Best VeriFinger SDK Alternatives in 2024
Find the top alternatives to VeriFinger SDK currently available. Compare ratings, reviews, pricing, and features of VeriFinger SDK alternatives in 2024. Slashdot lists the best VeriFinger SDK alternatives on the market that offer competing products that are similar to VeriFinger SDK. Sort through VeriFinger SDK alternatives below to make the best choice for your needs
-
1
ARGOS Identity
Argos Identity
5 RatingsARGOS Identity is a leading provider of Identity as a Service (IDaaS), offering comprehensive solutions for all your identity verification needs. Our mission is to enable you to identify Anyone, Anywhere, Anytime with ease. We specialize in simple, effective KYC implementation, empowering our clients to deliver a seamless digital onboarding experience. Our solutions allow you to build your identity management system around your business goals, providing your customers with a smooth, hassle-free KYC process. FACE Identity: This innovative service utilizes advanced facial recognition technology to match faces against a database of stored images, ensuring the accuracy and security of user verification during onboarding. ARGOS Textify: An AI-powered tool that automates the extraction and review of critical data from various documents, significantly reducing the time and cost associated with manual verification. -
2
AgeChecker.Net
AgeChecker.Net
AgeChecker.Net makes it easy to check out and keeps your site current with the most recent age regulations in your industry. Our extensive database of trusted records and intelligent match technology verify more than 90% of customers instantly. Keep abreast of the most recent FDA age requirements, state laws and merchant account policies. Our verification rules can be customized. Customers will be less likely to abandon their carts and have more fun with our system than other systems. Customers can be verified on your website at checkout. We are not a pop-up, but a real age verification service! To verify that a customer meets your minimum requirements, we match customer information from your checkout forms with our identity networks. All major ecommerce platforms are supported. The AgeChecker.Net popup will be displayed when a customer is ready for them to place an order. It will explain the verification process and the reasons why it is necessary. -
3
MIRACL
17 RatingsProtect your users. Make their journey easier. MIRACL Trust provides a safer and smoother authentication experience. Only one step. No passwords. No problem. Multi-factor authentication is slow and cumbersome. MIRACL is a safer and more efficient alternative to traditional MFA. Logging in takes only 2 seconds and error rates as low at 1/10th of passwords. No passwords necessary. All you need is a PIN and you are in. Our cryptographic technology ensures that users' information is always safe. MIRACL Trust provides a simple login experience that puts users first and makes it easy to roll out your data quickly. - 4
-
5
Touch N Go
Bayometric
Touch N Go - A fast, secure and simple way to integrate biometric fingerprint ID into your solution using just FOUR lines code. For seamless integration, a reliable, scalable and high-performing biometric identification solution. Easy implementation and maintenance of fingerprint recognition with minimal learning curve for developers. It provides the best-fit identity solution for workflows that require high security. This keeps developers happy, productive, and IT in control. Organizations can have a cost-effective, turnkey biometric identification system that leverages proven technologies. This allows them to focus on their core business operations. -
6
Neurodactyl
Neurodactyl
USD 0.01 per verificationNeurodactyl SDK allows system integrators to integrate biometric fingerprint recognition, verification or identification into their products and services. The SDK is based upon deep learning technologies, and matches fingerprints with high accuracy: flats, roll, latents, and photo images. It creates a fixed-size, compatible template for all types of fingerprints. The algorithm's recognition accuracy is top-tier in the NIST PFT III competition. -
7
MegaMatcher SDK
Neurotechnology
€2,590 one-time paymentMegaMatcher was designed for large-scale AFIS developers and multi-biometric system developers. Even when working with large databases, the technology guarantees high reliability and speed in biometric identification. This software development kit allows you to create large-scale multi-biometric fingerprints, iris, faces, voice, and palm print identification products for Microsoft Windows. It is compatible with Microsoft Windows, Linux. MacOS, iOS. This product has been used in large-scale national projects such as passport issuance and voter duplication. NIST MINEX-compliant fingerprint engine, NIST IREX-proven iris engine. MegaMatcher ABIS is a turnkey multi-biometric solution that can be used to identify national-scale projects. MegaMatcher Accelerator provides high-performance matching for large-scale systems. MegaMatcher On Cards allows you to match fingerprints, iris, and faces on smart cards. Includes fingerprint, iris and voice modes. -
8
Innovatrics ABIS
Innovatrics
Innovatrics ABIS supports facial recognition, fingerprint, iris, and fingerprint identification. With minimal hardware requirements, you can achieve fast and accurate performance. Our ABIS can be customized easily due to its modular architecture. Open APIs make it easy to integrate with other systems and avoid vendor lock-in. Our ABIS has been successfully deployed to hundreds of large-scale biometric projects, including the most complex biometric systems in the world. Our fingerprint, facial, and iris recognition technology allows you to quickly find a solution that suits your business processes. Based on independent NIST testing, our algorithms are consistently ranked amongst the best. You can create an identity management solution that is tailored to your requirements using our ABIS modules. You can add modules or upgrade as needed. We offer flexible licensing policies to meet the needs of every project. -
9
M2SYS Hybrid Biometric Platform
M2SYS Technology
Hybrid Biometric Platform™ is a multimodal biometrics platform that supports finger vein, fingerprint, face, and iris identification. Software developers can integrate Hybrid Biometrics™, using our CloudABIS API or Bio-Plugin middleware. They will be able to immediately deploy the biometric technology that best suits their user, demographic, or environmental needs. A biometric SDK will not limit your success. Although many biometric hardware manufacturers offer an SDK for their devices, it is not compatible with all other devices. If you use their biometric SDK to develop your biometric matching program, you will be forever tied to their devices. You are also locked into one form of biometric recognition forever! Your success rate is very limited if it doesn't work reliably or you have problems with their biometric hardware. -
10
PersonID
360 Biometrics
The PersonID-Att fingerprint-based attendance and time tracking system allows you to quickly identify employees and partners and track their arrivals and departures. This fingerprint attendance software is suitable for all businesses with hourly employees as well as educational, government, and other applications where arrivals or departures must be tracked. PersonID-Att's attendance system provides real-time identification (1:N) of an individual. This allows you to create a safer environment, increase efficiency, accuracy, and minimize fraud losses. Here's how it works. Individuals are automatically enrolled by taking a photo and their fingerprints. The system instantly matches a captured fingerprint with the enrolled fingerprints to identify the individual. It then displays the results with a match score and personal information. -
11
AwareABIS
Aware
$2495.00/one-time/ user Aware provides software and solutions for government-sponsored, biometrics-enabled citizen identification and credentialing systems. Aware's innovative biometric solutions are critical to ensure national security and protect citizens' freedoms and liberties. Our decades-long commitment to R+D has allowed us to work with more than 80 government agencies. We are experts in biometrics, security, and compliance. AwareABIS™ is the core of our citizen ID efforts. It is an Automated Biometric Identification System, or ABIS, that allows large-scale biometric identification and duplication. It supports fingerprint, face and iris modalities. Its modular architecture makes it easy to configure and optimize for civil or criminal applications. AwareABIS, a fully-featured biometric search platform is distinguished by its open architecture. -
12
VeriSpeak
NEUROtechnology
€339 one-time paymentVeriSpeak voice recognition technology is for integrators and developers of biometric systems. The text-dependent speaker recognition algorithm provides system security by verifying phrase and voice authenticity. Voiceprint templates can be matched in one-to-one (verification) or one to many (identification). This software development kit allows you to develop stand-alone or network-based speaker recognition apps on Microsoft Windows, Linux and macOS. A text-dependent algorithm prevents unauthorized entry by using a secretly-recorded user voice. Two-factor authentication is achieved by verifying voice biometrics and authenticating pass-phrases. Both regular microphones and smartphones can be used to record user voices. Multiplatform SDK available that supports multiple programming languages. Affordable prices, flexible licensing, and free support for customers. -
13
Sima
Active Witness
FreeSima does more than keep bad guys out. Sima is a cloud-based Access Control reader that is highly secure and yet easy to use. Sima can read both facial biometrics and mobile credentials (QR codes). This cloud-based integrated software can issue single (QR only), and multi-factor (facial verification) codes for highly secure and customized facility access. We respect your privacy. To perform facial authentication, we use facial recognition technology. This technology allows us to verify identity, and allow access to a specific location. Only for identification purposes, facial data will be stored on our servers. We will not share your personal data, including your face image, with any third parties. -
14
TrustLink
AarateK
TrustLink™, a high-performance platform for biometric authentication, supports facial and fingerprint recognition on a large scale. It is a powerful platform with multi-biometric technologies that can be used to capture fingerprints and facial images, register them, identify them, and authenticate them. It also provides APIs on both the server and client to allow for rapid development and deployment of a wide variety of applications. TrustLink™, equipped with Aratek Bione® dynamic optimization algorithms and TrustFace™, face recognition algorithms, is specialized in large-scale fingerprint recognition and face recognition applications. TrustLink™, a biometric identity authentication platform, is ideal for software developers. -
15
Griaule Biometric Suite
Griaule
Griaule Biometric Suite. Griaule provides solutions for iris recognition, face, fingerprint, palmprint, newborn, and latent recognition. One of the best ABIS systems in the world. Database migration with deduplication control. Scan paper-based biometric cards quickly and easily with OCR Enrollment in biometrics with quality control and data standardization. Enhancement and search for latent fingerprints. Control of frauds and quality control. Enrollment of biometrics for newborns. Easy biometric identification and verification High quality enrollment is guaranteed. Automatic face monitoring for crowds. Textual search in the database. Biometric integration in deployed systems. Printing Identification Documents that are integrated with biometric systems. This includes document check with OCR. Enrollment and search for biometric data (fingerprint, name). Griaule is a company at the forefront of biometric recognition technology! -
16
eClear 360
eConnect
Turnkey solutions that are affordable and easy to integrate into existing systems for scaling up operations. eConnect's Identity Management software, eClear360, integrates multiple data sources and ties them to the industry-leading facial recognition algorithm. This platform allows for new insights, revenue protection, and opportunities. The key capabilities include: Identifying anonymous high value patrons, their gaming values and frequency of visits, detecting exclusion patrons, advantage players and patrons who may have committed crimes in past. This is a great tool for helping the operator to know your customer mandates. The Identity Management system uses patented technology to provide operators accurate facial identification, data analytics, and the ability to identify staff members for time clock integrations, detect unwanted guests or individuals, and improve operational efficiency. -
17
ImageWare CloudID
ImageWare
ImageWare CloudID®, a modular software platform, allows rapid development and deployment high-security, yet flexible, biometric identity management solutions. ImageWare CloudID®, which is cloud-ready, can be easily integrated into existing or new cloud-enabled environments. It can also be used as cloud-ready software in traditional networked client servers and data center IT infrastructures. This biometric identity platform is distinguished by two innovations. It can easily be integrated into existing cloud-enabled environments or as cloud-ready software into traditional networked client server and data center IT infrastructures. The system can also be scaled to meet the needs of small organizations and entire counties, providing highly-scalable, real-time solutions. ImageWare CloudID's platform is a collection of configurable software modules that can be used to enhance or improve biometric identity management and credential issue capabilities to existing applications, or to support the development of such capabilities in new applications. -
18
DigitalPersona
HID Global
DigitalPersona®, software, allows you to go beyond multi-factor authentication. Expand to risk-based authentication, secure all applications, provide frictionless access, and deploy quickly. Industry-leading biometric solutions can improve security. Processes can be simplified, streamlined, and queues shortened to confirm identities for a variety of military, criminal justice, and citizen applications. Choose from a variety of U.are.U®, readers, modules, and sensors. The most advanced fingerprint technologies available to meet your OEM, retail, hospitality, and commercial identity management needs. -
19
CloudABIS
M2SYS Technology
Built with nearly 20 years of experience in large-scale biometric technology projects, CloudABIS™ is a superscalar, biometrics-as-a-service (BaaS) matching system that removes the burden & cost associated with building and maintaining a reliable biometric identification system. CloudABIS™, which can compare millions of biometric templates per second, can be used to speed up 1:N matching and de-duplication. Customers can instantly perform 1:N matching by connecting through our API or CloudApper™ software. CloudScanr™, our cloudScanr™, app supports many fingerprint readers. Device activation is seamless using our software. CloudScanr™, which allows the biometric system instantly to work across any web browser, also allows it to be used with other web browsers. There are many options for fingerprint readers. Because it is a universal format, most fingerprint SDKs can generate a standard ISO template. -
20
DERMALOG Biometric Software
DERMALOG Identification Systems
The fastest and most accurate software in the world. DERMALOG high speed identification software is a vital contribution to preventing identity fraud. It is constantly improved to ensure reliable products. It can trace identities and duplicates of biometric documents, such as national IDs, passports, and voter registrations. DERMALOG is scalable and customizable software that can perform a variety of tasks such as searching, retrieving, retrieving, and storing subject records and biometric templates. The German innovation leader in biometric technology has added DERMALOG fingerprint technology. Multi-modal biometric systems can combine fingerprint identification with an iris, face or other modality. DERMALOG offers the fastest Fingerprint matching in the world. DERMALOG Face Identification offers the highest accuracy and speed. DERMALOG Palm Identification is a powerful tool for solving crimes. -
21
NCheck BioAttendance
Neurotechnology
$0 for 5 userNCheck BioAttendance, a Biometric Attendance Management System, is designed to register and manage employee attendance using face and fingerprint biometric identification. Amazing features Recognition of attendance by Face, Fingerprint, or Iris Geofencing and locaton-based tracking Contactless and hygienic Identification with a face mask Face liveness detection Real-time face detection Multiple face detection -
22
identiMetrics Biometric ID Management
identiMetrics
IdentiMetrics is a flexible, unified platform for managing biometric IDs. It allows administrative applications to be completed with a single sign-on ID that is hygienic and clean. IdentiMetrics is a partner of all the top education software companies. Our award-winning biometric finger scanner identification platform uses one database to track attendance at meetings, tardy, daily, and meeting attendance, food service operations as well as staff time & attendance, emergency evacuations, staff time, attendance, book store, and for athletic events. IdentiMetrics simplifies school life by providing accurate, efficient, and hassle-free accounting. IdentiMetrics is safe, secure, and 100% accurate for everyone, from the senior staff to the kindergarten students. Our only option for customer support and services is excellence. IdentiMetrics is a proud member of the Student Privacy pledge. -
23
vIDix Identify
Ban-Koe Companies
Using vIDix ID, you can print high-quality badge designs at a reasonable price. You can also choose the system that best suits your company. We have the solution, whether you need to print employee badges for a small business or student IDs for a whole school district. The purpose of ID badges is to provide appropriate access for restricted areas, vending service, and visual identification. There are many options available for gathering the information that will be displayed on an identification badge. We can connect to an existing database, or import records to the vIDix Identification database from Access Control. Credentials allow for immediate identification of authorized personnel by visually recognizing them. Organizations can quickly verify employees who are members of certain qualifications. This allows your entire workforce to be part of your security plan. -
24
LetFaster
LetFaster
LetFaster specializes in cloud-based, automated Biometric Identification Screening, Fraud Detection, and Tenant Screening. Our proprietary Facial Recognition, Motion Detection and Liveness algorithms authenticate global identity documents using advanced AI and OCR technologies. Fake IDs are not easy to spot. Fake IDs would pass all background screening, so organisations are at risk of fraud or AML violations. Key Benefits: * In-Depth Tenant Screening * In-House SaaS Portal is Not an Outsourced Solution * Detect Internal and External Fraud * Key-Based 2-Factor Authentication (securer than SMS Verification). * Increase Internal Controls * Automate Workflows: Operational Efficiencies * Automated Set-Up: Offices/Properties/Buildings/Owners * Easy to use: No training required * Audit Trail * Business Intelligence * No forced tie-ups * There are no significant up-front fees -
25
Scanovate B-Trust
Scanovate
Due to inefficient and cumbersome internal processes, the approval and design of new products can be difficult in financial service companies. B-Trust offers a web-based workflow engine that streamlines and standardizes discussions and approvals across departments. Apps from our Marketplace can be used to support business users by automating the identification and management of potential risks. For example, checking appropriate commission rates. Enjoy a complete identity suite that includes state-of the-art onboarding technology. You can track the identity lifecycle by tracking onboarding, continuance verification and identification. Key performance indicators and risk indicators can be used to monitor compliance in real time. API-first design allows integration with third party supply chains and systems of record. -
26
Nexa|Face
Aware
Face™ provides high-performance biometric algorithms for multistage facial recognition and identification or rapid, high-volume face authentication. Aware has been a trusted provider for high-quality biometric software since over twenty years. Nexa APIs are reliable and configurable. Nexa SDKs can be configured easily for optimizing a system for a particular application, database, computing platform, or operational environment. They provide tools that can help you quantify the system's performance, identify areas for improvement, and continually optimize it. AwareABIS™, an Automated Biometric ID System (ABIS), is used to perform large-scale biometric identification. It supports fingerprint, face and iris modalities. Its modular architecture makes it easy to configure and optimize for civil or criminal applications. -
27
Imprivata
Imprivata
Imprivata is the digital identity company. Imprivata's understanding of complex healthcare workflows has made it the world's leader in trusted digital ID management for health delivery organisations. Imprivata is the leader in trusted digital identification management for healthcare delivery organizations because of our deep understanding of complex healthcare workflows. Imprivata provides enterprise access, multifactor authentication and identity governance. Our solutions are developed in close collaboration with clinicians to ensure that efficiency and security are always considered. Imprivata solutions are compatible with the Imprivata Digital Identity Framework, which provides a unified strategy for managing identities across healthcare delivery organizations. -
28
Axiom Protect
Axiom Protect
Multifactor security can be embedded to empower multiple IT systems (on-premise, hybrid, or cloud) according to the user's preference. Policies and settings provide central control to meet your business requirements and ensure regulatory compliance. All it takes is a few clicks to change default to custom Inbuilt Complex Password Source to External LDAP/Active Directory synchronized operator and user sources for consolidation. Trust can be strengthened and made more flexible by connecting users' devices. A business need is to have multiple users on one device or multiple devices for one user. If you have a great platform, it's easy. Everything is DATA. Data at rest and at transit security at mobile web, iOT device Server, files / database. You can choose from a variety of security grades, including different key lengths and algorithms. No expensive VPN. SDK and APIs are available. Pure 100% AI/DL facial biometrics provide 99%+ accuracy for building your EKYC or remote authentication. -
29
iCrypto
iCrypto
FreeThe iCrypto SDK is designed to work with all of our iCrypto cloud services. It can be integrated into existing Enterprise Apps, or deployed as iCrypto App and used as a standalone password-less verification solution. The iCrypto SDK combines the most recent cryptography technologies with device-level security management to create a software token that can be used in a variety of industries as a biometric ID while on the move. iCrypto SDK offers authenticator PKI signatures and a range cryptographic protocols like TOTP/HOTP/OCRA/MTP. It also provides push-based authentication, network-based biometrics such iris scan, fingerprint, face/voice recognition, third-party authorizations, secure storage, context collection, and a host of security features. -
30
Signicat
Signicat
TBDWe've got your back, from compliant onboarding through to secure logins and electronic signatures. Signicat allows you to sign up new clients in a KYC and AML-compliant manner, authenticate existing users using secure authentication, and electronically sign legally binding contracts. You can rely on our ability to exceed the strictest security and safety requirements. We offer public and private cloud solutions to meet your compliance and security requirements. We can meet your needs, no matter how simple or complex they may be. We offer quick deployment for smaller solutions, and heavy iron for enterprise-wide ones. -
31
MultiSense
MultiSense
MultiSense B.V., a Start-Up company, is involved in the multibiometrics industry and advanced software solutions. MultiSense B.V.'s unique technology combines multi-biometric factors such as face and voice recognition, fingerprint signature and GPS and NFC technologies. The company was founded by former security personnel from Israel with backgrounds in technology, security, and engineering. MultiSense is a Start Up company that combines advanced software solutions and biometrics. MultiSense was founded by former members of the Israeli security forces who have backgrounds in technology, security, and intelligence. Our vision is to be the leader in these fields, to be at forefront of technology development and provide the best solutions and responses to customer needs. Security and safety system technologies. Unique systems in the area of biometrics (face recognition and voice recognition). Public data systems. Marketing and advertising systems. -
32
Blue Biometrics
Blue Biometrics
Blue allows police to quickly identify and book more offenders. Border agencies can enrol more visitors biometrics in advance. Businesses will verify more customers in remote digital processes. Digital identity systems allow citizens to enroll and verify themselves at a lower cost. Blue Biometrics software allows smartphone cameras to be used as contactless fingerprint scanners in law enforcement, financial services and other applications. We specialize in the compatibility between contactless fingerprint images and contact-based technology for policing. Contactless fingerprint capture via smartphone camera is the cheapest way to distribute a fingerprint scanning capability that can be used for external databases. -
33
NOVOVISION
NOVOMATIC
NOVOVISION™ is an innovative new casino management software that uses the latest cutting edge technologies. It has extensive features to cover all aspects of a modern gambling operation. In an industry that is constantly changing, a CMS must be more dynamic and flexible. The modular design of the system allows for easy customization and flexibility depending on operator needs and legal obligations. This comprehensive software package is used to operate 40,000 gaming machines, 3,300 betting terminals, and 1,300 cash machine worldwide. The system's patented biometric technology is a highlight. It provides the most innovative and secure cashless experience available. For entry purposes, fingerprint and face recognition is used to ensure distinct identification of customers. -
34
EncryptScan
EncryptScan
$20 per monthThis HIPAA-compliant scanner app saves time and protects sensitive documents. Insecure apps and inefficient workflows can cause serious damage to your business. Securely capture field documents and share them with your team in a matter of seconds, while remaining HIPAA compliant. EncryptScan automates the process of securely taking documents from the field and sending them back to the back office in real time with HIPAA compliance. Scan paper documents, insurance cards and more. Automatic edge detection. Editing options include rotating, filtering, and cropping. Biometric access control via facial/fingerprint identification or PIN. Compatible with any EMR/EHR/record management system. EncryptScan uses biometric authentication to protect your documents. Scanned documents cannot be accessed from the camera role or from outside EncryptScan. Advanced document scanning algorithms allow you to scan pages automatically in just seconds. -
35
Nomidio
Nomidio
$3.88 per user per monthThe world's leading unified Identity and Authentication Service. Nomidio is a specialist in protecting identities. Our federated cloud of identity allows companies to eliminate unnecessary PII. We also enable secure customer identification for loan application, verification of customers to access accounts information, and many other purposes. The Nomidio Identity Cloud is an identity vault that is extremely secure and quantum-ready. The ID cloud provides multiple identity services to multiple organisations, eliminating the costly risk of companies propagating identity data as it is today. Our parent company's Quorum multiparty split-key cryptography is used to secure the identity data. Anyone wishing to decrypt any record will need the consent of other key fragment holders. Nomidio IDC, a lightweight, highly efficient biometric identity and authorization tool that is 100% SaaS, can be deployed in just minutes. -
36
Neikom Control de Presencia
Neikom
Presence Control AutoNET Press. The most advanced devices * The best deals * Security is the most important. Time control and attendance Our time management solutions include biometric time clocks that can be used by employees with different technologies. These include fingerprints, facial recognition (covid19), which is a contactless technology that can take the employee's temperature at sign in (covid19), as well as RFID proximity cards, which are one of the most popular technologies for their simplicity and low price. Customers trust our solutions for control on-site, access and adapted production control systems in these times of tight market and law. Since 2007, Neikom has been creating new value for companies by providing solutions to control hours worked and the know-how required to make a company a success. -
37
MobileID.io
ARIADNEXT
Digital identity can be defined as the identity of an entity via the internet. It is the technological link between real entities (person, company, organization) and virtual entities (i.e. its digital representations. Digital identity allows an individual to be identified online and connects them to online services. Digital identity is now able to prove that the user is who they claim to be. It also allows the user to securely identify themselves to online services. These digital identities are available to governments, private companies, and regulated activities (banks online, Fintech, etc.). To protect themselves from fraud and comply with increasingly restrictive regulations, while still being accessible to the maximum number of people, -
38
Assently CoreID
Assently
You can provide identification using any of the Nordic electronic IDs such as the Swedish BankID, Norwegian BankID or Danish NemID. It is easy to integrate CoreID in your systems on any platform. Reduce time spent on infrastructure maintenance, upgrades and other tasks. Your online security can be improved and you can offer your customers modern authentication solutions with electronic ID. Your customers can identify themselves on any device using Swedish BankID, Norwegian BankID and Danish NemID. Assently is ISO 27001 and GDPR certified. This international standard for information security is the international standard. Assently's premium identification software CoreID allows you to easily prove your customers' identities with electronic IDs. Assently CoreID can be easily customized and configured to meet your specific needs. You can choose which countries' eIDs you want to enable. You can use Assently CoreID on any device - mobile, tablet, desktop - on your website. -
39
ID.me simplifies how individuals prove & share their identity online. The ID.me secure digital identity network has over 98 million users, as well as partnerships with 30 states, 10 federal agencies, and over 500 name-brand retailers. The company provides identity proofing, authentication and community verification for organizations across sectors. ID.me is the only provider with video chat and is committed to "No Identity Left Behind" to enable all people to have a secure digital identity.
-
40
walt.id
walt.id
FreeWe offer holistic digital identity and wallet infrastructure used by thousands of developers, governments and businesses across industries. The products are open source and available for self-management (on-premise) or as a managed service (SaaS). Our Digital Identity Infrastructure include the following products and functionality: Issuer SDKs, APIs & APPs: Issue credentials or mint tokens with our infrastructure and white label applications. Wallet SDKs, APIs & APPs: Launch a wallet for your organization, employees or customers to manage access, credentials and tokens. Verifier SDKs, APIs & APPs: Verify credentials or tokens, use powerful verification policies and white label apps. Identity Provider: Enable wallet-, credential- and token-based authentication and identification for your apps. Our wallet infrastructure contains the following products and functionalities: White Label Wallets: Launch identity wallets fast with our open source progressive web app and UI. Embedded wallets: Extend your existing applications with all the identity and crypto capabilities you need. Mobile Wallets: Build a mobile apps (iOS, Android) with our multi-platform libraries and SDKs. -
41
InstantCard
InstantCard
$5.80 per cardYou can easily get the ID cards you need, when you need them. We won't sell your business a printer. We won't sell you any card stock. Our professional designers will create a customized template for you. We don't use generic templates so you get exactly what your employees need on your employee ID cards. Unlimited templates are available so that you can get the identification features you want, when you need them. You can get your employee ID badges the day you need them with same-day delivery. The InstantCard system was created for single-card orders. This applies to small orders as well. This is one way we can make ID card ordering for businesses of any size much easier. You can either enter the information for each employee one-by-one or upload it in bulk via a spreadsheet. You can order as many cards as you need, because we don't have a minimum batch size. -
42
Protecsys 2 Suite
Horoquartz
Horoquartz offers a global, connected electronic safety-security solution with Protecsys 2 suite. You can prevent theft, vandalism and aggression from affecting your company's operations, and help to create a positive environment. Protecsys 2 Suite integrates access control, intrusion detection and video surveillance. It also allows for visitor management and central supervision. We offer a complete line of professional IP cameras, pedestrian and vehicle barriers, image storage solutions, and all related electronic equipment. Horoquartz is a trusted leader in electronic security for over 30 years. Our solution is used by more than 1,200 customers in all areas of activity. Secure and manage access to your premises. Prevent threats, identify perpetrators, and facilitate alarm verification -
43
Resiliant
Resiliant
Blockchain and AI technology allows for a password-less, secure ID authentication that is user-centric, affordable, and secure. Control your digital risks and protect data by blocking unwanted users and devices. Onboarding once for multiple devices, servers, networks, and web sites. No more 2FA codes or matching images that do not protect users or enterprises against SIM swapping and false geolocation. Decentralized IdNFT™ gives users ownership and control over their identity. No private data are stored or uploaded in the cloud. Zero-knowledge proof allows information to be transferred without revealing credentials. -
44
bi-Cube Identity Access Management
OEDIV SecuSys
The most difficult task in today's heterogeneous IT infrastructure is managing data, accounts, and access authorizations for employees. The question is always: Who can do what, when, and where? Each person in a company, or external support, requires certain authorizations depending on their job or position. These authorizations should be available to employees when they join the company. They should also be automatically withdrawn if an employee leaves. An excellent IAM system (Identity Access Management System) allows for the distribution of authorizations based on conscientious role modeling. It can also be integrated into existing systems and is traceable and verifiable. This reduces IT costs, such as with the automation of the Active Directory. -
45
IBM Verify
IBM
Cloud IAM can be combined with deep context for risk-based authorization to provide secure, frictionless access for your workforce and consumers. Identity and access management cannot be separated as organizations modernize hybrid multicloud environments with a zero trust strategy. Cloud IAM strategies must use deep context to automate risk protection, and authenticate every user to any resource. Your business needs should be considered when designing your journey. As you design and tailor the cloud IAM architecture that will either replace or enhance your existing infrastructure, you can protect your investments and preserve on-premises applications. Your users expect one-click access from any device, to any application. New federated applications can be integrated to one sign-on (SSO), embed modern multifactor authentication (MFA), simplify logistics, and provide developers with consumable APIs. -
46
SIVIS Identity Manager
SIVIS
A large number of authorizations and identities can lead to a lot of work, especially if they must be manually administered by employees. The right IAM tool (Identity and Access Management Tools) will help you manage your administration and alleviate your employees. SIVIS Identity Manager automates the recording, control, and administration of users. It also allows for the management of access rights and approval processes. The workflow definition allows for easy implementation of processes and mapping in complex systems. You can easily make mass changes with the SIVIS Identity Manager. You can quickly and easily add or delete new attributes, such as roles in destination systems for any number of users. Administration using the SIVIS Identity Manager. You can also create an individual confirmation strategy or implement a two-man policy. -
47
EKEMP ABIS
EKEMP
EKEMP ABIS is a large-scale biometric verification system that supports fingerprint, face, and iris biometrics. The highly modular architecture of the software makes it easy to customize solutions to your business processes. ABIS is a solution that can be used for large projects, such as national identification card and social welfare, border controls, elections (voter verification and registration), criminal investigations, finance, etc. -
48
Access Auditor
Security Compliance Corp
Access Auditor automates user access reviews and user entitlement reviews. Access Auditor alerts you to any changes in user access rights and monitors for violations of separation of duties. It also shows who has what access. Any AD/LDAP, Database or REST API can be used to import users. Enterprise roles (RBACs) can be modelled and defined, which allows for full RBAC reviews and provisioning. Access Manager uses the same ease-of use to automate provisioning and managing user access rights. Role-based access controls can be used to manage any system that has a database, REST API, or LDAP. SCC's simple and powerful approach to Identity Management allows for rapid success at a low cost. Access Auditor has a 100% customer success rate and can automate user access reviews in less than a week. -
49
AppSmart Identity
AppSmart
Securely connect everyone with everything. Digital transformation requires that you connect with people, apps, and devices. AppSmart Identity provides identity management and access management for all users across all applications and interconnected systems. This allows you to securely access and manage all cloud migration services as well as all other services from one place. Users don't want multiple passwords. Single sign-on allows users to access business systems from one account. This ensures seamless user experience for all cloud migration services and cloud managed service. Users can ensure that all identities that have access to business systems are verified with strong authentication and multi-factor authentication. Policy-based MFA stops unauthorized users from accessing corporate information with passwords alone. All your cloud managed services, eg. Manage all your users, groups, and devices. -
50
Logto
Silverhand
$0Logto is a modern Auth0 replacement designed for SaaS and apps. It is a great choice for growing companies and individuals. Comprehensive Identity Solution Logto SDKs enable easy authentication. Supports multiple sign-in methods, including social and passwordless. Customize UI components to match brand. The infrastructure is ready-to-use, so there's no need to do any extra setup. Provides a ready-to-use management API It offers flexible connectors to customize and scale, and is customized for SAML, OAuth and OIDC protocols. Enterprise-ready, with role-based Access Control (RBAC), Organizations (multi-tenant applications), User Management, Audit Logs, Single Sign-On (SSO), Multi-factor Authentication (MFA), and Single Sign-On (SSO).