Best authID.ai Alternatives in 2024
Find the top alternatives to authID.ai currently available. Compare ratings, reviews, pricing, and features of authID.ai alternatives in 2024. Slashdot lists the best authID.ai alternatives on the market that offer competing products that are similar to authID.ai. Sort through authID.ai alternatives below to make the best choice for your needs
-
1
Udentify
Fraud.com
12 RatingsKnow the real identity of your customer, user, or employee with the Udentify Identity Verification and Biometric Authentication solution. Challenges we solve: - Identify verification - Onboarding - New account opening - Age verification - Fraud prevention - Biometric authentication - Passwordless authentication - Strong customer authentication - KBA replacement - KYC and AML compliance Udentify is iBeta Level 1 and Level 2 certified, quickly integrates into your website or mobile app and lets your users navigate from a desktop to a mobile experience as desired. -
2
ARGOS Identity
Argos Identity
5 RatingsARGOS Identity is a leading provider of Identity as a Service (IDaaS), offering comprehensive solutions for all your identity verification needs. Our mission is to enable you to identify Anyone, Anywhere, Anytime with ease. We specialize in simple, effective KYC implementation, empowering our clients to deliver a seamless digital onboarding experience. Our solutions allow you to build your identity management system around your business goals, providing your customers with a smooth, hassle-free KYC process. FACE Identity: This innovative service utilizes advanced facial recognition technology to match faces against a database of stored images, ensuring the accuracy and security of user verification during onboarding. ARGOS Textify: An AI-powered tool that automates the extraction and review of critical data from various documents, significantly reducing the time and cost associated with manual verification. -
3
HyperVerge
HyperVerge
HyperVerge Inc is a B2B SaaS company providing AI-based identity verification solutions to enterprises in Financial Services, Telecom, Gaming, E-commerce, Logistics, EdTech, and Crypto. Identity Verification Platform helps in onboarding customers seamlessly, fraud checks, face authentication, age verification, document verification, eKYC and other services. Clients onboard over 30 million customers every month using this product. With just an ID and a Selfie, verify the identity of your customer in seconds. Prevent fraud and ensure compliance with AML/KYC. With an accuracy of 99.5% (the highest among competitors) and 600+ million KYCs across 200+ countries since 2019, HyperVerge’s technology is built for scale. They work with SBI, LIC, Jio, Vodafone, Bajaj Finserv, L&T, Swiggy, WazirX, Coinswitch, Razorpay, ICICI Securities, SBI Cards, Grab, CIMB, FE Credit, Home Credit, and 100+ clients across 5+ geographies for their onboarding journeys. -
4
Oz Liveness is a world-leading facial recognition and authentication software that is used by private and public organizations around the world to reduce the risk of biometric fraud. It prevents deepfake attacks and spoofing attacks. Oz Liveness uses advanced algorithms to detect many forms of biometric spoofing. This includes 3D and 2D masks, photos and videos displayed on iPads or laptops, and photos and videos. Our technology has been approved by the industry's most stringent testing standard, ISO30107 certification. This certification helps organizations verify that they are dealing with a real person within seconds. It also lowers compliance risk and fraud risk.
-
5
1Kosmos
1Kosmos
1Kosmos allows citizens, customers, and workers to transact securely with digital services through passwordless access. The BlockID platform unites identity proofing with strong authentication to create a distributed digital identity that prevents identity fraud, account takeover, identity impersonation, and fraud while providing frictionless user experiences. BlockID is the only NIST-, FIDO2 and iBeta certified platform that performs millions upon daily authentications for some of the most important banks, telecommunications, and healthcare organizations around the globe. -
6
Auth Armor
Auth Armor
FREE for 10,000 active users! 4 RatingsYou can harness the power of biometrics to make authentication simple for any website or application. This will allow you to create a new way to log in and authenticate online. You can authenticate your users using their smartphones with 2-factor and passwordless authentication. Auth Armor provides secure authentication for every user. It does not require weak passwords or complicated codes. We have created powerful APIs, SDKs and libraries that allow you to create what you want, however you want it. You can use our tools to add authentication to any app using any flow. We offer protection for workers and consumers, so you have the power and flexibility you need to secure any information. Auth Armor is the most efficient mobile authentication system available. Instant push messaging is available to users' devices, enabling them to log in and authenticate quickly. -
7
Onfido
Onfido
How can you verify that real people are online? Onfido helps companies identify real identities using the help of AI and identity experts. With just an ID and a picture, your customers can prove their identity wherever they are. You'll be able to secure your business and have all the information you need. Your user's digital account can be linked to their real identity using only their ID and their face. You can then re-verify your user's digital account or authenticate them with a selfie. Onfido's identity authentication has helped businesses like yours to onboard more users and reduce fraud while freeing up resources for their internal teams. Identity verification and authentication can help you drive business results. Our AI-based technology determines if a user's government-issued ID has been authenticated or fake, and then compares it with their facial biometrics. This is how we provide companies with the security and assurance they need to securely and remotely onboard customers. -
8
Nomidio
Nomidio
$3.88 per user per monthThe world's leading unified Identity and Authentication Service. Nomidio is a specialist in protecting identities. Our federated cloud of identity allows companies to eliminate unnecessary PII. We also enable secure customer identification for loan application, verification of customers to access accounts information, and many other purposes. The Nomidio Identity Cloud is an identity vault that is extremely secure and quantum-ready. The ID cloud provides multiple identity services to multiple organisations, eliminating the costly risk of companies propagating identity data as it is today. Our parent company's Quorum multiparty split-key cryptography is used to secure the identity data. Anyone wishing to decrypt any record will need the consent of other key fragment holders. Nomidio IDC, a lightweight, highly efficient biometric identity and authorization tool that is 100% SaaS, can be deployed in just minutes. -
9
cidaas
WidasConcepts
Cidaas is the best solution for fast and secure identification management. Using cidaas, you can create one identity per user across all channels. cidaas, which is based on OAuth2.0 standards and OpenID Connect standards provides strong API security. It also integrates Bot Net Detection with Fraud Detection to ensure a secure journey through all your business channels. This is how modern identity and access management works. Comprehensive feature set allows for easy integration and implementation of all systems and use cases. We handle it so that you can concentrate on your core business. You don't have to worry about maintenance and operation. Users don't have to worry about pins and passwords. They are an unattractive barrier to digital access and make it difficult for them. Passwordless authentication secures your digital applications and offers your customers a unique customer experience. The login is the first thing that your users see. -
10
FortressBA
Fortress Identity
A mobile and web-based biometric user authentication solution can help you strengthen security and eliminate passwords. Fortress Identity introduces a biometric API to simplify secure authentication. Voice authentication can be implemented directly in the browser. You can also expand the API to include the user’s smart phone for multi-factor authentication. Secure account access and transaction authorization -
11
LastPass
LastPass
$4 per user per month 32 RatingsLastPass is the leader in password and identity management solutions, trusted by individuals and organizations of all sizes worldwide. Millions rely on LastPass daily to create, store, manage, and protect their most important credentials, keeping them secure, private and always within reach. With LastPass, anyone can effortlessly log in to life or work anytime, anywhere. -
12
Transmit Security
Transmit Security
The Future of Authentication is Passwordless Agile. Instant. Flexible. You can eliminate passwords and deliver identity experiences that delight all your users. Anywhere, anytime. Secure and seamless customer authentication via any device or channel. The mobile can be used as an authenticator. A network of trust is used to identify each user. This technology and installation provides the best experience and impact. Transform complex authorization, authorization, and risk policy decisions into simple trips. Flexible policy orchestration engine that works with all applications and channels. Protect your workforce and workplace, whether you are at work or away. Enjoy the benefits of risk-based technology that provides unbreakable security regardless of where you are located. Passwordless technology will make your enterprise more secure. -
13
OARO Identity
OARO
Advanced facial recognition allows us to connect people with their identities, simplifying the processes for large enterprises of all sizes. OARO IDENTITY provides an end-to-end solution that allows user authentication and authorization across devices and business lines. This reduces cost and complexity, while improving security and user experience. All organizations need to manage their identity and protect their data. Traditional solutions are no longer able to provide the user experience and security required in today's business environment. This is evident in the increasing frequency of data breaches by industry leaders and the government. OARO IDENTITY provides an end-to-end solution that allows clients to authenticate and authorise users across devices, business lines, and organizational boundaries. It also reduces complexity, costs, and improves user experience and security. -
14
Veriff
Veriff
Be confident that people are as honest and truthful as they claim to be. Veriff is the online infrastructure for identity verification, KYC and trust. Veriff's identity verification platform and KYC platform is a leading AI-driven technology that allows customers and users to be onboarded in seconds. Veriff is the industry leader in identity verification, KYC automation and identification fraud prevention. This allows your business to comply without losing new customers or users. Veriff's identity verification platform boasts a 98% check automation rate and a 6 second average decision speed. More than 9,500 identity documents are covered. 95% of users are verified the first time. -
15
FaceOnLive
$0 25 RatingsWelcome to FaceOnLive, your trusted provider of fully On-Premises Biometrics & ID Verification Solutions. Our advanced suite of services encompasses state-of-the-art technologies including Face Recognition, Face Liveness Detection, ID Document Recognition, ID Document Liveness Detection, and Touchless Fingerprint Recognition. With a focus on security, accuracy, and convenience, our solutions empower businesses to enhance customer onboarding processes, strengthen access control measures, and mitigate fraud risks effectively. Whether in banking, healthcare, government, or beyond, FaceOnLive delivers tailored biometric solutions to meet your organization's unique needs. Elevate your security standards, streamline operations, and build trust with your customers through cutting-edge biometric authentication. Join us as we pioneer the future of identity verification and authentication. -
16
Hive.id
Hive.id
You can separate fake signups and real users. This will help you protect your good users against account takeover. While free trials are great, don't let bad actors waste time or money. Align your risk with your business objectives to prevent fraudsters and bots signing up and causing damage to your brand and bottom line. Detect suspicious user access in real time without any manual overhead. Automate alerts, step up authentication, and account recovery processes, depending on the level of risk. Detect email addresses that appear undeliverable or fake. You can now identify low quality signups by adding different signals. Your user experience is still excellent, but it now aligns with your business objectives. All companies face the dilemma of whether to buy or build a security solution. Hive is a cost-effective option that can be brought to market in a shorter time. -
17
SmileID
Electronic Identification
SmileID is the new standard in face biometrics. Face biometrics solutions that verify identity remotely. SmileID conforms to strict KYC/AML regulations. SmileID's unique UX works on all channels, including mobile, tablet, desktop, and digital platforms at branch offices. Enjoy an omnichannel experience. Our API toolkit allows you to improve your omnichannel customer experience across all your operations, regardless of industry. Our Facial Biometric authentication, Advanced and Qualified Electronic Signatures, and Video IDentification services are changing the way customers and companies interact. Current eKYC solutions powered by Artificial Intelligence, Machine Learning, allow businesses of any sector, including banking, insurance, financial, and investment services, digitally transform their operations, reduce digital customer onboarding cost, and offer a unique user experience. -
18
Mitek Mobile Verify
Mitek
Mitek's Mobile Verify® can help you create certainty even as identity fraud increases in today's digital age. It combines linked and layered automated technology with the top forensic experts around the world to quickly detect identity fraud and verify customers accurately. This increases approval rates and security. Mobile Verify®, is also flexible. It integrates easily with existing systems, delivering an intuitive and simple customer experience. Mobile Verify®, makes life easy for everyone, except fraudsters. Integrating it with your existing tech stack will allow you to onboard customers who matter more seamlessly and increase their brand loyalty and brand confidence. All this while reducing costs associated with common attacks and friction points. Ensure that the user captures a high quality image on the first attempt. Verify that the identity document is authentic and unaltered. Connect the user to the identity file to establish a trusted identity profile. -
19
It'sMe
Acceptto
Employees hate passwords just as much as you hate managing password vulnerability. Increased security risk, fatigue, cost, and cost are all associated with more passwords and tokens. It is time to get rid them all. 89% of security professionals believe that a more advanced multifactor authentication tool that provides continuous, behavior-based authentication would improve their company’s security posture. Acceptto offers Intelligent MFA, which intuitively authorizes users to access applications and continues authenticating after authorization. Even if hackers have already obtained passwords, we prevent account takeovers. ItsMe™, Intelligent Multi Factor Authentication, (MFA) increases security by authorizing access attempts at a registered device in real time, whether it is through a push notification, verification code (SMS/TOTP, email, etc.). You can authenticate access even if you are offline using our timed-based one-time password (TOTP), security keys, or biometric options. -
20
iProov
iProov
Remote users can be authenticated online using Genuine Presence Assurance for verification and onboarding. Organizations that use iProov's biometric authentication to authenticate or onboard are seeing significant benefits. US Government Penetration Review has given a clean bill of health. Unique active threat management system that certifies resilience. No matter what platform, format, or device you use, this system is independent. iProov is the global leader in Genuine Presence Assurance. Our unique technology is used by banks, governments, travel agencies, and healthcare providers all over the globe to verify the online identity and health of citizens and customers more securely than ever before. GDPR compliant & eIDAS accredited. Credentials are not stored on devices. The most secure organizations in the world use this device. Five continents have been covered. Millions of authentications delivered worldwide -
21
Nok Nok S3 Authentication
Nok Nok
Authentication is the "frontdoor" to digital services. The Nok Nok™, S3 Authentication Suite (S3 Suite), provides passwordless authentication that's more user-friendly than legacy authentication and is more secure then legacy 2FA. This results in better user engagement and greater security. From seamless on-boarding and progressive profiling to easy bootstrapping new devices and account recovery to suspension and deprovisioning users. Passwordless authentication for Desktop Web, Mobile Web and Mobile Apps. Also, integration for authenticating with call centers. Authentication to cloud services, and - when used with the Nok Nok IoT SDK - to IoT devices. Nok Nok passwordless customer authentication platform provides omnichannel, frictionless authentication for any device. The platform's extensible architecture makes it possible to support third-party biometric products and new authenticators. -
22
Bravura OneAuth
Bravura Security
Protect your organization immediately from brute force and phishing attacks. Get rid of passwords with Bravura OneAuth powered HYPR. Your workforce will enjoy a passwordless sign in experience that is fast, simple, and significantly increases security across your security infrastructure. Bravura OneAuth uses one touch biometrics to act as access points, making authentication for your workforce as simple as unlocking a mobile phone and significantly more secure that traditional Multi-Factor Authentication. It replaces the inefficient and slow-to-implement MFA methods. Passwords are removed completely from the solution to reduce the chance of compromised credentials. -
23
Q5id
Q5id
A proven, universal identity that protects consumers and businesses from identity fraud. Everyone's identity should be protected. Every business should know its customers. Enrolling customers or employees in the Q5id patented identification proving system will help you reduce fraud in your company. Are you looking to improve your business' identity assurance? We can help you protect your business from identity fraud by enrolling in Q5id. To prove your customers' identity, you can use a simple mobile app. Your customers can use Q5id anytime, anywhere to authenticate transactions once they have enrolled. Customers can enroll in Q5id to prove their identity and meet Know Your Customer (KYC), while also ensuring that accounts comply with NIST-recommended security measures. -
24
DOOT
DOOT
Instantly share official documents with "Authorized to-know personnel". Our proprietary technology allows you to create contactless payment zones. Customers can be onboarded using automated image capture technology and auto-fill forms. Geo-location and time stamps provide human presence assurance. Online MFA via DOOT 1iD. Secure digital identity. DOOT leverages the power and patented technologies of DOOT 1iD. This allows citizens to manage their digital identities from their mobile devices. Ideal for use-cases that have high footfall and long queues, such as banks, museums, cinemas, and airports. Clients can now validate their official iD's, ticket stubs, and many other items without the need to pair or use expensive data networks. Each transaction is automatically recorded, with accurate geo-location and a time stamp for the most seamless customer experience. -
25
Jumio
Jumio
Businesses are finding it increasingly difficult to trust that an individual is who they claim to online, as identity theft and account takingovers are on the rise. Jumio's identity verification and eKYC solutions use the Jumio KYX Platform. It leverages biometrics, AI, and the most recent technologies to quickly and easily verify the digital identities both of new customers as well as existing customers. Jumio offers a seamless and intuitive user experience, which takes less than one minute to complete. Jumio supports more languages and document types than any other software. Jumio seamlessly integrates with websites, iOS and Android apps via APIs, SDKs, webcams, and webcams. It integrates quickly into your website or mobile application and allows your users to switch between a desktop and mobile experience as needed. All data is encrypted with strong AES256-bit encryption and is sent and stored securely. Jumio is PCI DSS Level 1 certified, which demonstrates how serious we take data security. -
26
IdentityX
Daon
Daon's IdentityX platform is multi-modal, vendor-agnostic, and future-proof. It addresses all aspects of customer identity lifecycle. Trust in digital identities is built on a user-centric, unified view of identity creation, management, and use. The IdentityX Platform offers the following core functions: Identity Establishment via account origination and digital boarding, Omni-Channel multi-factor authentication via mobile, web and call center authentication, Identity recovery and other device and account management functions. Daon's IdentityX Digital onboarding product allows for quick and accurate identification establishment for a variety of purposes, including Anti-Money Laundering checks (AML) or Know Your Customer (KYC). -
27
Veridium
Veridium
Veridium is an AI-based Behavioral biometrics-powered Integrated Identity Platform that provides multi-factor authentication (MFA), digital ID verification and a truly enterprise-grade passwordless experience to employees and customers. It is low code, flexible, and agile. Customers can forget their passwords. This eliminates friction and provides greater security for online connections. We offer a single-step multi-factor authentication solution that offers increased security. Organizations also get higher levels of identity assertion. Veridium provides an end-to-end authentication platform that can handle all your WFH requirements and any VPN solution. It delivers strong, multi-factor, passwordless workforce authentication. -
28
IDcheck
IDcheck
IDcheck specializes in cloud-based, automated Biometric Identification Screening, Fraud Detection, and KYC-AML. We authenticate global identity documents using advanced AI and OCR through our proprietary Facial Recognition and Frictionless Lifeness and Motion Detection algorithms. Fake IDs are difficult to spot for professionals. Fake IDs are not detected by professionals. All background screening on the person who passes must be done on the real person. Organisations are at risk of fraud and AML violations. Logging in to IDcheck is much safer than SMS verification. Key-Based 2-Factor authentication is used. The "pin" is not transmitted or stored. The pin will fail if the device is lost or stolen. However, a Key-Based 2-Factor Authentication system can detect the pin even though it is stored and transmitted. Multiple industry-specific automated portals are available with strict access management, permissions, and internal controls. This includes sanctions and checks for credit & wealth sources. -
29
PortalGuard
BIO-key International
BIO-key PortalGuard IDaaS, a cloud-based IAM platform, offers the most flexible options for multi-factor authentication and biometrics. It also allows customers to reset their passwords and provides a user-friendly interface. All this at a reasonable price. PortalGuard has been trusted by many industries, including education, finance, healthcare, and government, for over 20 years. It can be used to secure access for employees and customers, regardless of whether they are on-premises or remote. PortalGuard's MFA is unique because it offers Identity-Bound Biometrics with the highest levels of integrity and security. They are also more accessible than traditional authentication methods. -
30
Privakey
Privakey
Privakey's transaction intention verification allows for secure and efficient high-risk exchanges between services. Available as a cloud-based service. Your competition is also vulnerable to fraud. Enterprises strive to delight customers while maintaining security and experience. This is a difficult problem that gets more difficult every year. How can you securely engage with customers and gain their trust during sensitive exchanges? Privakey is the answer. Transaction intent verification (TIV), which combines strong identity assurance with contextual response, is an intuitive user experience. TIV is used to confirm payment confirmations, wire transfer approvals, and account update acknowledgments. Our solution uses asymmetric cryptography and mobile biometrics to ensure the integrity of every exchange. -
31
Say-Tec
Finnovant
FreeSay-Tec is our most popular cybersecurity product. Say-Tec combines state-of-the-art biometrics with blockchain technology to protect your data. Say-Tec eliminates the need to use multiple passwords. Instead of using your unique face or voice biometrics, Say-Tec uses your unique face and voice biometrics in order to unlock a device, log into an account, and access private data. Standard web interfaces can invoke Say-Tec during account setup, log-in, or to reset passwords if they have been forgotten. Say-Tec can replace the user-id or password friction when logging in to a website. Say-Tec was designed to support the world decentralized apps, web pages and processing. This is often encountered with Blockchain access, crypto currency and crypto wallets and trades. -
32
MiniAiLive
MiniAiLive
lifetime license 16 RatingsMiniAiLive provides Touchless Biometrics Authentication and ID Verification solutions. We offer security solutions that are based on cutting-edge technologies such as facial recognition, liveness detection and ID document recognition. We also ensure that our solutions are seamlessly integrated with the existing systems of our clients. MiniAiLive is a face recognition app that provides reliable and secure access control solutions. It also includes a passive liveness detection layer. Our app ensures only authorized individuals have access to sensitive areas, services, or accounts. It also minimizes the risk of unauthorized entry through spoofing and impersonation attempts. -
33
Ver-ID
Applied Recognition
Online identity verification is possible by comparing a "selfie", with the user's government-issued photograph ID. It works with laminated IDs like drivers' licenses and biometric passports for security-essential applications. It is rapidly becoming obsolete to rely on insecure and expensive external services to establish identity. Ver-ID Credentials allows for the seamless integration of identity verification into any digital business process. Mobile deployments can be made easy by establishing the identity validity score on the user's mobile device. Ver-ID does not allow users to export or store their images. Identity-as-a-Service products use 'bolt-on biometrics' and so suffer from high false rates or rely on manual checks. Ver-ID Credentials are based on ARI's core face recognition & lifeness detection technology to ensure performance across the widest range of uses. -
34
Trusona
Trusona
Trusona is the pioneer of passwordless authentication in digital businesses. It offers a phishing resistant alternative to SMS OTPs and passwords. Trusona Authentication cloud is a platform that allows you to add passkeys on your website in the easiest, fastest and least expensive manner. It increases business growth and profitability by providing sign-ins for your customers that are pleasing to them. It also mitigates top threats such as phishing and account takesovers (ATOs), while providing an UX designed specifically for people. Trusona is trusted by organizations in iGaming and travel, financial services, healthcare, and more for their passwordless authentication initiatives. -
35
Phonexia Voice Verify
Phonexia
Clients can now authenticate over the telephone in 30 seconds or less. This will reduce costs and time. Voice biometrics allow you to quickly and easily access your clients' data. You can also detect fraud attempts directly. Clients can be verified in just 3 seconds using their voice. Your customers will be able to authenticate themselves using their voice biometrics, instead of difficult-to-remember passwords. Phonexia Voice Verify uses Phonexia Deep Embedings™, a speaker identification technology powered by artificial Intelligence to provide fast and accurate speaker verification. Phonexia Voice Verify, a cutting-edge voice verification tool for contact centers, is designed to enhance them with an intuitive security layer. -
36
Alice Biometrics
Alice Biometrics
FreeALICE offers a frictionless, automatic, immediate and accurate online identity verification solution with the highest level of security at an efficient cost, which is purchased without commercial assistance and integrates in minutes. Anti-fraud technology authority with more than 10 years of research and 64 technical papers published. Our algorithm has been evaluated by NIST. Alice Biometrics is the perfect solutions for companies with a need to verify users either for business operations (shared mobility) or due to legal requirements (fintech) -
37
Incognia
Incognia
Location Behavioral Biometrics We create a dynamic location fingerprint by using the unique location behavior pattern of each user. This makes it very difficult for fraudsters or forgers to copy or forge. Incognia's location-based fraud solutions are designed to help financial institutions and retailers prevent account fraud and account takeover. Our precise location technology uses network signals and on-device sensors data to create unique behavioral patterns that allow users to be identified and authenticated. Our solution does not require PII and works in background to provide a secure and frictionless experience. -
38
Uniken REL-ID
Uniken
Accelerate opportunities with confidence in identity and security, while delivering an amazing customer experience. Uniken gives you more than just improved security. It gives you a certain identity. With Uniken, you can go beyond probabilistic approaches for security and identity, with certainty about the user, device, and network connection. You can build your business in the way you want. Allow customers to create or reactivate their accounts in seconds in even the most regulated regions, without risking identity fraud, and without having to enter a physical establishment. Confirm high-risk transaction with biometric assurance, and allow customers to purchase products in-store using biometric authentication. This will create more efficient shopping and strengthen customer loyalty. Uniken can help you create a world in which identity is assured, security is robust, and anything is possible. -
39
BioCatch
BioCatch
BioCatch provides advanced behavioral insights that provide actionable intelligence to global organizations so they can create a secure customer experience. BioCatch analyzes the user's cognitive and physical digital behaviors to identify legitimate applicants from cybercriminals. BioCatch detects behavioral anomalies that could indicate human and non-human cyberthreats like bots, remote access tools attacks, malware, and manual account takeover. BioCatch can detect subtle behavioral indicators that indicate that a victim is being unwittingly manipulated through fraudulent money transfers. BioCatch's Al driven behavioral biometrics technology reduces online fraud and allows online identity verification without compromising the user interface. BioCatch's unique solution is designed to protect identities online and provide a frictionless user experience for mobile and web users. -
40
FACEKI
FACEKI
FACEKI is a Facial Recognition authentication system. FACEKI is a Facial Recognition authentication platform that creates safer and more accessible user experiences. It uses state-of-the art facial recognition technology. It is a cloud-based, cross-devices security technology that is highly secure. It can be easily integrated with any online platform, website, or app to provide users with powerful facial recognition logins and onboarding capabilities. FACEKI's goal is to make account logins seamless, easy, and more secure than ever. -
41
ThumbSignIn
ThumbSignIn
$3 per user per monthWe have you covered, no matter what channel or device. You can choose from a variety of user-friendly authentication options, including passwordless biometrics and 2FA, to find the right authentication solution for your business. To improve security and user experience, start with 2FA. Then move on to biometrics-based authentication. Our SaaS-based authentication service, RESTAPs, mobile SDKs, and UI widgets offer a powerful combination software components that can all be used to create omni-channel authentication experiences across mobile, web, phone and IoT. It's time to remove the security burden from users! Our mission is to make the digital world more secure and open up access to strong authentication technology. ThumbSignIn is a SaaS-based service that helps companies choose the best way to enhance their existing systems with two factor authentication (2FA). -
42
iCrypto
iCrypto
FreeThe iCrypto SDK is designed to work with all of our iCrypto cloud services. It can be integrated into existing Enterprise Apps, or deployed as iCrypto App and used as a standalone password-less verification solution. The iCrypto SDK combines the most recent cryptography technologies with device-level security management to create a software token that can be used in a variety of industries as a biometric ID while on the move. iCrypto SDK offers authenticator PKI signatures and a range cryptographic protocols like TOTP/HOTP/OCRA/MTP. It also provides push-based authentication, network-based biometrics such iris scan, fingerprint, face/voice recognition, third-party authorizations, secure storage, context collection, and a host of security features. -
43
Samsung Pass
Samsung
Forget about forgotten passwords. Security is as easy as a glance or touch. To log in to your apps or websites securely and quickly, you only need to use your biometrics. Samsung Pass is an identity management as-a service that allows secure access via biometric authentication. Authenticate using biometrics, without the need to input an ID & Password. To log in to websites, you don't need to enter an ID & Password. Samsung Pass offers enhanced user experience through the integration of advanced biometrics. Samsung Knox will secure and encrypt your biometric template. Samsung Pass uses FIDO (Fast Identity Online), technology to provide secure and simple biometric authentication services. -
44
HYPR
HYPR | The Passwordless Company
$4.00 per user/month HYPR is The True Passwordless Company with cutting edge technology and backed up by major investment partners. The HYPR Cloud Platform allows Passwordless Authentication across an enterprise workforce. It combines the security and convenience of a smartcard with the convenience of a smartphone. With HYPR, businesses can eliminate customer passwords and provide a superior login experiences for your customers as well. Consumer-grade usability increases the productivity of your employees and reduces friction for your customers. -
45
Keyless Authenticator
Keyless Technologies
2 RatingsNothing to forget. Nothing to steal. You are the key. To protect your remote workforce, adopt zero-trust authentication. This will allow you to enable strong customer authentication with just one glance. Anywhere. Anytime. Any device. To eliminate fraud, phishing, and credential reuse, embrace passwordless, multifactor authentication. This will enhance customer and employee experience and protect their privacy. Unique technology enables you to achieve unique capabilities. Hardware Agnostic. Keyless does not rely on any device hardware or sensors. Keyless can be deployed on many devices and appliances. Eliminating passwords can help you achieve better results for your company. Top-Notch Security No central honeypot, no data on user devices. Data cannot be stolen or lost, as no private information is available to anyone except the user. Passwordless passwords can reduce password-related costs. Password Reset Costs. The average helpdesk labor price is $70 -
46
OnzAuth
OnzAuth
$50 per monthImplement authentication in 5 minutes or less, simple support for magic link and WebAuthN, no passwords required, no callbacks needed. Our SDK is a vanilla Javascript Framework that can be used with any frontend language. Framework-specific documentation and support are coming soon. Developers shouldn't have to reinvent authentication over and again. We can solve both Authorization (Passwordless), and Authentication (Passwordless). You can integrate with our SDK in minutes or use any standard OAuth or JWT library in a variety languages. -
47
Unikname
Unikname
€150 per yearIntegrating the next-generation strong authentication will protect your web accounts from phishing attempts. Protect the admin account for all websites you manage. Your clients can register without a password. The next-generation social authentication protects your privacy. Manage web access rights for your employees and partners easily. Install Unikname for all web environments in minutes! The dedicated dashboard allows you to manage trust certificates and web access. Manage access rights for admins and users. Unikname can be used as the default authentication method. Disable standard authentication. You can fine-tune Unikname's login button's style options. Unikname uses the most recent OAuth and OpenID Connect authentication protocols standards. Unikname allows you to generate a trust cert attached to your webdomain name. -
48
AuthX
AuthX
$2.99 per monthThe world's most advanced authentication platform. Log in online anywhere, anytime with your face, finger or palm. You can also use push or any other mode we support to log in. It's secure authentication that is smart, simple, and sometimes magical. Authx can be used to log in to any system or application from any location. You can log in with any device and change your preferred method whenever you want. Authx is safe, scalable, and very easy to use. Register once and you can use it everywhere. Authx offers all the time-saving options you need to securely authenticate. Authx is reliable and secure, and our experts are available to assist you 24/7. Authx Mobile is available for iOS and Android. Push an authentication request to your phone. Log in using your Palm, Finger, or Face. Authx Mobile allows you to authenticate using Push and biometrics on the phone. Logging in to your applications is as easy as touching your access card or being within range with BLE. -
49
Innovatrics ABIS
Innovatrics
Innovatrics ABIS supports facial recognition, fingerprint, iris, and fingerprint identification. With minimal hardware requirements, you can achieve fast and accurate performance. Our ABIS can be customized easily due to its modular architecture. Open APIs make it easy to integrate with other systems and avoid vendor lock-in. Our ABIS has been successfully deployed to hundreds of large-scale biometric projects, including the most complex biometric systems in the world. Our fingerprint, facial, and iris recognition technology allows you to quickly find a solution that suits your business processes. Based on independent NIST testing, our algorithms are consistently ranked amongst the best. You can create an identity management solution that is tailored to your requirements using our ABIS modules. You can add modules or upgrade as needed. We offer flexible licensing policies to meet the needs of every project. -
50
Prove
Prove
Prove's PhoneCentric Identity™, which has 1 billion+ small business and consumer identity tokens under continuous administration, helps companies to mitigate fraud and increase revenue while reducing OPEX online. To increase signups on any channel, authenticate identities and pre-fill forms using verified data. To prevent fraud and support multiple identities, access a trusted registry with 1 billion+ phone numbers-based identity tokens. Prove is the modern method of proving identity using a phone number. You've probably seen the news: digital trust is under constant attack. Cyberattacks, nation-state attacks and international fraud rings all threaten the ability of consumers and companies to trust each other online.