Alternatives to Amazon One

Compare Amazon One alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Amazon One in 2024. Compare features, ratings, user reviews, pricing, and more from Amazon One competitors and alternatives in order to make an informed decision for your business.

  • 1
    Udentify

    Udentify

    Fraud.com

    Know the real identity of your customer, user, or employee with the Udentify Identity Verification and Biometric Authentication solution. Challenges we solve: - Identify verification - Onboarding - New account opening - Age verification - Fraud prevention - Biometric authentication - Passwordless authentication - Strong customer authentication - KBA replacement - KYC and AML compliance Behind the scenes, Udentify embeds cutting-edge technologies into our identity verification and biometric authentication solution via a lightweight and flexible SDK. We are constantly investing in our technologies to stay at the forefront of fraud detection, compliance, and user experiences.
    Compare vs. Amazon One View Software
    Visit Website
  • 2
    ARGOS Identity

    ARGOS Identity

    Argos Identity

    ARGOS Identity is an identity verification service provider (Identity as a Service). Get everything you need for Identity verification at ARGOS. We provide services to help you identify Anyone Anywhere Anytime! Providing simple KYC implementation for identity verification.​ We empower our clients to deliver a seamless digital onboarding experience. Build your identity management system around your business goals and offer your customers a smooth, hassle-free KYC experience. FACE Identity is a section of user onboarding that utilizes facial recognition technology to search for matching faces within a collection of stored faces. This service helps alleviate the ARGOS Textify is an AI-powered solution that automates the extraction and review of critical data from a wide range of documents, reducing the time and cost of manual verification.
    Compare vs. Amazon One View Software
    Visit Website
  • 3
    Google Pay
    Google Pay is the fast, simple way to pay online or make contactless payments with your phone. Your payment info is protected with multiple layers of security so you can pay with peace of mind – all the time. See where you’ve made the most recent transactions, right on your home screen. Find past purchases, loyalty cards, offers - even online ordering - all in one place. Keep credit cards, debit cards, transit passes, and more on your phone for quick, easy access. Bring your accounts together for a clearer view of what you have, what you’ve spent, and recent activity. Easily find past purchases from weekend getaways, past payments, and tickets you saved in your wallet. And if you choose, you can link your bank account, Gmail, and Google Photos to search even more transactions.
  • 4
    Amazon Pay
    Amazon Pay makes it simple for hundreds of millions of customers around the globe to pay for products and services using the information already stored in their Amazon accounts. To make a payment, you can use any of the payment methods in your Amazon account. The Amazon Pay checkout solution increases shopper engagement, brand visibility, and security for your business, letting hundreds of millions of Amazon customers pay their way, every day. Amazon Pay is a service offered to Amazon customers, and you are enabled to use it wherever you see it — whether that is clicking the Amazon Pay button when checking out on your favorite online stores, managing your payment methods in your account on Amazon.com or using Amazon Pay on Alexa. There are no additional sign-ups or sign-ins. Your transactions are safe and secure, and everything can be tracked in your Amazon account.
  • 5
    Apple Pay
    Apple Pay is easy and works with the Apple devices you use every day. You can make contactless, secure purchases in stores, in apps, and on the web. And you can send and receive money from friends and family right in Messages. Apple Pay is a safer way to pay, and even simpler than using your physical card. Using Apple Pay with your iPhone or Apple Watch is quick and secure. It’s a safer way to pay that helps you avoid touching buttons or exchanging cash. Use Apple Pay on the App Store to buy apps and games, or within apps to pay for a ride, a pizza delivery, or a new pair of sneakers — with just a touch or a glance. You can also use Apple Pay for a subscription to Apple Music, Apple News+, and Apple Arcade. Or for upgraded iCloud storage and other Apple services. When you’re making purchases on the web in Safari on your iPhone, iPad, or Mac, you can use Apple Pay without having to create an account or fill out lengthy forms.
  • 6
    Blink Identity

    Blink Identity

    Blink Identity

    From front of house to back of house, the right people get right in. The wrong people stay out. Eliminating scalping. Reducing risk. And keeping lines moving. With decades of experience developing identity systems for enterprises in high-risk environments, Blink Identity’s biometric matching system utilizes military-grade technology to reliably identify people at full walking speed in any lighting condition. For individuals, Blink Identity eliminates the worst part of attending an event or concert: waiting in lines. Patrons get to their event faster and easier. Food and merchandise can be purchased with a glance. Customized communications open an array of options for venues to enhance customer experience. And, ticket scalping becomes a thing of the past. For companies, Blink Identity integrates with standard frameworks and workflows, handling everything from implementation and enrollment to privacy compliance.
  • 7
    Entrust Identity as a Service
    Cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). Secure access to apps, networks, and devices for all of your users — with cloud-based multi-factor authentication. Proximity-based login, adaptive authentication and other advanced features contribute to an optimal user experience. Happy users don’t try to circumvent security measures. Everyone wins. This is easier than anything else you’ve tried. Work-saving touches — like built-in provisioning tools and on-premises and cloud integrations — reduce the workload for IT, from deployment through everyday management. Get strong IAM to move faster into the future. Cloud-based Identity as a Service scales quickly to accommodate new users, expanding use cases, and evolving security threats.
  • 8
    VoiceMe

    VoiceMe

    VoiceMe

    In an always more contactless world, arises the necessity of a new model of digital trust. VoiceMe enables people, companies, and objects to interact with each other through a simple interface and in an ultra-secured way opening the door to a new generation of services. Access restricted physical areas guaranteeing users' identity. Sign with legal validation documents and contracts. Our algorithms pre-identify the user based on behaviors, using also biometric parameters obtained from the upper face and voice. All customer-related data remains exclusively at the user's disposal, offering maximum privacy and respect for GDPR regulation. Each data set is encrypted, divided in pieces, and spread on a network of nodes, making it impossible for an external unauthorized source to extract. At each authorized data usage the inverse process is done to recompose the data set. API or SDK for third-party allows easy integration in already existing systems.
  • 9
    Chekin

    Chekin

    Chekin

    Increase your income, profits and improve your guest experience while saving time and money by automating the entire registration process. Our online check-in tool is at the top of the market. Designed from minute one to provide your guests with a simple, fast and pleasant check-in experience. We verify the identity through our biometric comparison software, ensuring that the documentation provided corresponds to the person accessing your home. You can customize the rental contract by adding all the clauses you want. Your guests will be able to read and digitally sign it during online check-in. Offer your guests personalized experiences, such as early check-in / late check-out, services, transportation, leisure activities, and generate more money from each reservation and more direct bookings. Your and your guest’s peace of mind. During online check-in, you can ask your guests to pay insurance or make a deposit, which will be blocked until after check-out.
    Starting Price: €4 per month
  • 10
    Incognia

    Incognia

    Incognia

    Location Behavioral Biometrics. Using the location behavioral pattern unique to each user, we create a dynamic location fingerprint that is very difficult for fraudsters to mimic or forge. Incognia location-based fraud solutions help financial institutions and retailers prevent new account fraud and account takeover. Using network signals and on-device sensor data our precise location technology creates unique behavioral patterns to identify and authenticate users. Our solution requires no PII and works in the background to deliver a secure and frictionless experience. Validate addresses anywhere in the world with real-time location data. Detect location spoofing techniques used to execute identity fraud and ATO. Recognize anomalies to block fraudulent accounts, logins, transactions and fraud farms. Guide your identity decisions with real-time location data.
  • 11
    AuthX

    AuthX

    AuthX

    The most advanced authentication platform in the world. Log in online anytime, anywhere with your face, finger, palm, push or any other modality we support. It’s secure authentication that is simple, smart and occasionally magical. Use Authx to on any system and into any application from anywhere. Use any capability to log in and change preferred methodology anytime you like. Authx is secure, scalable and extremely easy to use. Register once and use everywhere. Enjoy Authx with all the time-saving solutions you need to securely authenticate. Authx is always secure and reliable and our experts are here to support you 24/7. Use Authx Mobile for iOS and Android and push an authentication right to your phone. Log in with your Face, Finger or Palm. Authx Mobile enables you to authenticate with Push as well as biometrics on your phone. You can log into your applications with a simple touch of your access card or in range with BLE.
    Starting Price: $2.99 per month
  • 12
    DOOT

    DOOT

    DOOT

    Instantly share verified official documents with “Authorized-to-know personnel”. Create contactless payment zones using our proprietary technology. Onboard customers using auto-fill forms and automated image capture technology. Human presence assurance using geo-location and time-stamp. Online MFA using secure digital identity via DOOT 1iD. DOOT harnesses the power of proprietary & patented technologies that you can trust, enabling each citizen to easily manage and share their digital identities from their personal mobile devices. Perfect for use-cases with high footfall and queues such as airports, banks, museums & cinemas. Your clients can now validate official iD’s, ticket stubs and much more without the need for pairing or expensive data networks. Each transaction is automated, logging accurate geo-location and time-stamp for the most seamless and secure customer experience.
  • 13
    Zoox Pass
    Once you have made a contactless web check-in, you can access your services through your Zoox Pass. The identification is automatic and the release is immediate. Our API (Application Programming Interface) for biometric authentication and facial recognition already operates integrated to the main management systems in the hospitality and healthcare segments with Zoox Pass hospitality and Zoox Pass Health. The Zoox Pay technology is available for Zoox Pass Hospitality subscribers. It is integrable with several payment gateways (in Brazil and abroad) and generates safer and faster payment flows, using tokenized data from virtual wallets and acquiring contracts. Whether through webapps or self-service totems of the systems developed by your company, the possibilities are many. Less queues and quicker processes, as payments, releases and check-ins. No need for an app to download. Make use of authentication and facial recognition APIs in apps your own or developed by third-parties.
  • 14
    Mitek Mobile Verify
    Even as identity fraud escalates in today’s digital world, you can create certainty with Mitek’s Mobile Verify®. It combines linked and layered automated technologies with the world’s top forensic experts to accurately verify your customers and detect identity fraud quickly, increasing approval rates as well as security. Mobile Verify® is also built to be flexible. It can integrate easily with your existing systems and delivering an intuitive and easy customer experience. Mobile Verify® makes life simple for everyone but fraudsters. By integrating it with your current tech stack, you’ll onboard customers that matter more seamlessly, boost their brand confidence and loyalty. All this while reducing the costs associated with typical friction points and attacks. Ensure the user captures a high-quality image with the first attempt. Confirm the identity document is unaltered and genuine. Establish a trusted real-world identity profile by connecting the user to the identity document.
  • 15
    DERMALOG Biometric Software

    DERMALOG Biometric Software

    DERMALOG Identification Systems

    The world's fastest and most accurate software. DERMALOG high-speed identification software provides a crucial contribution to prevent identity fraud. It is continuously improved to guarantee reliable products. The software traces identities and duplicates of biometric documents such as national IDs, ePassports, for instance in border control, voters and refugee registration. DERMALOG offers scalable and customizable software that allows performing a wide variety of tasks for processing, editing, searching, retrieving and storing biometric templates and subject records. In addition to the DERMALOG fingerprint technology the German innovation leader presents multi-modal biometric systems which can combine fingerprint identification with an iris or face modality. DERMALOG provides the world's fastest Fingerprint matching. DERMALOG Face Identification provides highest accuracy and speed. DERMALOG Palm Identification for effective crime solving.
  • 16
    Okta

    Okta

    Okta

    One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity.
  • 17
    Wink

    Wink

    Wink

    Wink enables any institution to offer simpler and superior identity and payment experiences through biometrics. The Wink platform brings facial and voice recognition-based multi-factor authentication and payments that can eliminate passwords, SMS/OTP, usernames, card numbers, and other older technologies that are memory or device-based. Integrate the Wink streaming checkout plug-in to eliminate fraud with our unique face- and voice-based user recognition. Dramatically improve conversions and eliminate cart abandonments as consumers simply smile to check out. Make long checkout forms and forgotten passwords a thing of the past. The industry’s first multi-factor biometric authentication combines the convenience and security of face-id type experience enhanced by strong digital voice printing. Our unique and patented one-way anonymous encryption technology ensures full privacy protection as the unique Wink ID represents the user’s face and voice data as a 3D model.
    Starting Price: $499 per month
  • 18
    Transmit Security

    Transmit Security

    Transmit Security

    The Future of Authentication Is Passwordless. Agile. Instant. Versatile. Eliminate passwords to deliver powerful identity experiences that delight you and all your users. Wherever, whenever. Strong and seamless customer authentication from any device or channel. Use the mobile as the authenticator. Powered by a network of trust to identify each and every user. This is instant technology and installation that gives the ultimate experience and impact. Turn complex authentication, authorization and risk policy decisions into simple journeys. Enjoy flexible policy orchestration engine for all applications and channels. Protect your workplace and workforce whether in the office or remote. No matter what location or device enjoy the benefits of risk based technology that provides impenetrable security. Go passwordless and keep your enterprise secure.
  • 19
    Samsung Pass
    Say goodbye to forgotten passwords. Get past security with just a glance or touch. Just use your biometrics to log in to your apps and websites quickly and securely. Samsung Pass is an ’identity management as-a-service’, enabling secure access through biometric authentication. Simply authenticate through biometrics without ID & Password input. No need to input an ID & Password to log in to websites anymore. Samsung Pass provides an enhanced user experience by integrating advanced biometrics. Your biometric template will be encrypted and secured by Samsung Knox. Samsung Pass adopts FIDO (Fast Identity Online) technology to ensure valid authentications and provide simple and secure biometric authentication services.
  • 20
    Nexsign

    Nexsign

    SAMSUNG SDS

    Get stronger mobile security that’s uniquely yours. The next step in mobile security is Nexsign. Unlike a password, which can be easily forgotten or duplicated, Nexsign™ verifies your identity with biometric information using your fingerprint, face, and voice. The result? An authentication experience that’s simpler, faster, and even more secure. The days of remembering long, complicated passwords are officially over. Accessing data is as simple as recognizing your fingerprint, face or voice. Enjoy some peace of mind. Nexsign™ will not store your biometric information on the server. And with a strong authentication system using Public-Key Infrastructure (PKI), there is no risk of biometric information leaking. Biometric authentication is just the beginning. Nexsign™ can also work on a range of platforms and environments, such as Mobile OTP or PIN authentication. Now it’s simple and easy to deploy solutions, with standardized development toolkits, APIs, and a web-based admin portal.
  • 21
    Hive.id

    Hive.id

    Hive.id

    Separate fake signups from real users, stop fraudulent accounts and protect your good users from account takeover. Free trials are great, but don’t let bad actors waste your time or money. Align risk with your business objectives and keep fraudsters and bots from signing up and damaging your brand and bottom line. Detect suspicious access on user accounts in real-time without manual overhead. Easily automate alerts, step-up authentication and account recovery process, appropriate to the specific level of risk. Detect email addresses that look undeliverable, or just plain fake. Add different signals, and you've identified most low quality signups. Your user experience is still great, but now it aligns with your business objectives and risk tolerance. Companies of all sizes face the question of whether to build or buy a security solution. Hive gives you a cost effective option with a faster time to market.
  • 22
    Callsign

    Callsign

    Callsign

    We are an identity fraud, authorization & authentication company, solving the challenges that organizations face in getting their users on to & interacting with their digital platforms. Often innovative solutions focus on the capability of technology and do not give applicability to a user base the same weighting. Our engineering team comes from a banking and ecommerce background, with over 300 years combined experience in making software work for all. That’s why we are chosen to help some of the world’s largest banks and, offer the same “bank grade” identification solutions to public and private sector clients of all sizes. Callsign helps your users get on with their digital lives in the most seamless way possible – checked, verified and safe, because we enhance, rather than block, user experience. Our Intelligence Driven Authentication recognizes users by combining deep learning insights - derived across device, location and behavioral data.
  • 23
    RecFaces

    RecFaces

    RecFaces FZ-LLC

    RecFaces Id-Guard is a software developed for video surveillance and security systems that allows you to expand the functions of a classic video surveillance system using identification in the video stream. Main features: Fast installation in 20 minutes Integration with world leaders Movement tracking at the facility All face recognition capabilities for your real-time video surveillance system: - Instant notification of the operator about alarming events at the workplace or through a mobile application; - Improving the accuracy of identifications during operation due to self-learning of the system and auto-update of the profile base; - Efficiency of incident investigation using parametric search in a long-term archive; - Fast search for people in the archive by photo, video or verbal description of facial features, hair, glasses, etc.; - Simple construction of complex reports, including the routes of people moving on the facility’s maps in the system.
  • 24
    Blue Biometrics

    Blue Biometrics

    Blue Biometrics

    Blue enables police to identify more offenders and book more efficiently. Border agencies to enrol more visitor biometrics in advance. Businesses to verify more customers for remote digital processes. Digital identity systems to enrol and verify more citizens at low cost. Blue Biometrics software enables smartphone cameras as contactless fingerprint scanners for law enforcement, financial services, digital identity systems and many other applications. We specialise in the compatibility of contactless fingerprint images with contact based technology for policing, border protection, visas and digital identity systems. Contactless fingerprint capture by smartphone camera is the lowest cost means of wide distribution of a fingerprint scanning capability suitable for external databases.
  • 25
    TECH5

    TECH5

    TECH5

    In a world where identity is moving away from the physical documents we have carried for decades and is becoming increasingly digital, online, and mobile, a solution is needed that can ensure citizens’ trust in the organizations that collect, store and access their data. TECH5 introduces T5-Digital ID – the inclusive technology solution for identity issuance and verification. It allows the strong binding of the digital credential to the holder biometrically and brings ownership of the identity to its authorized holder. With T5-Digital ID, the holder controls what data to share under what circumstances. We built our solution from the ground up by taking the analogy of the physical ID document and asking five fundamental questions related to where identity comes from and what it is moving toward. We then went further and applied all of the above questions to building an ecosystem where a physical smart card, with its (expensive) reader infrastructure, is not necessary.
  • 26
    IdentityX
    Daon’s IdentityX is a multi-modal, vendor agnostic and future-proof identity services platform that addresses the full customer identity lifecycle. The key to trust in a digital identity is a unified, user-centric view of identity creation, use, and management. The IdentityX Platform provides the following core functions: Identity Establishment through account origination and digital onboarding, Omni-Channel Multi-Factor Authentication via mobile, web, and call center authentication, Identity Recovery and other device and account lifecycle management functions. Daon’s IdentityX Digital Onboarding product enables quick, accurate identity establishment for a range of purposes, including Anti-Money Laundering (AML) and Know Your Customer (KYC) checks.
  • 27
    Spintly

    Spintly

    Spintly

    Truly wireless, cloud-based door access control system for a seamless, hassle-free, and contactless user experience. A modern access management system that combines the power of the cloud, smartphone, and wireless technology. Spintly is transforming the physical security industry with its fully wireless, cloud-based access control system. It removes the complexity of the process of deploying an access control solution in a building. With absolutely no wiring the installers can save more than 60% of their time and cost and be more productive. Our vision is to make the built world smarter and simpler by providing a frictionless access control experience to users and to make the building smarter with our fully wireless mesh platform for smart building devices. Spintly offers solutions to various industry segments with its fully wireless access control hardware along with cloud-based software.
  • 28
    1Kosmos

    1Kosmos

    1Kosmos

    1Kosmos enables passwordless access for workers, customers and citizens to securely transact with digital services. By unifying identity proofing and strong authentication, the BlockID platform creates a distributed digital identity that prevents identity impersonation, account takeover and fraud while delivering frictionless user experiences. BlockID is the only NIST, FIDO2, and iBeta biometrics certified platform that performs millions of authentications daily for some of the largest banks, telecommunications and healthcare organizations in the world.
  • 29
    eClear 360

    eClear 360

    eConnect

    Finding affordable, turnkey solutions that can quickly plug into existing systems to scale up operations. eConnect's Identity Management system, eClear 360, leverages multiple data integrations and ties them to our industry-leading facial recognition algorithm. This opens the door for new insights, opportunities, and revenue protection, all from one platform. Key capabilities include: Identifying anonymous high-value patrons, their gaming value, and frequency of visits, detecting excluded patrons, advantage players, and patrons who have committed crimes in the past, a great tool to help the operator with know your customer mandates. The Identity Management system employs patented technology to provide operators with accurate facial identification reinforced with data analytics to identify staff members for time-clock integrations, detect unwanted individuals or valued guests, and improve operational efficiency.
  • 30
    Imageware Biometric Engine
    The Imageware Biometric Engine is a scalable, agnostic, multi-modal biometric technology platform for identity management, ensuring only valid individuals gain access to controlled areas or obtain secure documents. Using one or more biometric technology factors the Biometric Engine conducts 1:1 biometric searches to verify an individual’s identity, 1:N searches to identify an individual within a population, and X:N investigative searches against watch lists and black lists. It is agnostic in biometric algorithm and hardware, supporting the largest number of algorithms and devices on the market. Using two or more biometric types, such as a face and finger, the modalities are processed through different algorithms and the results are merged after programmed logic is applied to the results. Imageware has been developing proven solutions for secure identities since 1997.
  • 31
    Onfido

    Onfido

    Onfido

    How do you verify real people in the digital world? Onfido helps companies see real identity, the humans behind the screens, using world-leading AI and identity experts. Your customers can prove their identities, wherever they are, with just an ID and their face. So you’ll have everything you need to grow your business securely. Anchor your user’s digital account to their real identity with just their ID and face. Then re-verify or authenticate them when needed with a selfie. See how Onfido’s identity verification has helped businesses like yours onboard more users, reduce fraud and free up resources for internal teams. Drive business results with identity verification and authentication. Our AI-based technology assesses whether a user’s government-issued ID is genuine or fraudulent, and then compares it against their facial biometrics. That’s how we give companies the assurance they need to onboard customers remotely and securely.
  • 32
    IdRamp

    IdRamp

    idRamp

    Turn your digital identity strategy into a business asset, not a liability. Stop spending time, money, and headcount replatforming insecure identity technology. Simplify authentication complexities with decentralized zero trust Identity from Idramp. Bring order to your identity management chaos. Accelerate delivery of services to meet the speed of business. Eliminate expensive platform upgrade projects with rapid modular deployment. Relieve the pain of bespoke integration with rapid integration that automatically interoperates with existing infrastructure. Tailor your customer experience with a modular architecture that eliminates vendor stack lock-in. Add zero trust identity with automated security policies and adaptive access controls. Control extensible ecosystems with state of the art data protection. Never trust but always verify that your applications and people are safe.
  • 33
    Keyless Authenticator

    Keyless Authenticator

    Keyless Technologies

    Nothing to remember. Nothing to steal. You are the key. Adopt zero-trust authentication to protect your remote workforce and enable strong customer authentication with just a look. Anywhere. Any time. Any device. Embrace passwordless, multi-factor authentication to eliminate fraud, phishing and credential reuse – all while enhancing customer and employee experiences and protecting their privacy. Unique capabilities powered by unique technology. Hardware Agnostic. Since we do not rely on the device hardware or sensors, Keyless can be deployed on a large set of devices and appliances. Drive better outcomes for your organization by eliminating passwords. Top-Notch Security. No central honeypot, no data on user devices. Data can never be stolen or lost because no private information is accessible to anyone but the user. Reduce password associated costs by going passwordless. Password Reset Costs. The average helpdesk labor cost is estimated at $70.
  • 34
    Say-Tec

    Say-Tec

    Finnovant

    Say-Tec is our flagship cybersecurity product, it combines state-of-the-art biometric technology with blockchain technology to ensure the safety of your data. Say-Tec eliminates the need for multiple passwords by using your unique face and voice biometrics to unlock a device, login to an account, and access your private data. Standard web interfaces could include invoking Say-Tec during account set-up, or during the log-in process, or resetting a password when it has been forgotten. Say-Tec can completely replace the user-id and password friction of logging into a website. Say-Tec has been tailored to support the world of decentralized apps, websites, and processing, which is commonly encountered with Blockchain access, cryptocurrency, and crypto wallets and exchanges.
  • 35
    Unisys Stealth
    Traditional security controls are insufficient to protect from cyberattacks in the digital age, compelling organizations to adopt a Zero Trust Network. The principles are simple – trust no user or device, inside or outside the private network and grant as little access as possible upon reliable identification. Implementing these principles can be complex – solutions that require expensive, time-consuming upgrades to existing network infrastructure make the move to Zero Trust prohibitive. Unisys Stealth is a flexible cybersecurity software built on identity-based encrypted microsegmentation that transforms your existing network – both on-premises and in the cloud – into a Zero Trust Network. Unisys Stealth products and services offer cybersecurity solutions that maximize your security posture, maintain regulatory compliance and protect your organization.
  • 36

    BioSig-ID

    Not Available

    BSI is a cybersecurity company that identifies and eliminates cheating, identity theft, and fraud with a written password. We analyze not what is written but how it is written. Our technology identifies and stops impersonators intent on illegal activities. Clients choose us because our technology is user-friendly, yet highly accurate. In fact, surveys show that 46% of first-time users reported the technology was “Entertaining”, while 98% agreed it’s more secure than a typed password. To the small group who write about difficulties please visit our help desk open 24x7, complete with self-help articles (found by selecting the “?” icon when you enroll or authenticate). As with most things, you must prepare yourself and read or watch our how-to instructions. With over 100M authentications completed worldwide, we report that approximately 99.97% of users experience no problems using our technology. Clients love what we do for them with pages of testimonials on our site.
  • 37
    Bravura OneAuth

    Bravura OneAuth

    Bravura Security

    Immediately protect your organization against two of the most prevalent cyberattacks: phishing and brute force attacks by eliminating the threat vector of passwords with Bravura OneAuth powered by HYPR. Provide your workforce with a passwordless sign-in experience that delivers on speed, simplicity, and significantly increased security across your security fabric. Bravura OneAuth uses one-touch biometrics that acts as access points making authentication for your workforce as easy as unlocking a cell phone yet significantly more secure than traditional Multi-Factor Authentication (MFA) solutions. It replaces traditional, tedious, and poorly adopted MFA methods and removes passwords entirely from the solution to reduce the risk of compromised credentials.
  • 38
    Acuant

    Acuant

    Acuant

    Knowing who you are doing business with has never been more critical. Acuant allows you to instantly minimize risk, prevent fraud and enhance security for any size business with the fastest Go-to-Market. We deliver omnichannel solutions for age verification, AML/KYC, fraud prevention and more to be where your customers want to transact. Fast, friendly and secure identity verification for today's digital-first economy. With Acuant you have the flexibility to easily address evolving fraud and regulations. Access the entire platform or just the solutions you need today. Acuant’s Identity Document Library of 6,000+ documents is continuously updated for the best coverage and highest accuracy. Acuant is at the forefront of enabling businesses and governments to transact with trust in an ever-increasing digital world, facilitating the creation, ownership and ability to verify your identity and making that accessible to the entire global population.
  • 39
    cidaas

    cidaas

    WidasConcepts

    cidaas is the optimal solution for fast and secure identity management. Thanks to cidaas you create one identity per user across all your channels. cidaas is based on OAuth2.0 and OpenID Connect standards, provides strong API security and with integrated Bot Net Detection and Fraud Detection a secure journey across all your business channels. Modern Identity and Access Management goes like this. Comprehensive feature set for quick and easy integration and implementation of all use cases and systems. We take care of it so you can focus on your core business. No more worrying about maintenance or operation. Countless passwords and pins make life difficult for users and are an unsightly barrier to access on digital channels. With passwordless authentication you secure your digital applications and offer your users a unique customer experience – because the login is the first thing your users see.
  • 40
    AU10TIX

    AU10TIX

    AU10TIX

    AU10TIX, an identity management company headquartered in Israel, is on a mission to obliterate fraud and further a more secure and inclusive world. The company provides critical, modular solutions to verify and link physical and digital identities so businesses and their customers can confidently connect. Over the past decade, AU10TIX has become the preferred partner of major global brands for customer onboarding and customer verification automation. AU10TIX takes verification and authentication to a whole new level of scalability. The power of deep learning lies within the input – the more you feed it, the smarter it becomes. This enables you to scale consumer onboarding and exponentially scale your business. With over 5% of the world identities already scanned and verified, fortune 500 companies are powered by AU10TIX, wiping out fraud while confidently focusing on growth. Our identity has changed over the years. Our principles & pioneering vision haven’t.
  • 41
    Jumio

    Jumio

    Jumio

    With identity theft and account takeover on the rise, it’s increasingly difficult for businesses to trust that someone is who they claim to be online. Jumio’s identity proofing and eKYC solutions are powered by the Jumio KYX Platform and leverage biometrics, AI and the latest technologies to quickly and automatically verify the digital identities of new customers and existing users. Jumio provides an automated and intuitive user experience that takes less than a minute to complete. Jumio supports more countries, languages, and document types than any other solution. Jumio seamlessly integrates into websites, iOS or Android applications via APIs, SDKs and webcams. Quickly integrates into your website or mobile app and lets your users shift from a desktop to mobile experience as desired. All data is transmitted and stored with strong AES 256-bit encryption. Jumio is PCI DSS Level 1 compliant which speaks to the seriousness that we take data security and privacy.
  • 42
    Regula

    Regula

    Regula

    Regula is a global developer of forensic devices and identity verification solutions. With 30+ years of experience in forensic research and the largest library of document templates in the world, Regula creates breakthrough technologies in document and biometric verification. Regula hardware and software solutions allow over 1,000 organizations and 80 border control authorities globally to provide top-notch client service without compromising safety, security or speed.
  • 43
    Nametag

    Nametag

    Nametag

    Nametag is the fast, safe, everywhere ID. Our mission is to bring authenticity to the internet and enable people to build trustful relationships. By putting privacy first, Nametag gives you control of sharing your personal information and the power to choose when it’s shared, where it’s shared, and for how long. We empower individuals to share validated details about who they are with other people or companies. We enable businesses to identify their customers in real-time and request the necessary details for a faster and more trusted transaction. Never get locked out. If you lose your phone, lose access to your email, or even get a new driver’s license, you'll still be able to sign in with Nametag. Don’t overshare. With Nametag's Privacy Mask, share only the necessary information and conceal the rest. Companies benefit too by not holding unnecessary personal information (PII).
  • 44
    FaiSentry
    FaiSentry includes a cluster-based architecture that provides effective scalability, robustness, and future-proofing, along with the option of hosting on-premise or in a data center. Going beyond passwordless login, FaiSentry enables efficient and frictionless identification of multiple individuals from a single image, with results returned within a fraction of a second. Our facial biometric engine combines enterprise-grade security and ease of use, creating the optimal business and client experience. In contrast to other face authentication products on the market, Aculab, combined with AI-driven technology, has created a solution impervious to race and gender biases. A single camera can monitor key entry and exit points, with FaiSentry identifying multiple individuals simultaneously from each image.
  • 45
    Veridium

    Veridium

    Veridium

    Veridium is the most comprehensive Integrated Identity Platform powered by AI-based Behavioral Biometrics, enabling Multi-Factor Authentication (MFA), digital ID verification, and a true enterprise-grade passwordless experience for employees and customers. Low code, agile, and flexible. Eliminating the password for customers removes the friction often associated with passwords and delivers increased security for online connections with our single step multi-factor authentication solution, while providing higher levels of identity assertion for organizations. Veridium provide an end-to-end authentication platform for all your WFH needs and any VPN solution, delivering strong, multi-factor, passwordless workforce authentication.
  • 46
    Verbio

    Verbio

    Verbio

    Increase security and user experience in daily interactions with the unique potential of voice. An innovative language agnostic, cost-effective and reliable alternative to seamlessly verify and identify users in real-time. Voice biometrics allows to automatically recognize any person through the characteristics of their voice and it can smartly substitute traditional authentication methods (cards, passwords, signature, fingerprint, etc) in security access control, user verification for digital transactions or for fraud prevention and detection. With an easy and cost-effective solution, authentication through voice biometrics brings an innovative and safe experience to users, with a risk-free and remote access. Biometric Authentication and Identification through voice has never been so secure and fast with different operational uttering models for each type of client and advanced anti-spoofing methodologies.
  • 47
    BioCatch

    BioCatch

    BioCatch

    BioCatch delivers advanced behavioral insights to provide global organizations with actionable intelligence so you can create a secure customer journey. BioCatch analyzes a user's physical and cognitive digital behaviors to generate insights that distinguish between legitimate applicants and cybercriminals. BioCatch detects behavioral anomalies indicative of human and non-human cyberthreats such as Remote Access Tools attacks, Bots, malware and manual account takeover methods. BioCatch detects subtle behavioral indicators that suggest a victim is being unwittingly guided through a fraudulent money transfer. BioCatch's Al-driven behavioral biometrics technology significantly reduces online fraud and enables online identity verification, without compromising the user experience. BioCatch's patented solution is designed to protect identities online while providing web and mobile users with a frictionless experience.
  • 48
    WEB-key

    WEB-key

    BIO-key

    Use our world-class biometric platform to streamline access and secure identity for your enterprise and nations around the globe. Compliant-by-design, BIO-key's solutions are NIST tested and built with integrity. A comprehensive multi-tenant enterprise biometric management platform built around one of the world’s most accurate and scalable biometric engines. API for WEB-key and biometric solutions to include in your application/environment. BIO-key offers a variety of Microsoft-qualified Windows Hello USB scanners that can be used out of the box with Windows Hello and Windows Hello for Business, or for use with our WEB-key biometric platform and PortalGuard MFA/SSPR as one of many supported brands of scanners. Reduce user frustration, down time, and calls to the help desk, or try one of these hybrid approaches. Required with a password for remote and home-based employees, contractors, business partners and other designated external users.
  • 49
    HYPR

    HYPR

    HYPR | The Passwordless Company

    HYPR fixes the way the world logs in. Organizations are faced with the challenge of achieving secured and seamless authentication coupled with a flawless user experience at a time when it’s more critical than ever. HYPR’s passwordless multi-factor authentication (PMFA) platform decouples authentication from the organization’s current and future identity providers and eliminates the traditional trade-off between security and user experience by providing uncompromising assurance and consumer-grade experience with true passwordless and phishing-resistant MFA. The solution is trusted by more than 60M users worldwide. With deployments taking hours rather than weeks or months, organizations decrease the risk of attack, increase positive user experience, and lower operational costs.
    Starting Price: $4.00 per user/month
  • 50
    Dapple Security

    Dapple Security

    Dapple Security

    Dapple is committed to creating cutting-edge technology utilizing responsible biometrics and privacy by design principles to protect human digital identity and defend against phishing attacks, all while simplifying the user experience. We believe that people should never have to sacrifice privacy for security and will never charge a premium for security or privacy features in our products. Dapple security is creating cutting-edge technology utilizing responsible biometrics that protects people and privacy through a first-of-its-kind passwordless platform. We’re creating a brand and culture using privacy by design, where we give power back to people and the planet through our shared values.