Alternatives to Evernym Verity

Compare Evernym Verity alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Evernym Verity in 2024. Compare features, ratings, user reviews, pricing, and more from Evernym Verity competitors and alternatives in order to make an informed decision for your business.

  • 1
    Ping Identity

    Ping Identity

    Ping Identity

    Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.
    Starting Price: $5 per user per month
  • 2
    Infisign

    Infisign

    Infisign

    Infisign is a cutting-edge Identity and Access Management (IAM) platform that revolutionizes digital security by leveraging decentralized identity, passwordless authentication, federation, and privileged access management capabilities. The solution empowers organizations to streamline user authentication, manage access efficiently, and ensure compliance across diverse environments. With its unique approach, Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.
    Starting Price: $4/per month
  • 3
    CREDEBL

    CREDEBL

    CREDEBL

    Effortlessly define and tailor credentials with our user-friendly schema template. Customize credentials for employees, customers, students, citizens, or any user, incorporating detailed schema information and intuitive controls for seamless management. Seamlessly issue digital credentials and explore a comprehensive overview on the platform for efficient credential verification and management. Securely connect with and receive credentials from diverse organizations & ecosystems with a simple tap on your screen. Instantly share the verifiable proof of your digital credential certificates. Empower your identity with selective (partial) disclosure on our SSI mobile wallet. Seamlessly present only the data you choose with confidence. Alternatively, you can share your personal milestones (e.g. achievements in sports) on social media directly.
  • 4
    Microsoft Entra Verified ID
    Start your decentralized identity journey with Microsoft Entra Verified ID—included free with any Azure Active Directory (Azure AD) subscription. Microsoft Entra Verified ID is a managed verifiable credentials service based on open standards. Digitally validate identity information to ensure trustworthy self-service enrollment and faster onboarding. Quickly verify an individual’s credentials and status to grant least-privilege access with confidence. Replace support calls and security questions with a streamlined self-service process to verify identities. Ensure that credentials are interoperable and reusable with a solution that supports open standards. Confidently issue and verify workplace credentials, citizenship, education status, certifications, or any unique identity attributes in a global ecosystem designed for more secure interaction between people, organizations, and things.
  • 5
    walt.id

    walt.id

    walt.id

    We offer holistic digital identity and wallet infrastructure used by thousands of developers, governments and businesses across industries. The products are open source, based on open standards, compliant with digital identity regulations and available for self-management (on-premise) or as a managed service (SaaS). Our Digital Identity Infrastructure include the following products and functionality: Issuer SDKs, APIs & APPs: Issue credentials or mint tokens with our infrastructure and white label applications. Wallet SDKs, APIs & APPs: Launch a wallet for your organization, employees or customers to manage access, credentials and tokens. Verifier SDKs, APIs & APPs: Verify credentials or tokens, use powerful verification policies and white label apps. Identity Provider: Enable wallet-, credential- and token-based authentication and identification for your apps.
  • 6
    SOURCE.ID

    SOURCE.ID

    Desmo Labs

    Offering secure, private, flexible, and auditable identity verification solutions. Empowering individuals to curate their profiles, control data sharing, and offer issuers the ability to swiftly verify credentials, thereby fostering a trusted platform for all participants. Built-in AML and KYC solutions with standardized interfaces, allowing for open ledger identification verification. Digital signatures for universal authentication and provide tamper-proof with verifiable credentials. Decentralized Identity (DID) technologies streamline the verification process, reducing the time from weeks to mere seconds for tasks ranging from accessing public services to opening a bank account. Simultaneously, they provide easily verifiable credentials, significantly minimizing the manual labor required from front-desk employees. Digital signatures and tamper-proof can be operated with no seed phrases and gas fees.
  • 7
    trinsic

    trinsic

    trinsic

    trinsic connect is a reusable identity verification solution powered by verifiable credentials, digital wallets, and passkeys. Applications can now instantly verify and onboard new users through Trinsic’s reusable identity network. Simplify the user experience with password-less authentication for maximum security with minimum friction. Using zero-knowledge proofs, users can prove things about themselves without oversharing their data. Unlock interoperability for your product without any additional effort on your end. Pre-verified users speed through onboarding helping you acquire more customers at a lower cost.
  • 8
    Gataca

    Gataca

    Gataca

    Gataca provides simple, compliant, and secure decentralized identity management technology, also known as self-sovereign identity (SSI) technology. Create and digitally sign identity credentials in a standardized format. Design customizable verification templates for on boarding and sign-in processes to offer frictionless access to digital services. Let your users authenticate seamlessly in digital services and control their data with the Gataca Wallet. User data and ID credentials are issued by trusted authorities and protected with biometrics and post-quantum cryptography to ensure they are tamper-proof, allowing instant identity verification without relying on centralized systems.
    Starting Price: €12 per month
  • 9
    Hyperledger Indy

    Hyperledger Indy

    Hyperledger

    Hyperledger Indy provides tools, libraries, and reusable components for providing digital identities rooted on blockchains or other distributed ledgers so that they are interoperable across administrative domains, applications, and any other silo. Indy is interoperable with other blockchains or can be used standalone powering the decentralization of identity. Distributed ledger purpose-built for decentralized identity, correlation-resistant by design. DIDs (Decentralized Identifiers) that are globally unique and resolvable (via a ledger) without requiring any centralized resolution authority. Pairwise Identifiers create secure, 1:1 relationships between any two entities. Verifiable claims are interoperable format for exchange of digital identity attributes and relationships currently in the standardization pipeline at the W3C. Zero Knowledge Proofs which prove that some or all of the data in a set of Claims is true without revealing any additional information.
  • 10
    HYPR

    HYPR

    HYPR | The Passwordless Company

    HYPR fixes the way the world logs in. Organizations are faced with the challenge of achieving secured and seamless authentication coupled with a flawless user experience at a time when it’s more critical than ever. HYPR’s passwordless multi-factor authentication (PMFA) platform decouples authentication from the organization’s current and future identity providers and eliminates the traditional trade-off between security and user experience by providing uncompromising assurance and consumer-grade experience with true passwordless and phishing-resistant MFA. The solution is trusted by more than 60M users worldwide. With deployments taking hours rather than weeks or months, organizations decrease the risk of attack, increase positive user experience, and lower operational costs.
    Starting Price: $4.00 per user/month
  • 11
    IBM Security Verify
    Infuse cloud IAM with deep context for risk-based authentication to enable frictionless, secure access for your consumers and workforce. As organizations modernize hybrid multi cloud environments using a zero-trust strategy, identity and access management can no longer remain siloed. In a cloud environment, you need to develop cloud IAM strategies that use deep context to automate risk protection and continuously authenticate any user to any resource. Your journey should match your business requirements. Maintain existing investments and protect on-premises applications as you design and customize the right cloud IAM architecture to either replace or complement your infrastructure. Your users want one-click access from any device to any application. Onboard new federated applications to single sign-on (SSO), embed modern multi-factor authentication (MFA) methods, simplify logistics and give developers consumable APIs.
  • 12
    EDUFIED

    EDUFIED

    EDUFIED

    Tamper-proof document issuance & verification system for issuing authorities to issue verifiable documents to recipients, allowing them to store & share them securely from their digital wallet.
  • 13
    Dock Certs

    Dock Certs

    Dock Certs

    Convert verified ID data into reusable digital credentials, reduce verification friction without compromising security and enable secure data exchanges with fraud-proof data.
  • 14
    Microsoft Entra
    Confidently enable smarter, real-time access decisions for all identities across hybrid, multicloud, and beyond. Safeguard your organization by protecting access to every app and every resource for every user. Effectively secure every identity including employees, customers, partners, apps, devices, and workloads across every environment. Discover and right-size permissions, manage access lifecycles, and ensure least privilege access for any identity. Keep your users productive with simple sign-in experiences, intelligent security, and unified administration. Safeguard your organization with the identity and access management solution that connects people to their apps, devices, and data. Discover, remediate, and monitor permission risks across your multicloud infrastructure with a cloud infrastructure entitlement management (CIEM) solution. Create, issue, and verify privacy-respecting decentralized identity credentials with an identity verification solution.
  • 15
    Intercede

    Intercede

    Intercede

    MyID® credential management software enables governments and large enterprises to issue and manage digital identities using the most secure method of multi-factor authentication to citizens, large workforces and supply-chains. Today, MyID enables the strong authentication of millions of people to the data, systems and networks they need access to. For those responsible for information security, MyID provides easy integration and control over digital identity issuance and management. For end users, whether citizens or employees, MyID enables seamless, secure access to company systems, networks and resources using multi-factor authentication via a variety of devices. Faced with ever increasing threats of cyber terrorism, identity fraud and crime, MyID® provides a cyber secure credential management software solution. Where data really matters, you will find MyID. The security, reliability and interoperability of MyID software sets it apart.
  • 16
    Hyland Experience Credentials
    Hyland Experience (Hx) Credentials leverages blockchain technology to quickly, accurately and efficiently verify records in a secure, tamper-proof way. Powered by blockchain and Blockcerts Hx Credentials makes it easy to issue records in a format that is fully compliant with the open standard set by Blockcerts.org. Increase security Hx Credentials records are secure, tamper-proof and vendor-independent. All content is stored off-chain for maximum privacy. Prevent fraud Use cryptographic signatures to stop others from impersonating official records. Provides credential ownership to users Users and recipients own their records and can verify them anywhere through a set of APIs, or aggregate them to form lifelong records of achievement. Promote awareness Generate brand awareness with recognizable records that can be shared safely anywhere in the world. Integrate with third-party applications APIs make it easy to establish trust for critical information
  • 17
    IdRamp

    IdRamp

    idRamp

    Turn your digital identity strategy into a business asset, not a liability. Stop spending time, money, and headcount replatforming insecure identity technology. Simplify authentication complexities with decentralized zero trust Identity from Idramp. Bring order to your identity management chaos. Accelerate delivery of services to meet the speed of business. Eliminate expensive platform upgrade projects with rapid modular deployment. Relieve the pain of bespoke integration with rapid integration that automatically interoperates with existing infrastructure. Tailor your customer experience with a modular architecture that eliminates vendor stack lock-in. Add zero trust identity with automated security policies and adaptive access controls. Control extensible ecosystems with state of the art data protection. Never trust but always verify that your applications and people are safe.
  • 18
    [D/Wallet]

    [D/Wallet]

    Desmo Labs

    Manage your digital identity, verifiable credentials, and digital assets, benefiting from a streamlined experience. Our blockchain-based platform securely manages infrastructure without exposing credential-generating data, allowing access only to permitted participants, and ensuring all actions and business processes are tamper-proof, and permanently recorded as blockchain transactions. Eliminating the often fluctuating and unpredictable fees associated with blockchain operations, making it ideal for widespread adoption. Additionally, it simplifies the user experience by removing the need to manage gas fees, enabling users to focus on their transactions and interactions within the blockchain ecosystem. Users benefit from the strong encryption of digital signatures ensuring their data is protected, while the use of social log-ins simplifies the access process. This integration provides a seamless, yet highly secure user experience, reducing potential friction.
  • 19
    ONTO

    ONTO

    Ontology

    One-step management of decentralized identity and data. Self-sovereign Verifiable Credentials powered by Ontology Network. It is a statement to confirm a claim made by one entity about another. The claim is accompanied by a digital signature that can be used by other entities for authentication. ONT Score is a decentralized review system for ONT ID user trust and can assess ONT ID users from multiple dimensions, including identity information, verification information, digital assets, and behavioral features. ONTO helps users create a decentralized digital identity built on Ontology blockchain which fully protect their privacy data through an encryption algorithm, aiming to provide a safe and convenient one-stop service for users worldwide.
  • 20
    VIDchain

    VIDchain

    Validated ID

    Digital identity is not a new challenge. Since the beginning of the online revolution, validating with complete confidence the real identity of people in a digital environment has been a problem both for users, who have had their privacy and control over their personal data removed and for companies that have suffered the cost of inefficient and constant identification security failures. With VIDchain, we offer a decentralized self-rule identity (SSI) service based on Blockchain to provide people control over their identity and facilitate secure user access to online services. It improves processes and reduces identity verification costs. It implements secure identification processes and improves anti-fraud measures in compliance with eIDAS and GDPR. Based on standards that eliminate the need for hundreds of credentials. You can easily validate your digital identity with anyone you want.
  • 21
    Meeco

    Meeco

    Meeco

    Increase trust, reduce friction through transparent personal data enabled services. As individuals gain the legal rights to manage and control their data, businesses need to re-think how they collect, store and exchange their customers information. Data breaches, identity theft and data malpractice have taken trust to an all-time low.​ Individuals are calling for a new social contract with businesses. As individuals gain the legal rights to manage and control their data, businesses need to re-think how they collect, store and exchange their customers information. The Meeco Labs program provides organisations an opportunity to test hypotheses and prove business value prior to making substantial investments. It is a custom designed process and pathway to new products, services, experiences and business models. Utilising the Meeco Platform and API suite, consent exchanged customer or citizen data is mapped directly to internal CRM, ERP or enterprise systems.
  • 22
    Nuggets

    Nuggets

    Nuggets

    Whether you’re a bank, subscription service, telco or logistics company, Nuggets self-sovereign decentralized identity helps you deliver on your regulatory expectations while building competitive advantage. While your consumers enjoy more convenience, confidence and choice. With Nuggets, consumers get back control of their data and you become a champion of trust. Nuggets ties every transaction to a verified self-sovereign decentralized identity. This means the customer is verified as legitimate before they even connect to the service. This is a gold standard in digital identity, through private, secure proof of transactions. Nuggets ties every payment to a verified digital identity, preventing fraudsters from compromising identities online. Payment providers and merchants save money from reduced fraud, as well as delivering all the payment options customers want.
  • 23
    Bloom

    Bloom

    Bloom

    Securely prove that your personal information is verified with blockchain technology. You choose what data to include in your BloomID. You determine exactly how it’s used. Re-use your verified data to prove who you say you are in seconds. Verify once, re-use anytime. Use your BloomID to access apps and services anywhere in the world. Secure verifiable credentials are issued to you by trusted providers via the Bloom app. These credentials are stored securely via the Bloom app with end-to-end encryption, meaning you stay in control of the data. The Bloom app allows you to seamlessly share your credentials with third parties, allowing you to stay in control of your data and share the minimum amount of your personal information required to establish trust.
  • 24
    BlockCypher

    BlockCypher

    BlockCypher

    Our architecture allows us to run in multiple data centers for redundancy and low-latency. Simple and easy web APIs (REST) enable developers to build blockchain applications quickly and confidently. Our modular, cloud-optimized architecture is enterprise-grade for scalability, performance and reliability. We maintain a cluster of distributed databases which contain all transactional data for the entire blockchain. We host full-node blockchains for optimal security in validating and relaying transactions.Our focus is to make our customers successful as they build their next-generation blockchain applications. BlockCypher quickly identifies fraud and transactions likely to confirm.
  • 25
    Transmute

    Transmute

    Transmute

    Transmute’s Verifiable Data platform transforms data from every stage of digitization and paper into secure, interoperable, machine readable, and context rich data. Transmute VDP transforms data from every stage of digitization and paper into secure, interoperable, machine readable, and context rich data. Transmute’s vision is to enable a more equitable future for all by deploying scalable solutions that empower enterprises across industries with authentic data and traceable insights. Transmute VDP was built with input from both regulators and vendors to meet the needs of complex regulatory supply chains like steel and ecommerce. We employ industry experts representing all aspects of the value chain when it comes to cross border trade.
  • 26
    Quadrata

    Quadrata

    Quadrata

    Start building trusted DApps and create a true bot-free experience with Quadrata Identity Passport. Sybil resistant decentralized identities, proof of humanity. Expanded institutional capital with KYC/AML. Increased capital efficiency. Prevent unfair advantage with unique identification. All-in-one Web3 KYC/AML plugin with ongoing monitoring. Swift passport creation with just a few lines of code. Quadrata Passport automatically syncs identity, compliance, and reputation-based data across multiple blockchain networks. Our ecosystem is ever expanding. Join our industry partners today and help create a trusted Web3 experience for all. Quantstamp is a trusted leader in blockchain security and delivers end-to-end blockchain solutions for the world's largest enterprises. CertiK has conducted over 1,800 audits across all major protocols and is trusted as the recommended blockchain and smart contract audit provider by top exchanges like Binance, OKEx, and Huobi.
  • 27
    Userfront

    Userfront

    Userfront

    Userfront gives you secure, pre-configured authentication & authorization that stays up to date automatically. We focus on simple setup and quality documentation to make the internet more secure. Manage users, tenants, authorization and more, all in one place. Whether it's editing records, viewing recent activity, analyzing trends, or messaging users, the dashboard has you covered. Stay on the same page with your team, and perform tasks quickly and efficiently. There are dozens of auth protocols and token exchange flows, with more added every year. Userfront gives you the best now and keeps you covered over time. Enterprise-grade RSA tokens, secure exchange and refresh, encryption at rest, properly configured cookies, forced SSL, and more. As browsers, standards, and threat models change, Userfront automatically updates you to keep your data and protocols secure.
    Starting Price: $140 per month
  • 28
    Acceptto Zero Trust Identity (CIAM)
    You need to know that your customers are who they say they are, customers don’t want to jump through hoops to prove it and they want you to keep their credentials safe. Protect your customers identities through a delicate balance of security and a frictionless, pleasant customer experience. Real-time, continuous identity monitoring & validation Post-Authorization. Eliminate account takeover (ATO) instantly with intelligent MFA. Risk-based policy orchestrated continuous authentication. Acceptto is a transformative cybersecurity company driving a paradigm shift in identity access management by treating authentication not as a single event, but rather a continuum. Our AI/ML powered Passwordless Continuous AuthenticationTM technology analyzes and verifies user identity, inferring behavioral data to detect anomalies and eliminate dependence on vulnerable binary authentications. We deliver the smartest, most resilient and breach-proof identity validation technology.
  • 29
    Ubisecure

    Ubisecure

    Ubisecure

    The Ubisecure Identity Platform helps organisations manage the many Digital Identity risks and opportunities. Focused on European B2B and B2C scenarios, Ubisecure combines highly assured Organisation Identity and Individual Identity to reduce fraud and increase efficiency in global trade and supply chain. Ubisecure is now the #1 global issuer of Legal Entity Identifiers (LEI). The Identity platform enables organisations to de-risk homegrown user registration and login solutions, and enable Single Sign-On (SSO) across all platforms and devices. Simplified MFA, including TOTP and Bank ID / Reusuable eIDs, reduce fraud by verifying customer identities, and automated customer credential management workflows for your helpdesk. Advanced identity use cases like consolidation of identity data silos, and Identity Relationship Management & Delegation can increase operational effectiveness, manage data breaches, and reduce IT costs dramatically.
  • 30
    IAP Network

    IAP Network

    Information Assurance Platform

    The IAP’s innovative combination of blockchain technology, zero-knowledge proofs and meta-consensus protocols allow for any of these parties to cryptographically prove the existence of evidence, states or activities to any interested party. Moreover, they allow for complete transparency without sacrificing the privacy of sensitive data. Allow any party to create a time-stamped proof of the existence of evidence, such as a legal document or an historical event. Third parties, such as auditors or consumers, can independently verify this proof without impinging upon the privacy or confidentiality of the original data.
  • 31
    everID

    everID

    Datarella

    Decentralized public key infrastructure is a fundamental technology that allows users to authenticate themselves, without relying on a trusted centralized authority. Private keys grant the users access and control over their accounts, their assets, and even to their digital identity (SSI). Within everID, everKEY is our decentralized key recovery solution for wallets and other products that require highly secure key management.
  • 32
    Concordium

    Concordium

    Concordium

    A blockchain that’s compliance ready with today’s and tomorrow’s economies. That enables private and public transactions. That offers high throughput, fast transactions, and predictable fees. That allows businesses, developers, and traders to harness blockchain’s true power and potential. Concordium’s decentralised blockchain technology is the first with layer-one ID built into the protocol. This means it offers forward-thinking businesses, application developers, and cryptocurrency traders unrivalled security, privacy, transparency and most importantly, compliance with regulations, if and when these come through. Utilizing zero-knowledge-proofs (ZKP) allows parties to verify information without exchanging or storing that information on-chain other than hash functions, so users can trust that their confidential business will become no one else’s business.
  • 33
    Spherity VERA
    The synergy between Spherity’s VERA and RCS Global’s Claritas introduces a game-changing solution for the battery sector. Powered by our technology, the Battery Passport offers car and battery manufacturers the ability to issue digital battery passports, making product traceability easier than ever. VERA allows you to securely exchange data with your suppliers and create Digital Product Passports that demonstrate your compliance with new regulations. It makes the data in your passport digitally verifiable and you'll have complete control over your data, deciding who can access it. Plus, the DPP is an invaluable tool for tracking your product's journey throughout its entire lifecycle, from use to re-use and recycling. Confirms technical and functional standards set by SAP, ensuring compatibility, performance, and reliability throughout.
  • 34
    Nxt

    Nxt

    Jelurida Swiss

    Nxt is an open source blockchain platform and the first to rely entirely on a proof-of-stake consensus protocol. Launched in November 2013 and written from scratch in Java, Nxt is proof that blockchain technology is not only about simple transfer of value but also has the potential to revolutionize many aspects of our lives with the various decentralized applications that can be built with it. Today, Nxt remains one of the most tested and reliable platforms in the industry, influencing numerous other projects. With its many easy to use modular built-in features, Nxt covers most of the dApp use cases and at the same time is perfectly suitable for private blockchain implementations. Nxt was the first to implement a pure proof-of-stake consensus protocol.
  • 35
    DL3ARN

    DL3ARN

    DL3ARN

    Discover data ownership, privacy, personalized insights, and more in one user-focused solution. Decentralizing database storage bolsters data security, protecting information from centralized vulnerabilities. Ensure your information is secured with verification, robust security features, and a traceable data system, protecting it from unauthorized access or alterations. Our platform's interoperability connects data from multiple sectors, offering a comprehensive view and empowering informed decisions. Securely monetize your data by sharing it with researchers, organizations, and marketers while retaining ownership. Take control of your data ownership, deciding who has access and how it's used, ensuring privacy and autonomy.
  • 36
    Tokeny

    Tokeny

    Tokeny

    Issue digital securities on a hyper-efficient infrastructure. Digitally onboard investors and embed transfer rules to enforce compliance. Codify legal obligations with smart contracts. Realize fast onboarding, cost-efficient management, and rapid transferability of real-world assets. Enforce compliance across the whole lifecycle. Apply control whilst utilizing blockchain technology with the ERC3643 protocol. Improve asset liquidity for your investors. Digitize securities on the most secure and cost-efficient blockchain infrastructure available in the market. Streamline the capital raising process and maximize the potential of your offering through a digital and seamless user experience. Control and manage issuer interfaces, automate corporate actions and digitally manage assets across the entire lifecycle. Embed transfer rules into the securities to enforce compliance and rapidly transfer securities to eligible investors.
  • 37
    Stacks

    Stacks

    Stacks

    Stacks makes Bitcoin programmable, enabling decentralized apps and smart contracts that inherit all of Bitcoin’s powers. Build apps and smart contracts on Bitcoin. Stacks connects to Bitcoin, enabling you to build apps, smart contracts, and digital assets that are integrated with Bitcoin's security, capital, and network. Lock your STX temporarily to support the network’s security and consensus. As a reward, you’ll earn Bitcoin that miners transfer as part of Proof of Transfer. Stacks makes Bitcoin's $760B of capital programmable with smart contracts. Build a better financial system on top of Bitcoin that’s open, composable, and without intermediaries. Run your app’s logic on the blockchain with Clarity smart contracts. Clarity is a more secure and predictable language that prevents many bugs and exploits. Perfect for high-stakes code where bugs are not an option.
  • 38
    FYEO

    FYEO

    FYEO

    FYEO secures enterprises and individuals from cyber attacks with security audits, real-time threat monitoring and intelligence, anti-phishing solutions and decentralized identity management. End-to-end blockchain security services and auditing for Web3. Protect your organization and employees from cyberattacks with FYEO Domain Intelligence. Decentralized password management and identity monitoring services made simple. End user breach and phishing alert system. Uncover vulnerabilities and protect both your application and your users. Identify and address cyber risks across a company before you take on the liability. Protect your company from ransomware, malware, insider threats, and more. Our team works collaboratively with your development team to identify potentially critical vulnerabilities before they can be exploited by a malicious actor. FYEO Domain Intelligence delivers real-time cyber threat monitoring and intelligence to help secure your organization.
  • 39
    Accredify

    Accredify

    Accredify

    Simplify the exchange of digital identity and data whilst augmenting trust in your organization with Accredify’s globally recognized and award-winning technology, TrustTech. Our society is powered by data shared through digital channels, but not all information can be relied on. With the rise of AI-driven deepfake data and documents, establishing digital trust in their services has become essential to every organization. The world is experiencing a crisis of trust where individuals, businesses, and governments globally are experiencing the consequences of a rise in unreliable information. However, legacy systems of information sharing face a trade-off between accessibility and security. Enhanced accessibility means relaxing security protocols, opening more avenues for malicious actors to obtain and tamper with sensitive data.
  • 40
    Onfido

    Onfido

    Onfido

    How do you verify real people in the digital world? Onfido helps companies see real identity, the humans behind the screens, using world-leading AI and identity experts. Your customers can prove their identities, wherever they are, with just an ID and their face. So you’ll have everything you need to grow your business securely. Anchor your user’s digital account to their real identity with just their ID and face. Then re-verify or authenticate them when needed with a selfie. See how Onfido’s identity verification has helped businesses like yours onboard more users, reduce fraud and free up resources for internal teams. Drive business results with identity verification and authentication. Our AI-based technology assesses whether a user’s government-issued ID is genuine or fraudulent, and then compares it against their facial biometrics. That’s how we give companies the assurance they need to onboard customers remotely and securely.
  • 41
    Fischer Identity

    Fischer Identity

    Fischer International Identity

    Fischer empowers organizations to build an effective, predictable and secure Global Identity® Architecture. Securing an Identity Program is the #1 priority now. Fischer Identity provides hardware and software solutions as well as Global Identity® Services to secure and control information technology resources. Leverage our plug & play automation to create predictable, secure provisioning to enable your identities with the access they need on day one as well as deprovision access on-demand. Eliminate the reliance on professional services by automating the Fischer way. Our governance model provides you the control you need to enforce compliance throughout your business. Always know who has access to what, how they obtained the access they have, and remediation when something is not right. Accelerate your digital transformation with Fischer Identity lifecycle management.
  • 42
    OpenText IAM
    Digital transformation can deliver many efficiencies and new sources of value, but it also presents an enormous challenge: providing secure access to information within and outside the firewall. IT must manage user access to internal and cloud-based applications among employees, customers and trading partners. In the digital economy, every person, system and device needs a digital identity. The OpenText Identity and Access Management (IAM) Platform helps enterprises manage all the digital identities that request access to their systems and applications. With OpenText IAM in place, information access becomes manageable, governable and visible. Identity and access management creates and manages user accounts, roles and access rights for individual users, systems and devices. The best IAM solutions manage both employee identities within an organization and across an extended business ecosystem of customers and partners. IAM is also essential to manage the identities of IoT devices.
  • 43
    Verifiable

    Verifiable

    Verifiable

    A modern provider data engine delivering real-time verifications and powerful automation to simplify credentialing and provider network management. One place to manage all your provider data and workflows, onboarding, network management, and everything in between. Replace manual verification processes with automation to save time, money and be more compliant by removing human error. Deploy lightning fast verifications and advanced network monitoring wherever your business needs. Advanced credentialing and compliance monitoring to notify you of gaps before they become an issue. Get the most accurate, up-to-date data using our proprietary real-time lookups, all delivered via an API that integrates wherever you need. Finally, a healthcare API that is a pleasure to work with. Customize to your needs and seamlessly integrate with your existing systems and workflows.
  • 44
    Verified.Me

    Verified.Me

    Verified.Me

    Verified.Me, by SecureKey Technologies Inc., is the new and secure way to help you verify your digital identity, so you can quickly get access to the services and products you want online, in person and on the phone. Verified.Me offers a secure and convenient way to help Canadians verify their digital identities. Verified.Me is a digital identity verification network offered by SecureKey Technologies Inc. The Verified.Me service was developed in cooperation with seven of Canada’s major financial institutions – BMO, CIBC, Desjardins, National Bank of Canada, RBC, Scotiabank and TD. The Verified.Me network continues to evolve, with plans of adding new digital identity providers and service providers to make your life easier. SecureKey’s Verified. Me digital identity verification service is now available in an easy-to-use, browser-based version.
  • 45
    Hyperledger Iroha
    Hyperledger Iroha is designed to be simple and easy to incorporate into infrastructural or IoT projects requiring distributed ledger technology. Hyperledger Iroha features a simple construction, modular, domain-driven C++ design, emphasis on client application development and a new, crash fault tolerant consensus algorithm, called YAC. Hyperledger Iroha is a simple blockchain platform you can use to make trusted, secure, and fast applications by bringing the power of permission-based blockchain with Crash fault-tolerant consensus. It’s free, open-source, and works on Linux and Mac OS, with a variety of mobile and desktop libraries. Hyperledger Iroha is a general purpose permissioned blockchain system that can be used to manage digital assets, identity, and serialized data. This can be useful for applications such as interbank settlement, central bank digital currencies, payment systems, national IDs, and logistics, among others.
  • 46
    Everest

    Everest

    Everest

    Everest is a decentralized platform with a massively scalable payment solution, EverChain, with a multi-currency wallet, EverWallet, a native biometric identity system, EverID, a value tracking token, the CRDT, all integrated to existing infrastructure with an easy to deploy software appliance, The Everest API Gateway. Everest delivers a complete solution for a new economy. The financial services toolbox provided by the Everest platform is able to be used to solve many different value transfer, tracking, and delivery challenges that you face every day. Below are some example solutions, contact us to tailor a solution for your specific needs. Cloud Fintech platform providing a regulatory compliance and value transfer toolkit which solves a variety of identity, value transfer, audit, reporting and agent management challenges. Everest is a decentralized platform incorporating a massively scalable payment solution, EverChain, with a multi-currency wallet, EverWallet, etc.
  • 47
    TraitWare

    TraitWare

    TraitWare

    TraitWare is Real Passwordless Multi-factor authentication (MFA) for True Zero Trust Access. TraitWare's enterprise-class, patented, plug-and-play solution combines Passwordless MFA and SSO – eliminating the need for usernames and passwords, while reducing friction for the user, and increasing security for your company. AND, you’ll save 60% or more on support budgets. With our QR solution, we can also eliminate the need for a username. Not only is our software convenient and easy to use, but it virtually eliminates vulnerabilities associated with traditional username and password logins. By replacing usernames and passwords we eliminate the ability to phish them. Leveraging our Direct login or our QR scan ties a user to the login, eliminating credential theft or sharing.
    Starting Price: $3 per month
  • 48
    VeriDoc Certificates
    VeriDoc Certificates offer you an end-to-end solution to store and send your certificates without thinking about how to send them, or will your certificates be secure, and also assures you 100% data transparency. You can now secure your certificates using blockchain technology, keeping your valuable certificates safe forever. With VeriDoc Certificates, your certificates become completely tamper-proof and safe from any scams & fraudsters. You can track, send, and verify the authenticity of any certificates without moving an inch from where you are. Now you can verify, send, and store certificates with ease. With VeriDoc Certificates, you can now store your certificates securely, send them to anyone and anywhere in the world, and verify the authenticity of all certificates whenever needed. VeriDoc Certificates store all your valuable documents in the blockchain which makes them tamper-proof and safe from any fishy activities.
    Starting Price: $30 per month
  • 49
    SelfKey

    SelfKey

    SelfKey

    Self sovereign identity means your data belongs to you. The SelfKey wallet is non-custodial, you are in full control of your data, documents and digital assets. SelfKey can never steal or lose your identity data or digital assets. Securely store and manage your identity documents and digital assets. Access multiple marketplaces to compare and sign up for. Start a new business, open a new bank account, or get documents notarized through the SelfKey Marketplace. Powered by the KEY token and priced against USD, the SelfKey Marketplace provides access to a variety of services with full transparency on documentation requirements, cost, and total processing time. Explore global options for banking, corporate, individual and wealth management. Apply for an international bank account directly from your SelfKey wallet. Send your identification documents and data (KYC) with a single click.
  • 50
    GlobaliD

    GlobaliD

    GlobaliD

    Portable, private, and secure identity. Claim your GlobaliD, get verified, create and join groups, communicate, pay and get paid online. At GlobaliD, we’re building a universal identity solution that is easy to use, ties users to unique names and transcends borders and institutions. We build a self-sovereign identity platform that enables everyday action for people and businesses. GlobaliD's privacy and security solutions help you protect your customers and win their trust, without compromising experience. Our platform delivers a convenient onboarding and single sign-on experience, while empowering users to build digital reputations and to maintain consent-based control over their personal data. Our solutions free our partners from the burden of data storage and security, while providing data integrity and maintaining compliance. From identity management to data security to messaging, GlobaliD’s full-fledged platform does it all.