2 Integrations with ActivID

View a list of ActivID integrations and software that integrates with ActivID below. Compare the best ActivID integrations as well as features, ratings, user reviews, and pricing of software that integrates with ActivID. Here are the current ActivID integrations in 2024:

  • 1
    AuthPoint

    AuthPoint

    WatchGuard

    Our unique multi-factor authentication (MFA) solution not only helps to reduce the likelihood of network disruptions and data breaches arising from lost or stolen credentials, but we deliver this important capability entirely from the Cloud for easy set-up and management. AuthPoint goes beyond traditional 2-Factor Authentication (2FA) by considering innovative ways to positively identify users, and our large ecosystem of 3rd party integrations means that you can use MFA to protect access. Ultimately, WatchGuard AuthPoint is the right solution at the right time to make MFA a reality for the businesses who desperately need it to block attacks. AuthPoint uses a push message, QR code, or one-time password (OTP) as an additional factor proving your identity, and our mobile device DNA matches the authorized user’s phone when granting access to systems and applications. Therefore, any attacker who clones a user’s device in an attempt to access a protected system would be blocked.
  • 2
    Qumulex QxControl

    Qumulex QxControl

    Qumulex QxControl

    A unified, cloud-based, physical security solution for those serious about security. QxControl is a modern take on video management and access control software. With QxControl, commercial customers can manage their physical security from anywhere, on any device that runs a browser, using a cybersecure, intuitive UI. Modern, intuitive user interface that can be operated on desktop, mobile, or any device with a browser, from anywhere you have an internet connection. Open platform architecture allows Integrators to choose the best cameras, door controllers, and analytics on the market and enables the use of existing infrastructure when upgrading legacy systems. Total control of storage via cloud-connected cybersecure gateways as well as external cloud storage. No more legacy system headaches of manual software updates, thick client applications to download, cumbersome NVRs, and insecure port-forwarding.
  • Previous
  • You're on page 1
  • Next