Business Software for Ping Identity - Page 3

Top Software that integrates with Ping Identity as of July 2025 - Page 3

  • 1
    Torpago

    Torpago

    Torpago

    Power growth and strengthen customer relationships with our program management solutions. Our turnkey technology platform solution lets banks launch a branded business credit card quickly and without costly software development investments. With our bank admin tool, banks get real-time access to their program data and a no-code solution for managing their credit card program. Launch and manage your credit programs seamlessly with the help of our team of experts, with services ranging from risk and underwriting to marketing and customer support. Our platform can be tailored to your program needs and can cover every stage of the process. Your customers can manage all aspects of their business's finances, including spending, approvals, bill pay, and reimbursements, easily through our white-labeled platform and mobile app. Your customers can effortlessly issue your branded physical or virtual credit cards and instantly add them to digital wallets.
    Starting Price: $33.33 per month
  • 2
    SSOReady

    SSOReady

    SSOReady

    Ship enterprise single sign-on in less than a day. SSOReady integrates with the services your customers use for single sign-on. Once you've set up SSOReady, you immediately get coverage for all major identity providers. Get multi-tenant SSO support with just two API calls. Stick with the tech stack you already use. Programmatically provision and de-provision users with a single unified API for your customers' identity providers. SSOReady is just an authentication middleware layer. SSOReady doesn’t “own” your users, and it doesn’t require you to use any particular tech stack. That’s on purpose, it makes onboarding easier for you, and it forces us to keep earning your business in the long run because churning is easier. SSOReady abstracts all this work away into you just needing to redirect your user to a URL. SSOReady’s SDKs generate a URL for you, and then you simply forward your user to that URL using any mechanism that suits your tech stack.
    Starting Price: Free
  • 3
    Keepnet Labs

    Keepnet Labs

    Keepnet Labs

    Keepnet’s extended human risk management platform empowers organizations to build a security culture with AI-driven phishing simulations, adaptive training, and automated phishing response, helping you eliminate employee-driven threats, insider risks, and social engineering across your organization and beyond. Keepnet continuously assesses human behaviors through AI-driven phishing simulations across email, SMS, voice, QR codes, MFA, and callback phishing to reduce human-driven cyber risks. Keepnet's adaptive training paths are tailored to individual risk levels, roles, and cognitive behaviors, ensuring that secure behaviors are embedded to continuously reduce human cyber risk. Keepnet empowers employees to report threats instantly. Using AI-driven analysis and automated phishing responses, security admins respond 168x faster. Detects employees who frequently click phishing links, mishandle data, or ignore security policies.
    Starting Price: $1
  • 4
    ChatBetter

    ChatBetter

    ChatBetter

    ChatBetter is a unified AI chat platform that gives you access to all major large language models in one intuitive interface. It automatically routes your prompts to the most suitable model for each task, predicts the ideal reasoning level, and lets you view the top 2–3 responses side by side to compare insights and identify disagreements. You can easily merge those responses into a comprehensive answer. With features like chaining models for complex workflows (e.g., using analytical models for research, planning models for structure, and writing models for output), folder-based organization, searchable history, context windows that persist across back-and-forth interactions, and editable memory, it streamlines productivity. For team use, ChatBetter supports single sign‑on, robust admin controls, custom branding, collaboration features, role-based access, MFA, IP restrictions, and more.
    Starting Price: $20 per month
  • 5
    BLUE Software
    BLUE’s SaaS label and artwork management applications simplify the label and packaging process through automated workflow templates, online proofing tools, and digital asset management. BLUE Software is the leading provider of Label and Artwork Management solutions for marketing, retail, consumer brand, and life sciences companies. BLUE Software simplifies the complexity of Label and Artwork development for both small and large companies worldwide. Our SaaS-based artwork collaboration and workflow tools create opportunities for cost savings within each stage of the label and artwork management process and improve efficiency KPIs including speed-to-market and sales lift. Reduce end-to-end artwork process time by up to 70%. BLUE Workflow Management empowers stakeholders in creative, brand, and regulatory to track and execute their tasks in the label and artwork process. Increase “right first time” artwork by up to 70%.
  • 6
    Avatier Identity Anywhere
    Introducing Identity Anywhere, the world’s first Identity Management solution based on Docker containers making it the most portable, scalable and secure solution on the market. Docker container technology allows Identity Anywhere to run anywhere: on any cloud, on premise or a private cloud instance hosted by Avatier. Avatier Identity Management products brings separately administered back office applications and assets together to manage them as one system. Now armed with a unified digital dashboard, C-level executives deliver measurable business growth and increased profits. Eliminate the #1 Help Desk request with military grade self-service password reset. Reduce Costs. Only pay for the cloud app licenses you need. Maximize company utilization with a phenomenal shopping cart experience. Avoid fines, lawsuits, negative publicity, and even jail time due to non-compliance.
    Starting Price: $5.00/one-time/user
  • 7
    LumApps

    LumApps

    LumApps

    LumApps is a leading Employee Experience Platform founded in 2015 to unify the modern workforce through better communication, engagement, and instant access to information. Integrated with Google Workspace and Microsoft 365, LumApps intelligently connects people, information, and business applications to empower employees and enhance productivity. The product tailors each experience to the unique needs of the employee, from executives and managers to frontline workers. LumApps is a true SaaS platform, designed to scale to the needs of today’s largest enterprises and is easily accessible across any device or language. With over 250 people in 7 offices located on 3 continents, LumApps serves prominent companies like Veolia, Airbus, Valeo, Air Liquide, The Economist and Electronic Arts, supporting more than 4 million users worldwide.
  • 8
    SafeConsole

    SafeConsole

    DataLocker

    Central Management Server Software. Instantly gain complete and granular control over all of your encrypted USB flash drives and portable hard drives with the SafeConsole central management server software: Achieve compliance for USB storage usage, with full control and audit. Keep the productivity benefits of USB storage devices – without the risks of malware, data leaks and breaches. Available as an on-premises software or as a DataLocker hosted cloud service with worldwide locations. Enforce policies such as password rules, file-type restrictions or geographic boundaries. Reset passwords, switch devices into read-only mode, and even remotely wipe them in case of loss or theft. Monitor all your encrypted drives, including their location anywhere in the world. Integrate with Active Directory to track users, assigned devices and connected computers with ease. See which files are saved to or deleted from your encrypted drives at any given moment.
    Starting Price: $28 per device per year
  • 9
    Google Cloud Identity
    A unified identity, access, app, and endpoint management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace. Defend your organization with the BeyondCorp security model and Google’s threat intelligence signals. Control access to SaaS apps, enforce strong multi-factor authentication (MFA) to protect user accounts, manage endpoints, and investigate threats with Security Center. Maximize efficiency by enabling intuitive user experiences on endpoint devices, and unify user, access, app, and endpoint management with a single console. Enable users to access thousands of apps with single sign-on (SSO) and manage their company accounts using the same process as their personal Google accounts. Transition to digital by integrating your existing systems on a reliable, trusted platform. Extend your on-premises directory to the cloud with Directory Sync.
    Starting Price: $6 per user per month
  • 10
    WorkEQ

    WorkEQ

    WorkEQ

    Create a workplace that puts people at the core of your business. Our app empowers employees to engage with each other, find the right hybrid working arrangements, and proactively help each other with professional growth. With WorkEQ, attrition rates will go down and attracting new talent will be easy. You will see an increase in productivity when your employees have flexibility, feel engaged and their professional growth is a priority. Happy and engaged employees drive the best outcomes for your business. Join hundreds of forward-thinking organizations using WorkEQ as the foundation for their Return to Office programs.
    Starting Price: $5 per user per month
  • 11
    API Fortress

    API Fortress

    API Fortress

    Discover a better breed of continuous API testing and monitoring that unifies functional, integration, and load testing across internal, partner, and third party APIs. Test REST, SOAP, GraphQL, Web Services, and Microservices. Automate tests as part of a CI pipeline. Monitor internal APIs continuously. Available by Hosted Cloud, Self-Hosted Cloud, or Hybrid. At many innovative organizations, continuous API quality is more than a competitive advantage - it’s the new normal. API Fortress allows any company to simplify continuous API quality, helping developers and test engineers to significantly accelerate time-to-market without increasing risk. Automatically create your first tests in seconds from a payload, spec file, or recorded API traffic. Then edit tests in your own IDE, our downloadable IDE Forge, or the simple drag-and-drop GUI. All tests are unlocked for painless editing as part of your existing workflow.
  • 12
    RadiantOne

    RadiantOne

    Radiant Logic

    Make identity a business enabler with a unified platform that transforms your existing infrastructure into a resource for the entire organization. RadiantOne is the cornerstone of complex identity infrastructures. Harness your identity data with intelligent integration to drive better business outcomes, improve security and compliance posture, increase speed-to-market, and more. Without RadiantOne, companies must rely on custom coding, rework, and ongoing maintenance to make new initiatives work with existing environments. Expensive solutions can’t be deployed on time or on budget, negatively impacting ROI and causing employee frustration. Identity frameworks that can’t scale waste time and resources, with employees struggling to deploy new solutions for users. Rigid, static systems can’t meet changing requirements, leading to duplicate efforts and repeated processes.
  • 13
    Forcepoint Secure Web Gateway
    Proactively secure the web with advanced, real-time threat defenses—full content inspection and in-line security scanning help mitigate risk and protect against malware. The convenience of securing your global workforce with a single endpoint for Web Security, DLP, CASB, and NGFW with flexible connectivity and traffic redirection options. Deploy how, when and where you want. On-premises, hybrid and cloud deployment architectures so you can go to the cloud at your own pace. Behavioral analytics and inline capabilities secure your policies and data across the world. Consistent policies with robust access control for all your sites, cloud apps, and users both on and off the corporate network. Keep users safe from malicious threats, including zero-day threats. Protect against zero-day threats with real-time threat intelligence and remote browser isolation, and provide deep content inspection for encrypted and unencrypted traffic to detect evolving threats across the entire kill chain.
  • 14
    It'sMe

    It'sMe

    Acceptto

    Employees hate using passwords as much as you hate managing password vulnerabilities. More passwords and tokens lead to greater security risk, fatigue, and cost. It’s time to get rid of them for good. 89% of security professionals claim that a more advanced multi-factor authentication tool that provides continuous, behavioral authentication would improve their company’s security posture. Acceptto provides users with Intelligent MFA that intuitively authorizes access to applications and continues authenticating post-authorization. We prevent account takeovers, even if hackers have already acquired passwords. ItsMe™ Intelligent Multi Factor Authentication (MFA) increases your security by authorizing access attempts to a registered device in real-time, be it through a push notification or verification code (SMS, TOTP, email, and etc.). With our timed based one-time password (TOTP), security key, or biometric options, you can authenticate access even when offline.
  • 15
    1Kosmos

    1Kosmos

    1Kosmos

    1Kosmos enables passwordless access for workers, customers and citizens to securely transact with digital services. By unifying identity proofing and strong authentication, the BlockID platform creates a distributed digital identity that prevents identity impersonation, account takeover and fraud while delivering frictionless user experiences. BlockID is the only NIST, FIDO2, and iBeta biometrics certified platform that performs millions of authentications daily for some of the largest banks, telecommunications and healthcare organizations in the world.
  • 16
    Delinea Cloud Access Controller
    Gain granular control over web applications and web-based cloud management platforms. Delinea's Cloud Access Controller provides a comprehensive PAM solution that operates at cloud speed and is quick to deploy and secure access to any web application. With Cloud Access Controller, you can easily integrate your existing authentication solutions with any web application without having to write any additional code. Apply granular RBAC policies that enforce least privilege and zero trust initiatives, even to custom and legacy web applications. Specify what an individual employee is allowed to read or modify within any web application. Grant, manage and revoke access to cloud applications. Specify who gets access to what, at a granular level. Track usage of each and every cloud application. Clientless session recording without agents. Secure access to all web applications, including social media, custom, and legacy web applications.
  • 17
    Authomize

    Authomize

    Authomize

    Authomize continuously detects all effective relationships between both human and machine identities to company assets throughout all your organization’s environments (IaaS, PaaS, SaaS, Data, On-prem), down to the most granular company asset and normalized consistently across apps. Authomize offers a continuously updated inventory of your identities, assets and access policies, blocking unintended access with guardrails and alerting on anomalies and various risks. Authomize’s AI-driven engine harnesses its comprehensive and granular visibility over all of an organization’s environments to construct an optimal set of access policies for any identity-asset relationship. This SmartGroup technology performs continuous access modeling, self-correcting as it incorporates new inputs such as actual usage, activities and decisions you take to create an optimal and accurate permission structure.
  • 18
    TWOSENSE.AI

    TWOSENSE.AI

    TWOSENSE.AI

    Quickly catch unauthorized users and get a better understanding of your organization's highest risks with our dynamic dashboard, whether that be password reuse, credential sharing, unmanaged device use and more. Integrate with your SIEM to keep alerts in one place. TWOSENSE invisibly authenticates users throughout a session and automatically responds to 95% of MFA challenges for your users reducing MFA friction. Find out exactly how much security fatigue is costing your organization. Our software is SSO enabled, SAML and RADIUS ready which means that you can use your existing login workflows and deploy the same day. Validating employees or customers using behaviors is more secure than usernames and passwords, for several years, the Defense Department has been working on ways to identify employees more securely, in part to augment and perhaps replace its existing identification cards that date back to 2000.
  • 19
    NextGen SSO
    NextGen SSO solution that protects both internal and cloud applications with the lowest possible spend, offers the best user experience, and provides unlimited possibilities to integrate with other SSO solutions. NextGen Cloud SSO SaaS solution, not a multi-tenant or a shared application. SSO would be deployed in minutes. Tiered pay as you go model with low flat fees, free multi factor authentication, and exceptional 24/7 support. Highly secured authentication with tons of integrations with other SSO systems. Seamless SSO between both on-prem and cloud applications. Out of the box support for mobile applications, built on the standards with LDAP version 3.0 and version 2. High availability and disaster recovery are out of the box. SSO software development company helping organizations implement web security, protect mission critical applications, and prevent cyber criminals from stealing confidential data, while bringing the best user experience to the employees and associates.
  • 20
    Absorb Analyze

    Absorb Analyze

    Absorb Software

    Powered by data, Absorb Analyze is the next evolution of Absorb LMS reporting. With Absorb Analyze, gain deeper insight into your learning program and the path between learner data and business results. This business intelligence solution equips organizations with tailor made interactive reports to visualize trends while helping your business make informed decisions. Your business is unique, and so are your reporting needs. Absorb Analyze equips teams to work smarter, giving organizations the insight to drive both learning and business outcomes through real-time reporting. Absorb Analyze is a customized reporting solution that gives your business the ability to act on your LMS data like never before. Create reports and charts to analyze engagement data in new and unique ways. Set alerts for when measures and data cross thresholds so you can take action.
  • 21
    Kion

    Kion

    Kion

    The only single-platform solution for setup and provisioning, financial management, and compliance. Kion offers the only single-platform approach to cloud enablement for AWS, Azure, and Google Cloud, transcending cloud management and cloud governance by offering all three pillars necessary for total cloud control. Provision accounts, get enterprise-wide visibility, and fully integrate the cloud with your tech stack to automate the full cloud lifecycle. Kion helps you start correctly from day 1 in the cloud by automating the provisioning of accounts with the proper controls around allowed services and budget. Prevent, detect, report, and remediate issues to comply with industry standards and business policies. Allocate and track spending, get real-time and forecasted data, identify savings opportunities, and enforce budgets. We deliver more than just the features to manage and govern your cloud.
  • 22
    IDmelon Authenticator

    IDmelon Authenticator

    IDmelon Technologies

    IDmelon Authenticator, a mobile app available on Google Play and App Store, allows you to use your ubiquitous smartphone into a FIDO certified security key so as to easily and securely log into websites, online accounts, and apps on your PC. This means when you want to log into your accounts such as Microsoft or GitHub, instead of the traditional way of presenting your username and password, you add a layer of security by using your username and security key., which is an easier, stronger, and phishing-resistant way of authentication. In addition to it, IDmelon Admin Panel, which is a dashboard available on our website for login to manage users and security keys, enables organizations to deploy passwordless authentication within their companies overnight to protect their data and workforce.
    Starting Price: $5.99/user/year
  • 23
    Thinfinity DaaS

    Thinfinity DaaS

    Cybele Software

    What is Thinfinity DaaS? Desktop virtualization doesn't have to be a complex process. Thinfinity is the digital transformation ally you need. We collaborate with Independent Software Vendors, Business owners, Managed Service Providers, IT managers, and various other professionals, empowering them with the tools to leverage the cloud and elevate their businesses. Thinfinity offers a fully integrated Desktop-as-a-Service solution (DaaS), prioritizing speed and simplicity— enabling you to work swiftly and flexibly from any location. With Thinfinity, you can also publish any Windows applications, transforming it into a Software as a Service (SaaS), thereby expanding your business possibilities. Experience Thinfinity and discover the simplicity and efficiency of our cloud desktop solution! Cloud-based VDI solutions provide businesses with a wide range of benefits, including enhanced security, increased flexibility, improved collaboration, and lower costs.
  • 24
    VeriClouds

    VeriClouds

    VeriClouds

    VeriClouds CredVerify is the only service designed to detect, verify and remediate the use of weak or stolen credentials throughout the entire user lifecycle, from registration to authentication and password reset. It takes seconds to detect, offers immediate response, and has over 90% coverage. Rest assured you will be protected by the highest standards in security, and know that part of VeriClouds’ service policy is hard dedication in complying with key security points. Automates the detection of unauthorized login attempts and integrates with real-time policy enforcement measures. Significantly minimizes the threat from the number one cause of data breaches, a weak or stolen password. Reduces the likelihood of an account takeover or credential stuffing attack from being successful. CredVerify can be consumed as a service in the VeriClouds cloud, or it can be deployed in a customer’s cloud environment with just a few lines of code.
  • 25
    Code42 Incydr
    Incydr gives you the visibility, context and control needed to stop data leak and IP theft. Detect file exfiltration via web browsers, USB, cloud apps, email, file link sharing, Airdrop, and more. See how files are moved and shared across your entire organization, without the need for policies, proxies, or plugins. Incydr automatically identifies when files move outside your trusted environment, allowing you to easily detect when files are sent to personal accounts and unmanaged devices. Incydr prioritizes file activity based on 120+ contextual Incydr Risk Indicators (IRIs). This prioritization works on day 1 without any configuration. Incydr’s risk-scoring logic is use case-driven and transparent to administrators. Incydr uses Watchlists to programmatically protect data from employees who are most likely to leak or steal files, such as departing employees. Incydr delivers a complete range of technical and administrative response controls to support the full spectrum of insider events.
  • 26
    Securden Unified PAM MSP
    To enforce complete access governance, MSPs purchase multiple solutions at a premium. We have combined all the required modules into one unified solution that solves the most crucial challenges faced by managed IT service providers. In addition to deploying robust access controls, MSPs can generate recurring revenue streams by providing privileged access management as a service. Grant JIT-based remote access to third parties and employees. Track and record all activities for complete control. Reduce the attack surface by eliminating external and internal threats. Automate privileged access provisioning to reduce helpdesk load and eliminate unnecessary downtime. Deploy robust privileged access workflows and realize an increase in efficiency instantly.
  • 27
    Hubstar Utilization
    HubStar is a dynamic workplace platform informs and guides your hybrid workplace strategy with insights on how much space you need to improve employee experience while reducing costs and carbon emissions. The HubStar platform includes space scheduling, an employee experience app powered by machine learning, space utilization measurement and prediction, automated floor plans, and space management. Shut down ghost town spaces on quiet days to save energy, then guide people into alternative spaces with HubStar Scheduling to deliver the best workplace experience. Get intelligent recommendations on exactly the size and type of spaces you need to improve your workplace experience. Ignite social connection, collaboration, and belonging by making it a breeze to get together, with purpose.
    Starting Price: $5,000 per year
  • 28
    Azure Spring Apps
    Azure Spring Apps is a fully managed service that helps Spring developers focus on code, not on infrastructure. Deploy any type of Spring app—including web apps, microservices, event-driven, serverless, and batch—without the need for Kubernetes. Take advantage of the Azure ecosystem while using your existing investments. Gain deep insights into application dependencies and operational telemetry using Azure monitor. Aggregate metrics for a topological view of how different services interact and see average performance and error rates. Easily identify the root cause of reliability issues and performance bottlenecks. Focus on what matters—your apps, business logic, and delivering value to your users. Deploy any type of Spring or Polyglot apps, either from source code or artifacts, with support for container creation and maintenance.
    Starting Price: $0.7136 per hour
  • 29
    Kontra

    Kontra

    Security Compass

    Kontra was built by industry veterans who invented and pioneered the first interactive application security training platform. We don't offer secure coding quizzes, that are effectively re-skinned multiple-choice questions. If that's your idea of educating developers about software security, we are not the company for you. Developers are who we serve. Adding artificial metrics, meaningless rewards, and silly badges is not what we do. We respect their time far too much to patronize them with these gimmicks. The days of heavily scripted OWASP Top 10 training videos with robotic voice-overs are over. Interactive storytelling with realness and purpose in short bursts is what puts developers in the middle of the action and drives a truly engaging learning experience. Developers are more engaged in training if the content has a basis in reality rather than contrived examples. We set out to design the most beautiful application security training experience ever built.
    Starting Price: $400 per year
  • 30
    Axiad Cloud

    Axiad Cloud

    Axiad Cloud

    Systematically authenticate across all users, machines, and interactions with a cloud-based, complete, and flexible authentication platform. Axiad helps organizations move to a passwordless future without the friction and risk of fragmented solutions and ultimately improve their cybersecurity posture and empower their end users. Establish best practices for user security, eliminate silos, and meet compliance requirements with enterprise-grade passwordless MFA. Establish best practices for user security, eliminate silos, and meet compliance requirements with government-grade phishing-resistant authentication. Go beyond an in-place IAM product, establish best practices for user security, and meet compliance requirements with passwordless and phishing-resistant MFA. Enhance machine identity authentication and improve overall security with a unified, highly customizable PKI solution.