Best vIDix Identify Alternatives in 2024

Find the top alternatives to vIDix Identify currently available. Compare ratings, reviews, pricing, and features of vIDix Identify alternatives in 2024. Slashdot lists the best vIDix Identify alternatives on the market that offer competing products that are similar to vIDix Identify. Sort through vIDix Identify alternatives below to make the best choice for your needs

  • 1
    Auth0 Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    Auth0 by Okta takes a modern approach to Identity and enables organizations to provide secure access to any application, for any user. Auth0 is highly customizable, and simple yet flexible. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is a part of Okta, The World’s Identity Company™. With Auth0, you can rapidly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with your own custom, secure, and standards-based unified login. With Universal Login, users are redirected to a central authorization server. Because authentication takes place on the same domain as the login, credentials are not sent across sources, increasing security and protecting against attacks like phishing and credential stuffing. OAuth 2.0 recommends that only external user agents (like the browser) should be used by native applications for authentication flows. Universal Login provides this in a secure manner while also enabling SSO.
  • 2
    Uniqkey Reviews
    See Software
    Learn More
    Compare Both
    Uniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies with enhanced control over their cloud infrastructure, access security, and employee management. Uniqkey combats the most significant threats to company infrastructure by safeguarding critical systems and company credentials with state-of-the-art encryption. It also offers unique insights and a comprehensive view of IT infrastructure, employee access, and security scores, making it a valuable tool for IT teams to monitor security policies and assess the impact of awareness campaigns with confidence. With powerful integrations and synergies with existing infrastructure such as Microsoft, IT managers can quickly provision or de-provision users for seamless onboarding and offboarding, all while protecting their entire IT infrastructure with advanced encryption. Engineered by leading European security experts, we leverage the latest encryption methodologies and technology, including offline encryption of all our data. Our modern tech stack and servers, hosted locally in Denmark, ensure maximum security, data integrity, and compliance with European regulations, providing our customers with peace of mind.
  • 3
    Securden Unified PAM Reviews
    Privileges and associated credentials are extremely important as they grant access to your organization's most sensitive information. The type of sensitive information varies a lot based on the industry. For example, healthcare organizations hold a lot of patient data and banks and financial institutions hold payment details, customer data. It is important to lock down access to these privileged accounts. Often, these accounts are left unmanaged and spread around the entire organization. You need a Privileged Access Management solution like Securden Unified PAM that helps consolidate all privileged identities and accounts into a centralized vault for easy management. Restrict access to these privileged accounts and enforce principle of Just-in-time access. Users can launch one-click remote connections to IT assets they have access to. Monitor and manage remote sessions launched by users, third party vendors, IT admin with shadowing capabilities. Eliminate local admin rights from endpoints and use application control policies to efficiently enforce Zero-Trust without impacting productivity. Record and track all activities with comprehensive audit trails and actionable reports and ensure compliance with industry standards.
  • 4
    Dashlane Reviews
    Top Pick

    Dashlane

    Dashlane

    $4 per user per month
    15 Ratings
    Dashlane can fill all your passwords, payment details, and personal information wherever you need them. Yes, we are a password manager. We can simplify your online life in a profound way. Security for your business. Simplicity for your staff. Breach is most common when passwords are not strong enough, stolen or used again. It's important to have a way to manage them that is both easy and secure. Our patented security system and high employee adoption rate are why we are chosen by businesses. You can control your business credentials and protect yourself against hacks and breaches. We are easy to use, which is why our employees love us. They can keep their personal and business accounts separate but still manage them all in one place. You can save passwords and logins while browsing. You can sync your Dashlane data to all devices automatically, no matter if you're an Apple fanatic, an Android addict, and any combination in between.
  • 5
    vIDix Info Reviews
    vIDix Info protects your registration by accurately capturing visitor information and storing it. Detail visitor information is accurately captured. You can identify all visitors to your facility by scanning their IDs and identifying the reason they visited. vIDix Info allows organizations to track visitors, print badges and integrate with facility access control. Use a software or hardware solution to define what information you want to capture and how it will all be collected. Multiple choice fields can be used to ensure accuracy of data, such as city names and zip codes. The integrated badge designer allows you to create professional visitor ID badges and issue them. The integrated badge designer includes pre-designed templates that make it easy to issue temporary or self-expiring badges. To capture the necessary information during a site visit, create screen layouts that can be as simple or as complex as you need. Include videos and questionnaires required upon arrival or departure of a site visit.
  • 6
    Passwork Reviews
    Passwork provides an advantage of effective teamwork with corporate passwords in a totally safe environment. Employees can quickly access all their passwords, while the rights and actions are closely supervised and managed by local system administrators.
  • 7
    HID SAFE Reviews
    HID SAFE Enterprise, which is a single, central platform, advances security functions in identity management. It breaks down siloed processes and systems within organizations and allows collaboration between departments and teams. HID SAFE Visitor Manager automates all aspects of visitor lifecycles for any organization. This web-based solution allows for visitor preregistration, security background checks, access authorizations, check-in/check out, badge printing, centralized reporting and audit trail functions. HID SAFE Visitors Manager is a flexible solution that can be configured to meet each customer's specific visitor management needs. This highly scalable solution makes it easy to manage busy sites with high visitor volumes. HID SAFE Risk Analytics allows organizations to extend the power of their security data beyond traditional reporting to use it to predict security operations.
  • 8
    CI Badge Reviews
    CI Badge is a powerful program for issuing ID cards. It supports thousands of users with flexible image capture, robust data connectivity, and unlimited card printing. This allows you to produce ID cards in a simple, secure way. Each version of our CI Badge Card Printing Software can be customized to meet your card printing needs. Our solutions are based on a variety of factors to ensure the best long-term solution possible for your company. Schedule a demo today to get started with your card printing program. Look up a record, take a photo and click print. CI Badge connects your card printer, camera, and database. Using a connected camera, CI Badge and a printer card, you can send print jobs to your card printing machine. You can also import your existing database into CI Badge. Simply search for a record in CI Badge and take a photograph if necessary. Click print to save the file.
  • 9
    walt.id Reviews
    We offer holistic digital identity and wallet infrastructure used by thousands of developers, governments and businesses across industries. The products are open source and available for self-management (on-premise) or as a managed service (SaaS). Our Digital Identity Infrastructure include the following products and functionality: Issuer SDKs, APIs & APPs: Issue credentials or mint tokens with our infrastructure and white label applications. Wallet SDKs, APIs & APPs: Launch a wallet for your organization, employees or customers to manage access, credentials and tokens. Verifier SDKs, APIs & APPs: Verify credentials or tokens, use powerful verification policies and white label apps. Identity Provider: Enable wallet-, credential- and token-based authentication and identification for your apps. Our wallet infrastructure contains the following products and functionalities: White Label Wallets: Launch identity wallets fast with our open source progressive web app and UI. Embedded wallets: Extend your existing applications with all the identity and crypto capabilities you need. Mobile Wallets: Build a mobile apps (iOS, Android) with our multi-platform libraries and SDKs.
  • 10
    PersonID Reviews
    The PersonID-Att fingerprint-based attendance and time tracking system allows you to quickly identify employees and partners and track their arrivals and departures. This fingerprint attendance software is suitable for all businesses with hourly employees as well as educational, government, and other applications where arrivals or departures must be tracked. PersonID-Att's attendance system provides real-time identification (1:N) of an individual. This allows you to create a safer environment, increase efficiency, accuracy, and minimize fraud losses. Here's how it works. Individuals are automatically enrolled by taking a photo and their fingerprints. The system instantly matches a captured fingerprint with the enrolled fingerprints to identify the individual. It then displays the results with a match score and personal information.
  • 11
    Core Access Insight Reviews
    Core Access Insight provides a comprehensive, continuous view and analysis of relationships between identities, access rights and policies across your entire environment. Access Insight's simple-to-use and understandable solution applies analytics to large amounts of access and identity data in your organization. This allows you to identify access risks and drive provisioning and governance controls that manage those risks within your business. Access Insight is more than just a governance tool. Access Insight provides access intelligence that allows you to analyze access and identity data within your organization using advanced analytics tools. This enables you to perform data mining, statistical analysis, and data visualization--drawing on specific governance policies, rules, and risk indicators to provide intelligence and valuable information for administrators, analysts, compliance officers, and incident responders.
  • 12
    MobileID.io Reviews
    Digital identity can be defined as the identity of an entity via the internet. It is the technological link between real entities (person, company, organization) and virtual entities (i.e. its digital representations. Digital identity allows an individual to be identified online and connects them to online services. Digital identity is now able to prove that the user is who they claim to be. It also allows the user to securely identify themselves to online services. These digital identities are available to governments, private companies, and regulated activities (banks online, Fintech, etc.). To protect themselves from fraud and comply with increasingly restrictive regulations, while still being accessible to the maximum number of people,
  • 13
    Touch N Go Reviews
    Touch N Go - A fast, secure and simple way to integrate biometric fingerprint ID into your solution using just FOUR lines code. For seamless integration, a reliable, scalable and high-performing biometric identification solution. Easy implementation and maintenance of fingerprint recognition with minimal learning curve for developers. It provides the best-fit identity solution for workflows that require high security. This keeps developers happy, productive, and IT in control. Organizations can have a cost-effective, turnkey biometric identification system that leverages proven technologies. This allows them to focus on their core business operations.
  • 14
    InstantCard Reviews

    InstantCard

    InstantCard

    $5.80 per card
    You can easily get the ID cards you need, when you need them. We won't sell your business a printer. We won't sell you any card stock. Our professional designers will create a customized template for you. We don't use generic templates so you get exactly what your employees need on your employee ID cards. Unlimited templates are available so that you can get the identification features you want, when you need them. You can get your employee ID badges the day you need them with same-day delivery. The InstantCard system was created for single-card orders. This applies to small orders as well. This is one way we can make ID card ordering for businesses of any size much easier. You can either enter the information for each employee one-by-one or upload it in bulk via a spreadsheet. You can order as many cards as you need, because we don't have a minimum batch size.
  • 15
    eClear 360 Reviews
    Turnkey solutions that are affordable and easy to integrate into existing systems for scaling up operations. eConnect's Identity Management software, eClear360, integrates multiple data sources and ties them to the industry-leading facial recognition algorithm. This platform allows for new insights, revenue protection, and opportunities. The key capabilities include: Identifying anonymous high value patrons, their gaming values and frequency of visits, detecting exclusion patrons, advantage players and patrons who may have committed crimes in past. This is a great tool for helping the operator to know your customer mandates. The Identity Management system uses patented technology to provide operators accurate facial identification, data analytics, and the ability to identify staff members for time clock integrations, detect unwanted guests or individuals, and improve operational efficiency.
  • 16
    Tools4ever IAM Reviews
    Streamline your operations and ensure compliance with HIPPA, SOX, or other requirements. IAM allows for user provisioning, central account management, and role-based access control through the integration of personnel and directory systems. Automated onboarding/offboarding ensures that the right people have access at the right times. You can learn more about how IAM works in your environment. It is a full-time job to manually create, manage, or disable user accounts in today’s complex corporate environment. Tools4ever's IAM user provisioning software connects HR systems, directory services (e.g. Active Directory, LDAP and GSuite) and downstream services. The entire process can be automated, allowing IT staff to recover significant bandwidth.
  • 17
    IAMCompare Reviews

    IAMCompare

    IAMCompare

    $500 per month
    IAMCompare is the only solution that focuses on auditing the integrity and de-provisioning of your Provisioning and De-provisioning processes. We track user access exceptions, identify them and resolve them, which reduces both time and costs. IAMCompare provides companies with direct visibility into their accounts. Our solution delivers results at a transparent cost. Our clients then identify assets (applications databases, devices, and other) that need monitoring and provide relevant account data. IAMCompare combines account and census information to identify actionable anomalies. You can view account access for employees, authorized contractors, vendors, and customers. Use IAMCompare for system access reviews and standardization of vendor, customer, and other third-party user certifications.
  • 18
    Sima Reviews

    Sima

    Active Witness

    Free
    Sima does more than keep bad guys out. Sima is a cloud-based Access Control reader that is highly secure and yet easy to use. Sima can read both facial biometrics and mobile credentials (QR codes). This cloud-based integrated software can issue single (QR only), and multi-factor (facial verification) codes for highly secure and customized facility access. We respect your privacy. To perform facial authentication, we use facial recognition technology. This technology allows us to verify identity, and allow access to a specific location. Only for identification purposes, facial data will be stored on our servers. We will not share your personal data, including your face image, with any third parties.
  • 19
    Juniper Identity Management Service Reviews
    Access to corporate data should be a top priority. Access to corporate data can be abused by insiders who have direct access. User access must be controlled and enforced across all levels of the organization, including mobile and cloud, to ensure the safety of corporate resources. Juniper Identity Management Service improves enterprise security by authenticating and restricting user access. It is the first line of defense for protecting corporate assets and preventing corporate breaches. Employees are identified and assigned corporate roles which determine what data and applications they can access. Juniper Identity Management Service seamlessly integrates to SRX Series next generation firewalls. This allows security teams to match user roles and application activity to security policies. It can then generate detailed user-metrics as well as audit reports for detailed reporting.
  • 20
    Sovrin Reviews
    You can manage your digital IDs online using the Sovrin Network. This open-source project creates a global utility for self-sovereign identities. It is time to change the current system of siloed identity, endless passwords, insecure databases, and siloed passwords. The time has come for frictionless, secure identity verification of one's self-sovereignness. The Sovrin Network, the new standard in digital identity, is designed to bring the trust and personal control of analog IDs such as driver's licenses or ID cards to the Internet. Sovrin is a metasystem that can be used by any application. It allows people, organizations, and other entities to prove their identity using trusted, verifiable digital credentials. "Self-sovereign" refers to the individual who controls their credentials and can use them whenever they like, without having to ask permission from an intermediary.
  • 21
    HORACIUS IAM Reviews
    Management of access rights to systems directly affects the agility of business processes. Choosing an IAM Identity Management platform that ensures security for all applications, data, and access is one of the most important strategic choices that will reduce costs and risk and increase the company's productivity. How can you ensure that your organization has the right levels of access, data, and transactions for all employees? The IAM Identity Management platform can also be integrated with the main Human Resources system, synchronizing information, and performing tasks essential to the smooth running the business. From the initial access at admission to the end of the link, all rights to the system are tracked.
  • 22
    ARCON | IDAM Reviews
    IDAM is a solution that ensures the details of an employee's overall employment tenure are maintained and managed from a single console. Administrators can perform access certification and review activities in a faster and more efficient way. The end users don't have to wait too much to gain access to legacy applications or business applications. You can enhance your digital experience at work by creating a digital identity for each employee, starting from the moment they start working for you. This will allow you to develop and release faster. You don't have to wait for support to respond before you can get back to work. Administrator activities such as adding, deleting, and updating user credentials are now much easier than ever. This reduces the need for help desk support, such as password change, access request, and removal.
  • 23
    C2 Identity Reviews

    C2 Identity

    Synology C2

    $19.99 per month
    Group management allows you to grant or revoke user access. To manage user accounts, you can access the admin console via a browser. A self-service portal allows users to manage their credentials and personal information. You can centrally manage users, groups and workstations. You can easily migrate users from an LDAP, Windows AD server or Microsoft 365 server. Users can reset their passwords, secondary email addresses, phone numbers, addresses, and other details to free up IT staff's time. For fast local authentication, create LDAP servers on-premises. Streamline authentication for SaaS apps with SSO and user accounts provisioning. C2 Identity's low latency hybrid architecture allows you to authenticate locally via an LDAP server for quick offline authentication.
  • 24
    ImageWare CloudID Reviews
    ImageWare CloudID®, a modular software platform, allows rapid development and deployment high-security, yet flexible, biometric identity management solutions. ImageWare CloudID®, which is cloud-ready, can be easily integrated into existing or new cloud-enabled environments. It can also be used as cloud-ready software in traditional networked client servers and data center IT infrastructures. This biometric identity platform is distinguished by two innovations. It can easily be integrated into existing cloud-enabled environments or as cloud-ready software into traditional networked client server and data center IT infrastructures. The system can also be scaled to meet the needs of small organizations and entire counties, providing highly-scalable, real-time solutions. ImageWare CloudID's platform is a collection of configurable software modules that can be used to enhance or improve biometric identity management and credential issue capabilities to existing applications, or to support the development of such capabilities in new applications.
  • 25
    Jamf Connect Reviews
    Organizations need to be able manage and secure mobile employees and their company information without having to bind to Active Directory. Jamf Connect allows users to unbox their Macs, turn them on, and then access all their corporate applications by signing in with one set of cloud-identity credentials. Learn how cloud identity is changing Mac security, and the crucial role Jamf Connect plays in facilitating the process. This overview will show you how Jamf Connect allows users to be provisioned from a cloud identity service in an Apple provisioning workflow. It also includes multi-factor authentication. An identity management solution can save you time, money, and resources. Businesses must consider a new approach to identity management as part of their enterprise strategy, in order to keep up with changing security and deployment requirements.
  • 26
    Microsoft Entra Reviews
    You can confidently make smarter, more timely access decisions for all identities, hybrid, multicloud and beyond. Protect your organization's access to all apps and resources for every user. Secure every identity, including customers, partners, employees, customers, apps, devices, workloads, and apps across all environments. Find and manage the right permissions, manage access lifecycles, ensure that no identity has access to privileges, and ensure that they are properly sized. Your users will be productive with easy sign-in, intelligent security, unified administration, and simple user interfaces. The identity and access management solution that connects people with their apps, devices, data, and protects your organization will help you to safeguard it. Cloud infrastructure entitlement management (CIEM), a solution that monitors, detects, and remediates permission issues across multicloud infrastructure, can help you to identify, remediate, or monitor them. An identity verification solution allows you to create, issue, and verify privacy-respecting, decentralized identity credentials.
  • 27
    UTMStack Reviews

    UTMStack

    UTMStack

    $25 per device per month
    A centralized management dashboard gives you complete visibility into the organization. All solutions in the stack can be integrated with one another and report to a single database. This makes it easy to perform daily tasks like monitoring, investigation and incident response. Both active and passive vulnerability scanners are available for early detection. They also provide compliance audit reports. Manage accounts access and permission changes. Alerts are sent when suspicious activity occurs. Remotely manage your environment, and respond to attacks from your dashboard. Keep track of all changes and gain access to classified information. Advanced threat protection protects servers and endpoints.
  • 28
    MobiKEY Reviews
    Generate exceptional outcomes for your organization with real-time secure delivery of actionable intelligence--whether in a manufacturing plant, in-theater, or in a university parking lot. Your performance potential is unlimited when you have the right analysis. We can help you identify key insights and eliminate your limitations while providing military-grade data security. Route1 helps organizations of all sizes use the data they have, and data they didn’t know they had, to make better decisions and gain enormous advantages...without compromising data security. Protect your data with our patented technologies. Real-time data acquisition and analytics allow you to understand the data. Use rugged, industrial-grade devices to visualize data. Advanced technologies and services allow you to make the most of your data. We can help you make better decisions and achieve extraordinary outcomes by leveraging the data that you already have and the data that you don't know about.
  • 29
    PlainID Reviews
    PlainID is The Authorization Company. PlainID is a platform that allows both Business and Admin teams to easily manage their authorization process. It's based on your business logic. PlainID allows you to implement virtually any type of rule you can imagine, without the need for coding and in fine-grained detail. PlainID makes authorization easier by converting thousands of Roles, Attributes, and Environmental Factors into a few logical SmartAuthorization Policies using our Graph Database decision engine. PlainID offers in-depth analytics and insights. PlainID also provides full audit trails. They are easy to manage using a graph-based UI. Access is determined dynamically and immediately based on user attributes and environmental attributes (time, place, etc.). Access can be granted based on event-based authorizations as well as user attributes. PlainID combines ABAC & RABC to a united policy.
  • 30
    RadiantOne Reviews
    Transform your existing infrastructure into an asset for the entire company with a platform that makes identity a business enabler. RadiantOne is a cornerstone for complex identity infrastructures. Using intelligent integration, you can improve your business outcomes, security and compliance posture, speed-to-market and more. RadiantOne allows companies to avoid custom coding, rework and ongoing maintenance in order to integrate new initiatives with existing environments. The deployment of expensive solutions is not on time or within budget, which negatively impacts ROI and causes employee frustration. Identity frameworks which cannot scale are a waste of time and resources. Employees struggle to provide new solutions for users. Rigid and static systems cannot meet changing requirements. This leads to duplication of efforts and repeated processes.
  • 31
    vIDix Labor Reviews
    There might be differences between departments within your company's policies. Our central policy management system makes it easy to apply the correct pay rules to the right employees. You can quickly access the most frequently used functions. You can set up reporting, exception tracking, payroll processing, and historical reports with just one click. Never again miss an unexpected overtime occurrence, late arrivals or record changes. Notifications and alerts prevent problems that could negatively impact your company. Our expertise lies in integrating vIDix Labor into your existing payroll system. Integrating systems reduces the number of steps required and allows data to only be entered once. Payroll processing is quick and easy. We make it easy to find the information you need.
  • 32
    Virtual Badge Reviews

    Virtual Badge

    Disaster Solutions

    $5.00/month/user
    Virtual Badge is a simple way to issue and use ID cards. Virtual Badge makes it easy to replace plastic badges that can be cumbersome and difficult to manage. Virtual Badge is a simple way to issue and use ID cards. Virtual Badge makes it easy to replace plastic badges that can be cumbersome and difficult to manage. Virtual Badge is an easy and quick way to create ID cards for conferences, meetings, events, and other occasions. You simply need to download the Virtual Badge app and request a badge.
  • 33
    VeriFinger SDK Reviews
    VeriFinger, a fingerprint identification system, is designed for biometric system developers and integrators. The technology ensures system performance by providing fast, reliable matching of fingerprints in 1-to-1 or 1-to-many mode. The software development kit allows for the development of standalone and network-based applications on Microsoft Windows, Linux macOS, iOS, and Android platforms. In 1998, Neurotechnology developed VeriFinger - a fingerprint recognition technology for biometric system integrators. Since then, Neurotechnology has released over 10 major and minor version of VeriFinger. This technology provides the most powerful fingerprint recognition algorithm to date. Neurotechnology's fingerprint algorithms have won numerous awards in competitions, technology evaluations and other contests. These include NIST MINEX and PFT III. Rolling and flat fingerprint matching which is tolerant of fingerprint translation, rotation, and deformation.
  • 34
    AwareABIS Reviews

    AwareABIS

    Aware

    $2495.00/one-time/user
    Aware provides software and solutions for government-sponsored, biometrics-enabled citizen identification and credentialing systems. Aware's innovative biometric solutions are critical to ensure national security and protect citizens' freedoms and liberties. Our decades-long commitment to R+D has allowed us to work with more than 80 government agencies. We are experts in biometrics, security, and compliance. AwareABIS™ is the core of our citizen ID efforts. It is an Automated Biometric Identification System, or ABIS, that allows large-scale biometric identification and duplication. It supports fingerprint, face and iris modalities. Its modular architecture makes it easy to configure and optimize for civil or criminal applications. AwareABIS, a fully-featured biometric search platform is distinguished by its open architecture.
  • 35
    Scanovate B-Trust Reviews
    Due to inefficient and cumbersome internal processes, the approval and design of new products can be difficult in financial service companies. B-Trust offers a web-based workflow engine that streamlines and standardizes discussions and approvals across departments. Apps from our Marketplace can be used to support business users by automating the identification and management of potential risks. For example, checking appropriate commission rates. Enjoy a complete identity suite that includes state-of the-art onboarding technology. You can track the identity lifecycle by tracking onboarding, continuance verification and identification. Key performance indicators and risk indicators can be used to monitor compliance in real time. API-first design allows integration with third party supply chains and systems of record.
  • 36
    VIDchain Reviews
    Digital identity is not new. Since the advent of the internet, it has been difficult to verify the identity of individuals in a digital environment. This is both for users who have lost their privacy and control over their personal information, and for companies who have experienced inefficient and constant security breaches. VIDchain is a decentralized self-rule identification (SSI) service based upon Blockchain. It gives people control over their identities and allows them secure access to online services. It improves processes and lowers identity verification costs. It improves anti-fraud and eIDAS compliance. It is based on standards that eliminate the need to have hundreds of credentials. You can easily verify your digital identity with anyone.
  • 37
    identiMetrics Biometric ID Management Reviews
    IdentiMetrics is a flexible, unified platform for managing biometric IDs. It allows administrative applications to be completed with a single sign-on ID that is hygienic and clean. IdentiMetrics is a partner of all the top education software companies. Our award-winning biometric finger scanner identification platform uses one database to track attendance at meetings, tardy, daily, and meeting attendance, food service operations as well as staff time & attendance, emergency evacuations, staff time, attendance, book store, and for athletic events. IdentiMetrics simplifies school life by providing accurate, efficient, and hassle-free accounting. IdentiMetrics is safe, secure, and 100% accurate for everyone, from the senior staff to the kindergarten students. Our only option for customer support and services is excellence. IdentiMetrics is a proud member of the Student Privacy pledge.
  • 38
    Microsoft Entra Verified ID Reviews
    Microsoft Entra Verified Identity is included free with any Azure Active Directory subscription. Microsoft Entra VerifiedID is a managed service that verifies credentials based on open standards. Validate digitally the identity information to ensure a trustworthy self-service registration and faster onboarding. Verify credentials and status of an individual quickly to grant least privilege access with confidence. Replace support calls with self-service processes that verify identities. Ensure that credentials can be reused and interoperable with a solution based on open standards. Confidently verify and issue workplace credentials, citizenship status, education status, certificates, or any unique attributes of identity in a global eco-system designed to improve the interaction between people, organisations, and things.
  • 39
    LogMeOnce Reviews

    LogMeOnce

    LogMeOnce

    $3 per user per month
    An effective cyber security defense must be able to stop both internal and external threats. One common factor unites external and internal threats. The end user's compliance with security, policy, best practices. External elements can exploit an unacquainting internal user's compliance to sound security policies to gain entry. Although external threats can be dealt with using various mechanisms, such as firewalls and other security tools, it is inherently rooted in internal weaknesses. You can reduce internal threats by simply creating "automatic and enforceable" security policies. This will require end-users adhere to secure access protocols using trusted credentials. LogMeOnce Patented technology offers many ways to protect your agency, team members, and credentials with advanced automated authentication. LogmeOnce dashboard gives users powerful and unified access across all their applications.
  • 40
    Simeio Reviews
    Simeio offers the best Identity and Access Management (IAM), which engages securely with anyone, anywhere and anytime with an unmatched "service first" philosophy. We can help you protect your customers, partners, and employees identities. Our job is to make access easy, reliable, and secure, wherever you are, in all areas of banking, hospitality and healthcare, as well as government and universities. We can also protect your brand reputation by protecting identities. To create a platform of exceptional reliability and security, we partner with, leverage, and interoperate solutions from the industry's most trusted businesses. Yes, our work is complex and specialized. You can let us handle all the complexity. We simplify the way your company manages identity.
  • 41
    Assently CoreID Reviews
    You can provide identification using any of the Nordic electronic IDs such as the Swedish BankID, Norwegian BankID or Danish NemID. It is easy to integrate CoreID in your systems on any platform. Reduce time spent on infrastructure maintenance, upgrades and other tasks. Your online security can be improved and you can offer your customers modern authentication solutions with electronic ID. Your customers can identify themselves on any device using Swedish BankID, Norwegian BankID and Danish NemID. Assently is ISO 27001 and GDPR certified. This international standard for information security is the international standard. Assently's premium identification software CoreID allows you to easily prove your customers' identities with electronic IDs. Assently CoreID can be easily customized and configured to meet your specific needs. You can choose which countries' eIDs you want to enable. You can use Assently CoreID on any device - mobile, tablet, desktop - on your website.
  • 42
    OpenAM Reviews

    OpenAM

    Open Identity Platform

    You will need to provide seamless authentication for all sites and applications within your company if you have multiple sites or applications. If a user logs in to one of your sites, he doesn't need to enter his credentials for other sites. OpenAM can solve all these problems. OpenAM comes with more than 20 authentication module that you can customize your authentication process. You can also customize the sequence of authentication modules to provide multi-factor authentication or adaptive authentication. OpenAM also allows you to manage authorization. You can limit access to resources according to different authorization policies. OpenAM can extend any functionality, including authentication modules and user data sources. It also supports UI customization, allowing you to create individual pages for end-users with your branding.
  • 43
    Ubisecure Reviews
    The Ubisecure Identity Platform helps organisations manage the many Digital Identity risks and opportunities. Focused on European B2B and B2C scenarios, Ubisecure combines highly assured Organisation Identity and Individual Identity to reduce fraud and increase efficiency in global trade and supply chain. Ubisecure is now the #1 global issuer of Legal Entity Identifiers (LEI). The Identity platform enables organisations to de-risk homegrown user registration and login solutions, and enable Single Sign-On (SSO) across all platforms and devices. Simplified MFA, including TOTP and Bank ID / Reusuable eIDs, reduce fraud by verifying customer identities, and automated customer credential management workflows for your helpdesk. Advanced identity use cases like consolidation of identity data silos, and Identity Relationship Management & Delegation can increase operational effectiveness, manage data breaches, and reduce IT costs dramatically. Whether your business goals are increasing revenue and user engagement, meeting compliance, de-risking homegrown systems or reducing operational costs, Ubisecure identity management can help.
  • 44
    Intercede Reviews
    MyID®, credential management software, allows governments and large corporations to issue and manage digital identity using the most secure method for multi-factor authentication to citizens and large workforces. MyID allows millions of people to securely authenticate themselves to the data, systems, and networks they need. MyID makes it easy for those responsible for information security to integrate and manage digital identity management and issuance. MyID allows seamless, secure access to company networks, systems, and resources for citizens and employees using multi-factor authentication via a variety devices. MyID®, a cyber secure credential management solution, is able to address the ever-growing threats of cyber terrorism and identity fraud. MyID is the best choice for data management. MyID software is distinguished by its reliability, security, and interoperability.
  • 45
    LastPass Reviews
    Top Pick

    LastPass

    LastPass

    $4 per user per month
    32 Ratings
    LastPass is the leader in password and identity management solutions, trusted by individuals and organizations of all sizes worldwide. Millions rely on LastPass daily to create, store, manage, and protect their most important credentials, keeping them secure, private and always within reach. With LastPass, anyone can effortlessly log in to life or work anytime, anywhere.
  • 46
    SecureIdentity IAM Reviews
    SecureIdentity IAM enforces access decisions regarding applications and data repositories. It can dynamically decide what programs a user can run and which file servers or cloud storage areas it is allowed to access by reading information from the Universal Directory. Clients on the endpoints enforce this policy by intercepting requests for access to data areas or applications and verifying them against the defined policy. If the action is permitted, the user experience will continue as normal without any overhead. Access to the executables or DLL files required for the action is blocked dynamically if it is prohibited. To provide a forensic trail, logs of all events are sent back from the platform to its event database.
  • 47
    LogonBox Reviews
    Find the LogonBox Advantage and our innovative solutions for modern Enterprises. LogonBox is an independent software vendor. It develops software that helps organizations manage and protect user identities and credentials. LogonBox solutions can reduce helpdesk calls, increase productivity, secure access across heterogeneous enterprise environments, and protect network resources through the extension of authentication beyond the password.
  • 48
    AuthStack Reviews

    AuthStack

    Buckhill

    €41.25 per month
    AuthStack is a host-anywhere, Enterprise-grade Single Sign-On (SSO), and Identity Access Management System (IAM). It can log in users to your own websites and applications, as well as third-party websites. AuthStack centralizes your user identification management. Instead of managing multiple logins for each website or application, the user only needs to log in once and maintain a single password and profile. If your website or application supports SAML, integration with AuthStack does not require any custom coding. We provide a Connector Framework for those sites that do not support SAML. If required, we can help you integrate the Connector. You don't need to migrate any existing user databases. AuthStack bundles with a Connector Framework that can communicate with any data source (LDAP, MySQL SOAP API, SOAP API, SOAP API, etc.) to verify credentials from existing user database(s).
  • 49
    Logto Reviews
    Logto is a modern Auth0 replacement designed for SaaS and apps. It is a great choice for growing companies and individuals. Comprehensive Identity Solution Logto SDKs enable easy authentication. Supports multiple sign-in methods, including social and passwordless. Customize UI components to match brand. The infrastructure is ready-to-use, so there's no need to do any extra setup. Provides a ready-to-use management API It offers flexible connectors to customize and scale, and is customized for SAML, OAuth and OIDC protocols. Enterprise-ready, with role-based Access Control (RBAC), Organizations (multi-tenant applications), User Management, Audit Logs, Single Sign-On (SSO), Multi-factor Authentication (MFA), and Single Sign-On (SSO).
  • 50
    Anomalix Reviews
    Engage employees from day one and remove any barriers to collaboration. Access management can be done with historical and real-time data. This will help reduce compliance costs and empower employees. Passwordless access management and enterprise identity. Secure solution to manage employee lifecycle events (Joiner/Mover/Leader) to protect sensitive data and allow for the smallest privileges necessary to perform job functions. Identify suspicious and unusual User and Entity behavior. Create accurate and efficient job roles that allow for the right level access to information and data. Implement an identity management solution that covers non-employee employees and corporate assets. Cross-organizational collaboration is possible to improve data quality and reduce problems. Establish a trusted source for all non-employee Identities. Perform all necessary identity-related due diligence. All identity lifecycle events (Engagement, Change, Disengaged, Reengage) for people and assets will be managed.