Best MobiKEY Alternatives in 2024

Find the top alternatives to MobiKEY currently available. Compare ratings, reviews, pricing, and features of MobiKEY alternatives in 2024. Slashdot lists the best MobiKEY alternatives on the market that offer competing products that are similar to MobiKEY. Sort through MobiKEY alternatives below to make the best choice for your needs

  • 1
    Gravitee.io Reviews

    Gravitee.io

    Gravitee.io

    $2500 per month
    Gravitee.io, the most cost-effective, performant, and cost-effective Open Source API Platform, allows your organization to securely publish, analyze, and secure your APIs. Gravitee.io's OAuth2 OpenID Connect (OIDC), and Financial-grade API(FAPI) certified servers allow you to manage your identities. Gravitee.io APIM allows you to control precisely who, when, and how your APIs are accessed by your organization. It is lightweight, flexible, and lightning-fast. Gravitee.io allows you to manage, monitor, deploy, and secure your APIs with strong governance features like API review and API quality. Your API consumers can fully engage with your business through a Gravitee.io portal. This will ensure high quality engagement in the digital age.
  • 2
    SailPoint Reviews
    Technology is essential for business. Without it, technology can't be trusted. Today's "work from anywhere" era means that managing and controlling access to every digital identity is crucial for the protection of your business as well as the data it runs on. Only SailPoint Identity security can help you empower your business and manage cyber risk from the explosion in technology access in the cloud enterprise. This will ensure that every worker has the right access to their job, no more, no lesser. Unmatched visibility and intelligence is achieved while automating and speeding the management of all user identities and entitlements. With AI-enhanced visibility, you can automate, manage, and govern access in real time. Allow business to operate in a cloud-critical and threat-intensive environment with speed, security, and scale.
  • 3
    Zluri Reviews
    Zluri is a SaaS Operations Management Platform for IT Teams. It allows IT teams to manage, secure, and comply with multiple SaaS applications from one dashboard. Zluri helps bring shadow IT to light, monitor and manage SaaS spend, and automates end to end application renewal management. Zluri is data-driven. It helps IT teams plan, organize, secure, and get more out of their SaaS app portfolio.
  • 4
    Passwork Reviews
    Passwork provides an advantage of effective teamwork with corporate passwords in a totally safe environment. Employees can quickly access all their passwords, while the rights and actions are closely supervised and managed by local system administrators.
  • 5
    OpenText Business Network Reviews
    Securely integrate people, systems, and things across multiple business ecosystems. Expert people, proven processes, and the latest technologies are used to connect experts and provide real-time business intelligence and streamlined connectivity across a growing network of cloud applications, trading partners, and other connected devices. To facilitate digital business information exchange, connect people, systems, and things through a single platform. Advanced visibility tools can be used to analyze both internal and external information flows. Implement a digital backbone to underpin future digital transformation initiatives. OpenText™, Business Network is a leading cloud platform that securely connects data to people, systems, and things within and outside of the firewall. It streamlines business processes and delivers new insights to give you an information advantage.
  • 6
    Verosint Reviews

    Verosint

    Verosint

    $279 one-time payment
    Bad actors are highly interested in user credentials. Verosint helps companies deliver trusted online experiences by detecting and preventing account theft, new account fraud and account sharing attempts. Your digital business is at stake if account security is not properly strengthened. Interact with customers confidently, no matter what device or platform they use. Verosint allows your customers to enjoy a low-friction, seamless transaction path. It also stops suspicious users from creating a new account or logging in. Our patent-pending technology uses machine learning to analyze millions of data points and turn them into actionable insights. Verosint is cloud-native, built for scale, and works in the background, assessing risk and orchestrating account security and fraud control so quickly that you won't even know we are there.
  • 7
    OpenText NetIQ Identity Manager Reviews
    Manage the identity lifecycle of all entities within your hybrid infrastructure. Secure, consistent and efficient access to corporate assets both within and outside the firewall. Collect and curate identity information across complex, mixed environments. A centralized framework is available to provide identities and allow access to data and applications. Automating access decisions can save time and reduce risk. Continuously adjust security controls based upon real-time insights and information. Create a consistent, global view of all identities within and outside your organization. Identity Manager collects and curates data about identity governance. This allows you to know who has access, why they were granted, and if it is still required. You have one source of truth for access and identity with features like continuous reconciliation and attribute-level authority.
  • 8
    eClear 360 Reviews
    Turnkey solutions that are affordable and easy to integrate into existing systems for scaling up operations. eConnect's Identity Management software, eClear360, integrates multiple data sources and ties them to the industry-leading facial recognition algorithm. This platform allows for new insights, revenue protection, and opportunities. The key capabilities include: Identifying anonymous high value patrons, their gaming values and frequency of visits, detecting exclusion patrons, advantage players and patrons who may have committed crimes in past. This is a great tool for helping the operator to know your customer mandates. The Identity Management system uses patented technology to provide operators accurate facial identification, data analytics, and the ability to identify staff members for time clock integrations, detect unwanted guests or individuals, and improve operational efficiency.
  • 9
    SecureAuth Reviews

    SecureAuth

    SecureAuth

    $1 per month
    SecureAuth makes it easy and seamless to create digital experiences that support Zero Trust initiatives. SecureAuth provides a frictionless user experience that protects employees, contractors, and partners. This helps to reduce business risk and increase productivity. Secure, secure, and unified customer experiences will enable you to support your digital business initiatives. SecureAuth uses adaptive risk analytics to analyze hundreds of variables such as human patterns, device fingerprinting and geolocation to create each user’s digital DNA. This allows for continuous authentication in real-time, ensuring the highest level security possible throughout the digital journey.
  • 10
    Avatier Identity Anywhere Reviews
    Identity Anywhere is the first identity management solution that uses Docker containers. It is the most portable, scalable, and secure on the market. Identity Anywhere can run on any cloud, on-premise, or private cloud instance hosted at Avatier using Docker container technology. Avatier Identity Management products bring together separate back office applications and assets to manage them all in one system. With a single digital dashboard, executives at all levels can achieve measurable business growth and higher profits. With military-grade self-service password reset, you can eliminate the #1 Help Desk request. Reduce costs Only pay for what you use. A great shopping cart experience will maximize company utilization. Non-compliance can result in fines, lawsuits and even jail time.
  • 11
    CloudEagle.ai Reviews
    CloudEagle.ai helps IT, security & Procurement teams manage, govern & renew all their SaaS apps from one single platform. Along with making SaaS management & governance a breeze, CloudEagle.ai has processed over $2bn and saved enterprises like RingCentral, Shiji, Recroom $150M. Using 500+ direct connectors and no code slack-enabled workflows, IT & security teams get 100% visibility into all applications, streamline employee onboarding/offboarding, access reviews, licence harvesting and renewals.
  • 12
    Zeotap Reviews
    Zeotap is a Customer Intelligence Platform, (CIP). It helps companies better understand their customers to predict their behavior and make more meaningful investments. Our platform allows brands to leverage a core of first-party data to win new clients and grow their customer base. Our modules are independent but integrate and include customer data unification, identity resolution (including in data clean rooms), enrichment, modeling, and activation to more than 100 partners in the marketing ecosystem. Gartner has named us a "Cool Vendor" in 2020 and AdExchanger the "Best Data-Enabling Technology” in 2019. Our platform meets the highest standards for enterprise data privacy and security, including ISO 27001 and CSA STAR. We serve top brands, publishers, and agencies in more than a dozen countries in Europe and North America. Zeotap is also a founding member of ID+, an initiative for universal marketing ID.
  • 13
    Twine Reviews
    Share the workload with your cyber team. Use existing tools to tailor-make execution. Make sure that execution is not hindered by gaps in knowledge or data. Empower your team to focus on strategic projects. Reduce human error and execute cyber tasks consistently. Own and execute identity tasks A-Z. Improve the use of existing identity tools. Close data and knowledge gaps. Identify bottlenecks, and engage with stakeholders. Always meet deadlines. It ensures that the entire process is executed, as opposed to simple local automation. Handles and fixes edge-cases and exceptions without requiring human intervention. Autonomously fixes issues, removes roadblocks, and recovers what is needed to achieve your Identity objectives. Reduce the cost of managing identity and access. Use AI's full potential to gain the competitive edge you need to cyberproof your organization.
  • 14
    AIKON Reviews
    The Blockchain provides secure user Identities. Identity as a Service, GDPR & CCPA compliant Identity that connects businesses & users to the most important public Blockchains - Algorand EOS, Ethereum, and many more! One service allows you to manage all blockchains. AIKON connects your business to multiple blockchains cost-effectively and integrates with your existing technology stack. Your customers can seamlessly move to the blockchain. Login using email, phone, or social login. Companies can sign on behalf of users. It is an API-based solution that can be used out of the box. It works across all chains. Instead of training new skills, use existing engineers. All the features you need to ensure that your users are GDPR & CCPA-compliant. Blockchain-based infrastructure to keep data and access secure. It's easy to create native blockchain accounts. Your users can sign up using the familiar social, email, or SMS logins.
  • 15
    Fischer Identity Reviews

    Fischer Identity

    Fischer International Identity

    Fischer helps organizations build a secure, predictable, and effective Global Identity®. Architecture. The number one priority is now to secure an Identity Program. Fischer Identity offers hardware and software solutions, as well as Global Identity®, Services to protect and control information technology resources. Our plug-and-play automation allows for predictable, secure provisioning that will provide your identities with the access they require on day one. You can also deprovision access as needed. Automating Fischer's way will eliminate the need for professional services. Our governance model gives you the control you need in order to ensure compliance throughout your business. You will always know who has what access, how they got it, and what you can do to correct any issues.
  • 16
    RadiantOne Reviews
    Transform your existing infrastructure into an asset for the entire company with a platform that makes identity a business enabler. RadiantOne is a cornerstone for complex identity infrastructures. Using intelligent integration, you can improve your business outcomes, security and compliance posture, speed-to-market and more. RadiantOne allows companies to avoid custom coding, rework and ongoing maintenance in order to integrate new initiatives with existing environments. The deployment of expensive solutions is not on time or within budget, which negatively impacts ROI and causes employee frustration. Identity frameworks which cannot scale are a waste of time and resources. Employees struggle to provide new solutions for users. Rigid and static systems cannot meet changing requirements. This leads to duplication of efforts and repeated processes.
  • 17
    Omada Identity Suite Reviews
    Omada, a leading IGA provider, offers Omada Identity Cloud, a cloud-native SaaS platform that secures digital identities in complex environments. This AI-powered solution automates identity management and leverages advanced analytics to suggest optimal role structures, boosting efficiency and security. Omada Identity Cloud scales seamlessly and integrates effortlessly with other cloud services. Its API-first design facilitates easy connection to existing IT infrastructure and third-party applications. Additionally, the platform employs risk-based access governance with real-time predictive analytics to mitigate access risks. Omada offers configurable workflows that align with an organization's policies. It simplifies compliance management with pre-built reports and continuous monitoring ensures adherence to regulations. With Omada, organizations can effectively manage modern identity challenges, ensuring the right people have the right access to the right resources at the right time.
  • 18
    Incode Omni Reviews

    Incode Omni

    Incode Technologies

    varies
    Our flagship identity solution, Incode Omni introduces a new generation of authentication and verification systems that automate the management of transactions. We use advanced Artificial Intelligence (AI) and Machine Learning (ML), along with User-centric design principles, to create a user-centric experience by enabling personalized interactions in multiple domains. An advanced Identity Management System allows banks to increase their revenue while reducing fraud, while providing convenience and outstanding experiences for users.
  • 19
    Microsoft Entra Reviews
    You can confidently make smarter, more timely access decisions for all identities, hybrid, multicloud and beyond. Protect your organization's access to all apps and resources for every user. Secure every identity, including customers, partners, employees, customers, apps, devices, workloads, and apps across all environments. Find and manage the right permissions, manage access lifecycles, ensure that no identity has access to privileges, and ensure that they are properly sized. Your users will be productive with easy sign-in, intelligent security, unified administration, and simple user interfaces. The identity and access management solution that connects people with their apps, devices, data, and protects your organization will help you to safeguard it. Cloud infrastructure entitlement management (CIEM), a solution that monitors, detects, and remediates permission issues across multicloud infrastructure, can help you to identify, remediate, or monitor them. An identity verification solution allows you to create, issue, and verify privacy-respecting, decentralized identity credentials.
  • 20
    FortiAuthenticator Reviews
    FortiAuthenticator offers Identity Access Management (IAM) and Single Sign-On. FortiAuthenticator offers identity and access management services (IAM) to prevent breaches caused by unauthorized users accessing a network, or inappropriate access levels granted to valid users. FortiAuthenticator ensures that only the right person has access to your sensitive data and resources at the right time. FortiAuthenticator, combined with FortiToken or FIDO2 authentication, ensures that only authorized users are granted access to sensitive information. This additional layer of protection reduces the risk of data leakage and helps companies meet audit requirements related to government and business privacy regulations.
  • 21
    Akku Reviews

    Akku

    CloudNow Technologies

    $5.00/year/user
    Simplified user lifecycle for corporate users. Akku is a flexible, robust identity and access management system that can help you manage each stage of your user lifecycle. Akku's versatile features help improve data security, standards compliance and efficiency, as well as productivity. Akku is a cloud SSO solution that integrates easily with any cloud or in-house applications. It also includes a range security and access control features that allow for seamless user provisioning, management, access control, and deprovisioning. Akku is an agentless IAM solution that does not require the installation of a user agent on your infrastructure. You can see exactly which parts of your sensitive user data Akku can access so you have transparency and control.
  • 22
    DruID Reviews
    Intelligent relationships built on Identity. To establish long-lasting relationships, it is essential to manage the unique consumer identity. DRUID allows you to integrate your digital ecosystem, consolidate users' data, and personalize your user experiences. What is DRUID? DRUID is a platform that manages the unique identity and access control (CIAM). DRUID allows for the integration of complex digital ecosystems with great flexibility. It also allows you to manage all points of contact dynamically. You can ensure compliance with data protection laws and enrich your consumers' information through external sources such as social media. RELATIONAL STRATEGY DRUID plays a critical role in your consumer-centric strategy. DRUID allows you to create a unique consumer identity. It also helps you to understand your target audience (consumers and stakeholders ...) DRUID is crucial to deploying a winning strategy in just 3 steps: Integrate. Align the entire digital ecosystem
  • 23
    SlashID Reviews
    Identity is a common vector of lateral movement and data breaches. SlashID helps build a compliant, secure, and scalable infrastructure for identity. Manage the creation, rotation, and deletion of identities and secret in one place. Multi-cloud inventory of all identities and secrets. Detect initial access, privilege elevation, and lateral movements across your IdPs, cloud environments. Add authentication, authorization and conditional access to your services. Rotate key materials to detect leaks in real-time. This will prevent data breaches. To reduce the impact of an attacker, you can automatically block, suspend or rotate MFA based on a detection. Add MFA and conditional accessibility to your applications. Add authentication, authorization and credential tokenization to your APIs and workloads.
  • 24
    Accops HyID Reviews
    Accops HyID, a futuristic access and identity management solution, protects business applications and data against misuse by internal and external users. It manages user identities and monitors user access. HyID gives enterprises strong control over endpoints. It allows for contextual access, device entry control, and flexible policy framework. The MFA works with all modern and legacy apps as well as cloud and on-prem apps. It provides strong authentication using OTP sent via SMS, email, and app, biometrics, device hardware ID and PKI. Single sign-on (SSO), provides greater security and convenience. Organizations can monitor the security status of endpoints, including BYOD, and grant or deny access based upon real-time risk assessment.
  • 25
    DigitalPersona Reviews
    DigitalPersona®, software, allows you to go beyond multi-factor authentication. Expand to risk-based authentication, secure all applications, provide frictionless access, and deploy quickly. Industry-leading biometric solutions can improve security. Processes can be simplified, streamlined, and queues shortened to confirm identities for a variety of military, criminal justice, and citizen applications. Choose from a variety of U.are.U®, readers, modules, and sensors. The most advanced fingerprint technologies available to meet your OEM, retail, hospitality, and commercial identity management needs.
  • 26
    Oracle Identity Management Reviews
    Oracle Identity Management allows organizations to manage the entire lifecycle of user identities across all enterprise resources. This includes both inside and outside the firewall, as well as into the cloud. The Oracle Identity Management platform offers scalable solutions for identity governance and access management. This platform enables organizations to improve security, simplify compliance, and take advantage of business opportunities related to mobile and social access. Oracle Identity Management is part of the Oracle Fusion Middleware product family. This allows for greater agility, better decision making, and lower cost and risk in diverse IT environments. We now offer an innovative, fully integrated service, Oracle Identity Cloud Service, that provides all core identity and access management capabilities via a multi-tenant Cloud platform.
  • 27
    LogonBox Reviews
    Find the LogonBox Advantage and our innovative solutions for modern Enterprises. LogonBox is an independent software vendor. It develops software that helps organizations manage and protect user identities and credentials. LogonBox solutions can reduce helpdesk calls, increase productivity, secure access across heterogeneous enterprise environments, and protect network resources through the extension of authentication beyond the password.
  • 28
    IAMCompare Reviews

    IAMCompare

    IAMCompare

    $500 per month
    IAMCompare is the only solution that focuses on auditing the integrity and de-provisioning of your Provisioning and De-provisioning processes. We track user access exceptions, identify them and resolve them, which reduces both time and costs. IAMCompare provides companies with direct visibility into their accounts. Our solution delivers results at a transparent cost. Our clients then identify assets (applications databases, devices, and other) that need monitoring and provide relevant account data. IAMCompare combines account and census information to identify actionable anomalies. You can view account access for employees, authorized contractors, vendors, and customers. Use IAMCompare for system access reviews and standardization of vendor, customer, and other third-party user certifications.
  • 29
    Stack Identity Reviews
    We identify, eliminate, and govern shadow access, unauthorized, unmonitored, and invisible access to cloud applications, data, and infrastructure, before an attacker can exploit this. We transform cloud IAM with an automated, risk-driven approach for securing and managing cloud data. This allows cloud and security teams quickly identify data access patterns; who, what and when data is accessed, and its impact on cloud security. Stack Identity protects data in the cloud by prioritizing and visualizing the impact of identity, data and access vulnerabilities. We help you remediate both human and API-based access risks, guiding identity practitioners and governance and compliance teams, as well as data owners, to take definitive actions and provide SecOps, DevOps, and SecOps teams, with an honest view on cloud security risks.
  • 30
    OpenOTP Security Suite Reviews
    OpenOTP Security Suite is an enterprise-class security solution for two-factor authentication with U2F/OTP, federation and identity management (IAM). The solution combines mobile technologies with proven security standards to provide the best alternative for business and non-business users who need cost-effective solutions that support their users' mobility. It enables integration of a variety of third-party products and systems with MFA, even if they only support LDAP as an authentication backend. Try OpenOTP Security Suite if you are interested in: USER MOBILITY | PRIVACY | VPN AND WIFI SECURITY | SSO AND ADFS | FINE-GRAINED AUTHENTICATION POLICIES | ALL-IN-ONE SECURITY SOLUTIONS | EUROPEAN DATA STORAGE OpenOTP Security Suite is an enterprise-class European security solution designed for installation on-premises or in a private cloud. ++ Free Token App (and compatible with most existing hardware and software tokens) ++ Free 30-day Trial ++ Freeware (<25 users)
  • 31
    Privileged Access Management Reviews
    Xton Access Manager is the simplest, all-in-one solution for PAM without the price shock. Xton Access Manager, a privileged access management platform, provides a secure AES256 encrypted Identity Vault to ensure total administrative control over all passwords, certificates keys, files secrets and privileged accounts. Privileged session recording can be used to preserve all sessions and can be used to diagnose or forensic investigations. Keystroke logging can also be used. Integrated Job Engine and Policy Engine to automate Password Resets and Privileged Account Discovery. Configurable Workflows that can be used to implement Dual Control and Four Eyes policies to provide additional security for your secrets and privileged systems. Command Control is used to restrict the commands that users can execute in remote Windows or Unix sessions. Full system and user audit trails that can trigger notifications or in-application alerts.
  • 32
    Axiom Protect Reviews
    Multifactor security can be embedded to empower multiple IT systems (on-premise, hybrid, or cloud) according to the user's preference. Policies and settings provide central control to meet your business requirements and ensure regulatory compliance. All it takes is a few clicks to change default to custom Inbuilt Complex Password Source to External LDAP/Active Directory synchronized operator and user sources for consolidation. Trust can be strengthened and made more flexible by connecting users' devices. A business need is to have multiple users on one device or multiple devices for one user. If you have a great platform, it's easy. Everything is DATA. Data at rest and at transit security at mobile web, iOT device Server, files / database. You can choose from a variety of security grades, including different key lengths and algorithms. No expensive VPN. SDK and APIs are available. Pure 100% AI/DL facial biometrics provide 99%+ accuracy for building your EKYC or remote authentication.
  • 33
    Teamstack Reviews

    Teamstack

    Teamstack

    $3 per user per month
    Do not compromise security for convenience. Automate identity management for legacy, mobile, and web apps to grow your team seamlessly. Integrate your day-to-day apps with our identity management platform to increase efficiency and allow employees, contractors, and customers to work seamlessly together. You can use pre-built integrations, Single-Sign-On and one click user provisioning to allow your team to sign in to any application passwordless using multi-factor authentication. Your workforce deserves easy access, regardless of whether your applications are cloud-based or custom-built. The Fortune 500s should not have high standards in identity management. They can access best-in-class accessibility and security features that will protect their business, increase efficiency, and save valuable time. Our access policies are now in place for employees who attempt to access cloud apps.
  • 34
    Acxiom Real Identity Reviews
    Real Identity™, delivers subsecond decisions to power relevant messages in a real-time environment. Real Identity allows the world's largest brands to ethically identify and connect with people anywhere, anytime to create relevant experiences. Engage people with precision, scale, and reach across all interactions You can manage and maintain your identity across your enterprise with 50 years of identity and data expertise, combined with the most recent artificial intelligence and machine-learning techniques. Adtech requires fast access to identity and data in order to enable personalization and decision making. These functions will be driven by first-party data signals in a cookieless environment. The conversation between publishers, brands, and people will continue to be between them. Delivering experiences that matter across all channels will allow you to wow your customers and prospects while also staying ahead of the regulations and your competitors.
  • 35
    Touch N Go Reviews
    Touch N Go - A fast, secure and simple way to integrate biometric fingerprint ID into your solution using just FOUR lines code. For seamless integration, a reliable, scalable and high-performing biometric identification solution. Easy implementation and maintenance of fingerprint recognition with minimal learning curve for developers. It provides the best-fit identity solution for workflows that require high security. This keeps developers happy, productive, and IT in control. Organizations can have a cost-effective, turnkey biometric identification system that leverages proven technologies. This allows them to focus on their core business operations.
  • 36
    Sticky Password Reviews

    Sticky Password

    Sticky Password

    $19.99 per user per month
    2 Ratings
    It creates and remembers strong passwords for all accounts and then types them for you. All your credentials, logins, and credit cards are kept safe and secure. The world's best security -- AES256 encryption, biometric authentication, and enhanced two-factor authentication. Sticky Password's secure backup and synchronization ensures that you have access to your passwords, logins, and credentials no matter where you are. Fill out forms automatically with your name, address, phone number, email, and credit card information. Our superstrong password generator integrates with autofill to make account creation easy. It can be used in any combination of lower, upper, numbers, special characters, and numbers to make it extremely strong.
  • 37
    aapi Reviews

    aapi

    aapi

    $4 per user per month
    To make identity experiences more seamless and compliant, secure, compliant, as well as productive, you can act on identity events in other apps. Automate embed the right real-time actions for users or teams to efficiently act upon data in downstream apps. Next-generation granular access to specific functions of apps. This surpasses existing PAM or CASB solutions and provides true zero trust. Aapi responds to events such as identity provisioning or suspicious activity. It automates identity, application, security, and security responses. Using aapi, users and teams can automatically embed correct real-time actions in their chosen app. Access to the data is protected by your IAM. Your IAM gives users access to the features they require within apps, but keeps everything else secure and safe.
  • 38
    Resiliant Reviews
    Blockchain and AI technology allows for a password-less, secure ID authentication that is user-centric, affordable, and secure. Control your digital risks and protect data by blocking unwanted users and devices. Onboarding once for multiple devices, servers, networks, and web sites. No more 2FA codes or matching images that do not protect users or enterprises against SIM swapping and false geolocation. Decentralized IdNFT™ gives users ownership and control over their identity. No private data are stored or uploaded in the cloud. Zero-knowledge proof allows information to be transferred without revealing credentials.
  • 39
    Visual Guard Reviews
    Visual Guard is an advanced identity and access management (IAM) tool. It offers a complete solution to secure sensitive applications and data. Visual Guard facilitates the implementation of robust, standards-compliant security policies, with centralized management of users and permissions, User management : Create, modify & delete user accounts Integrate with LDAP or Active Directory directories Automatic synchronization of user information Access control : Fine-grained access rights to features and resources Permission and Role Management Multi-factor authentication (MFA) Single Sign-On (SSO) Security Audit and Monitoring : Permission Matrix Detailed logs Historical & Real-time Graphs Integration: Compatibility with major development platforms, frameworks, and protocols. APIs for integration of authentication and authorization features into custom applications Benefits : Simplified access management Enhanced data security Improved regulatory compliance Reduce identity management cost Visual Guard is the ideal tool for organizations seeking to optimize their IT security strategy, while ensuring efficient and effective identity management.
  • 40
    SecureIdentity IAM Reviews
    SecureIdentity IAM enforces access decisions regarding applications and data repositories. It can dynamically decide what programs a user can run and which file servers or cloud storage areas it is allowed to access by reading information from the Universal Directory. Clients on the endpoints enforce this policy by intercepting requests for access to data areas or applications and verifying them against the defined policy. If the action is permitted, the user experience will continue as normal without any overhead. Access to the executables or DLL files required for the action is blocked dynamically if it is prohibited. To provide a forensic trail, logs of all events are sent back from the platform to its event database.
  • 41
    Corsha Reviews
    APIs power all your services and applications. Secrets can be shared. They are not often rotated, or sometimes never at all. At an alarming rate, API keys, tokens, and even PKI are being leaked. Clear visibility and control of the machines accessing your APIs is essential. Organizations don't have visibility into the machines that access API secrets. As automation shifts risk from humans to machines, it is becoming more important to know the identities and secrets of the machines. Corsha prevents API attacks using stolen or compromised API credentials. It also helps enterprises protect data, applications, and services that leverage machine-to-machine (or service-to service) API communication.
  • 42
    UserLock Reviews

    UserLock

    IS Decisions

    $2.00/month/user
    UserLock | Two Factor Authentication & Access Management for Windows Active Directory
  • 43
    LoginRadius Reviews
    LoginRadius allows businesses to provide a pleasant customer experience without compromising security. Companies can use our customer identity platform to offer a simplified login process, protect digital accounts, and comply with data privacy regulations. LoginRadius has over 3,000 users and 700 million monthly visitors worldwide. Registration services, adaptive security, integrations with third-party apps, and customer insights are some of the key platform features. Gartner, KuppingerCole and Computer Weekly have named the company an industry leader in customer identification and access management (CIAM). Microsoft is a major technology investor and partner. LoginRadius has its headquarters in Vancouver, Canada. There are additional offices in Toronto, USA and Australia. LoginRadius Services: API Authentication OAuth Data Management Secure Login One Sign On SAML SSO Sign up for social media Two Factor Authentication
  • 44
    Cipherise Reviews

    Cipherise

    Cipherise

    $30 per user per month
    6 Ratings
    Cipherise for developers. All you need to create powerful and user-friendly authentication. Your users will have the best experience possible. Multi-Factor Authentication. MFA is simple and highly secure, which is almost invisible to end users. No complex passwords. No more complicated passwords, usernames, or credential sharing Omni Channel. The user experience is consistent regardless of whether it's on a mobile, tablet, laptop, or PC. Hackers are no longer able to access centralized credential Honeypots. Bi-Directional authentication. Before the user authenticates to it, the service authenticates to them. Mobile Native. Mobile Native. Protect your valuable IP and Content. We make it easy for your customers to sign up and access your content from any device.
  • 45
    WSO2 Identity Server Reviews
    WSO2 Identity Server API-driven is built on open standards and offers the option of cloud, hybrid, or on-premise deployments. It is highly extensible and can support complex IAM requirements. WSO2 Identity Server allows you to do single sign-on as well as identity federation. It is backed up by strong and adaptive authentication. Securely expose APIs and manage identities by connecting with heterogeneous user accounts. Open-source IAM can be used to innovate quickly and to build secure Customer IAM solutions (CIAM) to deliver a user-friendly experience.
  • 46
    AuthStack Reviews

    AuthStack

    Buckhill

    €41.25 per month
    AuthStack is a host-anywhere, Enterprise-grade Single Sign-On (SSO), and Identity Access Management System (IAM). It can log in users to your own websites and applications, as well as third-party websites. AuthStack centralizes your user identification management. Instead of managing multiple logins for each website or application, the user only needs to log in once and maintain a single password and profile. If your website or application supports SAML, integration with AuthStack does not require any custom coding. We provide a Connector Framework for those sites that do not support SAML. If required, we can help you integrate the Connector. You don't need to migrate any existing user databases. AuthStack bundles with a Connector Framework that can communicate with any data source (LDAP, MySQL SOAP API, SOAP API, SOAP API, etc.) to verify credentials from existing user database(s).
  • 47
    RapidIdentity Reviews
    Identity Automation is the most flexible, fully-integrated, full-lifecycle solution for identity, access, governance and administration. RapidIdentity, the company's flagship product is designed to help organizations increase their business agility, embrace security and provide a better user experience. RapidIdentity is a great tool for organizations that want to improve security, reduce risk of data breaches and lower IT costs.
  • 48
    Transmit Security Reviews
    The Future of Authentication is Passwordless Agile. Instant. Flexible. You can eliminate passwords and deliver identity experiences that delight all your users. Anywhere, anytime. Secure and seamless customer authentication via any device or channel. The mobile can be used as an authenticator. A network of trust is used to identify each user. This technology and installation provides the best experience and impact. Transform complex authorization, authorization, and risk policy decisions into simple trips. Flexible policy orchestration engine that works with all applications and channels. Protect your workforce and workplace, whether you are at work or away. Enjoy the benefits of risk-based technology that provides unbreakable security regardless of where you are located. Passwordless technology will make your enterprise more secure.
  • 49
    Xage Reviews
    Xage Security, a cybersecurity company, provides zero-trust asset protection for critical infrastructures, industrial IoT and operational technology environments. Fabric Platform is the foundation of all Xage products and use cases. It protects assets from attacks across OT IIoT IT and cloud. Xage's zero-trust approach to security is based upon the principle "never trust, and always verify." Xage authenticates users and devices prior to granting any access. Xage enforces granular policies based on asset risk, context and user identity. Xage products include: Zero Trust Remote Access Identity-Based Access Control Zero Trust Data Exchange Xage products are used by a variety of organizations including government agencies and utilities as well as industrial manufacturers. Xage customers rely on Xage for protection of their critical infrastructures, OT assets and industrial data against cyberattacks.
  • 50
    Sima Reviews

    Sima

    Active Witness

    Free
    Sima does more than keep bad guys out. Sima is a cloud-based Access Control reader that is highly secure and yet easy to use. Sima can read both facial biometrics and mobile credentials (QR codes). This cloud-based integrated software can issue single (QR only), and multi-factor (facial verification) codes for highly secure and customized facility access. We respect your privacy. To perform facial authentication, we use facial recognition technology. This technology allows us to verify identity, and allow access to a specific location. Only for identification purposes, facial data will be stored on our servers. We will not share your personal data, including your face image, with any third parties.