Alternatives to AuthZed

Compare AuthZed alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to AuthZed in 2024. Compare features, ratings, user reviews, pricing, and more from AuthZed competitors and alternatives in order to make an informed decision for your business.

  • 1
    Auth0

    Auth0

    Okta

    Auth0 by Okta takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO.
    Leader badge
    Compare vs. AuthZed View Software
    Visit Website
  • 2
    Auth Armor

    Auth Armor

    Auth Armor

    Harness the power of biometrics on smartphones to make authentication easy for any application or website, creating a new approach to logging and authenticating online. Passwordless and 2-factor authentication that lets you authenticate your users with the smartphones in their pockets. Auth Armor puts secure authentication in the hands of every user — no weak passwords or cumbersome codes. We have built powerful APIs, SDKs, libraries, and dashboards to allow you to build what you want to build, how you want to build it. Use our tools to build authentication into any app, using any flow you would like. We offer Consumer facing and workforce protection, giving you the power and flexibility to secure anything, the way you need it. Auth Armor is the fastest and easiest mobile authenticator available. We support instant push messaging directly to user's devices enabling the fastest login and authentication experience.
    Starting Price: FREE for 10,000 active users!
  • 3
    Frontegg

    Frontegg

    Frontegg

    Frontegg is a user management platform, designed for the Product-Led Growth (PLG) era. Frontegg provides blazing-fast integration of a powerful user infrastructure, designed to handle modern application use-cases. Our platform supports app builders by covering all the way from fundamental authentication flows to the most advanced capabilities such as complex organizational structures (multi-tenancy), fine-grained authorization, API-token management, self-service admin portal for end-users, subscription enforcement, single-sign-on (SSO), and much more. Frontegg’s interfaces are embedded as a UI layer within your app and becomes a customer-facing management interface for your end-users, both on the personal and workspace levels. Frontegg also powers-up your backend through rich SDKs supported in various languages and frameworks.
  • 4
    Authsignal

    Authsignal

    Authsignal

    Authsignal delivers a suite of drop-in authentication and fraud tools to enable consumer-focused businesses to securely authenticate customer identity, mitigate fraud and deliver seamless customer experiences. Trusted by modern product and identity teams around the world, Authsignal plugs into your existing technology stack to streamline the authentication of any customer flow or action in seconds. Effortlessly safeguard customer transactions, mitigate risks, and implement rules all within a single, user-friendly workspace. Easily deploy Passkeys, passwordless authentication, and deliver authentication uplift programs to secure customer data in days. Leverage Authsignal's no-code rules engine to deploy rules and safeguard customer data. - Integrate via OpenID Connect (OIDC). - Integrate with Auth0 - Integrate with ForgeRock - Integrate with Microsoft Entra, Azure AD B2C Marketplace integrations - Veriff - MessageBird - iProove And many more
    Starting Price: $99 USD Per Month
  • 5
    FusionAuth

    FusionAuth

    FusionAuth

    FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome. You'll get all the features your app needs plus a customizable, scalable solution you can run on any computer, anywhere in the world. FusionAuth was built from the ground up to easily integrate with any app, language, and framework. Every feature (yes, every single one) is exposed as an API giving you complete flexibility to handle any use case. You get every feature and acronym you need: registration & login, passwordless, SSO, MFA, SAML, OIDC, OAuth, JWT, social login, and more. Comply with GDPR, HIPAA, COPPA, and PCI requirements in seconds. FusionAuth installs on any platform, any computer, anywhere. Host it yourself or use FusionAuth Cloud, our fully managed SaaS hosting service.
  • 6
    Ping Identity

    Ping Identity

    Ping Identity

    Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.
    Starting Price: $5 per user per month
  • 7
    Symantec VIP
    Your key to one swipe two-step authentication. Two-factor authentication is easy to enable and prevents attacks. With just a swipe of a finger, or use of a security code, your information is secure. Your favorite websites offer secured authentication compatible with VIP. To begin, scan a QR code and security codes will be generated for that website every thirty seconds. With Symantec VIP both enterprise and end users can securely authenticate wherever and however they are accessing the services. With hundreds of supported websites and integrations that you can easily set up yourself, multi-factor authentication is a snap.
  • 8
    Aserto

    Aserto

    Aserto

    Aserto helps developers build secure applications. It makes it easy to add fine-grained, policy-based, real-time access control to your applications and APIs.
 Aserto handles all the heavy lifting required to achieve secure, scalable, high-performance access management. It offers blazing-fast authorization of a local library coupled with a centralized control plane for managing policies, user attributes, relationship data, and decision logs. And it comes with everything you need to implement RBAC or fine-grained authorization models, such as ABAC, and ReBAC. Take a look at our open-source projects: - Topaz.sh: a standalone authorizer you can deploy in your environment to add fine-grained access control to your applications. Topaz lets you combine OPA policies with Zanzibar’s data model for complete flexibility. - OpenPolicyContainers.com (OPCR) secures OPA policies across the lifecycle by adding the ability to tag, ver
    Starting Price: $0
  • 9
    Ory

    Ory

    Ory

    The missing web-scale API for identity and access control. 10x your security, user experience, and PII compliance today. Build secure apps on top of the Ory Network and reach new customers in any geopolitical region of the world with the best login experience ever. Login is more than a username and password. Building it from the ground up is time-consuming and dangerous. Ory's API-first microservice architecture makes it straightforward to integrate projects at any stage. Pay for usage, not features. Get advanced multi-factor to auth on every Ory subscription plan. Plus advanced permissions, SSO, OAuth2, OIDC, multi-tenancy, and so much more. Ory is made for high-performance, high-scale applications in any cloud. Built with developers in mind, Ory lets you quickly build your on-brand user experience and integrate it into your software stack. Ory's focus on open standards and automated data import capabilities makes migrating from legacy systems straightforward.
    Starting Price: $29 per month
  • 10
    SGNL

    SGNL

    SGNL

    As the enterprise and workforce evolve, access must be intelligent and dynamic. SGNL ensures that your most valuable resources are being accessed by the right people, at the right time, in the right context. Enterprise use cases require a fine-grained approach. By building a deep understanding of your business, SGNL is able to drive smart, realtime access decisions. Scalable access policies should be understandable by all stakeholders. SGNL enables this through an intuitive, human-readable policy builder. SGNL connects to, and complements, your existing identity and business systems—with a broad array of simple, easy-to-implement integrations.
  • 11
    TrustBuilder

    TrustBuilder

    TrustBuilder

    TrustBuilder is your reliable partner in cybersecurity. We go beyond the traditional software firm role, focusing on delivering robust and secure solutions that foster trust among enterprises. Through our Access Management Platform, TrustBuilder.io, our commitment is to ensure the secure digital journey of your employees, partners, and customers. With our advanced MFA and CIAM technology, we provide uninterrupted access while safeguarding identities. > TrustBuilder's SaaS MFA provides airtight, phishing-resistant security, passwordless experience, and seamless integration. > TrustBuilder's tailor made CIAM provides PBAC delivering fine grained authorization based on attributes with customisable workflows.
    Starting Price: € 10 per user / per year
  • 12
    Authorizer

    Authorizer

    Authorizer

    Build secure apps 10x faster. Low code tool and low cost deployment. Own your user data in your preferred database. Authenticate users with multiple auth recipes. Authorize users based on your business roles. OAuth2 and OpenID compatible APIs. Authentication and authorization have never been this simple before. Deploy production-ready Authorizer instance using one-click deployment options available. Open Authorizer instance endpoint in the browser. Sign up as an admin with a secure password. Configure environment variables from the dashboard. Authorizer object can be instantiated with JSON object. You can use Authorizer off the shelf and provide an amazing digital experience in just 3 minutes. We rather have you focused on your core business and build stuff that matters. Auth with best services baked in. Secure Session management implemented with HTTP-only cookies. Authorization Code flow implemented for mobile-based auth.
  • 13
    Oso Cloud
    Customers want features that you can’t build without a refactor. Your code is hand-rolled, fragile and hard to debug. It’s spread throughout the codebase and relies on data from multiple sources. There’s no one place to see who has access to what, that authorization is working, or why requests are or are not authorized. Lay out who's allowed to do what in Workbench, our visual rules editor Start with primitives for common patterns like multi-tenancy and RBAC Extend your logic with custom rules in Polar, our configuration language for authorization. Send core authorization data, like roles and permissions. Make authorization checks and filter lists based on authorization where you used to have IF statements and custom SQL.
    Starting Price: $149 per month
  • 14
    OAuth

    OAuth

    OAuth.io

    Focus on your core app and get to market faster. OAuth.io handles identity infrastructure, maintenance, and security overhead, so your team doesn’t have to. Identity can be difficult, OAuth.io makes it easy. Choose identity providers, add custom attributes, customize your login page or use our widget, integrate with your app - identity solved in minutes. Manage your users from our easy to use dashboard - find and manage users, reset passwords, enforce two-factor authentication, and add memberships and permissions through OAuth.io's simple and easy to use User Management. Fully-featured, hyper-secure user authentication using passwords or tokens. From multi-tenant to complex permissions, OAuth.io has your user authorization modeling covered. Force a second factor of user authentication with our popular integrations.
    Starting Price: $19 per month
  • 15
    Skillmine Authenticator

    Skillmine Authenticator

    Skillmine Technology Consulting

    All Users, All Apps, All Devices, Just One Authenticator! AUTH is a unified authentication platform that supports all major protocols and can be integrated with enterprise applications, partners applications, and social media platforms without making any changes. Use Skillmine Authenticator to centralize authentication and simplify access management across multiple applications in an organization and improve the security of the user login process. Why Skillmine Authenticator? 1. Is a one-stop solution to manage all your passwords at once. 2. Allows businesses to interact with various authentication and authorization protocols. 3. Supports multiple methods of login and works well irrespective of the platform. 4. Supports OAuth 2.0, OpenID Connect, SAML, AD, LDAP. 5. Supports various online platforms like Facebook and Google. 6. Classical logins, password-less logins, social logins are possible with Skillmine Authenticator.
  • 16
    passbolt

    passbolt

    passbolt

    Finally, a password manager built for collaboration. Secure, flexible, and automation-ready. Trusted by 10,000 organizations, including Fortune 500 companies, newspapers, governments, and defense forces. Passbolt servers are designed to be simple to install and easy to manage. Yet they are enterprise-ready and can support complex setup for high availability. Passbolt can be used from your browser or mobile phone. Sharing happens in real-time. Desktop apps are coming soon. Retrieve, store and share passwords programmatically with the JSON API. Automate at scale with Passbolt CLI. Real-time access logs. Privacy is in our DNA, but also in the DNA of European laws (to make sure we don’t change our minds). Passbolt self-hosted source code comes under an AGPL license. Yes, even the commercial version. You are free to audit it, contribute to it, and redistribute it. This is why we have a healthy community of thousands of organizations in all sectors.
    Starting Price: €45/month/10 users
  • 17
    Super Gluu
    Super Gluu is a push-notification two-factor authentication (2FA) mobile app built to work with the Gluu Server. Super Gluu uses public-key encryption as specified in the FIDO U2F authentication standard. Upon device enrollment, Super Gluu registers its public key against the Gluu Server's FIDO U2F endpoint. When authentication happens, there is a challenge response to ensure that the device has the corresponding private key. Better identity access management for customers, citizens, and remote workforce. Super Gluu is supported by the Gluu Server out-of-the-box -- simply turn it on! Make strong access security as easy as approving a push notification. Make strong access security as easy as approving a push notification. The Gluu Server and Super Gluu can work in the same network, without a DNS server hostname and with a self-signed certificate. There is only one limitation: both components should belong to the same network.
  • 18
    Sima

    Sima

    Active Witness

    Sima does more than just keep the bad guys out. Sima is a highly secure yet frictionless cloud-based Access Control reader. Sima has the ability to read both mobile credentials (QR codes) and facial biometrics. This allows the integrated cloud-based software to issue both single (QR only) and multi-factor (facial verification) for highly secure and customized facility access. We take your privacy very seriously. We use facial recognition technology to perform facial authentication. This allows us to verify identity and grant access to a location. Facial data will be stored on our servers only for the purpose of identification. Your personal data, including your face picture, will not be shared with third parties.
    Starting Price: Free
  • 19
    Calico Enterprise
    A self-managed, active security platform with full-stack observability for containers and Kubernetes. Calico Enterprise is the industry’s only active security platform with full-stack observability for containers and Kubernetes. Calico Enterprise extends the declarative nature of Kubernetes to specify security and observability as code. This ensures consistent enforcement of security policies and compliance, and provides observability for troubleshooting across multi-cluster, multi-cloud and hybrid deployments. Implement zero-trust workload access controls for traffic to and from individual pods to external endpoints on a per-pod basis, to protect your Kubernetes cluster. Author DNS policies that implement fine-grained access controls between a workload and the external services it needs to connect to, like Amazon RDS, ElastiCache, and more.
  • 20
    Axiomatics Orchestrated Authorization
    With our solution, Information Access Management (IAM) teams establish policy guardrails, while enabling developers, DevOps and DevSecOps teams as well as application owners to author, test, deploy, and analyze policies. In return, you are rewarded with an authorization approach that aligns to a Zero Trust strategy, creates policy visibility, accelerates application development, and delivers confidence. Organizations on the journey toward an Orchestrated Authorization approach do so with the goal of implementing an authorization vision that can support every application and resource in their technology environment.
  • 21
    Visual Guard
    Visual Guard is an advanced identity and access management (IAM) tool offering a complete solution for securing sensitive applications and data. With centralized management of users and permissions, Visual Guard facilitates the implementation of robust, standards-compliant security policies. User management : Create, modify & delete user accounts Integration with LDAP or Active Directory directories Automatic synchronization of user information Access control : Precise definition of access rights to features and resources Role and Permission Management Multi-factor authentication (MFA) Single Sign-On (SSO) Security Audit and Monitoring : Permission Matrix Detailed Event log Real-time and Historical Graphs Integration & compatibility : Compatibility with major development platforms, frameworks, and protocols. .NET API Benefits : Simplified access management Enhanced data security Improved regulatory compliance Reduce identity management cost
    Starting Price: 1.55/month/user
  • 22
    PropelAuth

    PropelAuth

    PropelAuth

    Easy integration and straightforward APIs for developers. Built-in user management for customer-facing teams. Data and insights for PMs and executives. PropelAuth was founded on the idea that a great auth product gets out of your way. We provide you with the right tools out of the box, so you can quickly make your users' experiences as secure and smooth as possible. As soon as you start onboarding users, your team will have a laundry list of things they need to do or see. Organizations are a first-class concept in PropelAuth. You can use our UIs to get started quickly or build your own with our APIs. Start with our default roles, or create your own. We even handle updating existing users when you make changes. The easiest way to integrate with identity providers, like Okta and Azure AD. We provide guides for your users to set up and test their configuration. Set custom session durations per organization, enforce MFA, and more. We handle the complexity so you don't have to.
    Starting Price: $150 per month
  • 23
    Bravura OneAuth

    Bravura OneAuth

    Bravura Security

    Immediately protect your organization against two of the most prevalent cyberattacks: phishing and brute force attacks by eliminating the threat vector of passwords with Bravura OneAuth powered by HYPR. Provide your workforce with a passwordless sign-in experience that delivers on speed, simplicity, and significantly increased security across your security fabric. Bravura OneAuth uses one-touch biometrics that acts as access points making authentication for your workforce as easy as unlocking a cell phone yet significantly more secure than traditional Multi-Factor Authentication (MFA) solutions. It replaces traditional, tedious, and poorly adopted MFA methods and removes passwords entirely from the solution to reduce the risk of compromised credentials.
  • 24
    OpenIAM

    OpenIAM

    OpenIAM

    Identity Governance and Web Access Management. As new employees join your organization, you face the conundrum of ensuring that they are given rights to all the systems and resources they need to do their work on the day they join the firm. Similarly, when a person changes positions within the firm, access that is no longer relevant must be revoked and access that is needed for their new position must be granted. For the situation of users leaving the firm or being terminated, it is even more imperative that permissions be addressed. Access to sensitive applications and data must be disabled/removed in a timely manner with traceability to avoid the consequences of a disgruntled user.
  • 25
    OpenAM

    OpenAM

    Open Identity Platform

    If you have multiple sites and applications in your company, probably you need to provide seamless authentication to all of them. So when user logged in at one of your sites once, he does not need to enter his credentials on other sites. So, OpenAM can help you to solve all this issues. OpenAM ships with more than 20 authentication modules, which you can use to customize your authentication process. Also, you can customize sequence of authentication modules, to provide multi-factor or adaptive authentication. OpenAM can also manage authorization, so you can restrict access to desired resources according to different authorization policies. OpenAM allows to extend just any functionality, from authentication modules to user data source. Besides, it supports UI customization to create separate end-user pages with personal branding.
  • 26
    Keyote

    Keyote

    TeskaLabs

    Use your smartphone for secure authentication, next-gen logins, and more. Keyote is built by cyber security veterans, following standard authorized cryptography to give you the strongest possible protection. Everyone has a smartphone today, you don't need to have any additional hardware such as a USB token or smart card to be more secure. Software keys are easy to be copied and hence lost. Keyote stores keys in the phone security chip, effectively preventing their extraction. You must authorize the use of keys with biometry such as a fingerprint, Face ID, etc. So even if the phone is lost or stolen, your keys are still safe. Passwords are dead. People have to remember long passwords, and they have to change them frequently. We believe that there is a simpler way how to login: a smartphone. Contemporary mobile phones contain a powerful security chip, which in combination with a biometry authentication such as fingerprint or Face ID allows a user to login very securely and conveniently.
  • 27
    Appwrite

    Appwrite

    Appwrite

    Build your entire backend within minutes with just a few lines of code using the frameworks and languages you love. Allowing you to focus on design and innovation instead of tedious and repetitive backend tasks. Products Appwrite Cloud provides you with: - Authentication: 30+ login methods, support for teams, roles, and user labels - Databases: Never paused, fast in-memory caching, advanced permission models, relationships support - Storage: File encryption at rest and transit, built-in image transformation capabilities, advanced compression with WebP/Brotli support - Functions: Automatic deployment from GitHub - Messaging: SMS, email, and push notification support - Real-time: Unlimited subscriptions By utilizing Appwrites’ features, you save time and ensure your products are stable and secure for your end users. With Appwrite, you always own your data, so you never have to fear vendor lock-in.
    Starting Price: $15 per month, per member
  • 28
    Memberstack

    Memberstack

    Memberstack

    Beautiful user logins & payments for any website. You control where your website & content lives. 1. Install a JavaScript code snippet to your website. 2. Set membership plans, pricing and permissions for your website. 3. Manage members through a simple dashboard. Say goodbye to authentication and payment problems — gate website pages and content to create web applications. Start accepting payments quickly with our one-click Stripe integration. 100% free, unlimited trial — upgrade only when you're ready to launch. No credit card required. You also get access to Stripe taxes, Free-trials, the Stripe billing portal, and tons of other Stripe features. Offer payment methods that are in demand and relevant to your business model. Reach more customers globally, increase conversions, reduce fraud, and optimize your transaction costs.
    Starting Price: $25 per month
  • 29
    Clerk

    Clerk

    Clerk

    We are a team of dev-tool experts, and know all the pain points involved with building for the web. We’ve painstakingly built the authentication platform you’ve always wished you had — one that “just works”, and one that still keeps you in control of your user data and user experience. We are a team of experienced web-security experts focused on helping you ship your product securely, without having to sweat over all the intricate security details. All of our APIs are built following industry best-practices and are regularly audited by 3rd parties. We know auth is core to your app, so we go above and beyond to make sure you’re well supported. There’s always someone on call to answer any questions you may have, or there in case of emergencies. We offer industry leading SLAs and support agreements.
    Starting Price: $25 per month
  • 30
    Regula

    Regula

    Regula

    Regula is a global developer of forensic devices and identity verification solutions. With 30+ years of experience in forensic research and the largest library of document templates in the world, Regula creates breakthrough technologies in document and biometric verification. Regula hardware and software solutions allow over 1,000 organizations and 80 border control authorities globally to provide top-notch client service without compromising safety, security or speed.
  • 31
    Teleport

    Teleport

    Teleport

    Teleport is the easiest, most secure way to access all your infrastructure. Our platform, the open-source Teleport Access Platform, consolidates the four essential infrastructure access capabilities every security-conscious organization needs: connectivity, authentication, authorization, and audit. By consolidating all aspects of infrastructure access into a single platform for software engineers and the applications they write, Teleport reduces attack surface area, cuts operational overhead, easily enforces compliance, and improves productivity. The Teleport Access Plane replaces VPNs, shared credentials, and legacy privileged access management technologies, improving security and engineering productivity.
  • 32
    Loginizer

    Loginizer

    Loginizer

    Loginizer aims at securing your WordPress websites from all attacks. We at Loginizer believe that security is the most important aspect for a website and it should be easy to secure a website for any website owner, hence we work round the clock to craft features that help you achieve that without having to constantly monitor your site. We are constantly woking hard to add more features and think of ways to protect your site from brute-force attacks. All differences of WordPress Core will be reported to the Admin. An email with a temporary login URL. Users can set secondary challenge questions. Two-factor auth using Google Authenticator, Authy, etc. Simply disable XML-RPC with Loginizer. Check logs of failed login attempts. Blacklist an IP or IP range from login. Loginizer has been integrated as a WordPress plugin so you can simply install the plugin from your WordPress dashboard and get started.
    Starting Price: $24 per year
  • 33
    Callsign

    Callsign

    Callsign

    We are an identity fraud, authorization & authentication company, solving the challenges that organizations face in getting their users on to & interacting with their digital platforms. Often innovative solutions focus on the capability of technology and do not give applicability to a user base the same weighting. Our engineering team comes from a banking and ecommerce background, with over 300 years combined experience in making software work for all. That’s why we are chosen to help some of the world’s largest banks and, offer the same “bank grade” identification solutions to public and private sector clients of all sizes. Callsign helps your users get on with their digital lives in the most seamless way possible – checked, verified and safe, because we enhance, rather than block, user experience. Our Intelligence Driven Authentication recognizes users by combining deep learning insights - derived across device, location and behavioral data.
  • 34
    FortiAuthenticator
    FortiAuthenticator provides Identity Access Management and Single Sign-On. FortiAuthenticator provides identity and access management (IAM) services to prevent breaches resulting from unauthorized users gaining access to a network or inappropriate levels of access granted to valid users. FortiAuthenticator ensures only the right person can access your sensitive resources and data at the right time. User identity information from FortiAuthenticator combined with authentication information from FortiToken and/or FIDO2 authentication ensures that only authorized individuals are granted access to your sensitive information. This additional layer of security greatly reduces the possibility of data leaks while helping companies meet audit requirements associated with government and business privacy regulations.
  • 35
    Acceptto eGuardian
    Acceptto monitors user behavior, transactions, and application activity to create an enriched user profile within each application landscape and subsequently verify if access attempts are legitimate or a threat. No passwords or tokens are required. Acceptto’s risk engine calculates whether an access attempt is legitimate or not by tracking user and device posture pre-authentication, during authentication, and post-authorization. We deliver a continuous, step-up authentication process with real-time threat analytics in an age when identities are persistently under attack. Based on a risk score computed by our proprietary AI/ML algorithms, a dynamic level of assurance (LoA) is computed. Our approach automatically finds the optimal policy for each transaction to maximize security while minimizing friction for the user with machine learning and AI analytics. This provides a smoother user experience without sacrificing enterprise security.
  • 36
    Active Directory
    Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
    Starting Price: $1 per user per month
  • 37
    REVE Secure

    REVE Secure

    REVE Secure

    Dual authentication check of login’s credibility via user’s registered credential (Password) and security token generated at authorized user end only. Passwords are incompetent in securing your logins. Adding 2nd-factor authentication will not only deliver dual authentication security but also ensure safe & secure login & protected account access. With Two Factor Authentication, secure your remote logins and access to Linux/UNIX servers from security breaches and malicious attacks. Integrate a second layer of authentication to existing Windows password-based security to ensure the all-round protection of your enterprise data. Secure & protect logins and access to each different web application and service to avoid unauthorized access and cyber-attacks. Blocks unauthorized login attempts made using passwords. Supports a multitude of platforms and devices.
  • 38
    Pirean Access: One

    Pirean Access: One

    Pirean Software

    We provide robust authentication and authorization services across web and mobile. Our Access: One platform protects high-value data, equity and IP across critical industries. We partner with some of the world’s largest organizations to protect their services globally. Delivered through our private cloud identity platform, we enable our customers to quickly realize identity services that: Provide a central point of control for managing identities and entitlements. Provide flexible access management, supporting single sign-on and strong user authentication. Deliver an agile and robust IAM API for extending the reach of your identity infrastructure. We are recognized for our innovation, our versatility and our focus on the end user.
  • 39
    MonoCloud

    MonoCloud

    MonoCloud

    MonoCloud is a developer-focused platform designed to streamline authentication, authorization, and user management for applications across multiple environments, including web, mobile, IoT devices, and more. It enables developers to easily integrate secure and customizable login processes, supporting a range of authentication methods such as passwords, magic links, one-time passcodes, and social logins like Google, Facebook, and Apple. Built with a strong emphasis on reducing user friction, MonoCloud offers a branded and smooth authentication experience. The platform includes advanced features such as mutual TLS, brute-force protection, and global session management, making it a comprehensive solution for handling user access across various applications and devices. In addition, MonoCloud is designed with developers in mind, providing extensive documentation, integration guides, and support for various front-end and back-end frameworks.
    Starting Price: $0
  • 40
    Safenet MobilePASS
    Evolve your authentication infrastructure to include One Time Password (OTP) solution, as well as advanced security applications. With a Mobile Pass permits a user to use one set of login credentials to access multiple applications. Automated processes, over-the air activation and installation for software tokens, and intuitive self-service tools ensure extensive support for end users and lower Helpdesk costs. Our Authentication Suite is filled with every tool you will need to manage the security of your business from Two-Factor Authentication (2FA) to Single Sign-On (SSO) and much, much more. The success of your organization depends on your ability to give authorized customers, partners and employees access to online applications, corporate networks, and business portals from anywhere.
  • 41
    XONA

    XONA

    XONA

    XONA enables frictionless user access that’s purpose-built for operational technology (OT) and other critical infrastructure systems. Technology agnostic and configured in minutes, XONA’s proprietary protocol isolation and zero-trust architecture immediately eliminates common attack vectors, while giving authorized users seamless and secure control of operational technology from any location or device. With integrated multi-factor authentication, user-to-asset access controls, user session analytics, and automatic video recording, XONA is the single, secure portal that connects the cyber-physical world and enables critical operations to happen from anywhere with total confidence and trust. XONA enables users to connect to critical assets and systems from anywhere securely. See how a technician quickly logs into a XONA CSG and authenticates, allowing them to connect to an HMI and address any issues remotely.
  • 42
    BotDelive

    BotDelive

    BotDelive

    BotDelive is a 2FA and push notification service via IM bots for developers. Create an account on BotDelive and get your API credentials. Read our API documentation and start integrating! You will need only 2 API endpoints to integrate 2FA. BotDelive is a cloud communication platform for developers. It allows developers to send and receive 2FA and push notifications over the chat apps by using its APIs. Normally, you have to force your user to install an app to send notifications. But, the chat apps are already installed on millions of devices. Why not use them? BotDelive offers a quick way of 2FA. With only answering the yes/no questions your users can authorize their own accounts. Authenticate users via BotDelive instead of e-mail and password. You can require only once the password and then BotDelive will handle all requests for you. Send important push notifications via chat apps. BotDelive ID is reliable.
    Starting Price: Free
  • 43
    Avatier Identity Anywhere
    Introducing Identity Anywhere, the world’s first Identity Management solution based on Docker containers making it the most portable, scalable and secure solution on the market. Docker container technology allows Identity Anywhere to run anywhere: on any cloud, on premise or a private cloud instance hosted by Avatier. Avatier Identity Management products brings separately administered back office applications and assets together to manage them as one system. Now armed with a unified digital dashboard, C-level executives deliver measurable business growth and increased profits. Eliminate the #1 Help Desk request with military grade self-service password reset. Reduce Costs. Only pay for the cloud app licenses you need. Maximize company utilization with a phenomenal shopping cart experience. Avoid fines, lawsuits, negative publicity, and even jail time due to non-compliance.
    Starting Price: $5.00/one-time/user
  • 44
    ForgeRock

    ForgeRock

    ForgeRock

    Radically improve and scale all things identity, governance, and access management with the industry's only full-suite, AI-driven platform. Today we rely on digital access for our work, learning, and personal lives more than at any other time in history. To meet demand and keep up with competitors, it’s imperative to speed digital transformation and provide superior experiences while ensuring the utmost security. At ForgeRock, we help people safely and simply access the connected world by helping organizations significantly improve and scale all things identity, governance, and access management. ForgeRock offers the industry's only full-suite, AI-driven platform purpose-built for all identities and use cases (consumers, workforce, and things). ForgeRock’s comprehensive, yet simple-to-use solutions allow you to grow revenue, manage risks, increase workforce productivity, and reduce costs.
  • 45
    Secuve Q Authentication
    SECUVE Q Authentication is a unique and simple mobile authentication technology that can be applied to a wide range of applications including identification services, Fintech, online banking, etc. Authenticates users with secure authentication code generated by the combined operation of both one-time secure random value transmitted over the additional secure channel, and 'QR code'. Easy-to-use authentication by letting users touch or scan the QR code enclosing secure authentication code, or enter the numeric secure authentication code in SMS.
  • 46
    AU10TIX

    AU10TIX

    AU10TIX

    AU10TIX, an identity management company headquartered in Israel, is on a mission to obliterate fraud and further a more secure and inclusive world. The company provides critical, modular solutions to verify and link physical and digital identities so businesses and their customers can confidently connect. Over the past decade, AU10TIX has become the preferred partner of major global brands for customer onboarding and customer verification automation. AU10TIX takes verification and authentication to a whole new level of scalability. The power of deep learning lies within the input – the more you feed it, the smarter it becomes. This enables you to scale consumer onboarding and exponentially scale your business. With over 5% of the world identities already scanned and verified, fortune 500 companies are powered by AU10TIX, wiping out fraud while confidently focusing on growth. Our identity has changed over the years. Our principles & pioneering vision haven’t.
  • 47
    Enzoic for Active Directory
    With Enzoic for Active Directory, enterprises can eliminate unsafe passwords and adopt NIST requirements. - Fully automate password screening and remediation - Checks at creation and continuously against the latest exposures - Evaluate both passwords and full credential combinations - Prevent common passwords and predictable user behaviors - Add a Windows client for intuitive user feedback - Easily comply with NIST 800-63B guidelines Scans check against Enzoic’s complete database of billions of unsafe passwords, updated every day by Enzoic’s threat intelligence team.
    Starting Price: $0
  • 48
    Boku Identity
    Boku provides a best-in-class mobile identity solution that will protect your business from account takeovers, synthetic identities, and compromised numbers, all through a seamless user experience. Boku Authenticate will protect you against account takeovers (ATOs) that target your customer’s phone number by streamlining your methods for verifying mobile number possession. Instead of sending one-time passcodes (OTPs) that can be stolen or forcing users to implement complicated app based solutions, Boku Authenticate will verify mobile number possession directly on the device by using its built-in connectivity to the mobile operators’ wireless network. The solution is both seamless and secure. Boku Authenticate will reduce user friction while providing the best possible defense against the threat of ATOs.
  • 49
    Quicklaunch

    Quicklaunch

    Quicklaunch

    QuickLaunch is the #1 leader in Identity and Access Management (IAM) for Higher Education. More than 500 organizations trust QuickLaunch’s platform to manage over 2,000,000 identities and integrate over 3,000 applications worldwide. CIOs, CTOs, and CISOs use QuickLaunch IAM technologies to engage with students, faculty, and staff and protect them throughout their journey. QuickLaunch’s technology is vital in protecting the user experience, driving both operational efficiencies and higher productivity for colleges, universities, and institutions. Improves cyber security posture by protecting user accounts from being hacked and thwarting ransomware and phishing cyber attacks. Automatically provisions students from the Student Information System and employees from the Human Resources system so they can quickly get access to the apps they need when they matriculate and join.
    Starting Price: $0.73 per month
  • 50
    IronWiFi

    IronWiFi

    IronWiFi

    Cloud-based authentication platform offering Captive Portal and RADIUS as a service. Know who is using your Wi-Fi. Take advantage of your wireless networks to generate revenue and collect visitor data. Control the methods and devices your employees use to connect to your company's network. IronWiFi offers advanced Captive Portal that will help you quickly turn your Wi-Fi into a revenue stream and collect valuable visitor data. You can customize the portal pages to support your brand and fit your needs. Subscription plans based on the number of users or access points. There are no hidden or additional fees. Monitoring and controlling access to both networks - the network for your guests and the network for your employees - from one platform. You can include your logo, change colors, and even run the splash pages on your own domain.
    Starting Price: $5 per user per month