Best RSA ID Plus Alternatives in 2025
Find the top alternatives to RSA ID Plus currently available. Compare ratings, reviews, pricing, and features of RSA ID Plus alternatives in 2025. Slashdot lists the best RSA ID Plus alternatives on the market that offer competing products that are similar to RSA ID Plus. Sort through RSA ID Plus alternatives below to make the best choice for your needs
-
1
Cisco Duo
Cisco
1,290 RatingsSecure your workforce with powerful, simple access security. We are Cisco Duo. Our modern access security system is designed to protect all users, devices, applications, so you can focus on what you do best. Secure access for all users and devices, in any environment, from any location. You will enjoy the peace of mind that only total device visibility and trust can provide. A SaaS solution that natively protects all applications and is easy to deploy, scaleable and quick to respond to threats. Duo's access security protects all applications from compromised credentials and devices. It also provides comprehensive coverage that helps you meet compliance requirements. Duo integrates natively with applications to provide flexible, user friendly security that is easy to implement and manage. It's a win-win-win for administrators, users, and IT staff. Multi-factor authentication, dynamic device trust and adaptive authentication are key components of your zero-trust journey. Secure SSO is also a part of the mix. -
2
Auth0
Okta
817 RatingsAuth0 takes a modern approach to Identity and enables organizations to provide secure access to any application, for any user. Auth0 is highly customizable, and simple yet flexible. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. With Auth0, you can rapidly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. -
3
Uniqkey
Uniqkey
175 RatingsUniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies with enhanced control over their cloud infrastructure, access security, and employee management. Uniqkey combats the most significant threats to company infrastructure by safeguarding critical systems and company credentials with state-of-the-art encryption. It also offers unique insights and a comprehensive view of IT infrastructure, employee access, and security scores, making it a valuable tool for IT teams to monitor security policies and assess the impact of awareness campaigns with confidence. With powerful integrations and synergies with existing infrastructure such as Microsoft, IT managers can quickly provision or de-provision users for seamless onboarding and offboarding, all while protecting their entire IT infrastructure with advanced encryption. Engineered by leading European security experts, we leverage the latest encryption methodologies and technology, including offline encryption of all our data. Our modern tech stack and servers, hosted locally in Denmark, ensure maximum security, data integrity, and compliance with European regulations, providing our customers with peace of mind. -
4
miniOrange
miniOrange
122 RatingsminiOrange offers a range of IAM products and solutions to secure both Identity anywhere and everywhere! Here are some of the major solutions from miniOrange: Single Sign-On (SSO): Enable SSO for web, mobile, and legacy apps with this robust solution which supports all IDPs and Authentication protocols. Multi-Factor Authentication (MFA): The only MFA solution in the market offering 15+ MFA methods including Push Notification, OTP verification, Hardware Token, Authenticator Apps, and many more. Customer Identity & Access Management (CIAM): Secure your customer identity and provide a seamless customer experience. CIAM enables you to safeguard customer privacy while providing them convenient access to your digital resources. User Provisioning: Sync all users automatically from your local directory to miniOrange. Effectively manage User Lifecycle for employees & customers. Adaptive Authentication: Tackle high-risk scenarios with ease with a solution that analyzes risk based on contextual factors and applies appropriate security measures. Universal Directory: A secure directory service that safeguards your sensitive information. It also allows you to integrate your existing directory into miniOrange. -
5
FusionAuth
FusionAuth
$0 22 RatingsFusionAuth was built from the ground up to integrate with any app or language. Each feature (yes, every one) is exposed via an API which gives you total flexibility to handle any use cases. Every feature and acronym you need is included: registration & log-in, passwordless, MFA, SAML and OIDC. In seconds, you can comply with GDPR, HIPAA and COPPA requirements. FusionAuth can be installed on any platform, on any computer, and anywhere. FusionAuth Cloud, our fully managed SaaS hosting solution, allows you to host it yourself. -
6
The OptimalCloud
Optimal IdM
$2/user/ month The OptimalCloud from Optimal IdM provides a scalable and affordable Identity and Access Management Solution that meets the security and usability requirements of small, medium-sized and large enterprises. The OptimalCloud platform is available for both consumer and workforce deployments. Each pricing tier includes multi-factor authentication (MFA), because good security shouldn't be more expensive. The OptimalCloud integrates with over 11 thousand applications, making it easier to set up and configure. It also offers 24 x 7 x 365 support with a 99.99% uptime guarantee. -
7
Symantec VIP
Broadcom
Your key to two-step, one-swipe authentication. Two-factor authentication is simple to enable and prevents attacks. Your information is protected with a simple swipe of your finger or the use of a security password. Secure authentication is compatible with VIP on your favorite websites. To get started, scan a QR code. Security codes for that website will be generated every thirty seconds. Symantec VIP allows both end users and enterprises to securely authenticate where and how they access the services. Multi-factor authentication is easy with hundreds of integrations and websites that you can set up. -
8
Ping Identity
Ping Identity
$5 per user per monthPing Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow. -
9
Entrust Identity Enterprise
Entrust
Strong digital security is possible with the world's most trusted on-prem identity and access management (IAM). Identity Enterprise is an integrated IAM platform which supports a wide range of consumer, worker, and citizen use cases. Identity Enterprise is ideal for high-assurance applications that require zero trust for thousands or millions users. It can be deployed on-premises as well as virtual appliances. Never trust, always verify. Your organization and user communities are protected both within and outside the perimeter. High assurance use case coverage includes credential-based access, smart cards issuance and best-in class MFA. This will protect your workforce, consumers, and citizens. User friction can be reduced with adaptive risk-based authentication and passwordless login. You can use digital certificates (PKI), which provide a higher level security, whether you have a physical smartcard or a virtual one. -
10
Ondato offers identity verification, business onboarding, customer data platform, due diligence, and authentication solutions tailored to fit in your everyday workflow. Our tools fit the entire customer lifecycle management, starting from onboarding and ending with continuous user monitoring. It's a one-stop solution whether you're worried about compliance or are looking for a more user-friendly data management platform.
-
11
IBM Verify
IBM
Cloud IAM can be combined with deep context for risk-based authorization to provide secure, frictionless access for your workforce and consumers. Identity and access management cannot be separated as organizations modernize hybrid multicloud environments with a zero trust strategy. Cloud IAM strategies must use deep context to automate risk protection, and authenticate every user to any resource. Your business needs should be considered when designing your journey. As you design and tailor the cloud IAM architecture that will either replace or enhance your existing infrastructure, you can protect your investments and preserve on-premises applications. Your users expect one-click access from any device, to any application. New federated applications can be integrated to one sign-on (SSO), embed modern multifactor authentication (MFA), simplify logistics, and provide developers with consumable APIs. -
12
Entrust Identity as a Service
Entrust
Cloud-based identity management (IAM), which includes multi-factor authentication (MFA), credential based passwordless access and single sign-on (SSO). Cloud-based multi-factor authentication provides secure access to all your users' apps, networks, devices, and accounts. Optimal user experience is achieved through adaptive authentication, proximity-based login, and adaptive authentication. Happy users won't try to bypass security measures. Everyone wins. This is easier than any other thing you have tried. The work-saving features, such as built-in provisioning tools, on-premises integrations, and cloud integrations, reduce the IT workload from deployment to everyday management. To move forward faster, you need strong IAM. Cloud-based Identity as a Service scales rapidly to accommodate new users, expanding use case, and evolving security threats. -
13
Accops HyID
Accops Systems
Accops HyID, a futuristic access and identity management solution, protects business applications and data against misuse by internal and external users. It manages user identities and monitors user access. HyID gives enterprises strong control over endpoints. It allows for contextual access, device entry control, and flexible policy framework. The MFA works with all modern and legacy apps as well as cloud and on-prem apps. It provides strong authentication using OTP sent via SMS, email, and app, biometrics, device hardware ID and PKI. Single sign-on (SSO), provides greater security and convenience. Organizations can monitor the security status of endpoints, including BYOD, and grant or deny access based upon real-time risk assessment. -
14
AuthControl Sentry
Swivel Secure
AuthControl Sentry®, which has been deployed in more than 54 countries and is used by enterprises across finance, government, education, manufacturing, and healthcare, provides true multi-factor authentication (MFA) for organisations. It provides an intelligent solution to prevent unauthorised data and applications access. AuthControl Sentry®, which supports a variety of architectural requirements, has the flexibility to be used in a variety of ways and can ensure maximum adoption due to its many authentication factors. Patented PINsafe®, technology for maximum security. Supports both cloud and on-premise for a flexible architecture. Optimized customization is possible with a single tenancy and a single-tiered cloud service. Single sign-on and risk-based authentication are standard. Integrates seamlessly with hundreds if not thousands of applications. With a wide range of authenticators, you can ensure maximum adoption. -
15
PortalGuard
BIO-key International
BIO-key PortalGuard IDaaS, a cloud-based IAM platform, offers the most flexible options for multi-factor authentication and biometrics. It also allows customers to reset their passwords and provides a user-friendly interface. All this at a reasonable price. PortalGuard has been trusted by many industries, including education, finance, healthcare, and government, for over 20 years. It can be used to secure access for employees and customers, regardless of whether they are on-premises or remote. PortalGuard's MFA is unique because it offers Identity-Bound Biometrics with the highest levels of integrity and security. They are also more accessible than traditional authentication methods. -
16
HYPR
HYPR | The Passwordless Company
$4.00 per user/month HYPR is The True Passwordless Company with cutting edge technology and backed up by major investment partners. The HYPR Cloud Platform allows Passwordless Authentication across an enterprise workforce. It combines the security and convenience of a smartcard with the convenience of a smartphone. With HYPR, businesses can eliminate customer passwords and provide a superior login experiences for your customers as well. Consumer-grade usability increases the productivity of your employees and reduces friction for your customers. -
17
Secfense
Secfense
Secure your company, employees, and customers with stronger authentication. 2FA can be deployed in minutes and not weeks. 2FA (and other user access policies) are built into the infrastructure and not fixed to applications. Allowing the use of all 2FA methods on the market, now and in the future, without changing the core. Protection is available to all employees, including those who work in the public, private, and on-premise sectors. Secfense is installed between your users and the applications they access. It tracks traffic patterns that are related to authentication. It can then enforce multifactor authentication logon and other sensitive actions, without interfering in applications existing code or databases. The platform always has the most current 2FA methods. Secfense and applied methods are not affected by application changes. You can control session expiration rules across all applications. Do not rely on VPNs. Instead, trust users and their devices. -
18
Censornet MFA
Censornet
An adaptive, cloud-based multifactor authentication solution that is flexible and cloud-based can secure access to many systems, services, and applications. Protect user accounts with more that a password. Reduce the risk of password reuse in the event of a large-scale data breach. Cloud-based backend is 100% secure and easy to use for all organizations. Intelligent multi-factor authentication provides a frictionless user experience and intelligently challenges users when there is high risk. Support is available for all major VPN vendors and cloud services. Passwords alone are not sufficient. Multi-Factor authentication adds an extra layer of security to user accounts and privileged accounts. It eliminates account compromises and identity-related threats. Some OTPs sent using legacy solutions are vulnerable to interception and susceptible to phishing or MITM attacks. -
19
Appsian
Appsian
Appsian enables large organizations to maximize their ERP investments by natively integrating security solutions that are required to protect against today's threats. Appsian enables organizations to increase their ERP control and visibility by leveraging solutions such as Single Sign-On, Multi Factor Authentication, Location Based Security, Data Masking and Transaction Logging. -
20
LiveEnsure
LiveEnsure
LiveEnsure®, security authenticates users via their smart devices in real-time. It is more than tokens, certs and PINs. LiveEnsure®, a seamless multi-factor verification system that verifies devices, location, knowledge and behavior in context, with an elegant user interface and individual privacy, is strong and seamless. LiveEnsure®, a trust API, is a simple trust tool that allows you to verify multiple factors using one call. Developers can provide strong, private authentication to their users by simply integrating our mobile libraries for iOS or Android into their website. You can get rid of traditional passwords, 2FA, and captcha with one API. There are no confusing tokens and certs. It takes only a simple call to our cloud authentication service. -
21
UserLock
IS Decisions
$2.00/month/ user UserLock | Two Factor Authentication & Access Management for Windows Active Directory -
22
RSA SecurID
RSA Security
2 RatingsRSA SecurID allows organizations of all sizes to reduce identity risk and ensure compliance without compromising user productivity. It provides users with easy access to their information and confirms that they are who they claim to be. RSA SecurID also provides unified visibility across all organizations' islands of identity and control. RSA SecurID combines multi-factor authentication with identity governance to address security concerns associated with providing easy access to dynamic user populations in complex environments. It assesses risk and business context to provide access and identity assurance. Digital transformation presents new challenges in authentication, access management, and identity governance for organizations. As a result, more users require access to more systems via more devices than ever before. RSA SecurID is a tool that helps organizations address these issues and protect their identity. -
23
One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
-
24
You can use the NetIQ Risk Service engine to access both static and behavioral risk metrics to adjust your users' authentication experience. This allows you to make access as easy as possible for your users, while protecting your personal information. The NetIQ Advanced Authentication framework allows you to choose from a variety of authentication types beyond the standard Azure AD multi-factor authentication options. It allows you to protect access to all your cloud and on-premise services, regardless of whether they are located in your Azure environment. It is essential to ensure authentication across all users. Organizations often have multiple policies and authentication infrastructures. NetIQ Advanced Authentication provides a single framework that can handle all your authentication requirements. It offers consistent security and simplified administration.
-
25
Centagate Cloud
Centagate Cloud
$2 per monthCENTAGATE CLOUD provides a central login option that protects all applications against security breaches using FIDO2 passwordless authentication. You can control, secure and protect your application access. All applications require one login credential. Strong digital security that eliminates fraud, phishing, and password theft. Because authentication is centralized, only one login credential will be required for all applications. Cost-effective, with minimal OPEX and zero CAPEX. CENTAGATE CLOUUD has many important features that make authentications more secure and protected. An authentication that requires two or three factors, such as what you have (device), who you are (biometrics), and what you know (password). An authentication that is based on previous logins' risk and behavior. These risk can be used to stop security breaches. Pre-integrated Securemetric FIDO2 server certified for authentication and registration. -
26
It'sMe
Acceptto
Employees hate passwords just as much as you hate managing password vulnerability. Increased security risk, fatigue, cost, and cost are all associated with more passwords and tokens. It is time to get rid them all. 89% of security professionals believe that a more advanced multifactor authentication tool that provides continuous, behavior-based authentication would improve their company’s security posture. Acceptto offers Intelligent MFA, which intuitively authorizes users to access applications and continues authenticating after authorization. Even if hackers have already obtained passwords, we prevent account takeovers. ItsMe™, Intelligent Multi Factor Authentication, (MFA) increases security by authorizing access attempts at a registered device in real time, whether it is through a push notification, verification code (SMS/TOTP, email, etc.). You can authenticate access even if you are offline using our timed-based one-time password (TOTP), security keys, or biometric options. -
27
Axiom Protect
Axiom Protect
Multifactor security can be embedded to empower multiple IT systems (on-premise, hybrid, or cloud) according to the user's preference. Policies and settings provide central control to meet your business requirements and ensure regulatory compliance. All it takes is a few clicks to change default to custom Inbuilt Complex Password Source to External LDAP/Active Directory synchronized operator and user sources for consolidation. Trust can be strengthened and made more flexible by connecting users' devices. A business need is to have multiple users on one device or multiple devices for one user. If you have a great platform, it's easy. Everything is DATA. Data at rest and at transit security at mobile web, iOT device Server, files / database. You can choose from a variety of security grades, including different key lengths and algorithms. No expensive VPN. SDK and APIs are available. Pure 100% AI/DL facial biometrics provide 99%+ accuracy for building your EKYC or remote authentication. -
28
SolidPass
SolidPass
SolidPass is a leader for next-generation strong authentication. It protects customers and enterprises from fraud, digital attacks and information theft with advanced security software. Solidpass converts desktop applications, mobile phones, and internet browsers into secure security tokens. SolidPass eliminates the need for hardware tokens and provides the highest level of security without the hassle and cost of traditional two-factor authentication tokens. SolidPass bridges the traditional trade-off between security and usability. It incorporates advances such as barcode scanning to make Challenge-Response and Transaction Data Signing (TDS), simple to use. Barcode scanning-based authentication is possible for both Challenge-Response and Transaction Data Signing. Barcode scanning is convenient and easy. -
29
LastPass
LastPass
$4 per user per month 32 RatingsLastPass is the leader in password and identity management solutions, trusted by individuals and organizations of all sizes worldwide. Millions rely on LastPass daily to create, store, manage, and protect their most important credentials, keeping them secure, private and always within reach. With LastPass, anyone can effortlessly log in to life or work anytime, anywhere. -
30
OneLogin, a trusted identity management (IAM), solution for modern enterprises, helps you secure company information and empower your employees. OneLogin is a great solution for companies that want to simplify business logins and strengthen enterprise security. OneLogin features include single sign-on (SS), user provisioning, unified directory, user provisioning and adaptive authentication. Compliance reporting is also available.
-
31
OpenOTP Security Suite
RCDevs
€1.85/User/ M OpenOTP Security Suite is an enterprise-class security solution for two-factor authentication with U2F/OTP, federation and identity management (IAM). The solution combines mobile technologies with proven security standards to provide the best alternative for business and non-business users who need cost-effective solutions that support their users' mobility. It enables integration of a variety of third-party products and systems with MFA, even if they only support LDAP as an authentication backend. Try OpenOTP Security Suite if you are interested in: USER MOBILITY | PRIVACY | VPN AND WIFI SECURITY | SSO AND ADFS | FINE-GRAINED AUTHENTICATION POLICIES | ALL-IN-ONE SECURITY SOLUTIONS | EUROPEAN DATA STORAGE OpenOTP Security Suite is an enterprise-class European security solution designed for installation on-premises or in a private cloud. ++ Free Token App (and compatible with most existing hardware and software tokens) ++ Free 30-day Trial ++ Freeware (<25 users) -
32
Deepnet DualShield
Deepnet Security
You are searching for an enterprise-grade 2-factor authentication (2FA), or multi-factor authentication(MFA) product that can protect all business applications and provide a wide range authentication methods, then you have come to the right place. Deepnet DualShield, a multi-factor authentication platform, unifies a variety authentication methods, protocols and solutions, as well as user experience, in one platform. DualShield offers self-service Password Recovery, Single Sign-On, Identity & Access Management, (IAM), and Adaptive Authentication. It is the most flexible and powerful multi-factor authentication system available. Deepnet DualShield is available on-premises or in a private cloud. This means that you have complete control over your user authentication system and can keep your users' credentials and identities safe. -
33
Pindrop
Pindrop
Fraud in contact centers is a multibillion-dollar problem. One out of every 770 fraudulent calls reach agents. It's a race between call center staff and fraudsters to outsmart each other. One out of every 390 accounts accessed by the IVR will be the victim to a fraud attack. Fraud losses directly impact a company's bottom lines, customer experience, brand perception, and overall bottom line. Pindrop®, a multifactor, real time, fraud prevention solution, analyzes calls into the call center for voice, device and behavior to identify up to 80% of telephone channel fraud, predict future fraudulent behavior 60 days in advance, provide a complete crosschannel view of fraud and reduce costs, review rates, and protect the company from attacks. To prevent data theft, account mining and omnichannel fraud, the IVR can determine call risk and account risks. Real-time alerts for agents about potential fraudulent callers allow you to see the call risk on every call. -
34
Trusona
Trusona
Trusona is the pioneer of passwordless authentication in digital businesses. It offers a phishing resistant alternative to SMS OTPs and passwords. Trusona Authentication cloud is a platform that allows you to add passkeys on your website in the easiest, fastest and least expensive manner. It increases business growth and profitability by providing sign-ins for your customers that are pleasing to them. It also mitigates top threats such as phishing and account takesovers (ATOs), while providing an UX designed specifically for people. Trusona is trusted by organizations in iGaming and travel, financial services, healthcare, and more for their passwordless authentication initiatives. -
35
DigitalPersona
HID Global
DigitalPersona®, software, allows you to go beyond multi-factor authentication. Expand to risk-based authentication, secure all applications, provide frictionless access, and deploy quickly. Industry-leading biometric solutions can improve security. Processes can be simplified, streamlined, and queues shortened to confirm identities for a variety of military, criminal justice, and citizen applications. Choose from a variety of U.are.U®, readers, modules, and sensors. The most advanced fingerprint technologies available to meet your OEM, retail, hospitality, and commercial identity management needs. -
36
Akku
CloudNow Technologies
$5.00/year/ user Simplified user lifecycle for corporate users. Akku is a flexible, robust identity and access management system that can help you manage each stage of your user lifecycle. Akku's versatile features help improve data security, standards compliance and efficiency, as well as productivity. Akku is a cloud SSO solution that integrates easily with any cloud or in-house applications. It also includes a range security and access control features that allow for seamless user provisioning, management, access control, and deprovisioning. Akku is an agentless IAM solution that does not require the installation of a user agent on your infrastructure. You can see exactly which parts of your sensitive user data Akku can access so you have transparency and control. -
37
Every organization should consider Secure Identity & Access Management due to the increasing number of remote workers, increased dependence on cloud applications, as well as explosive increases in cyber theft. IT teams can quickly, easily, and economically enable the right people to access the right resources using Passly™, a Kaseya company. Secure Password Management, Single Sign On, Multi-Factor authentication, and many more. It's crucial to choose the right secure identity and access management platform in a world where cyberattacks are more common than ever. Nearly 80% of all data breaches are due to weak passwords. Passly is the most cost-effective and comprehensive solution to ensure security, compliance, efficiency, and compliance. Techs can store and manage passwords for personal, business, or shared accounts using shared password vaults. It is centralized and easy-to-use
-
38
CoffeeBean Identity and Access Management
CoffeeBean Technology
CoffeeBean Identity and Access Management provides a complete solution in the areas IAM (Identity and Access Management), and CIAM ("Customer Identity and Access Management") respectively. This platform has several modules: Single Sign-On (SSO), Multiple-Factor Authentication (2FA or 2FA), Adaptive Authentication and Directory Services. It also offers Lifecycle Management. -
39
Akamai MFA
Akamai
FreeMobile push makes phish-proof authentication as simple as a mobile push. Protect employee accounts from being taken over and data breaches by using phish-proof multifactor authentication. Multi-factor authentication is the most secure standard for MFA bypass attacks. End-to-end cryptography makes MFA impossible to crack. No cumbersome physical security keys. Easy smartphone app experience and self-service enrollment make adoption simple. FIDO2 provides the strongest authentication. Security is more important than hardware. Administrators will be less stressed. FIDO2 MFA security for any smartphone defeats phishing via frictionless push notifications. Choose your authentication options, including secure push and standard push, TOTP, SMS, and TOTP. Integrates with leading IdP and identity products for seamless MFA services. Automates user provisioning workflows, ensuring that any changes to IdP are immediately reflected. Administration teams are kept informed by rich reporting features about authentication events. -
40
Entrust Identity Essentials
Entrust
Multi-factor authentication (MFA), which is fast and cost-effective, allows Windows-based companies to achieve Zero Trust. Start with an easy to use, easy-to deploy on-premises MFA system. Then, if necessary, migrate to Identity as a service in the cloud. The seamless integration between the two provides a frictionless experience and three additional authentication options: mobile push, device fingerprint, grid cards. One license, one solution to secure and empower your digital business. Adaptive authentication and self-service password changes reduce friction for users. Different authentication methods can be provided for different users and different requirements. There are many options for authenticators, including SMS, voice, email, and OTP. Option to use smart phone biometrics such as fingerprint and facial match. ActiveSync for Outlook prevents unauthorized devices from accessing users’ email without the need for MDM integration. -
41
OneSpan Authentication Servers
OneSpan
Multi factor authentication and transaction signing capabilities can be deployed at large scale to secure access and transactions. Use API technologies and proven authentication servers to protect access and transactions, and simplify identity management. Secure access to corporate resources as well as banking applications by using strong authentication Secure transaction signing is possible with the user-friendly Cronto®. technology. A single integrated system simplifies authentication management. Support new standards in network access and application security for all major operating systems and platforms. Server downtime and service disruptions can be eliminated to ensure business continuity. No matter what operating system or architecture, server solutions can be deployed. OneSpan server solutions validate authentication requests to provide secure and seamless access for a variety corporate resources and applications. -
42
IDmission
IDmission
It is not enough to just verify identity solutions. Businesses must integrate identity solutions into their business processes in today's digital world. IDmission offers effortless end-to-end customer journeys using passive liveness biometrics, Identity-as-a-Service, and multi-factor authentication, coupled with our industry expertise. IDmission offers solutions to orchestrate digital transformations in companies that rely on ID verifications and identity. Our industry knowledge and standards-compliant security are used to create seamless customer journeys. IDmission offers solutions for complex applications that require identity and document authentication. IDmission offers more than just the best AI and biometric technologies in the industry. We take our technology and help customers organize their digital transformation. -
43
Plurilock DEFEND
Plurilock Security
$9 per user per monthPlurilock DEFEND provides full-time, continuous authentication throughout active computing sessions using behavioral biometrics and your existing employee keyboard and pointer devices. DEFEND relies on an invisible endpoint agent and machine learning techniques to confirm or reject user's identity biometrically based on console input as they work, without visible authentication steps. When integrated with SIEM/SOAR, DEFEND can help to triage and respond to SOC alerts with high-confidence identity threat intelligence. By integrating with login and application workflows, DEFEND provides a just-in-time identity certainty signal behind the scenes, making truly invisible login workflows possible when identity is already confirmed. DEFEND supports Windows, Mac OS, IGEL, Amazon Workspaces VDI clients. -
44
Unbound CORE Identity Security
Unbound Security
Authenticate users and protect PKI seamlessly across all devices and locations. With maximum security and minimal impact on the user experience, create virtual enclaves that work both on mobile and desktop. CORE virtual secure encryption SDK allows you to authenticate user access and quickly identify users. CORE protects credentials on any device, mobile, desktop, or server-side. Pure software agility allows you to create virtual smartcards and protect mobile apps. No hardware, no one time password, and no software token are required to integrate strong multi-factor and two-factor authentication into a mobile application. To authenticate employees, replace traditional smartcards by virtual ones. This will reduce operational strain and the total cost of ownership. Protect both machine and human electronic identities, and the root certificate authority that oversees them. Protecting PII with maximum security and best user experience -
45
FortiToken
Fortinet
ForiTokens provide flexible and strong multi-factor authentication. FortiToken can help prevent breaches due to compromised passwords and user accounts by increasing the certainty that users are who they claim to be. FortiToken is integrated with FortiAuthenticator and FortiGate Next-Generation Firewalls to achieve multi-factor verification (MFA). It is also part of Fortinet Identity and Access Management Solution (IAM). FortiToken enables organizations to deploy different token methods, including SMS tokens, adaptive authentication, and one-time passwords. FortiToken allows you to provide passwordless authentication based on FIDO or FIDO2 specifications for even greater security. -
46
Veridium
Veridium
Veridium is an AI-based Behavioral biometrics-powered Integrated Identity Platform that provides multi-factor authentication (MFA), digital ID verification and a truly enterprise-grade passwordless experience to employees and customers. It is low code, flexible, and agile. Customers can forget their passwords. This eliminates friction and provides greater security for online connections. We offer a single-step multi-factor authentication solution that offers increased security. Organizations also get higher levels of identity assertion. Veridium provides an end-to-end authentication platform that can handle all your WFH requirements and any VPN solution. It delivers strong, multi-factor, passwordless workforce authentication. -
47
EnSecure
Enqura
Strong multi-factor customer authentication designed for secure first time log-in, transaction signing, document verification protection. -Performance and reliability across all usage levels saving costs -Agile integration with Soft OTP and Electronic Certificate, rapid adjustments to meet evolving needs -Minimal maintenance with automated updates, continuous operation and reduced operational overhead -Optimized for high performance, fast, secure log-ins & transaction processing -Top-tier security with asymmetric signing technology, multi-factor authentication, safeguarding against fraud Unlimited usage under single license, no additional server costs -Seamless user-friendly experience, easy integration into mobile apps, intuitive authentication processes -
48
TWOSENSE.AI
TWOSENSE.AI
Our dynamic dashboard allows you to quickly identify unauthorized users and gain a better understanding about your organization's greatest risks. Integrate with your SIEM for all alerts. TWOSENSE invisible authentication authenticates users during a session and automatically responds 95% of MFA questions for your users, reducing MFA friction. Find out how security fatigue is affecting your organization. Our software is SAML, RADIUS, and SSO-enabled. This means you can use your existing login processes and deploy the software within minutes. Validating customers or employees using behavior is more secure than usernames/passwords. The Defense Department has been working for years to find ways to make employees and customers more secure. This includes enhancing and possibly replacing its 2000-dated identification cards. -
49
WSO2 Identity Server
WSO2
WSO2 Identity Server API-driven is built on open standards and offers the option of cloud, hybrid, or on-premise deployments. It is highly extensible and can support complex IAM requirements. WSO2 Identity Server allows you to do single sign-on as well as identity federation. It is backed up by strong and adaptive authentication. Securely expose APIs and manage identities by connecting with heterogeneous user accounts. Open-source IAM can be used to innovate quickly and to build secure Customer IAM solutions (CIAM) to deliver a user-friendly experience. -
50
SecureAuth
SecureAuth
$1 per monthSecureAuth makes it easy and seamless to create digital experiences that support Zero Trust initiatives. SecureAuth provides a frictionless user experience that protects employees, contractors, and partners. This helps to reduce business risk and increase productivity. Secure, secure, and unified customer experiences will enable you to support your digital business initiatives. SecureAuth uses adaptive risk analytics to analyze hundreds of variables such as human patterns, device fingerprinting and geolocation to create each user’s digital DNA. This allows for continuous authentication in real-time, ensuring the highest level security possible throughout the digital journey.