What Integrates with Sovrin?
Find out what Sovrin integrations exist in 2025. Learn what software and services currently integrate with Sovrin, and sort them by reviews, cost, features, and more. Below is a list of products that Sovrin currently integrates with:
-
1
Keyless Authenticator
Keyless Technologies
2 RatingsNothing to forget. Nothing to steal. You are the key. To protect your remote workforce, adopt zero-trust authentication. This will allow you to enable strong customer authentication with just one glance. Anywhere. Anytime. Any device. To eliminate fraud, phishing, and credential reuse, embrace passwordless, multifactor authentication. This will enhance customer and employee experience and protect their privacy. Unique technology enables you to achieve unique capabilities. Hardware Agnostic. Keyless does not rely on any device hardware or sensors. Keyless can be deployed on many devices and appliances. Eliminating passwords can help you achieve better results for your company. Top-Notch Security No central honeypot, no data on user devices. Data cannot be stolen or lost, as no private information is available to anyone except the user. Passwordless passwords can reduce password-related costs. Password Reset Costs. The average helpdesk labor price is $70 -
2
Evernym Verity
Evernym
$1,000 per monthThe first enterprise-grade verifiable credential platform was created to be easy to use and interoperable. Our decentralized protocol platform to issue and verify digital credentials. Our mobile wallet app for sharing and holding digital credentials. SSI wallet functionality embedded for existing apps. Digitally issue digital verifiable credentials directly into SSI-based wallets. It is easy to verify credentials stored in SSI wallets. Integrate with back-end systems easily using REST APIs or SDKs in three languages. With enterprise-grade architecture, you can build for scale and support millions of users. Your credential architecture can be future-proofed by being compliant with new open standards such as Hyperledger Aries and W3C DIDs. Customers and end users can manage all their digital credentials from their phones. -
3
IdRamp
idRamp
Your digital identity strategy should be a business asset and not a liability. Stop wasting time, money and human resources replatforming insecure ID technology. Idramp's decentralized zero trust Identity simplifies authentication. Your identity management chaos can be sorted. You can speed up the delivery of services to meet your business's needs. Rapid modular deployment eliminates expensive platform upgrades Rapid integration seamlessly integrates with existing infrastructure to relieve the pain of bespoke integration. Modular architecture allows you to tailor your customer experience and eliminate vendor stack lock-in. Automated security policies and adaptive access control ensure zero trust identity. Extensible ecosystems can be managed with state-of-the-art data protection. Do not trust, but always confirm that your applications are secure. -
4
Covalent
Covalent
Our vision is to empower tomorrow's pioneers by providing the strongest and most robust data infrastructure possible for the entire blockchain ecosystem. Explore the richest and most comprehensive blockchain data available online. To create rich and compelling interfaces for users, you can combine historical balances, positions, and PnL from dozens of DeFi protocol. Analytic dashboards that show price trends, liquidity, and the ROI of assets can be created. To integrate blockchain data into your project, check out our quick start tutorials, guides, example code, or other resources. Covalent offers a single API that allows you to see and control assets across all blockchain networks. We have a single API that allows you to pull detailed, granular transaction data from multiple blockchains without writing any code. -
5
DigiCert CertCentral
DigiCert
CertCentral streamlines the entire lifecycle of certificates by consolidating tasks for issuing and installing, inspecting, inspecting, remediating and renewing them. All aspects of the cycle are accessible from one window. ACME + CertCentral allows you to automate deployment with virtually any client or server type. This means you can spend less time doing manual tasks, or worse, putting out flames. DigiCert uses ACME protocol to automate the deployment of OV certificates and EV certificates. These benefits are endless. Contact your sales rep to enable ACME in CertCentral. Previously, there were two major bottlenecks when it came to certificates: renewal and approval. These tasks can now be automated in just a few clicks. If this were a race you would be the winner. Get alerts about possible vulnerabilities and know when each certificate is about to expire. Because guessing is gambling. -
6
Risk Radar
MITRE
Risk Matrix, as well as additional information on RiskNav or Risk Radar, is available in the Systems Engineering Practice Office's Risk Management Toolkit. Risk Matrix is freely available, but only downloadable online documentation is available. Government programs sometimes implement a combined government/contractor risk management process that uses tools provided by the contractor. Numerous government contractors have developed risk management software in-house. Many applications can be used to support program risk management and are comparable to commercial tools and MITRE. Many smaller programs use Microsoft Excel and Access customized risk management tools. Some customized solutions meet the criteria for tool selection. This is important when looking at a customized solution that meets all the requirements of the program being supported. -
7
Fetch.ai
Fetch.ai
Fetch.ai builds tools and infrastructure that enable a decentralized digital economy. Fetch.ai is a Cambridge-based artificial Intelligence Lab that builds a decentralized machine-learning platform. It uses a distributed ledger to allow secure sharing, connection, and transactions based upon any data worldwide. Fetch.ai's network is built around an open-source technology that anyone can use to connect to it. This gives access to the power and security of AI on a global secure dataset that allows for complex coordination tasks in modern economies. A series of software agents act for their owners on this network. These autonomous agents provide a service that is optimized across multiple ecosystems to both consumers and suppliers. -
8
Veridium
Veridium
Veridium is an AI-based Behavioral biometrics-powered Integrated Identity Platform that provides multi-factor authentication (MFA), digital ID verification and a truly enterprise-grade passwordless experience to employees and customers. It is low code, flexible, and agile. Customers can forget their passwords. This eliminates friction and provides greater security for online connections. We offer a single-step multi-factor authentication solution that offers increased security. Organizations also get higher levels of identity assertion. Veridium provides an end-to-end authentication platform that can handle all your WFH requirements and any VPN solution. It delivers strong, multi-factor, passwordless workforce authentication.
- Previous
- You're on page 1
- Next