Compare the Top IT Security Software that integrates with OAuth as of October 2025

This a list of IT Security software that integrates with OAuth. Use the filters on the left to add additional filters for products that have integrations with OAuth. View the products that work with OAuth in the table below.

What is IT Security Software for OAuth?

IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities. Compare and read user reviews of the best IT Security software for OAuth currently available using the table below. This list is updated regularly.

  • 1
    Thinfinity Workspace

    Thinfinity Workspace

    Cybele Software, Inc.

    Thinfinity® Workspace 7 is a comprehensive, secure platform that offers a zero-trust approach, enabling secure and contextual access to corporate virtual desktops, virtual applications, internal web apps, SaaS, and files, whether they are on Windows, Linux, or mainframes. It supports various deployment models, including cloud, on-premise, and hybrid settings, and can be deployed on any cloud provider of your choice. With its proprietary reverse gateway technology, Thinfinity® Remote Workspace 7 ensures secure reverse connections over SSL with TLS 1.3 encryption. This robust approach doesn't require client-side installations, firewall modifications, or the opening of inbound ports on your network, thereby enhancing the security infrastructure of your business. The platform ensures all browser-based connections are secured over HTTPS, offering a wide variety of authentication options, from straightforward User/Password to sophisticated Active Directory authentication.
    Leader badge
    View Software
    Visit Website
  • 2
    Veeam Kasten for Kubernetes
    Leading Kubernetes Data Protection and Mobility Trusted by the world’s largest organizations, Veeam Kasten delivers secure, Kubernetes-native data protection and application mobility for the most complete set of distributions and platforms at enterprise scale. We give operations and application teams the confidence to withstand the unexpected and deliver faster, all without complex scripting, unsupported tools, and legacy solutions.
  • 3
    OpenOTP Security Suite
    OpenOTP Security Suite is a European Enterprise-grade Security all-in-one Solution for Identity & Access Management (IAM), including : - Multi-Factor Authentication (MFA/2FA) with U2F / OTP, applicable even for Legacy Applications - Federation Services (SSO with OpenID & SAML / ADFS) - Network Access Control (protecting Wifi & Ethernet Swiches) - VPN security (via an included Radius Bridge), designed specifically for remote work - Windows logins & Remote Desktop Services (RDS) OpenOTP Security Suite combines mobile technology with proven security standards to offer professionals and non-professionals the best alternative, bringing modularity and flexibility to suit any infrastructure's needs. OpenOTP Security Suite is an enterprise-class European security solution designed for installation on-premises or in a private cloud. ++ Free Token App (and compatible with most existing hardware and software tokens) ++ Free 30-day Trial ++ Freeware (<25 users)
    Starting Price: €1.85/User/M
  • 4
    SyncTree

    SyncTree

    Ntuple

    SyncTree strives to be a "Super Connecting Platform" that can easily connect any services you want. With SyncTree, which consists of SyncTree STUDIO, a solution for building backend business logic with block coding, and Block Store, a platform for buying and selling pre-made backend function blocks like App Store, you can organically utilize data and connect services to achieve unlimited service expansion. Based on aPaaS, Block Store provides APIs from various services such as ChatGPT, DALLE, YouTube, etc. in the form of 'backend function blocks', which you can subscribe to and then combine as you want quickly in SyncTree STUDIO to build your business logic. SyncTree is for everyone, whether you're an individual or a business, and you can subscribe and use it according to your needs, from the free version to the PRO version.
    Starting Price: Free/1Month/3,000 Call
  • 5
    IriusRisk

    IriusRisk

    IriusRisk

    IriusRisk is the industry's leading threat modeling and secure design solution in Application Security. With enterprise clients including Fortune 500 banks, payments, and technology providers, it empowers security and development teams to ensure applications have security built-in from the start - using its powerful threat modeling platform. Whether teams are implementing threat modeling from scratch, or scaling-up their existing operations, the IriusRisk approach results in improved speed-to-market, collaboration across security and development teams, and the avoidance of costly security flaws.
  • 6
    Authentiq

    Authentiq

    Authentiq

    Strong authentication, without the passwords. Add secure authentication options to any website or application. Easy and without headaches. Authentiq Connect lets users decide when to step up their security, and whether to use a second factor like TOTP (e.g. Google Authenticator) or U2F (e.g. Yubikey), or go passwordless with Authentiq ID right away. Authentiq Connect is compatible with OAuth 2.0 and OpenID Connect; getting started is as simple as adding a social network button to a site. Authentiq Connect is compatible with OAuth 2.0 and OpenID Connect; getting started is as simple as adding a social network button to a site. The passwordless experience you want without the lock-in. Authentiq ID simply allows you to use your phone to authenticate to things online, share your identity details safely, and sign out again remotely. It also supersedes Google Authenticator by supporting more secure TOTP authentication, making it a one-stop-app for everyone interested.
    Starting Price: $49
  • 7
    EthicalCheck

    EthicalCheck

    EthicalCheck

    Submit API test requests via the UI form or invoke EthicalCheck API using cURL/Postman. Request input requires a public-facing OpenAPI Spec URL, an API authentication token valid for at least 10 mins, an active license key, and an email. EthicalCheck engine automatically creates and runs custom security tests for your APIs covering OWASP API Top 10 list Automatically removes false positives from the results, creates a custom developer-friendly report, and emails it to you. According to Gartner, APIs are the most-frequent attack vector. Hackers/bots have exploited API vulnerabilities resulting in major breaches across thousands of organizations. Only see real vulnerabilities; false positives are automatically separated. Generate enterprise-grade penetration test reports. Confidently share it with developers, customers, partners, and compliance teams. Using EthicalCheck is similar to running a private bug-bounty program.
    Starting Price: $99 one-time payment
  • 8
    OnzAuth

    OnzAuth

    OnzAuth

    Implement Authentication in 5 mins or less, straightforward support for magic link or WebAuthN, no passwords to manage, no callbacks to implement. Our SDK is a vanilla javascript Framework meant to work with any frontend languages. Framework-specific support and documentation are coming soon. We believe developers should not spend time reinventing authentication over and over again. We solve both Authentication (Passwordless) and Authorization for you. Integrate with our simple-to-use SDK in minutes, or use any other standard OAuth or JWT libraries available in a variety of languages when required.
    Starting Price: $50 per month
  • 9
    Resmo

    Resmo

    Resmo

    All-in-one platform for SaaS app and access management for modern IT teams. Streamline app discovery, identity security, user offboarding, access reviews, and cost tracking. Actively scan and notify for vulnerabilities with 100+ native integrations with your favorite tools. Review identity access permissions, OAuth risks, and SSO logins. Uncover shared accounts, weak passwords, excessive permissions, externally shared files, and more. Let them use the SaaS they need to get their job done quickly. Lift the burden of security checks on your IT and security teams with automation. Offboard employees securely with no dormant accounts left behind. We empower your team to take ownership of security without any roadblocks, ensuring a seamless and secure workflow. Get accurate visibility over the apps your employees login with their business accounts. Empower your workforce with SaaS adoption while maintaining control over your SaaS security posture.
    Starting Price: $2 per month
  • 10
    Auth.js

    Auth.js

    Auth.js

    Auth.js is an open-source authentication library designed to integrate seamlessly with modern JavaScript frameworks, providing a flexible and secure authentication experience. It supports various authentication methods, including OAuth (e.g., Google, GitHub), credentials, and WebAuthn, allowing developers to choose the most suitable approach for their applications. Auth.js is compatible with multiple frameworks, such as Next.js, SvelteKit, Express, Qwik, and SolidStart, enabling developers to implement authentication across different platforms. The library offers built-in support for popular databases like Prisma, Drizzle ORM, Supabase, Firebase, and TypeORM, facilitating user data management. Security features include signed cookies, CSRF token validation, and encrypted JSON Web Tokens (JWTs), ensuring robust protection for user data. Auth.js is designed to operate efficiently in serverless environments and provides comprehensive documentation and examples.
    Starting Price: Free
  • 11
    Pomerium

    Pomerium

    Pomerium

    Pomerium is a secure, clientless solution that enables seamless access to web applications and services without the need for a corporate VPN. Designed to enhance developer productivity, it eliminates complex user access flows that can hinder workflow. Unlike traditional client-based tunneling solutions, Pomerium offers lightning-fast connections with minimal latency, ensuring security and privacy without compromise. It leverages contextual data for access control decisions, implementing continuous verification—a zero trust concept where every action is verified for contextual factors before being accepted or denied. This approach contrasts with NextGen VPNs, which only verify authentication and authorization at the start of a session. Pomerium supports secure access to web apps, databases, Kubernetes clusters, internal tools, and legacy applications, making it suitable for individuals and teams of all sizes.
    Starting Price: $7 per month
  • 12
    Duende IdentityServer
    IdentityServer is a flexible and standards-compliant OpenID Connect and OAuth 2.0 framework for ASP.NET Core, offering full control over UI, UX, business logic, and data. IdentityServer is officially certified by the OpenID Foundation and implements over a dozen protocols and standards from the OpenID Foundation and IETF working groups. It supports unlimited hosting options, allowing deployment on-premises, in the cloud, behind a VPN, on Windows, Linux, Docker, or Kubernetes. Duende Software also offers additional products such as IdentityServer for Redistribution and a Backend for Frontend (BFF) security framework. Comprehensive documentation and training resources are available to support developers in implementing these solutions. Being fully standards-compliant is very important to us, and we want to give you access to every aspect of the OAuth and OpenID Connect protocol family.
    Starting Price: $1,500 per year
  • 13
    Unikname

    Unikname

    Unikname

    Prevent phishing hack attempts of your web accounts in integrating the next-gen strong authentication that secures all your web access. Protect your admin account of all your websites that you manage. Offer your clients a password-less experience of registration. Add the next-gen social authentication that respects the privacy life. Easily manage the web access rights of your employees and partners. Install the Unikname solution for all web environments you need in minutes! Easily manage your trust certificates and web access from the dashboard dedicated. Manage the access rights of admins and website users. Enable Unikname as the default authentication system. Disable standard authentication. Fine-tune the style options of the Unikname login button. Unikname relies on the latest OAuth and OpenID Connect authentication protocol standards and allows to generate a trust certificate attached to your web domain name.
    Starting Price: €150 per year
  • 14
    Ubisecure

    Ubisecure

    Ubisecure

    The Ubisecure Identity Platform helps organisations manage the many Digital Identity risks and opportunities. Focused on European B2B and B2C scenarios, Ubisecure combines highly assured Organisation Identity and Individual Identity to reduce fraud and increase efficiency in global trade and supply chain. Ubisecure is now the #1 global issuer of Legal Entity Identifiers (LEI). The Identity platform enables organisations to de-risk homegrown user registration and login solutions, and enable Single Sign-On (SSO) across all platforms and devices. Simplified MFA, including TOTP and Bank ID / Reusuable eIDs, reduce fraud by verifying customer identities, and automated customer credential management workflows for your helpdesk. Advanced identity use cases like consolidation of identity data silos, and Identity Relationship Management & Delegation can increase operational effectiveness, manage data breaches, and reduce IT costs dramatically.
  • 15
    TruffleHog

    TruffleHog

    Truffle Security

    TruffleHog runs behind the scenes to scan your environment for secrets like private keys and credentials, so you can protect your data before a breach occurs. Secrets can be found anywhere, so TruffleHog scans more than just code repositories, including SaaS and internally hosted software. With support for custom integrations and new integrations added all the time, you can secure your secrets across your entire environment. TruffleHog is developed by a team entirely comprised of career security experts. Security is our passion and primary concern, and all features are developed with best practices in mind. TruffleHog enables you to track and manage secrets within our intuitive management interface, including links to exactly where secrets have been found. Authenticate with secure OAuth workflows for users and never worry about username and password breaches.
  • 16
    WWPass

    WWPass

    WWPass

    No need to remember, manage, reset, protect or exchange. Consolidation of all logins in one protected authentication token. Easy self-management of the authentication token. Log in with a universal, international digital identity, trusted if required and anonymous if allowed. All data is encrypted by the user with WWPass Key. No need for OTP, SMS, or other extra costly adaptive authentication and login support. User identity is protected by WWPass Key. WWPass MFA is a strong customer authentication compliant with GDPR and NIST. Each user gets a unique key, which helps to log in to an unlimited number of accounts and services without usernames and passwords. Log in to a growing number of online services with your WWPass Key as a universal key to the digital world. Enable next-generation strong multi-factor authentication without usernames and passwords. Simplify and streamline secure access to any business application without a username and password.
    Starting Price: Free
  • 17
    Ory

    Ory

    Ory

    The missing web-scale API for identity and access control. 10x your security, user experience, and PII compliance today. Build secure apps on top of the Ory Network and reach new customers in any geopolitical region of the world with the best login experience ever. Login is more than a username and password. Building it from the ground up is time-consuming and dangerous. Ory's API-first microservice architecture makes it straightforward to integrate projects at any stage. Pay for usage, not features. Get advanced multi-factor to auth on every Ory subscription plan. Plus advanced permissions, SSO, OAuth2, OIDC, multi-tenancy, and so much more. Ory is made for high-performance, high-scale applications in any cloud. Built with developers in mind, Ory lets you quickly build your on-brand user experience and integrate it into your software stack. Ory's focus on open standards and automated data import capabilities makes migrating from legacy systems straightforward.
    Starting Price: $29 per month
  • 18
    Escape

    Escape

    Escape

    Discover your API attack surface in minutes, find business logic flaws, and protect your applications against even sophisticated attacks. No agents or infrastructure changes are required. Fastest return on investment. Gain a comprehensive overview of your API security posture within just 15 minutes. Powered by in-depth API security intelligence developed by our in-house research team. Supports all APIs and all environments. Escape offers a unique approach to API security through agentless scanning. You can gain a complete view of all your exposed APIs in minutes, along with their context. Get key data about your APIs, including endpoint URLs, methods, response codes, and metadata, and identify potential security risks, sensitive data exposure, and attack paths. Achieve thorough security coverage with 104+ security tests, including OWASP, business logic, and access control. Integrate Escape seamlessly into your CI/CD systems like Github Actions or Gitlab CI for automated scanning.
  • 19
    AgentAuth

    AgentAuth

    Composio

    AgentAuth is a specialized authentication platform designed to facilitate secure and seamless access for AI agents to over 250 third-party applications and services. It offers comprehensive support for various authentication protocols, ensuring reliable connections with automatic token refresh. The platform integrates seamlessly with leading agentic frameworks such as LangChain, CrewAI, and LlamaIndex, enhancing the capabilities of AI agents. AgentAuth provides a unified dashboard for complete visibility into user-connected accounts, enabling efficient monitoring and issue resolution. It also offers white-labeling options, allowing customization of the authentication process to align with product branding and OAuth developer applications. Committed to high-security standards, AgentAuth complies with SOC 2 Type II and GDPR, employing strong encryption for data protection.
    Starting Price: $99 per month
  • 20
    Curity

    Curity

    Curity

    The Curity identity server is a standards-based identity and API security platform designed to provide robust authentication and authorization for digital services. It combines identity and API security, enabling scalable customer identity and access management to accelerate digital transformation, growth, and customer loyalty. It offers a range of features, including multi-factor authentication, user journey orchestration, decentralized identity, and secure access management. It supports various identity-related standards such as OAuth, OpenID Connect, and SCIM, ensuring interoperability and compliance with industry protocols. Curity's architecture is built on the principle of separation of concerns, enhancing security, flexibility, and scalability. It provides advanced configuration management with transaction-based changes, rollbacks, and backups, accessible through a web UI, CLI, RESTCONF API, and XML config files.
  • 21
    Akamai Identity Cloud

    Akamai Identity Cloud

    Akamai Technologies

    Create seamless, personalized customer experiences without compromising security. Akamai Identity Cloud is a cloud-native, SaaS solution that simplifies customer identity and access management (CIAM). Purpose-built for consumer use cases, Identity Cloud provides the scalable infrastructure needed to convert, manage, and engage millions of customers. Out of the box, it includes customizable registration, authentication and SSO, consent and preference management, easy integration into your MarTech ecosystem, and powerful data analytics. Enhanced customer data protection streamlines privacy regulation compliance without sacrificing customer experience. For mission-critical applications, where scale, performance, and customer experience are table stakes, brands use Identity Cloud. Quickly enable omnichannel access with SSO and a wide array of authentication methods, including social login, directory services, and OIDC.
  • 22
    IDmission

    IDmission

    IDmission

    Identity solutions require more than just verification. In today's digital world, businesses need to integrate identity solutions as a strategic part of their business processes. IDmission offers effortless end-to-end customer journeys using passive liveness biometrics, Identity-as-a-Service, and multi-factor authentication, coupled with our industry expertise. IDmission provides solutions that orchestrate digital transformations for companies relying on identity and ID verifications. We utilize standards compliant security, passive liveness biometrics, AI, and our industry expertise to help you create an effortless end to end customer journey. IDmission provides solutions for demanding applications that rely on identity and document authentication integrated into an end to end solution. IDmission provides much more than the best biometric technologies and AI in the industry. We take our technology and help our customers orchestrate their entire digital transformation.
  • 23
    Authorizer

    Authorizer

    Authorizer

    Build secure apps 10x faster. Low code tool and low cost deployment. Own your user data in your preferred database. Authenticate users with multiple auth recipes. Authorize users based on your business roles. OAuth2 and OpenID compatible APIs. Authentication and authorization have never been this simple before. Deploy production-ready Authorizer instance using one-click deployment options available. Open Authorizer instance endpoint in the browser. Sign up as an admin with a secure password. Configure environment variables from the dashboard. Authorizer object can be instantiated with JSON object. You can use Authorizer off the shelf and provide an amazing digital experience in just 3 minutes. We rather have you focused on your core business and build stuff that matters. Auth with best services baked in. Secure Session management implemented with HTTP-only cookies. Authorization Code flow implemented for mobile-based auth.
  • 24
    Cypago

    Cypago

    Cypago

    Reduce manual efforts, lower costs and strengthen trust with customers with no-code automation workflows. Elevate your security Governance, Risk, and Compliance (GRC) maturity through simplified and automated cross-functional processes. Everything you need to know about achieving and maintaining compliance across all security frameworks and IT environments. Get in-depth ongoing insight into your compliance and risk posture. Save thousands of hours of manual work by leveraging the power of true automation. Put security policies and procedures into action to maintain accountability. At last, a complete audit automation experience, including audit scope generation and customization, 3600 evidence collection across data silos, in-context gap analysis, and auditor-trusted reports. Because audits can be easier and way more efficient than they are today. Transform chaos into compliance and enjoy instant insights on your employee and user base access privileges and permissions.
  • 25
    Ploy

    Ploy

    Ploy

    Discover, protect, and manage your SaaS in minutes. Integrate in minutes to detect all SaaS applications employees are using. Identify duplicate applications and licenses that are no longer used by employees. Triage applications that have access to sensitive data and uncover supply chain risks. Ploy enables businesses to save on wasted SaaS spending that can manifest in multiple ways. Ensure employees have been completely offboarded from SaaS tools so licenses aren't being paid for unnecessarily. Ploy also automatically identifies duplicated SaaS, so you'll never end up paying for Jira and Asana again. Gain insights into low-usage licenses, so you can de-provision licenses that are no longer required by employees. See every app employees have signed up to and their authentication method. Guarantee employees have been offboarded ensuring your data is protected. Identify licenses no longer being used by employees. Use Ploy's workflows to automate all your onboarding and access processes.
  • 26
    SecureFlag

    SecureFlag

    SecureFlag

    SecureFlag’s hands-on training in real development environments offers a tailored approach to enterprise training needs. 45+ technologies supported and over 150 vulnerability types covered. Each comprises a fully configured development environment. With more than 70% of vulnerabilities introduced during development, writing secure software is more critical than ever. SecureFlag has revolutionized the approach to secure coding training. With SecureFlag’s hands-on labs, participants learn in virtualized environments using the tools they know and love. SecureFlag’s Labs teaches participants how to identify and remediate the most prevalent security issues by doing instead of simply just seeing. Labs run in real, virtualized development environments, and participants learn using the same tools they use at work. Engage with your organization’s developer community and promote learning through enjoyable competition.
  • 27
    FortiTrust Identity
    FortiTrust Identity is a cloud-based subscription that simplifies identity and access management across enterprise hybrid environments. FortiTrust Identity (FTI) is cloud-based and natively integrated with the Fortinet Security Fabric to deliver a rich set of security controls and centralized management of user authentications, including multi-factor authentication. FTI enables you to begin your zero-trust journey with reliable user verification and strong authentication, plus ease of use for the end user. Adaptive, multi-factor, or passwordless authentication and identity federation for SSO across the enterprise hybrid environment are all included via user-based licensing. Ensure the right people get appropriate access to your data, resources, and applications across the enterprise. Increase certainty of user identity with the verification of another factor and adaptive authentication technique.
  • 28
    Cloudentity

    Cloudentity

    Cloudentity

    Cloudentity increases development velocity, audit efficiency and risk mitigation by advancing fine-grained authorization policy management and delivering continuous, transaction-level enforcement across hybrid, multi-cloud and microservice environments. Externalize authorization management that empowers developers to efficiently create policy-as-code, provision standardized controls, and invoke contextual access and data exchange enforcement as close to the service as possible. Accelerate application delivery by expediting security validation with full data lineage for audit, forensics and compliance. Cloudentity provides dynamic authorization governance that delivers policy automation and adaptive control ensuring Zero Trust between users, apps, services and data. Automate app, service and API inventory, authorization policy standardization, and declarative authorization provisioning to streamline release security verification.
  • 29
    ZeroNorth

    ZeroNorth

    ZeroNorth

    Complete risk visibility and assurance from a single pane of glass. Organizations rely on ZeroNorth (formerly CYBRIC) for software and infrastructure risk management at the speed of business. The ZeroNorth platform accelerates and scales the discovery and remediation of software and infrastructure vulnerabilities. converting your manual and siloed efforts into a single, orchestrated process. Only the ZeroNorth platform enables organizations to orchestrate a consistent vulnerability discovery and remediation program, deliver continuous risk visibility and assurance, improve the value of existing scanning tools and help organizations move forward from any point in their journey to secure DevOps.
  • Previous
  • You're on page 1
  • Next