Best Teleport Alternatives in 2025

Find the top alternatives to Teleport currently available. Compare ratings, reviews, pricing, and features of Teleport alternatives in 2025. Slashdot lists the best Teleport alternatives on the market that offer competing products that are similar to Teleport. Sort through Teleport alternatives below to make the best choice for your needs

  • 1
    Cisco Duo Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    Secure your workforce with powerful, simple access security. We are Cisco Duo. Our modern access security system is designed to protect all users, devices, applications, so you can focus on what you do best. Secure access for all users and devices, in any environment, from any location. You will enjoy the peace of mind that only total device visibility and trust can provide. A SaaS solution that natively protects all applications and is easy to deploy, scaleable and quick to respond to threats. Duo's access security protects all applications from compromised credentials and devices. It also provides comprehensive coverage that helps you meet compliance requirements. Duo integrates natively with applications to provide flexible, user friendly security that is easy to implement and manage. It's a win-win-win for administrators, users, and IT staff. Multi-factor authentication, dynamic device trust and adaptive authentication are key components of your zero-trust journey. Secure SSO is also a part of the mix.
  • 2
    Auth0 Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    Auth0 by Okta takes a modern approach to Identity and enables organizations to provide secure access to any application, for any user. Auth0 is highly customizable, and simple yet flexible. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is a part of Okta, The World’s Identity Company™. With Auth0, you can rapidly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with your own custom, secure, and standards-based unified login. With Universal Login, users are redirected to a central authorization server. Because authentication takes place on the same domain as the login, credentials are not sent across sources, increasing security and protecting against attacks like phishing and credential stuffing. OAuth 2.0 recommends that only external user agents (like the browser) should be used by native applications for authentication flows. Universal Login provides this in a secure manner while also enabling SSO.
  • 3
    ManageEngine ADSelfService Plus Reviews
    See Software
    Learn More
    Compare Both
    Both IT teams and end users are afflicted by password reset tickets. IT teams will often push more urgent issues down the queue to ensure that users don't have their work put on hold while their passwords reset. Password reset tickets can be costly if they aren't addressed promptly. Nearly 30 percent of all help desk tickets were caused by forgotten passwords. It is not surprising that large companies have spent more than $1 million to resolve password-related help desk requests. It is a good habit to change passwords regularly, as it helps prevent cyberattacks caused by stolen credentials. Security experts recommend that administrators ensure that users change their passwords regularly and have password expiration policies in place.
  • 4
    StrongDM Reviews
    See Software
    Learn More
    Compare Both
    Access and access management today have become more complex and frustrating. strongDM redesigns access around the people who need it, making it incredibly simple and usable while ensuring total security and compliance. We call it People-First Access. End users enjoy fast, intuitive, and auditable access to the resources they need. Administrators gain precise controls, eliminating unauthorized and excessive access permissions. IT, Security, DevOps, and Compliance teams can easily answer who did what, where, and when with comprehensive audit logs. It seamlessly and securely integrates with every environment and protocol your team needs, with responsive 24/7 support.
  • 5
    Keeper Security Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    Password security is the foundation of cybersecurity. Keeper's powerful password security platform will protect your business from cyberthreats and data breaches related to passwords. Research shows that 81% of data breaches can be attributed to weak passwords. Password security platforms are an affordable and easy way for companies to address the root cause of most data breaches. Your business can significantly reduce the risk of data breaches by implementing Keeper. Keeper creates strong passwords for all websites and apps, then secures them on all devices. Each employee receives a private vault to store and manage their passwords, credentials and files, as well as private client data. Employees will save time and frustration by not having to remember, reset, reuse, or remember passwords. Industry compliance is achieved through strict and customizable role-based access controls. This includes 2FA, usage auditing, and event reporting.
  • 6
    Uniqkey Reviews
    See Software
    Learn More
    Compare Both
    Uniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies with enhanced control over their cloud infrastructure, access security, and employee management. Uniqkey combats the most significant threats to company infrastructure by safeguarding critical systems and company credentials with state-of-the-art encryption. It also offers unique insights and a comprehensive view of IT infrastructure, employee access, and security scores, making it a valuable tool for IT teams to monitor security policies and assess the impact of awareness campaigns with confidence. With powerful integrations and synergies with existing infrastructure such as Microsoft, IT managers can quickly provision or de-provision users for seamless onboarding and offboarding, all while protecting their entire IT infrastructure with advanced encryption. Engineered by leading European security experts, we leverage the latest encryption methodologies and technology, including offline encryption of all our data. Our modern tech stack and servers, hosted locally in Denmark, ensure maximum security, data integrity, and compliance with European regulations, providing our customers with peace of mind.
  • 7
    JumpCloud Reviews
    See Software
    Learn More
    Compare Both
    Small and medium-sized enterprises (SMEs) around the world can realize true freedom of choice by partnering with JumpCloud. JumpCloud centralizes the management and security of identities, access, and devices through its cloud-based open directory platform, enabling IT teams and managed service providers (MSPs) to remotely support Windows, Mac, Linux, and Android devices, manage identities natively or from their preferred HRIS or productivity suite, and provide access to hundreds of on-prem and cloud-based apps with a single, secure set of credentials. Start a 30 Day Trial of JumpCloud today to take advantage of the entire platform for free.
  • 8
    miniOrange Reviews
    See Software
    Learn More
    Compare Both
    miniOrange offers a range of IAM products and solutions to secure both Identity anywhere and everywhere! Here are some of the major solutions from miniOrange: Single Sign-On (SSO): Enable SSO for web, mobile, and legacy apps with this robust solution which supports all IDPs and Authentication protocols. Multi-Factor Authentication (MFA): The only MFA solution in the market offering 15+ MFA methods including Push Notification, OTP verification, Hardware Token, Authenticator Apps, and many more. Customer Identity & Access Management (CIAM): Secure your customer identity and provide a seamless customer experience. CIAM enables you to safeguard customer privacy while providing them convenient access to your digital resources. User Provisioning: Sync all users automatically from your local directory to miniOrange. Effectively manage User Lifecycle for employees & customers. Adaptive Authentication: Tackle high-risk scenarios with ease with a solution that analyzes risk based on contextual factors and applies appropriate security measures. Universal Directory: A secure directory service that safeguards your sensitive information. It also allows you to integrate your existing directory into miniOrange.
  • 9
    Frontegg Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    Frontegg is a developer platform that enables self-service, security and enterprise-capabilities through a rich user-management interface, freeing up creativity and differentiation. Frontegg's platform provides more than just authentication and SSO via an embedded login-box. It also offers an Admin Portal that serves as the Settings area for your users. The Admin Portal lets your users manage all aspects of their accounts. Users can assign roles and permissions to users and teams, create and assign roles and permissions, view audit logs, subscribe for webhooks, and more. Frontegg interfaces can be embedded within your app as a UI layer and become a customer-facing management interface. This interface is available for both personal and workspace level. Frontegg can also power-up your backend with rich SDKs that are available in various languages and frameworks.
  • 10
    The OptimalCloud Reviews
    The OptimalCloud from Optimal IdM provides a scalable and affordable Identity and Access Management Solution that meets the security and usability requirements of small, medium-sized and large enterprises. The OptimalCloud platform is available for both consumer and workforce deployments. Each pricing tier includes multi-factor authentication (MFA), because good security shouldn't be more expensive. The OptimalCloud integrates with over 11 thousand applications, making it easier to set up and configure. It also offers 24 x 7 x 365 support with a 99.99% uptime guarantee.
  • 11
    AWS Identity and Access Management (IAM) Reviews
    AWS Identity and Access Management allows you to securely manage access to AWS resources and services. You can use IAM to create and manage AWS users, groups, and assign permissions to grant or deny access to AWS resources. IAM is an AWS feature that you can use at no additional cost. Only your users will be charged for access to other AWS services. IAM allows your users to restrict access to AWS service APIs or to specific resources. IAM allows you to specify conditions, such as the time of day, IP address, SSL used, multi-factor authentication, and whether a user is authorized to use AWS. AWS MFA is a security feature that enhances password and user names to protect your AWS environment. MFA requires that users prove physical possession of a hardware MFA token, or MFA-enabled smartphone device by providing a valid MFA Code.
  • 12
    FusionAuth Reviews
    Top Pick
    FusionAuth was built from the ground up to integrate with any app or language. Each feature (yes, every one) is exposed via an API which gives you total flexibility to handle any use cases. Every feature and acronym you need is included: registration & log-in, passwordless, MFA, SAML and OIDC. In seconds, you can comply with GDPR, HIPAA and COPPA requirements. FusionAuth can be installed on any platform, on any computer, and anywhere. FusionAuth Cloud, our fully managed SaaS hosting solution, allows you to host it yourself.
  • 13
    MIRACL Reviews
    Top Pick
    Protect your users. Make their journey easier. MIRACL Trust provides a safer and smoother authentication experience. Only one step. No passwords. No problem. Multi-factor authentication is slow and cumbersome. MIRACL is a safer and more efficient alternative to traditional MFA. Logging in takes only 2 seconds and error rates as low at 1/10th of passwords. No passwords necessary. All you need is a PIN and you are in. Our cryptographic technology ensures that users' information is always safe. MIRACL Trust provides a simple login experience that puts users first and makes it easy to roll out your data quickly.
  • 14
    Microsoft Entra ID Reviews
    Microsoft Entra ID, formerly known as Azure Active Directory, is a comprehensive cloud-based identity and access management solution that combines core directory service, application access management and advanced identity protection. Cloud identity and access management solutions connect employees, customers and partners with their apps, devices and data. Protect data and resources with adaptive access policies and strong authentication without compromising the user experience. Provide a quick, easy sign-in across your multicloud environment in order to keep your users productive and reduce time spent managing passwords. Manage all your identities, and access to your applications, in one central location, whether in the cloud, or on-premises. This will improve visibility and control.
  • 15
    Ping Identity Reviews

    Ping Identity

    Ping Identity

    $5 per user per month
    Ping Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow.
  • 16
    Authelia Reviews
    Authelia is a multi-factor authentication server and portal that is open source. It fulfills the role of identity and access management in information security by providing single sign-on and multi-factor authentication for your applications through a web portal. It is a companion to common reverse proxy servers. It's one the lightest solutions available, with a container size of less than 20 megabytes. Memory usage is typically under 30 megabytes. Authorization policies and other backend tasks can be completed in milliseconds. Login portal loading times are 100 milliseconds. Processors use a lot electricity when they are idle, but the usage is so low you can't even measure it. Active usage in small business environments is under 1%, which allows you to relax (with the exception of password hashing). Our design process includes a lot of consideration for security.
  • 17
    Pomerium Reviews
    Pomerium is an easy-to-use, clientless solution for seamless access to web services and applications without the need of a corporate VPN. It is designed to improve developer productivity by eliminating complex user access flows which can hinder workflow. Pomerium, unlike traditional client-based solutions, offers lightning-fast connections and minimal latency. This ensures security and privacy without compromise. It uses contextual data to make access control decisions. Continuous verification is used, which is a zero-trust concept that verifies contextual factors for every action before accepting or denying it. This is in contrast to NextGen VPNs which only verify authorization and authentication at the beginning of a session. Pomerium provides secure access to web applications, databases, Kubernetes Clusters, internal tools and legacy apps. It is suitable for individuals and groups of all sizes. Pomerium replaces VPNs by providing secure remote access that is clientless.
  • 18
    Tailscale Reviews

    Tailscale

    Tailscale

    $5 per user per month
    Securely connect your servers, computers, cloud instances, and other devices through a network. Tailscale works even when it is separated by firewalls and subnets. It is a frustratingly complicated and fragile collection of rules, firewalls, and holes that can make it difficult to determine if your network security is sufficient. Devices can connect directly from any location or network environment. All this without compromising your firewall. Devices can only connect after you sign in through your existing identity provider. You can easily enforce multi-factor authentication and deauthorize employees who have moved on. You can define role-based access controls to limit sensitive servers and authorize contractors to see only what they need. Every connection is centrally logged from both ends and can be viewed from a dashboard or logging API.
  • 19
    Nebula Reviews
    Nebula is a network management platform that allows innovative companies to manage their networks. After years of R&D, Slack opened sourced the project and began deploying it at scale. Nebula is a lightweight service, which is easy to distribute and configure on modern operating system. It can be used on a variety of hardware, including x86, arm and mips. Traditional VPNs have performance and availability bottlenecks. Nebula is not centralized: Encrypted tunnels can be created per-host or on-demand as required. Nebula was created by security engineers. It uses trusted crypto libraries (Noise), has a firewall with granular security groupings, and uses the best bits of PKI to authenticate hosts.
  • 20
    Entrust Identity as a Service Reviews
    Cloud-based identity management (IAM), which includes multi-factor authentication (MFA), credential based passwordless access and single sign-on (SSO). Cloud-based multi-factor authentication provides secure access to all your users' apps, networks, devices, and accounts. Optimal user experience is achieved through adaptive authentication, proximity-based login, and adaptive authentication. Happy users won't try to bypass security measures. Everyone wins. This is easier than any other thing you have tried. The work-saving features, such as built-in provisioning tools, on-premises integrations, and cloud integrations, reduce the IT workload from deployment to everyday management. To move forward faster, you need strong IAM. Cloud-based Identity as a Service scales rapidly to accommodate new users, expanding use case, and evolving security threats.
  • 21
    authentik Reviews

    authentik

    authentik

    $0.02 per month
    authentik, an open-source identity provider, unifies your identity requirements into a single platform. It replaces Okta Active Directory and Auth0. Authentik Security, a public-benefit company, is building on the open-source project. By using a self hosted, open source identity provider, you can prioritize security and take control of your most sensitive information. You no longer have to rely on a third-party provider. Authentik can be adapted to any environment. Automate any workflow using our APIs and policies that are fully customizable. Prebuilt templates and support of Kubernetes Terraform and Docker Compose simplify deployment and scaling. You don't need to rely upon a third-party for critical infrastructure, or expose sensitive data on the internet. Use our pre-built authentication workflows or customize each step through configurable templates.
  • 22
    Okta Reviews
    Top Pick
    One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
  • 23
    LastPass Reviews
    Top Pick

    LastPass

    LastPass

    $4 per user per month
    32 Ratings
    LastPass is the leader in password and identity management solutions, trusted by individuals and organizations of all sizes worldwide. Millions rely on LastPass daily to create, store, manage, and protect their most important credentials, keeping them secure, private and always within reach. With LastPass, anyone can effortlessly log in to life or work anytime, anywhere.
  • 24
    Akku Reviews

    Akku

    CloudNow Technologies

    $5.00/year/user
    Simplified user lifecycle for corporate users. Akku is a flexible, robust identity and access management system that can help you manage each stage of your user lifecycle. Akku's versatile features help improve data security, standards compliance and efficiency, as well as productivity. Akku is a cloud SSO solution that integrates easily with any cloud or in-house applications. It also includes a range security and access control features that allow for seamless user provisioning, management, access control, and deprovisioning. Akku is an agentless IAM solution that does not require the installation of a user agent on your infrastructure. You can see exactly which parts of your sensitive user data Akku can access so you have transparency and control.
  • 25
    IBM Verify Reviews
    Cloud IAM can be combined with deep context for risk-based authorization to provide secure, frictionless access for your workforce and consumers. Identity and access management cannot be separated as organizations modernize hybrid multicloud environments with a zero trust strategy. Cloud IAM strategies must use deep context to automate risk protection, and authenticate every user to any resource. Your business needs should be considered when designing your journey. As you design and tailor the cloud IAM architecture that will either replace or enhance your existing infrastructure, you can protect your investments and preserve on-premises applications. Your users expect one-click access from any device, to any application. New federated applications can be integrated to one sign-on (SSO), embed modern multifactor authentication (MFA), simplify logistics, and provide developers with consumable APIs.
  • 26
    CyberArk Workforce Identity Reviews
    CyberArk Workforce Identity (formerly Idaptive) empowers your workforce by providing easy and secure access to business resources. Your users need quick access a variety business resources. You need to be able to trust that they are knocking, not an attacker. CyberArk Workforce Identity allows you to empower your workforce and keep threats out. Your team can set the stage for success and open up new opportunities. Strong AI-powered, password-free, risk-aware authentication can validate identities. Streamline the management of app access requests, account creation, and termination. Workers should be working, not logging out and in. AI-powered analytics can help you make intelligent access decisions. Access is possible from any device, at any time.
  • 27
    Quicklaunch Reviews
    It makes it easier for employees and students to access the apps they need to learn or work. Students and employees can reset their passwords at any time, which reduces the need for IT help. Increases cyber security by protecting user accounts against hacking and thwarting ransomware, phishing cyber attacks.
  • 28
    PortalGuard Reviews
    BIO-key PortalGuard IDaaS, a cloud-based IAM platform, offers the most flexible options for multi-factor authentication and biometrics. It also allows customers to reset their passwords and provides a user-friendly interface. All this at a reasonable price. PortalGuard has been trusted by many industries, including education, finance, healthcare, and government, for over 20 years. It can be used to secure access for employees and customers, regardless of whether they are on-premises or remote. PortalGuard's MFA is unique because it offers Identity-Bound Biometrics with the highest levels of integrity and security. They are also more accessible than traditional authentication methods.
  • 29
    Cipherise Reviews

    Cipherise

    Cipherise

    $30 per user per month
    6 Ratings
    Cipherise for developers. All you need to create powerful and user-friendly authentication. Your users will have the best experience possible. Multi-Factor Authentication. MFA is simple and highly secure, which is almost invisible to end users. No complex passwords. No more complicated passwords, usernames, or credential sharing Omni Channel. The user experience is consistent regardless of whether it's on a mobile, tablet, laptop, or PC. Hackers are no longer able to access centralized credential Honeypots. Bi-Directional authentication. Before the user authenticates to it, the service authenticates to them. Mobile Native. Mobile Native. Protect your valuable IP and Content. We make it easy for your customers to sign up and access your content from any device.
  • 30
    OneLogin Reviews
    OneLogin, a trusted identity management (IAM), solution for modern enterprises, helps you secure company information and empower your employees. OneLogin is a great solution for companies that want to simplify business logins and strengthen enterprise security. OneLogin features include single sign-on (SS), user provisioning, unified directory, user provisioning and adaptive authentication. Compliance reporting is also available.
  • 31
    TrustBuilder Reviews

    TrustBuilder

    TrustBuilder

    € 10 per user / per year
    TrustBuilder is a European-based Access Management software vendor based in Europe, specializing in strengthening digital landscapes with identity-centric solutions. It's SaaS platform seamlessly integrates passwordless and deviceless Multifactor Authentication into a comprehensive Customer Identity and Access Management platform, combining airtight security with a frictionless user experience. Committed to enabling secure and efficient operations, TrustBuilder offers tailor-made solutions, empowering businesses to customize their cybersecurity defenses.
  • 32
    Avatier Identity Anywhere Reviews
    Identity Anywhere is the first identity management solution that uses Docker containers. It is the most portable, scalable, and secure on the market. Identity Anywhere can run on any cloud, on-premise, or private cloud instance hosted at Avatier using Docker container technology. Avatier Identity Management products bring together separate back office applications and assets to manage them all in one system. With a single digital dashboard, executives at all levels can achieve measurable business growth and higher profits. With military-grade self-service password reset, you can eliminate the #1 Help Desk request. Reduce costs Only pay for what you use. A great shopping cart experience will maximize company utilization. Non-compliance can result in fines, lawsuits and even jail time.
  • 33
    RSA SecurID Reviews
    RSA SecurID allows organizations of all sizes to reduce identity risk and ensure compliance without compromising user productivity. It provides users with easy access to their information and confirms that they are who they claim to be. RSA SecurID also provides unified visibility across all organizations' islands of identity and control. RSA SecurID combines multi-factor authentication with identity governance to address security concerns associated with providing easy access to dynamic user populations in complex environments. It assesses risk and business context to provide access and identity assurance. Digital transformation presents new challenges in authentication, access management, and identity governance for organizations. As a result, more users require access to more systems via more devices than ever before. RSA SecurID is a tool that helps organizations address these issues and protect their identity.
  • 34
    Deepnet DualShield Reviews
    You are searching for an enterprise-grade 2-factor authentication (2FA), or multi-factor authentication(MFA) product that can protect all business applications and provide a wide range authentication methods, then you have come to the right place. Deepnet DualShield, a multi-factor authentication platform, unifies a variety authentication methods, protocols and solutions, as well as user experience, in one platform. DualShield offers self-service Password Recovery, Single Sign-On, Identity & Access Management, (IAM), and Adaptive Authentication. It is the most flexible and powerful multi-factor authentication system available. Deepnet DualShield is available on-premises or in a private cloud. This means that you have complete control over your user authentication system and can keep your users' credentials and identities safe.
  • 35
    Entrust Identity Enterprise Reviews
    Strong digital security is possible with the world's most trusted on-prem identity and access management (IAM). Identity Enterprise is an integrated IAM platform which supports a wide range of consumer, worker, and citizen use cases. Identity Enterprise is ideal for high-assurance applications that require zero trust for thousands or millions users. It can be deployed on-premises as well as virtual appliances. Never trust, always verify. Your organization and user communities are protected both within and outside the perimeter. High assurance use case coverage includes credential-based access, smart cards issuance and best-in class MFA. This will protect your workforce, consumers, and citizens. User friction can be reduced with adaptive risk-based authentication and passwordless login. You can use digital certificates (PKI), which provide a higher level security, whether you have a physical smartcard or a virtual one.
  • 36
    Silverfort Reviews
    Silverfort's Unified Identity Protection Platform was the first to consolidate security controls across corporate networks to prevent identity-based attacks. Silverfort seamlessly integrates all existing IAM solutions (e.g. AD, RADIUS Azure AD, Okta. Ping, AWS IAM), providing protection for assets that cannot be protected previously. This includes legacy applications, IT infrastructure, file system, command-line tools and machine-tomachine access. Our platform continuously monitors access to users and service accounts in both cloud and on-premise environments. It analyzes risk in real-time and enforces adaptive authentication.
  • 37
    Accops HyID Reviews
    Accops HyID, a futuristic access and identity management solution, protects business applications and data against misuse by internal and external users. It manages user identities and monitors user access. HyID gives enterprises strong control over endpoints. It allows for contextual access, device entry control, and flexible policy framework. The MFA works with all modern and legacy apps as well as cloud and on-prem apps. It provides strong authentication using OTP sent via SMS, email, and app, biometrics, device hardware ID and PKI. Single sign-on (SSO), provides greater security and convenience. Organizations can monitor the security status of endpoints, including BYOD, and grant or deny access based upon real-time risk assessment.
  • 38
    ManageEngine AD360 Reviews
    AD360 is an integrated identity management (IAM), solution that manages user identities, controls access to resources, enforces security, and ensures compliance. AD360 allows you to perform all your IAM tasks using a simple and easy-to-use interface. All these functions are available for Windows Active Directory, Exchange Servers and Office 365. You can choose the modules that you need and get started addressing IAM issues across hybrid, on-premises, and cloud environments with AD360. You can easily provision, modify, and deprovision mailboxes and accounts for multiple users from one console. This includes Exchange servers, Office 365, G Suite, and Office 365. To bulk provision user accounts, you can use customizable templates for user creation and import data from CSV.
  • 39
    LoginTC Reviews

    LoginTC

    Cyphercor

    $3/month/user
    Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more. LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more. LoginTC can help you reduce your insurance costs and meet compliance regulations with ease.
  • 40
    LogMeOnce Reviews

    LogMeOnce

    LogMeOnce

    $3 per user per month
    An effective cyber security defense must be able to stop both internal and external threats. One common factor unites external and internal threats. The end user's compliance with security, policy, best practices. External elements can exploit an unacquainting internal user's compliance to sound security policies to gain entry. Although external threats can be dealt with using various mechanisms, such as firewalls and other security tools, it is inherently rooted in internal weaknesses. You can reduce internal threats by simply creating "automatic and enforceable" security policies. This will require end-users adhere to secure access protocols using trusted credentials. LogMeOnce Patented technology offers many ways to protect your agency, team members, and credentials with advanced automated authentication. LogmeOnce dashboard gives users powerful and unified access across all their applications.
  • 41
    Ory Reviews
    The missing web-scale identity and access control API. Today, 10x your security and user experience. Build secure apps over the Ory Network to reach new customers in any region of the globe with the best login experiences ever. Login is much more than just a username and a password. It is dangerous and time-consuming to build it from scratch. Ory's API first microservice architecture allows projects to be integrated at any stage. Pay for usage and not features. Ory subscription plans include advanced multi-factor authentication. Plus, advanced permissions, SSO OAuth2, OIDC multi-tenancy and more. Ory is designed for high-performance and high-scale applications on any cloud. Ory is designed with developers in mind. It allows you to quickly create your own user experience, and integrate it within your software stack. Ory's focus is on open standards, and its automated data import capabilities make migrating to legacy systems simple.
  • 42
    ForgeRock Reviews
    The only AI-driven platform that combines all aspects of identity, governance and access management to dramatically improve and scale, it is the only one in the industry. Digital access is essential for our personal, professional, and educational lives. It is essential to accelerate digital transformation, provide superior experiences, and ensure the highest level of security in order to meet customer demand and keep up with our competitors. ForgeRock helps people connect to the world safely and easily by helping organizations improve and scale their identity, governance and access management. ForgeRock is the only AI-driven platform that offers a full suite of AI-driven solutions. It is designed for all types of identities (consumers and workers, as well as things). ForgeRock's simple-to-use, comprehensive solutions will help you increase revenue, manage risk, increase workforce productivity, and lower costs.
  • 43
    FortiAuthenticator Reviews
    FortiAuthenticator offers Identity Access Management (IAM) and Single Sign-On. FortiAuthenticator offers identity and access management services (IAM) to prevent breaches caused by unauthorized users accessing a network, or inappropriate access levels granted to valid users. FortiAuthenticator ensures that only the right person has access to your sensitive data and resources at the right time. FortiAuthenticator, combined with FortiToken or FIDO2 authentication, ensures that only authorized users are granted access to sensitive information. This additional layer of protection reduces the risk of data leakage and helps companies meet audit requirements related to government and business privacy regulations.
  • 44
    LoginRadius Reviews
    LoginRadius allows businesses to provide a pleasant customer experience without compromising security. Companies can use our customer identity platform to offer a simplified login process, protect digital accounts, and comply with data privacy regulations. LoginRadius has over 3,000 users and 700 million monthly visitors worldwide. Registration services, adaptive security, integrations with third-party apps, and customer insights are some of the key platform features. Gartner, KuppingerCole and Computer Weekly have named the company an industry leader in customer identification and access management (CIAM). Microsoft is a major technology investor and partner. LoginRadius has its headquarters in Vancouver, Canada. There are additional offices in Toronto, USA and Australia. LoginRadius Services: API Authentication OAuth Data Management Secure Login One Sign On SAML SSO Sign up for social media Two Factor Authentication
  • 45
    Google Cloud Identity Reviews
    Unified identity, access, app and endpoint management platform (IAM/EMM). This platform helps IT and security teams maximize end user efficiency, protect company data, transition to a digital workspace, and transition to it. Protect your organization using the BeyondCorp security model, and Google's threat intelligence signals. Security Center can control access to SaaS apps and enforce strong multi-factor authentication (MFA). This will protect user accounts, manage endpoints, investigate threats, and ensure that users are protected. Optimize efficiency by providing intuitive user experiences on endpoint devices. You can also unify user, access and app management from one console. Users can access thousands of apps using single sign-on (SSO), and manage their company accounts the same way as their personal Google accounts. Integrate your existing systems onto a trusted platform and transition to digital. Directory Sync allows you to extend your existing directory to the cloud.
  • 46
    Vault One Reviews

    Vault One

    VaultOne Software

    $99 per month
    You have complete control over who has access to your data, systems and infrastructure. This will prevent cyber attacks and data breaches. VaultOne helps you to protect your company's assets and ensure compliance. VaultOne is reinventing the concept behind privileged access management (PAM). VaultOne is reinventing the concept of privileged access management (PAM). It allows you to manage user access, credentials, and sessions in a fast and secure way. We offer multiple features such as a digital vault, password generator and sessions recording, auditing, reporting, customizable policies and disaster recovery. You've found the right solution to protect shared accounts, certificates, and user access to websites, applications, servers, databases and cloud services. You can prevent data breaches by creating custom access policies and managing privileges.
  • 47
    ZITADEL Reviews

    ZITADEL

    ZITADEL

    $100 per month
    ZITADEL, an open-source platform for identity and access management, simplifies authentication and authorization of applications. It has a wide range of features including customizable hosted logins pages, support for authentication methods like Single Sign-On (SSO), social logins and multifactor authentication. Developers can integrate authentication into their applications directly using ZITADEL APIs or create dedicated login interfaces. The platform is multi-tenant and supports role-based control. This allows for precise permissions based on roles. ZITADEL’s extensibility allows for seamless adaptation to workflows, user-management processes, and brand guidelines. Features like ZITADEL Actions execute workflows based on predefined events, without the need for extra code deployment.
  • 48
    Ilantus Compact Identity Reviews
    It is the first time that an IAM solution is available that is comprehensive, deep, and easy to implement even by non-IT personnel. This includes Access Management, Identity Governance and Administration. You can implement the solution step by step and at your own pace with an online digital guidance system. Ilantus offers free implementation support, unlike other vendors. Seamless SSO with "no app left behind", including on-premise or thick-client apps. All web apps, whether they are federated, non federated or thick-client, legacy, custom, or other apps, will be included in your SSO environment. Support is also available for mobile apps and IOT devices. What is your homegrown app? This will not be a problem thanks to our interactive digital help guide. If you need help, you can call Ilantus' dedicated helpline, available 24 hours a day, Monday through Friday, and we will assist you with the integration.
  • 49
    Cymmetri Reviews
    Cymmetri manages and protects the entire identity ecosystem, from employees and partners to customers or privileged users. Control user access with ease, ensuring efficient and secure operations in the digital world. It provides seamless identity protection to safeguard individuals and organizations anywhere, anytime. Streamline the onboarding process for all new employees. Cymmetri experts are available to discuss your IAM needs or demonstrate the power of Cymmetri. Our solutions have measurable outcomes that demonstrate the positive and tangible effects on security, efficiency and overall performance. Implementing robust cybersecurity improves data protection and minimizes the risk of breaches or unauthorized access. Our solutions will boost productivity by empowering employees to thrive within a secure, efficient and safe work environment. Our innovative solutions and optimized process will help you to increase efficiency, streamline operations and save money.
  • 50
    PropelAuth Reviews

    PropelAuth

    PropelAuth

    $150 per month
    Developers will find it easy to integrate and use the APIs. User management built-in for teams that interact with customers. Data and insights for executives and PMs. PropelAuth was built on the belief that a great authentication product should get out of your way. We give you the tools you need to make sure your users have a smooth and secure experience. Your team will be given a list of tasks and information to complete as soon as they begin onboarding new users. PropelAuth is a first class concept when it comes to organizations. Our UIs will help you get started quickly, or you can build your own using our APIs. Create your own roles or start with our defaults. We will even update existing users when you make changes. Integrating with identity providers like Okta or Azure AD is easy. We provide guides to help your users set up and test configuration. Set custom session durations for each organization, enforce MFA and more. We take care of the complexity, so you don't need to.