi
$199 per monthAffinidi's vision is to revolutionize digital identity by empowering individuals to reclaim data ownership, regain control of digital identities, as well as actively engage in safeguarding their privacy. Our "Holistic ID" concept encompasses all aspects of digital data collection, sharing, storage, and monetization. We empower individuals to have a comprehensive, integrated view of themselves in the digital realm, to exercise authority over their data and to make informed decisions. Our digital selves, which are constructed using attributes such as names, ages and locations, become fragmented in the digital world, with each site capturing only partial aspects. This leaves us vulnerable and exposed. -
20
Blockchains
Blockchains
Your identity in the physical world is usually comprised of your name and a government-issued identification card that proves you are who you claim to be. Digital identity works in the same way. It provides the digital world with credentials that verify you are who you claim to be. However, it goes beyond your name and possibly even your picture. Our digital identity management system allows users the ability to create digital representations of themselves in order to prove their identity and the things associated with them, such as important digital documents, property, and devices, and to gain access to certain services and information. An attestation framework allows users to interact with other users, businesses or government entities that are anchored on the Blockchain. Our digital identity solutions allow users to control their personal data while providing trusted, distributed identity for consumers and organizations. -
21
IdRamp
idRamp
Your digital identity strategy should be a business asset and not a liability. Stop wasting time, money and human resources replatforming insecure ID technology. Idramp's decentralized zero trust Identity simplifies authentication. Your identity management chaos can be sorted. You can speed up the delivery of services to meet your business's needs. Rapid modular deployment eliminates expensive platform upgrades Rapid integration seamlessly integrates with existing infrastructure to relieve the pain of bespoke integration. Modular architecture allows you to tailor your customer experience and eliminate vendor stack lock-in. Automated security policies and adaptive access control ensure zero trust identity. Extensible ecosystems can be managed with state-of-the-art data protection. Do not trust, but always confirm that your applications are secure. -
22
Cognito
Cognito
$0.99 per identitySmarter identity verification services, and compliance solutions. Our APIs are simple to integrate, and our dashboards were designed to simplify workflows, rather than clog them. You will be integrated in days, not months, with our solid documentation and hands-on support. We have verified and screened millions upon millions of customers, and we know what works. Our APIs make sure you do the right thing so that your business can be focused on what it is. Cognito integrates quickly and easily thanks to extensive API documentation, a dedicated Slack area for your company, and client SDKs for most popular programming languages. Our core values are data security and compliance. We regularly audit organizational (SOC 2) as well as app-level security. Sensitive information such SSNs is encrypted on disks with AES256. -
23
Elliptic
Elliptic
Training and certification in blockchain analytics for regulators, financial institutions, and crypto-businesses. Manage financial crime risk, ensure regulatory compliance, and grow with confidence. Our crypto compliance services and solutions are used by regulators, financial institutions, and crypto businesses to detect and prevent financial crimes in cryptoassets. Businesses can rely on blockchain analytics to provide accurate and actionable insights across more than 100 cryptoassets. Elliptic offers blockchain analytics for cryptoasset compliance. Your compliance team can manage risk across more than 100 cryptoassets and comply with regulatory requirements. Compliance is a competitive advantage that builds trust between regulators, customers, partners, and other stakeholders. It is crucial to have the best AML monitoring solutions. Also, it is important to invest in your team to develop the knowledge required to stay compliant. -
24
Enformion
Enformion
Founded by a team of industry pioneers and experts in data technology with over two decades experience, Enformion’s data repository comprises more than 6,000 data sources and 120 billion records available via cloud-based platform, API, and batch processing. Using state-of-the-art artificial intelligence (AI) and machine learning (ML), we provide an unparalleled and comprehensive view of people, businesses, assets, and their interrelationships. Our family of solutions empower businesses throughout the United States to make informed decisions that maximize knowledge, improve efficiencies, and better serve the needs of their clients. Our Values Partnering for Success: Our goal is to build lasting relationships with our clients and partners with a single driving force and common purpose – that their continued success is Enformion’s success. Quality You Can Trust: We offer best-in-class data, analytics, and applications that are customized to each customer’s specific workflow. Built on next-generation technology, with a focus on AI and ML, our data solutions allow businesses to make informed decisions with confidence. -
25
Ubisecure
Ubisecure
The Ubisecure Identity Platform helps organisations manage the many Digital Identity risks and opportunities. Focused on European B2B and B2C scenarios, Ubisecure combines highly assured Organisation Identity and Individual Identity to reduce fraud and increase efficiency in global trade and supply chain. Ubisecure is now the #1 global issuer of Legal Entity Identifiers (LEI). The Identity platform enables organisations to de-risk homegrown user registration and login solutions, and enable Single Sign-On (SSO) across all platforms and devices. Simplified MFA, including TOTP and Bank ID / Reusuable eIDs, reduce fraud by verifying customer identities, and automated customer credential management workflows for your helpdesk. Advanced identity use cases like consolidation of identity data silos, and Identity Relationship Management & Delegation can increase operational effectiveness, manage data breaches, and reduce IT costs dramatically. Whether your business goals are increasing revenue and user engagement, meeting compliance, de-risking homegrown systems or reducing operational costs, Ubisecure identity management can help. -
26
Strivacity
Strivacity
$500 per monthStrivacity quickly adds secure customer access management (CIAM), to your online properties. This allows you to grow your revenue, comply with rapidly-changing privacy regulations, and personalize your service using the insights you get into your customers' interactions with you. We can integrate into your existing app to allow your customers to self-service their accounts. This will allow you to scale your business as fast as possible. It's okay if your CIAM solution is no longer sufficient. Clicks (not codes) are used to reduce your TCO, and get your customers where you want them to go. Our Isolation By Design™, architecture protects regulated data and meets privacy standards such as GDPR and CCPA. Add in legal and security requirements, and the focus often drifts to the "C" (aka customers). Strivacity helps you keep your customers' focus by providing a single solution that meets all of their needs, goes live quicker, and doesn't require a team of developers or consultants to maintain it. -
27
maat.ai
MAAT.ai
It is vital to protect our digital identity, especially in this age of internet fraud and theft. This is why maat.ai was created. It is a platform that uses blockchain, advanced encryption and high-security servers. It allows people to identify themselves and manage information with confidence and security. You can use the maat.ai business platform to share information and request official documents from customers, employees, suppliers, and users in a safe and practical way. We verify the identity and validity of your clients through biometrics and Facial Maatch. Your safety is paramount to our team. All files are encrypted and stored on high security servers. All transactions are confidential and are recorded on the Blockchain. -
28
Tappd(in) Community Bundle
IDENTOS
A mobile app that allows you to engage your community members can be customized to reflect the brand of your community. Your users digital pass – The wallet allows password-less authentication and personal data sharing to control any service within your app or digital ecosystem. Built on open standards and the FPX Open-Specification. Trusted connectivity is achieved by the user-centric access network. You can easily eliminate the technical hurdles in realizing your vision of digital connectivity. Tappd(in), Community Bundle allows you to create a seamless experience that delivers real business value. Create an immersive, connected experience your community will want to continue to tap into. Users can decide when, where, and how they want to tap into data sharing between digital service providers. -
29
OpenText IAM
OpenText
Digital transformation can bring many benefits and new sources of value. However, it also presents a huge challenge: ensuring secure access to information both within and outside the firewall. IT must manage access to cloud-based and internal applications by employees, customers, and trading partners. Every person, device, and system in the digital economy requires a digital identity. OpenText Identity and Access Management Platform (IAM) helps enterprises manage all digital identities that request access. OpenText IAM makes information access manageable, visible, and governable. Identity and access management manages user accounts, roles, and access rights for specific users, systems, and devices. The best IAM solutions manage employee identities within an organisation as well as across an extended business ecosystem that includes customers and partners. IAM is also necessary to manage IoT devices' identities. -
30
Web5
TBD
You can create a decentralized web that gives you control over your data and identity. Although the internet has made information more accessible, it lacks a crucial layer: identity. With hundreds of accounts and passwords that we don't know, it is difficult to protect personal data. Today, identity and personal information are now the property of third-parties on the internet. Web5 allows you to store and manage your data decentralized. Developers can focus on creating user experiences that are enjoyable, while Web5 gives individuals ownership of their data. -
31
Dock Certs
Dock Certs
Convert verified ID data to reusable digital credentials. Reduce verification friction without compromising on security. Enable secure data exchanges using fraud-proof data. -
32
3ntity
Hypermine
3ntity, a decentralized layer of identity for the internet gives users control over their personal data and identities while digitally enabling trust for business. -
33
Hushmesh
Hushmesh
Identity theft is a result of the domain-centric, disjointed architecture of the Web. The Web is unable to manage identity without a global namespace. This "each domain for themselves" model makes global security of identity impossible. The Mesh's cryptographic namespace, on the other hand, allows for the creation of unique keychains per person or non-person entity. Domains can lock their users accounts using unique keys stored on their keychains. Data breaches are symptoms that the domain-centric model of data security on the Web is flawed. The Web does not have built-in cryptographic protection at the entity or person level. Each domain must secure its own data. This approach increases the global surface of attack and places "domain insiders" in the middle, creating vulnerabilities and liabilities. -
34
Guardtime
Guardtime
Guardtime's core competency is in the design and implementation machines, distributed virtualized computers that can execute tasks with cryptographic proofs. These machines have two main benefits: a) operational cost savings due to security, audit, and compliance being embedded into the design; and b) new business model by enabling the automation process across organizational boundaries. VaccineGuard, a distributed data exchange platform that facilitates vaccination campaign management, allows for counterfeit and diversion detection, vaccine allocation prioritization, just-in-time stock and supply, pinpoint recall, and rapid adverse reaction detection. Our products all share the same technology platform which allows us to go from ideation to production in just a few months. -
35
Quadrata
Quadrata
Quadrata Identity Passport allows you to start building trusted DApps. Sybil resistant, decentralized identities, proof that humanity. Increased institutional capital through KYC/AML. Capital efficiency is increased. Unique identification prevents unfair advantage All-in-one Web3 KYC/AML plugin that allows for continuous monitoring. With just a few lines code, you can create a swift passport. Quadrata Passport automatically synchronizes identity, compliance and reputation-based data across multiple Blockchain networks. Our ecosystem is constantly expanding. Join our industry partners today to help create a trusted Web3 experience. Quantstamp is a trusted leader for blockchain security. They provide end-to-end solutions for the largest companies in the world. CertiK has performed over 1,800 audits on all major protocols. It is trusted by top exchanges such as Binance, OKEx and Huobi as the preferred blockchain and smart contract auditor provider. -
36
trinsic
trinsic
trinsic Connect is a reusable solution for identity verification powered by digital wallets and passkeys. Trinsic’s reusable identity network allows applications to instantly verify and onboard users. Password-less authentication simplifies the user experience for maximum security and minimum friction. Users can prove certain things about themselves using zero-knowledge evidences without sharing too much data. You can unlock interoperability without any extra effort. Pre-verified users help you onboard more customers faster and at a lower price. -
37
CREDEBL
CREDEBL
Our user-friendly template allows you to easily define and customize credentials. Customize credentials to suit employees, customers, students or citizens. Incorporate detailed schema information with intuitive controls for seamless management. Explore the platform to efficiently verify and manage credentials. Issue digital credentials with ease and get a comprehensive overview. With a single tap on your screen, securely connect to and receive credentials from diverse organisations & ecosystems. Instantly share verifiable proofs of your digital credentials certificates. SSI's mobile wallet allows you to enhance your identity by selectively (partially) disclosing certain information. Present only the data that you choose in a secure and seamless manner. You can also share your personal milestones, e.g. You can share your achievements in sports directly on social media. -
38
[D/Wallet]
Desmo Labs
Manage your digital identity and assets with a streamlined interface. Our blockchain-based platform securely manages infrastructure without exposing credential-generating data, allowing access only to permitted participants, and ensuring all actions and business processes are tamper-proof, and permanently recorded as blockchain transactions. It is ideal for wide adoption because it eliminates the unpredictable and fluctuating fees associated with blockchain operations. It also simplifies the user's experience by eliminating the need to manage the gas fees. This allows users to focus more on their transactions and interactions in the blockchain ecosystem. The strong encryption of digital signings ensures that users' data is protected. Using social logins simplifies access. This integration offers a seamless and highly secure user experience. It reduces friction. -
39
VeriDoc Certificates
VeriDoc
$30 per monthVeriDoc certificates offer you a solution end-to-end to store and send certificates without worrying about how they will be sent, or if they are secure. They also guarantee 100% data transparency. Now you can secure your certificates with blockchain technology. This will keep your valuable certificates safe for ever. VeriDoc Certificates make your certificates completely tamper proof and secure from scammers & fraudsters. You can track, verify, and send any certificate without moving a single inch. You can now verify, store, and send certificates with ease. VeriDoc certificates allow you to securely store certificates, send them anywhere in the globe, and verify their authenticity whenever necessary. VeriDoc Certificates securely store all of your valuable documents on the blockchain, making them safe from any tampering and fraudulent activities. -
40
Bloom
Bloom
Blockchain technology allows you to prove your personal information securely. You decide what data you want to include in your BloomID. You decide how it will be used. Re-use verified data to prove you are who you claim to be in seconds. Verify once and use anytime. BloomID allows you to access apps and other services from anywhere in the globe. The Bloom app allows you to receive secure, verifiable credentials from trusted providers. These credentials are stored securely in the Bloom app, with end-toend encryption. You remain in control of your data. The Bloom app lets you share your credentials seamlessly with third parties. This allows you to maintain control over your data while sharing only the minimum amount necessary to establish trust. -
41
BitMark
BitMark
A blockchain is an open, secure computer that anyone can use without asking permission. It's both open and secure, protected by cryptography and consensus technologies. Bitmark was founded in 2014 after we saw glimpses into how this could lead a better society. Accountants, lawyers, regulators and police are needed by institutions. This increases the amount of bureaucracy and risk to society. Regulation can be captured. Our existing institutions are costly to scale. The blockchain's breakthrough idea is that excess computing resources can be used to build trust. Code can implement data security. Computing follows Moore's Law, so society will get more computing power for less money in the future. We can simultaneously increase individual autonomy while reducing corruption. Smart contracts, also known as blockchain programs, create and manage data, called tokens. -
42
Kaleido
Kaleido
$ 0.15 per node per hourYou can create blockchain and digital asset solutions without having to start from scratch. Start small and quickly move to production. You can choose from popular cloud properties, hybrid deployment options, geographical regions, protocols, consensus mechanism, and many other options all at the touch of a button. It makes blockchain an easy-to-use endpoint that allows you to accelerate the development and deployment your d'Apps. An intuitive interface that allows you to manage all aspects of your blockchain networks and environments. Automated tools and workflows make it easy to scale your business network and onboard new members. Each member is responsible for managing their own key materials, data, and nodes. You can easily scale your network using single proxy operator or distributed network ownership. Manage your networks, memberships, users, and environments. -
43
SOURCE.ID
Desmo Labs
Identity verification solutions that are flexible, auditable, secure, private and private. Individuals can curate their profile, control data sharing and issuers can quickly verify credentials. This creates a trusted platform that is open to all participants. AML and KYC integrated solutions with standard interfaces that allow for open ledger verification. Digital signatures provide universal authentication, and verifiable credentials are tamper proof. Decentralized Identity (DID), a technology that streamlines the verification process, reduces the time required from weeks to seconds for tasks such as opening a bank or accessing public services. They also provide easily verifiable credentials and reduce the amount of manual labor required by front-desk staff. Digital signatures can be operated without seed phrases or gas fees. -
44
Nuggets
Nuggets
FreeNuggets' self-sovereign, decentralized identity can help you meet your regulatory requirements while building a competitive advantage. Your consumers will enjoy greater convenience, confidence, and choice. With Nuggets consumers regain control over their data, and you become the champion of trust. Nuggets ties each transaction to an independently verified decentralized self-sovereign identity. This means that the customer's legitimacy is verified before they connect to the service. This is the gold standard for digital identity. It uses private, secure proofs of transactions. Nuggets ties each payment to a verified identity, preventing fraudsters online from compromising identities. Payment providers and merchants both save money by reducing fraud. They also get to offer all the payment options that customers want. -
45
KILT
KILT Protocol
Try our KILT Demo Client to get play money from Mashnet Faucet. You will be amazed at how easy it is for you to create your own blockchain apps with our KILT SDK. You can check out the running KILT Blockchain nodes and see live transactions on the KILT Blockchain right away! KILT is a blockchain-based identity network that is decentralized. Decisions are made by a community of KILT Coin holders through a sophisticated governance system. A monopoly is created when there are many users using one service. There is little chance that better services will be recognized and the monopoly service won't evolve as quickly as it could, because it doesn't fear competition. These services have an unfair advantage in the age artificial intelligence because they only collect a small amount of data. -
46
Microsoft Entra
Microsoft
You can confidently make smarter, more timely access decisions for all identities, hybrid, multicloud and beyond. Protect your organization's access to all apps and resources for every user. Secure every identity, including customers, partners, employees, customers, apps, devices, workloads, and apps across all environments. Find and manage the right permissions, manage access lifecycles, ensure that no identity has access to privileges, and ensure that they are properly sized. Your users will be productive with easy sign-in, intelligent security, unified administration, and simple user interfaces. The identity and access management solution that connects people with their apps, devices, data, and protects your organization will help you to safeguard it. Cloud infrastructure entitlement management (CIEM), a solution that monitors, detects, and remediates permission issues across multicloud infrastructure, can help you to identify, remediate, or monitor them. An identity verification solution allows you to create, issue, and verify privacy-respecting, decentralized identity credentials. -
47
Verifiable
Verifiable
Modern provider data engine that delivers real-time verifications and powerful automation. This will simplify credentialing as well as provider network management. All your provider data, workflows, onboarding, network management, as well as everything else, can be managed from one place. Automation can replace manual verification processes and save time, money, and help you be more compliant. You can deploy lightning fast verifications and advanced network surveillance wherever your business requires. Advanced credentialing and compliance monitoring will alert you of any gaps before they become a problem. Our proprietary real-time lookups provide the most current and accurate data. All delivered via an API that integrates wherever needed. Finally, a healthcare API that's easy to use. You can customize the API to meet your specific needs and integrate seamlessly with your existing systems and workflows. -
48
Cloudentity
Cloudentity
Cloudentity improves development velocity, audit efficiency, and risk mitigation by advancing finely-grained authorization policy administration and delivering continuous transaction-level enforcement across hybrid and multi-cloud environments. Externalize authorization management empowers developers to create policy-as code, provide standardized controls, invoke contextual access, and enforce data exchange as close as possible to the service. Accelerate application delivery with security validation that includes full data lineage for compliance, audit, forensics, and validation. Cloudentity offers dynamic authorization governance that provides policy automation and adaptive control, ensuring zero trust between users, apps and services. Automate the inventory of APIs, services, and apps, as well as standardization and provisioning for authorization policies. This will simplify security verification. -
49
TraitWare is a Real Passwordless Multifactor Authentication (MFA) that allows for True Zero Trust Access. TraitWare's plug-and-play, enterprise-class, patented solution combines Passwordless MFA (Multi-factor authentication) and SSO. This eliminates the need for usernames or passwords, reduces friction, and increases security for your company. You'll also save up to 60% on support budgets. Our QR solution can eliminate the need to create a username. Our software is easy to use and virtually eliminates the vulnerabilities associated with password logins and usernames. We eliminate the possibility of phishing usernames and passwords by replacing them. Our QR scan or Direct login ties a user directly to the login, eliminating credential sharing or theft.
-
50
OneWelcome
OneWelcome
OneWelcome Cloud Identity Platform allows you to manage all your use cases, including gig workers, B2C and B2B. You can expand this core platform with a variety of identity apps to suit your organization's needs. OneWelcome handles the European complexity of eID's and privacy laws, GDPR regulations, as well as languages, for you. Our goal is to lower the barrier for any European citizen and company who wants to connect. Your customers will have seamless, secure, and privacy-protected access. Protect and connect your business-to-business ecosystem. Manage and delegate access to suppliers, business partners, and your extended workforce. Get in touch with us to learn more about the OneWelcome Cloud Identity Platform and how it can help your business.