Best Passage by 1Password Alternatives in 2024
Find the top alternatives to Passage by 1Password currently available. Compare ratings, reviews, pricing, and features of Passage by 1Password alternatives in 2024. Slashdot lists the best Passage by 1Password alternatives on the market that offer competing products that are similar to Passage by 1Password. Sort through Passage by 1Password alternatives below to make the best choice for your needs
-
1
Udentify
Fraud.com
12 RatingsKnow the real identity of your customer, user, or employee with the Udentify Identity Verification and Biometric Authentication solution. Challenges we solve: - Identify verification - Onboarding - New account opening - Age verification - Fraud prevention - Biometric authentication - Passwordless authentication - Strong customer authentication - KBA replacement - KYC and AML compliance Udentify is iBeta Level 1 and Level 2 certified, quickly integrates into your website or mobile app and lets your users navigate from a desktop to a mobile experience as desired. -
2
Auth Armor
Auth Armor
FREE for 10,000 active users! 4 RatingsYou can harness the power of biometrics to make authentication simple for any website or application. This will allow you to create a new way to log in and authenticate online. You can authenticate your users using their smartphones with 2-factor and passwordless authentication. Auth Armor provides secure authentication for every user. It does not require weak passwords or complicated codes. We have created powerful APIs, SDKs and libraries that allow you to create what you want, however you want it. You can use our tools to add authentication to any app using any flow. We offer protection for workers and consumers, so you have the power and flexibility you need to secure any information. Auth Armor is the most efficient mobile authentication system available. Instant push messaging is available to users' devices, enabling them to log in and authenticate quickly. -
3
Beyond Identity
Beyond Identity
$0/User/ Month Beyond Identity provides the strongest authentication on the planet, eliminating passwords completely for customers, employees, and developers. Unique to Beyond Identity, users never have to pick up a second device to enroll or authenticate, passwords are completely eliminated from user flows and your database, and organizations can implement risk-based access controls using granular user and device risk captured in real-time. By default, Beyond Identity authenticates with invisible MFA that only leverages unphishable factors. This allows organizations to secure access to applications and critical data by eliminating account takeover, ransomware, and all credential-based attacks all while improving the user experience -
4
FusionAuth
FusionAuth
$0 22 RatingsFusionAuth was built from the ground up to integrate with any app or language. Each feature (yes, every one) is exposed via an API which gives you total flexibility to handle any use cases. Every feature and acronym you need is included: registration & log-in, passwordless, MFA, SAML and OIDC. In seconds, you can comply with GDPR, HIPAA and COPPA requirements. FusionAuth can be installed on any platform, on any computer, and anywhere. FusionAuth Cloud, our fully managed SaaS hosting solution, allows you to host it yourself. -
5
Authsignal
Authsignal
$99 USD Per Month 3 RatingsDrop Authsignal into your identity stack to secure customer journeys and deliver world-class user authentication experiences. Focused on enabling product and fraud teams to orchestrate customer journeys and mitigate fraud, Authsignal makes it easy to deploy passkeys. Delivering class-leading drop-in authentication experiences, product teams leverage Authsignal to drop authentication (Passkeys, push, SMS authentication) challenges anywhere in the user experience. Seamlessly authenticate identity, secure customer journeys, and protect customer data with a unified customer experience. Gain a single view of customer activity and stream identity data with audit trails. Passkeys, CIAM, IAM, Authentication, Passwordless Authentication, Multifactor Authentication, Passkey -
6
Corbado
Corbado
€29/month You deserve the best login. Add future-proof passwordless authentication within 1 hour. Passkeys are a great way to improve conversion, UX, and security. Passkeys are used to login to websites and apps using Face ID or Touch ID. Digital-first companies are already offering passkeys as a new login standard, which is being enforced by Apple, Google & Microsoft. It has never been a better moment to abandon passwords and offer future proof authentication. -
7
Ping Identity
Ping Identity
$5 per user per monthPing Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow. -
8
TraitWare is a Real Passwordless Multifactor Authentication (MFA) that allows for True Zero Trust Access. TraitWare's plug-and-play, enterprise-class, patented solution combines Passwordless MFA (Multi-factor authentication) and SSO. This eliminates the need for usernames or passwords, reduces friction, and increases security for your company. You'll also save up to 60% on support budgets. Our QR solution can eliminate the need to create a username. Our software is easy to use and virtually eliminates the vulnerabilities associated with password logins and usernames. We eliminate the possibility of phishing usernames and passwords by replacing them. Our QR scan or Direct login ties a user directly to the login, eliminating credential sharing or theft.
-
9
SAWO
SAWO Labs
$17.98 per monthSAWO was born out of the need to revolutionize authentication services. SAWO offers a unique and fast service. It is a B2B2C company that offers API Integration. This allows one-tap authentication on your Android, iOS, and web apps to provide passwordless and OTPless authentication. It's time for SAWO to offer additional device-based security and quick customer onboarding. SAWO's API eliminates passwords and OTPs, as well as the inconvenience caused by the existing authentication options. We offer a device-based, customer-centric, standardised, and customer-centric verification. It takes just 6 minutes to move towards a passwordless future. Integration with all popular web, cloud, VPN, remote-access gateways, and more. Additional device-based security layer for user convenience. Multiple devices can be connected through the primary device. -
10
Magic
Magic Labs
$35 per monthIt's plug and play authentication that's radically more efficient. Integrate unstoppable passwordless authentication that scales with your business in a matter of seconds and gives you peace of mind. It is now more important than ever to build auth on your terms. There are many things to consider when you start from scratch, regardless of whether you are a veteran developer or a novice. It's a huge responsibility to worry about vendor lock-in and friction for users, scalability reliability, security, privacy compliance and constant cyber threats. Magic links and many other things. Your app can be configured to accept a variety passwordless login methods with just a few lines code. Our SDKs make it simple to get your app up and running with battle-tested authentication so you can ship faster. Bring your tech stack to keep you in the flow. Magic can be integrated with modern programming languages and frameworks. You can spend more time building the best product possible for your users by reducing overhead. -
11
AuthN by IDEE
IDEE
€3 per user per monthAward-winning, enterprise-wide, zero trust authentication as a service. AuthN™, a service from IDEE, eliminates password-based risks and lowers administrative overhead. The fastest time to market for your transition from passwordless to passwordless in the enterprise. AuthN™, which is interoperable, can be deployed alongside your existing SSOs, hardware tokens and password-management investments. You can reduce your risk exposure by completely removing your password, whether it is standalone or integrated. Using no central credential database, insider threats and human error are also reduced. Our passwordless multi-factor authentication will keep your attackers away and keep you out the news. You can upgrade your favorite applications, password managers, and SSO software with a simple plug-and-play upgrade. AuthN™, which supports open standards (e.g. RADIUS, SAML and OIDC are supported by AuthN™ and you can also use custom plugins to take advantage of the additional benefits offered by AuthN™. -
12
Trusona
Trusona
Trusona is the pioneer of passwordless authentication in digital businesses. It offers a phishing resistant alternative to SMS OTPs and passwords. Trusona Authentication cloud is a platform that allows you to add passkeys on your website in the easiest, fastest and least expensive manner. It increases business growth and profitability by providing sign-ins for your customers that are pleasing to them. It also mitigates top threats such as phishing and account takesovers (ATOs), while providing an UX designed specifically for people. Trusona is trusted by organizations in iGaming and travel, financial services, healthcare, and more for their passwordless authentication initiatives. -
13
Vault Vision
Vault Vision
$25/month for 10k users User auth for web and mobile apps with industry-leading security and passwordless login convenience for end users. Vault Vision's low-code user authentication platform allows applications to securely manage user auth and login management. Our platform helps application owners increase user login engagement with passwordless application logins powered by mobile passkeys, two factor auth (2FA), multi-factor auth (MFA), face id auth, fingerprint auth, USB key auth, pin based auth, SSO with email, OIDC logins for Apple, Google and Microsoft, and more. -
14
PrivX
SSH Communications Security
PrivX is an automated, scalable and cost-efficient privileged access management solution (PAM) for hybrid and multicloud environments. It supports quantum-safe connections, password vaulting and rotation, as well as passwordless authentication. PrivX simplifies PAM, increases productivity, and reduces costs while reducing complexity. PrivX eliminates passwords, keys and other credentials that are left behind after access authentication. Instead, it uses ephemeral, short-lived certificates. Your privileged users and Superusers will get role-based, just-in time Zero Trust access, without having to manage, vault or rotate any secrets. PrivX supports hybrid environments, with a secret vault and password rotation as needed. It allows you to create quantum-safe SSH connection. -
15
IDmelon Authenticator
IDmelon Technologies
$5.99/user/ year IDmelon Authenticator, a mobile app that is available on Google Play or App Store, allows you to turn your smartphone into a FIDO-certified security key that allows you to securely log in to websites, online accounts, apps, and other sites. This means that instead of using the traditional method of presenting your username or password to log in to accounts like Microsoft or GitHub, you can use your username and security keys to add an extra layer of security. Organizations can use IDmelon Admin Panel to login to manage users, security keys, and to deploy passwordless authentication within their organizations overnight to protect their data, employees, and assets. -
16
Keyless Authenticator
Keyless Technologies
2 RatingsNothing to forget. Nothing to steal. You are the key. To protect your remote workforce, adopt zero-trust authentication. This will allow you to enable strong customer authentication with just one glance. Anywhere. Anytime. Any device. To eliminate fraud, phishing, and credential reuse, embrace passwordless, multifactor authentication. This will enhance customer and employee experience and protect their privacy. Unique technology enables you to achieve unique capabilities. Hardware Agnostic. Keyless does not rely on any device hardware or sensors. Keyless can be deployed on many devices and appliances. Eliminating passwords can help you achieve better results for your company. Top-Notch Security No central honeypot, no data on user devices. Data cannot be stolen or lost, as no private information is available to anyone except the user. Passwordless passwords can reduce password-related costs. Password Reset Costs. The average helpdesk labor price is $70 -
17
Unikname
Unikname
€150 per yearIntegrating the next-generation strong authentication will protect your web accounts from phishing attempts. Protect the admin account for all websites you manage. Your clients can register without a password. The next-generation social authentication protects your privacy. Manage web access rights for your employees and partners easily. Install Unikname for all web environments in minutes! The dedicated dashboard allows you to manage trust certificates and web access. Manage access rights for admins and users. Unikname can be used as the default authentication method. Disable standard authentication. You can fine-tune Unikname's login button's style options. Unikname uses the most recent OAuth and OpenID Connect authentication protocols standards. Unikname allows you to generate a trust cert attached to your webdomain name. -
18
Entrust Identity as a Service
Entrust
Cloud-based identity management (IAM), which includes multi-factor authentication (MFA), credential based passwordless access and single sign-on (SSO). Cloud-based multi-factor authentication provides secure access to all your users' apps, networks, devices, and accounts. Optimal user experience is achieved through adaptive authentication, proximity-based login, and adaptive authentication. Happy users won't try to bypass security measures. Everyone wins. This is easier than any other thing you have tried. The work-saving features, such as built-in provisioning tools, on-premises integrations, and cloud integrations, reduce the IT workload from deployment to everyday management. To move forward faster, you need strong IAM. Cloud-based Identity as a Service scales rapidly to accommodate new users, expanding use case, and evolving security threats. -
19
Stytch
Stytch
The authentication platform for developers. Stytch's APIs allow you to authenticate, sign up, and engage with your users. Flexible, passwordless authentication solutions that improve security and user experience. Let us help you build the infrastructure so that you can concentrate on your product. Our SDKs allow you to create seamless onboarding and authentication experiences. They can be customized to your logo, colors, fonts, or logo. Our direct API integration gives you more control over your user experience. It considers both the developer and user experience and ensures fast, secure, and passwordless authentication flows. With clear and complete documentation, we make integration easy and painless. -
20
ThumbSignIn
ThumbSignIn
$3 per user per monthWe have you covered, no matter what channel or device. You can choose from a variety of user-friendly authentication options, including passwordless biometrics and 2FA, to find the right authentication solution for your business. To improve security and user experience, start with 2FA. Then move on to biometrics-based authentication. Our SaaS-based authentication service, RESTAPs, mobile SDKs, and UI widgets offer a powerful combination software components that can all be used to create omni-channel authentication experiences across mobile, web, phone and IoT. It's time to remove the security burden from users! Our mission is to make the digital world more secure and open up access to strong authentication technology. ThumbSignIn is a SaaS-based service that helps companies choose the best way to enhance their existing systems with two factor authentication (2FA). -
21
cidaas
WidasConcepts
Cidaas is the best solution for fast and secure identification management. Using cidaas, you can create one identity per user across all channels. cidaas, which is based on OAuth2.0 standards and OpenID Connect standards provides strong API security. It also integrates Bot Net Detection with Fraud Detection to ensure a secure journey through all your business channels. This is how modern identity and access management works. Comprehensive feature set allows for easy integration and implementation of all systems and use cases. We handle it so that you can concentrate on your core business. You don't have to worry about maintenance and operation. Users don't have to worry about pins and passwords. They are an unattractive barrier to digital access and make it difficult for them. Passwordless authentication secures your digital applications and offers your customers a unique customer experience. The login is the first thing that your users see. -
22
PortalGuard
BIO-key International
BIO-key PortalGuard IDaaS, a cloud-based IAM platform, offers the most flexible options for multi-factor authentication and biometrics. It also allows customers to reset their passwords and provides a user-friendly interface. All this at a reasonable price. PortalGuard has been trusted by many industries, including education, finance, healthcare, and government, for over 20 years. It can be used to secure access for employees and customers, regardless of whether they are on-premises or remote. PortalGuard's MFA is unique because it offers Identity-Bound Biometrics with the highest levels of integrity and security. They are also more accessible than traditional authentication methods. -
23
Ory
Ory
$29 per monthThe missing web-scale identity and access control API. Today, 10x your security and user experience. Build secure apps over the Ory Network to reach new customers in any region of the globe with the best login experiences ever. Login is much more than just a username and a password. It is dangerous and time-consuming to build it from scratch. Ory's API first microservice architecture allows projects to be integrated at any stage. Pay for usage and not features. Ory subscription plans include advanced multi-factor authentication. Plus, advanced permissions, SSO OAuth2, OIDC multi-tenancy and more. Ory is designed for high-performance and high-scale applications on any cloud. Ory is designed with developers in mind. It allows you to quickly create your own user experience, and integrate it within your software stack. Ory's focus is on open standards, and its automated data import capabilities make migrating to legacy systems simple. -
24
Transmit Security
Transmit Security
The Future of Authentication is Passwordless Agile. Instant. Flexible. You can eliminate passwords and deliver identity experiences that delight all your users. Anywhere, anytime. Secure and seamless customer authentication via any device or channel. The mobile can be used as an authenticator. A network of trust is used to identify each user. This technology and installation provides the best experience and impact. Transform complex authorization, authorization, and risk policy decisions into simple trips. Flexible policy orchestration engine that works with all applications and channels. Protect your workforce and workplace, whether you are at work or away. Enjoy the benefits of risk-based technology that provides unbreakable security regardless of where you are located. Passwordless technology will make your enterprise more secure. -
25
Teamstack
Teamstack
$3 per user per monthDo not compromise security for convenience. Automate identity management for legacy, mobile, and web apps to grow your team seamlessly. Integrate your day-to-day apps with our identity management platform to increase efficiency and allow employees, contractors, and customers to work seamlessly together. You can use pre-built integrations, Single-Sign-On and one click user provisioning to allow your team to sign in to any application passwordless using multi-factor authentication. Your workforce deserves easy access, regardless of whether your applications are cloud-based or custom-built. The Fortune 500s should not have high standards in identity management. They can access best-in-class accessibility and security features that will protect their business, increase efficiency, and save valuable time. Our access policies are now in place for employees who attempt to access cloud apps. -
26
Centagate Cloud
Centagate Cloud
$2 per monthCENTAGATE CLOUD provides a central login option that protects all applications against security breaches using FIDO2 passwordless authentication. You can control, secure and protect your application access. All applications require one login credential. Strong digital security that eliminates fraud, phishing, and password theft. Because authentication is centralized, only one login credential will be required for all applications. Cost-effective, with minimal OPEX and zero CAPEX. CENTAGATE CLOUUD has many important features that make authentications more secure and protected. An authentication that requires two or three factors, such as what you have (device), who you are (biometrics), and what you know (password). An authentication that is based on previous logins' risk and behavior. These risk can be used to stop security breaches. Pre-integrated Securemetric FIDO2 server certified for authentication and registration. -
27
Microsoft Authenticator
Microsoft
31 RatingsGo passwordless. Enter your username to confirm your sign-in via your phone. It's easy! Passwords can be lost, stolen, or compromised. Authenticator adds an extra layer to your phone's security beyond your fingerprint or PIN. Authenticator allows you to sign in to Outlook, OneDrive and Office. Two-step verification protects all your accounts. You can also use the industry-standard time-based OTP (onetime password) codes to secure all your online accounts. -
28
Authentiq
Authentiq
$49Strong authentication without passwords Secure authentication options can be added to any website or app. It's simple and easy. Authentiq Connect allows users to decide when to increase their security and whether they want to use a second factor such as TOTP (e.g. Google Authenticator or U2F (e.g. Yubikey, or you can go passwordless right away with AuthentiqID. Authentiq Connect works with OAuth 2.0, OpenID Connect and is easy to add a social network button on a site. Authentiq Connect works with OAuth 2.0, OpenID Connect. All you have to do is add a social network button on a site. You can have the passwordless experience that you want without locking yourself in. Authentiq ID allows you to use your smartphone to authenticate online, share your identity details securely, and sign out again remotely. It also replaces Google Authenticator with more secure TOTP authentication. This makes it a one-stop-app that is suitable for everyone. -
29
V-Key Smart Authenticator
V-KEY
FreeRegister for the V Key Smart Authenticator today to receive a free one-month trial. Trust is the foundation of trust in businesses and relationships. Are your employees working remotely from home? Are there many users who need access to your app or system? Multi-factor authentication (MFA) is becoming more popular in organizations. A simple password is not enough. SMS OTPs are insecure and vulnerable to phishing attacks and interception. Hardware tokens can be difficult to deploy, lose or stolen, and they need to be replaced regularly. The V-Key authenticator is a strong, flexible, and less expensive multi-factor authentication device that can be used by small and medium-sized companies. The V-Key Smart Authenticator is compatible with many enterprise apps, systems, and VPNs. In 3 simple steps, enterprise-grade multifactor authentication. -
30
Bravura OneAuth
Bravura Security
Protect your organization immediately from brute force and phishing attacks. Get rid of passwords with Bravura OneAuth powered HYPR. Your workforce will enjoy a passwordless sign in experience that is fast, simple, and significantly increases security across your security infrastructure. Bravura OneAuth uses one touch biometrics to act as access points, making authentication for your workforce as simple as unlocking a mobile phone and significantly more secure that traditional Multi-Factor Authentication. It replaces the inefficient and slow-to-implement MFA methods. Passwords are removed completely from the solution to reduce the chance of compromised credentials. -
31
Yubico YubiKey
Yubico
YubiKey protects your digital world. Stop account takeovers, make your multifactor authentication passwordless, and modernize it. The world's best security key provides superior security, user experience, and a return on investment. The YubiKey is available in a variety shapes and features to suit your needs, both for personal and professional use. To find the right key, take our Product Finder Quiz. The YubiKey can be used with hundreds of software and services. We are here to help you get started, whether it's for personal or professional use. The industry's most trusted security key. It allows strong multi-factor, two-factor, and passwordless authentication. The multi-protocol YubiKey protects your access to computers, networks, online services, and other digital devices with a simple touch. No more reaching for your smartphone or retyping passcodes. Simply plug in your YubiKey and tap. It will do the rest. -
32
BankVault MasterKey
BankVault
A new, intelligent approach to Passwordless Authentication that is invisible and frictionless for the user. The seamless experience provides MFA in 1 step (not 2 steps) and can be fully implemented in 3-5 minutes by integrating an open source API or partner networks. There is no security or technology risk. The system is based upon a new Decentralized Web Protocol, which requires no software or setup for the user, no change management and no changes to the backend system. It supports up 5FA and is FIDO2 compatible. MasterKey meets all the latest standards for Zero-Trust Networks and Zero-Trust Devices. Passkeys (FIDO2/WebAuthn), a system that does not require any system development, can be deployed by organizations. MasterKey supports a vast scale. -
33
OpenLogin
Torus Labs
$0.058 per userCombining the simplicity and security of passwordless authentication with private key management. OpenLogin accounts act as a proxy for traditional SSOs. Accounts can be secured across devices and authentication methods. There is no central server or data honey pot. You can plug and play the logins you choose for your application. You can customize your UI screens to fit seamlessly in your application screens. If a user is chosen, they can use touchID or face to access your app. Biometrics never leave a user's device after registration. OpenLogin accounts work in the same way as a cryptographic key pair. They are initialized with at least two factors. These are, by default, a user's login and their first device. Keys and accounts are not saved on any central server, including OpenLogin's. -
34
Veridium
Veridium
Veridium is an AI-based Behavioral biometrics-powered Integrated Identity Platform that provides multi-factor authentication (MFA), digital ID verification and a truly enterprise-grade passwordless experience to employees and customers. It is low code, flexible, and agile. Customers can forget their passwords. This eliminates friction and provides greater security for online connections. We offer a single-step multi-factor authentication solution that offers increased security. Organizations also get higher levels of identity assertion. Veridium provides an end-to-end authentication platform that can handle all your WFH requirements and any VPN solution. It delivers strong, multi-factor, passwordless workforce authentication. -
35
Entrust Identity Enterprise
Entrust
Strong digital security is possible with the world's most trusted on-prem identity and access management (IAM). Identity Enterprise is an integrated IAM platform which supports a wide range of consumer, worker, and citizen use cases. Identity Enterprise is ideal for high-assurance applications that require zero trust for thousands or millions users. It can be deployed on-premises as well as virtual appliances. Never trust, always verify. Your organization and user communities are protected both within and outside the perimeter. High assurance use case coverage includes credential-based access, smart cards issuance and best-in class MFA. This will protect your workforce, consumers, and citizens. User friction can be reduced with adaptive risk-based authentication and passwordless login. You can use digital certificates (PKI), which provide a higher level security, whether you have a physical smartcard or a virtual one. -
36
Hideez
Hideez
$3Hideez Authentication Service is a top-of-the-line security solution suitable for businesses of all sizes. This comprehensive service provides a range of features that enhance security and streamline access control, including password management, multi-factor authentication, passwordless SSO, and various other security tools. With Hideez Service, businesses can easily manage all of their passwords, securely store them in an encrypted hardware token (Hideez Keys), or try passwordless authentication and contactless desktop logins with the mobile app (Hideez Authenticator). Hideez Server manages authentication tokens, centralizes endpoints associated with them, and stores digital identity information, such as roles, permissions, and other settings. The Hideez Authentication Service is an ideal solution for companies looking to enhance their security posture and streamline authentication processes in multi-user environments. With its range of features and customizable solutions, it's perfect for businesses of all sizes. Consider adding Hideez Authentication Service to your business software and services comparison directory to help your customers find the best security solution for their needs. -
37
MojoAuth
MojoAuth
57% of internet users want a passwordless method to protect their identities in the future. All layers are secure, from storage to network. Services are 100% reliable and resilient. Data driven experiences reduce friction for customers' login. Passwordless is available for web, mobile, TV and wearable devices. Any organization can create a passwordless authentication system that allows them to use our APIs to provide seamless auth experiences for their customers and reduce security risks. -
38
Secfense
Secfense
Secure your company, employees, and customers with stronger authentication. 2FA can be deployed in minutes and not weeks. 2FA (and other user access policies) are built into the infrastructure and not fixed to applications. Allowing the use of all 2FA methods on the market, now and in the future, without changing the core. Protection is available to all employees, including those who work in the public, private, and on-premise sectors. Secfense is installed between your users and the applications they access. It tracks traffic patterns that are related to authentication. It can then enforce multifactor authentication logon and other sensitive actions, without interfering in applications existing code or databases. The platform always has the most current 2FA methods. Secfense and applied methods are not affected by application changes. You can control session expiration rules across all applications. Do not rely on VPNs. Instead, trust users and their devices. -
39
WinMagic MagicEndpoint
WinMagic Corp.
MagicEndpoint offers the most secure user authentication with the best possible user experience. Once the user has unlocked the endpoint, the endpoint gives access to everything else — no user action required. Based on cutting-edge FIDO2 security, MagicEndpoint actively verifies a “user + device” entity. The endpoint provides the IdP server real-time intelligence to monitor the user, device and even the user’s intent. This continuous verification supports zero-trust architecture without burdening the user. Free your users from all remote authentication steps today and step up your security with MagicEndpoint passwordless authentication. -
40
IBM Verify
IBM
Cloud IAM can be combined with deep context for risk-based authorization to provide secure, frictionless access for your workforce and consumers. Identity and access management cannot be separated as organizations modernize hybrid multicloud environments with a zero trust strategy. Cloud IAM strategies must use deep context to automate risk protection, and authenticate every user to any resource. Your business needs should be considered when designing your journey. As you design and tailor the cloud IAM architecture that will either replace or enhance your existing infrastructure, you can protect your investments and preserve on-premises applications. Your users expect one-click access from any device, to any application. New federated applications can be integrated to one sign-on (SSO), embed modern multifactor authentication (MFA), simplify logistics, and provide developers with consumable APIs. -
41
Procyon
Procyon
Secure, frictionless access to cloud infrastructure. Access to major cloud platforms and thousands more cloud resources is possible with password-free access. We integrate seamlessly with AWS and GCP, Azure, as well as other cloud-native tools. Just-in-time access for developers will end overprivileged access. DevOps users have the ability to request access to cloud resources with "just enough privileges" to gain time-bound access. Eliminate productivity bottlenecks caused by a central administrator. You can create approval policies that are based on many factors. View a list of unaccessed and granted resources. Stop worrying about credential theft and credential sprawl. Developers can gain passwordless access to cloud resources with Trusted Platform ModuleTM (TPM) technology. Use our free assessment tool to discover potential vulnerabilities and learn how Procyon can solve the problem within hours. Use TPM to identify users and devices. -
42
LoginTC
Cyphercor
$3/month/ user Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more. LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more. LoginTC can help you reduce your insurance costs and meet compliance regulations with ease. -
43
LiveEnsure
LiveEnsure
LiveEnsure®, security authenticates users via their smart devices in real-time. It is more than tokens, certs and PINs. LiveEnsure®, a seamless multi-factor verification system that verifies devices, location, knowledge and behavior in context, with an elegant user interface and individual privacy, is strong and seamless. LiveEnsure®, a trust API, is a simple trust tool that allows you to verify multiple factors using one call. Developers can provide strong, private authentication to their users by simply integrating our mobile libraries for iOS or Android into their website. You can get rid of traditional passwords, 2FA, and captcha with one API. There are no confusing tokens and certs. It takes only a simple call to our cloud authentication service. -
44
Cipherise for developers. All you need to create powerful and user-friendly authentication. Your users will have the best experience possible. Multi-Factor Authentication. MFA is simple and highly secure, which is almost invisible to end users. No complex passwords. No more complicated passwords, usernames, or credential sharing Omni Channel. The user experience is consistent regardless of whether it's on a mobile, tablet, laptop, or PC. Hackers are no longer able to access centralized credential Honeypots. Bi-Directional authentication. Before the user authenticates to it, the service authenticates to them. Mobile Native. Mobile Native. Protect your valuable IP and Content. We make it easy for your customers to sign up and access your content from any device.
-
45
IPification
IPification
IPification is designed to provide instant user access and bank-grade security. It also offers authentication possibilities beyond traditional SMS, Header Enrichment, and USSD. IPification's seamless and secure mobile identity verification allows consumers to enjoy the best of your product without threatening their online security. The Zero-Click login and registration processes will simplify onboarding and usage. Based on only mobile network data, trusted protocols for user's identification confirmation IPification prevents data leaks by not taking sensitive app/device information. With bank-grade security and the best UX, you can login and register with zero clicks. Streamline onboarding, payment, and app usage with an intuitive authentication process that doesn't require any user action. No matter what device, browser, or browsing mode you use, registration and log in can be done seamlessly. -
46
PureAUTH eliminates passwords and other risks from your enterprise. PureAUTH has unmatched benefits over other enterprise multi-factor authentication solutions. It is easy to set up, integrate and use. Secure and resilient technology. Reduce cost & overheads of compliance/governance. Enterprises are becoming more aware about the risk and inconvenience associated with passwords, as there is a new breach almost every day. Many companies are looking into going passwordless. PureAUTH provides a uniform and frictionless authentication experience across all enterprise resources. Corporate networks, AWS, Azure, Google Cloud platform. Enterprise applications, with or without SSO on premise or in the cloud. Web Applications, Executive dashboards and IoT. Every enterprise is unique, and so are their authentication requirements. PureAUTH integrates seamlessly with enterprise resources in multiple clouds, both on-premise and in a hybrid environment.
-
47
LastPass
LastPass
$4 per user per month 32 RatingsLastPass is the leader in password and identity management solutions, trusted by individuals and organizations of all sizes worldwide. Millions rely on LastPass daily to create, store, manage, and protect their most important credentials, keeping them secure, private and always within reach. With LastPass, anyone can effortlessly log in to life or work anytime, anywhere. -
48
iCrypto
iCrypto
FreeThe iCrypto SDK is designed to work with all of our iCrypto cloud services. It can be integrated into existing Enterprise Apps, or deployed as iCrypto App and used as a standalone password-less verification solution. The iCrypto SDK combines the most recent cryptography technologies with device-level security management to create a software token that can be used in a variety of industries as a biometric ID while on the move. iCrypto SDK offers authenticator PKI signatures and a range cryptographic protocols like TOTP/HOTP/OCRA/MTP. It also provides push-based authentication, network-based biometrics such iris scan, fingerprint, face/voice recognition, third-party authorizations, secure storage, context collection, and a host of security features. -
49
Say-Tec
Finnovant
FreeSay-Tec is our most popular cybersecurity product. Say-Tec combines state-of-the-art biometrics with blockchain technology to protect your data. Say-Tec eliminates the need to use multiple passwords. Instead of using your unique face or voice biometrics, Say-Tec uses your unique face and voice biometrics in order to unlock a device, log into an account, and access private data. Standard web interfaces can invoke Say-Tec during account setup, log-in, or to reset passwords if they have been forgotten. Say-Tec can replace the user-id or password friction when logging in to a website. Say-Tec was designed to support the world decentralized apps, web pages and processing. This is often encountered with Blockchain access, crypto currency and crypto wallets and trades. -
50
Hive.id
Hive.id
You can separate fake signups and real users. This will help you protect your good users against account takeover. While free trials are great, don't let bad actors waste time or money. Align your risk with your business objectives to prevent fraudsters and bots signing up and causing damage to your brand and bottom line. Detect suspicious user access in real time without any manual overhead. Automate alerts, step up authentication, and account recovery processes, depending on the level of risk. Detect email addresses that appear undeliverable or fake. You can now identify low quality signups by adding different signals. Your user experience is still excellent, but it now aligns with your business objectives. All companies face the dilemma of whether to buy or build a security solution. Hive is a cost-effective option that can be brought to market in a shorter time.