Alternatives to Gataca

Compare Gataca alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Gataca in 2024. Compare features, ratings, user reviews, pricing, and more from Gataca competitors and alternatives in order to make an informed decision for your business.

  • 1
    Ping Identity

    Ping Identity

    Ping Identity

    Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.
    Starting Price: $5 per user per month
  • 2
    SOURCE.ID

    SOURCE.ID

    Desmo Labs

    Offering secure, private, flexible, and auditable identity verification solutions. Empowering individuals to curate their profiles, control data sharing, and offer issuers the ability to swiftly verify credentials, thereby fostering a trusted platform for all participants. Built-in AML and KYC solutions with standardized interfaces, allowing for open ledger identification verification. Digital signatures for universal authentication and provide tamper-proof with verifiable credentials. Decentralized Identity (DID) technologies streamline the verification process, reducing the time from weeks to mere seconds for tasks ranging from accessing public services to opening a bank account. Simultaneously, they provide easily verifiable credentials, significantly minimizing the manual labor required from front-desk employees. Digital signatures and tamper-proof can be operated with no seed phrases and gas fees.
  • 3
    ONTO

    ONTO

    Ontology

    One-step management of decentralized identity and data. Self-sovereign Verifiable Credentials powered by Ontology Network. It is a statement to confirm a claim made by one entity about another. The claim is accompanied by a digital signature that can be used by other entities for authentication. ONT Score is a decentralized review system for ONT ID user trust and can assess ONT ID users from multiple dimensions, including identity information, verification information, digital assets, and behavioral features. ONTO helps users create a decentralized digital identity built on Ontology blockchain which fully protect their privacy data through an encryption algorithm, aiming to provide a safe and convenient one-stop service for users worldwide.
  • 4
    EDUFIED

    EDUFIED

    EDUFIED

    Tamper-proof document issuance & verification system for issuing authorities to issue verifiable documents to recipients, allowing them to store & share them securely from their digital wallet.
  • 5
    everID

    everID

    Datarella

    Decentralized public key infrastructure is a fundamental technology that allows users to authenticate themselves, without relying on a trusted centralized authority. Private keys grant the users access and control over their accounts, their assets, and even to their digital identity (SSI). Within everID, everKEY is our decentralized key recovery solution for wallets and other products that require highly secure key management.
  • 6
    Ontology

    Ontology

    Ontology

    Ontology supports identity authentication and data collaboration between users, vehicles, and third parties. Data can only be accessed, used and stored with the consent of the owner. Through the Ontology Trust Framework and Self-Sovereign Data Storage, a number of cryptographic algorithms are implemented to protect user identity and data privacy security. Each data exchange operation requires authorization and selective exchange can be achieved through authorization protocols and cryptographic algorithms. Traceability, authorization and authentication of personal data is possible through blockchain. In some cases, we integrate TEE technology to support data analysis and processing without privacy disclosure. It's time to reclaim control of your digital identity. ONT ID enables autonomous control of your private data. You decide if and when your data is accessible by others.
  • 7
    trinsic

    trinsic

    trinsic

    trinsic connect is a reusable identity verification solution powered by verifiable credentials, digital wallets, and passkeys. Applications can now instantly verify and onboard new users through Trinsic’s reusable identity network. Simplify the user experience with password-less authentication for maximum security with minimum friction. Using zero-knowledge proofs, users can prove things about themselves without oversharing their data. Unlock interoperability for your product without any additional effort on your end. Pre-verified users speed through onboarding helping you acquire more customers at a lower cost.
  • 8
    Nuggets

    Nuggets

    Nuggets

    Whether you’re a bank, subscription service, telco or logistics company, Nuggets self-sovereign decentralized identity helps you deliver on your regulatory expectations while building competitive advantage. While your consumers enjoy more convenience, confidence and choice. With Nuggets, consumers get back control of their data and you become a champion of trust. Nuggets ties every transaction to a verified self-sovereign decentralized identity. This means the customer is verified as legitimate before they even connect to the service. This is a gold standard in digital identity, through private, secure proof of transactions. Nuggets ties every payment to a verified digital identity, preventing fraudsters from compromising identities online. Payment providers and merchants save money from reduced fraud, as well as delivering all the payment options customers want.
    Starting Price: Free
  • 9
    Microsoft Entra

    Microsoft Entra

    Microsoft

    Confidently enable smarter, real-time access decisions for all identities across hybrid, multicloud, and beyond. Safeguard your organization by protecting access to every app and every resource for every user. Effectively secure every identity including employees, customers, partners, apps, devices, and workloads across every environment. Discover and right-size permissions, manage access lifecycles, and ensure least privilege access for any identity. Keep your users productive with simple sign-in experiences, intelligent security, and unified administration. Safeguard your organization with the identity and access management solution that connects people to their apps, devices, and data. Discover, remediate, and monitor permission risks across your multicloud infrastructure with a cloud infrastructure entitlement management (CIEM) solution. Create, issue, and verify privacy-respecting decentralized identity credentials with an identity verification solution.
  • 10
    walt.id

    walt.id

    walt.id

    We offer holistic digital identity and wallet infrastructure used by thousands of developers, governments and businesses across industries. The products are open source, based on open standards, compliant with digital identity regulations and available for self-management (on-premise) or as a managed service (SaaS). Our Digital Identity Infrastructure include the following products and functionality: Issuer SDKs, APIs & APPs: Issue credentials or mint tokens with our infrastructure and white label applications. Wallet SDKs, APIs & APPs: Launch a wallet for your organization, employees or customers to manage access, credentials and tokens. Verifier SDKs, APIs & APPs: Verify credentials or tokens, use powerful verification policies and white label apps. Identity Provider: Enable wallet-, credential- and token-based authentication and identification for your apps.
    Starting Price: Free
  • 11
    [D/Wallet]

    [D/Wallet]

    Desmo Labs

    Manage your digital identity, verifiable credentials, and digital assets, benefiting from a streamlined experience. Our blockchain-based platform securely manages infrastructure without exposing credential-generating data, allowing access only to permitted participants, and ensuring all actions and business processes are tamper-proof, and permanently recorded as blockchain transactions. Eliminating the often fluctuating and unpredictable fees associated with blockchain operations, making it ideal for widespread adoption. Additionally, it simplifies the user experience by removing the need to manage gas fees, enabling users to focus on their transactions and interactions within the blockchain ecosystem. Users benefit from the strong encryption of digital signatures ensuring their data is protected, while the use of social log-ins simplifies the access process. This integration provides a seamless, yet highly secure user experience, reducing potential friction.
  • 12
    CREDEBL

    CREDEBL

    CREDEBL

    Effortlessly define and tailor credentials with our user-friendly schema template. Customize credentials for employees, customers, students, citizens, or any user, incorporating detailed schema information and intuitive controls for seamless management. Seamlessly issue digital credentials and explore a comprehensive overview on the platform for efficient credential verification and management. Securely connect with and receive credentials from diverse organizations & ecosystems with a simple tap on your screen. Instantly share the verifiable proof of your digital credential certificates. Empower your identity with selective (partial) disclosure on our SSI mobile wallet. Seamlessly present only the data you choose with confidence. Alternatively, you can share your personal milestones (e.g. achievements in sports) on social media directly.
  • 13
    Peer Mountain

    Peer Mountain

    Peer Mountain

    Peer Mountain goes beyond providing users with ownership and control over their cryptographically secure identities. It is an end-to-end application ecosystem that facilitates secure commerce and exchange of digital and physical services. Gain assurance of reliable and secure independent audits and claim verification. Only share and validate encrypted data according to transaction requirements. Segment services across Peer Mountain deployments securely and transparently. Control your data in a distributed system that makes hacking unfeasible. Peer Mountain serves consumers who want self-sovereign identity, service providers who need continuous, reliable compliance, and trust providers offering validation services who need trust interoperability and portability.
  • 14
    GlobaliD

    GlobaliD

    GlobaliD

    Portable, private, and secure identity. Claim your GlobaliD, get verified, create and join groups, communicate, pay and get paid online. At GlobaliD, we’re building a universal identity solution that is easy to use, ties users to unique names and transcends borders and institutions. We build a self-sovereign identity platform that enables everyday action for people and businesses. GlobaliD's privacy and security solutions help you protect your customers and win their trust, without compromising experience. Our platform delivers a convenient onboarding and single sign-on experience, while empowering users to build digital reputations and to maintain consent-based control over their personal data. Our solutions free our partners from the burden of data storage and security, while providing data integrity and maintaining compliance. From identity management to data security to messaging, GlobaliD’s full-fledged platform does it all.
  • 15
    Hyland Experience Credentials
    Hyland Experience (Hx) Credentials leverages blockchain technology to quickly, accurately and efficiently verify records in a secure, tamper-proof way. Powered by blockchain and Blockcerts Hx Credentials makes it easy to issue records in a format that is fully compliant with the open standard set by Blockcerts.org. Increase security Hx Credentials records are secure, tamper-proof and vendor-independent. All content is stored off-chain for maximum privacy. Prevent fraud Use cryptographic signatures to stop others from impersonating official records. Provides credential ownership to users Users and recipients own their records and can verify them anywhere through a set of APIs, or aggregate them to form lifelong records of achievement. Promote awareness Generate brand awareness with recognizable records that can be shared safely anywhere in the world. Integrate with third-party applications APIs make it easy to establish trust for critical information
  • 16
    VIDchain

    VIDchain

    Validated ID

    Digital identity is not a new challenge. Since the beginning of the online revolution, validating with complete confidence the real identity of people in a digital environment has been a problem both for users, who have had their privacy and control over their personal data removed and for companies that have suffered the cost of inefficient and constant identification security failures. With VIDchain, we offer a decentralized self-rule identity (SSI) service based on Blockchain to provide people control over their identity and facilitate secure user access to online services. It improves processes and reduces identity verification costs. It implements secure identification processes and improves anti-fraud measures in compliance with eIDAS and GDPR. Based on standards that eliminate the need for hundreds of credentials. You can easily validate your digital identity with anyone you want.
  • 17
    SelfKey

    SelfKey

    SelfKey

    Self sovereign identity means your data belongs to you. The SelfKey wallet is non-custodial, you are in full control of your data, documents and digital assets. SelfKey can never steal or lose your identity data or digital assets. Securely store and manage your identity documents and digital assets. Access multiple marketplaces to compare and sign up for. Start a new business, open a new bank account, or get documents notarized through the SelfKey Marketplace. Powered by the KEY token and priced against USD, the SelfKey Marketplace provides access to a variety of services with full transparency on documentation requirements, cost, and total processing time. Explore global options for banking, corporate, individual and wealth management. Apply for an international bank account directly from your SelfKey wallet. Send your identification documents and data (KYC) with a single click.
  • 18
    Evernym Verity
    Meet the first enterprise-grade verifiable credential platform designed around ease of use and interoperability. Our decentralized protocol platform for issuing and verifying digital credentials. Our consumer mobile wallet app for holding and sharing credentials. Embedded SSI wallet functionality for your organization’s existing apps. Issue digital verifiable credentials directly to SSI-based wallets. Verify credentials held in SSI-based wallets simply and easily. Easily integrate with back-end systems, using REST APIs and SDKs in three popular languages. Build for scale, with enterprise-grade architecture designed to support millions of users. Future-proof your credential architecture, through built-in compliance with emerging open standards, including Hyperledger Aries, W3C DIDs, and W3C Verifiable Credentials. Enable customers and end users to manage all of their digital credentials from the safety of their own phone.
    Starting Price: $1,000 per month
  • 19
    Hyperledger Indy

    Hyperledger Indy

    Hyperledger

    Hyperledger Indy provides tools, libraries, and reusable components for providing digital identities rooted on blockchains or other distributed ledgers so that they are interoperable across administrative domains, applications, and any other silo. Indy is interoperable with other blockchains or can be used standalone powering the decentralization of identity. Distributed ledger purpose-built for decentralized identity, correlation-resistant by design. DIDs (Decentralized Identifiers) that are globally unique and resolvable (via a ledger) without requiring any centralized resolution authority. Pairwise Identifiers create secure, 1:1 relationships between any two entities. Verifiable claims are interoperable format for exchange of digital identity attributes and relationships currently in the standardization pipeline at the W3C. Zero Knowledge Proofs which prove that some or all of the data in a set of Claims is true without revealing any additional information.
  • 20
    IdRamp

    IdRamp

    idRamp

    Turn your digital identity strategy into a business asset, not a liability. Stop spending time, money, and headcount replatforming insecure identity technology. Simplify authentication complexities with decentralized zero trust Identity from Idramp. Bring order to your identity management chaos. Accelerate delivery of services to meet the speed of business. Eliminate expensive platform upgrade projects with rapid modular deployment. Relieve the pain of bespoke integration with rapid integration that automatically interoperates with existing infrastructure. Tailor your customer experience with a modular architecture that eliminates vendor stack lock-in. Add zero trust identity with automated security policies and adaptive access controls. Control extensible ecosystems with state of the art data protection. Never trust but always verify that your applications and people are safe.
  • 21
    Civic

    Civic

    Civic Technologies

    Meet KYC & AML requirements with Civic’s compliance tools for decentralized finance (DeFi), public blockchains, NFTs, and businesses. Allow qualified, known users to participate in permissioned markets. Liquidity providers, dApp developers, and institutional participants can manage risk while creating trust in the DeFi ecosystem with Civic’s compliance tools. Civic Pass sets the stage for more checks and balances within the DeFi ecosystem. Users must meet rigorous requirements before being issued a Civic Pass to access a permissioned market and are monitored for ongoing adherence to the rules. AI-powered identity verification combined with human review to ensure that your users are real, always. Email and liveness verification, biometrics, and a passcode-protected app all designed to keep bad actors out.
    Starting Price: $250 per month
  • 22
    VeriDoc Certificates
    VeriDoc Certificates offer you an end-to-end solution to store and send your certificates without thinking about how to send them, or will your certificates be secure, and also assures you 100% data transparency. You can now secure your certificates using blockchain technology, keeping your valuable certificates safe forever. With VeriDoc Certificates, your certificates become completely tamper-proof and safe from any scams & fraudsters. You can track, send, and verify the authenticity of any certificates without moving an inch from where you are. Now you can verify, send, and store certificates with ease. With VeriDoc Certificates, you can now store your certificates securely, send them to anyone and anywhere in the world, and verify the authenticity of all certificates whenever needed. VeriDoc Certificates store all your valuable documents in the blockchain which makes them tamper-proof and safe from any fishy activities.
    Starting Price: $30 per month
  • 23
    Nok Nok S3 Authentication
    Authentication is the "front door" to digital services. The Nok Nok™ S3 Authentication Suite (S3 Suite) provides passwordless authentication that is more convenient and user friendly than legacy authentication, and is more secure than legacy 2FA, resulting in improved user engagement and greater security. From frictionless on-boarding and progressive profiling, through easy bootstrapping of new devices and account recovery, to suspension and deprovisioning of users. Passwordless authentication support for Desktop Web, Mobile Web, Mobile Apps, Smartwatch Apps and integration for authenticating to call centers. Authentication to cloud services and - in combination with the Nok Nok IoT SDK, to IoT devices. The Nok Nok passwordless customer authentication platform delivers omnichannel, frictionless authentication to any device. The platform’s extensible architecture allows you to support third party biometric products or new authenticators and biometric modalities.
  • 24
    Accredify

    Accredify

    Accredify

    Simplify the exchange of digital identity and data whilst augmenting trust in your organization with Accredify’s globally recognized and award-winning technology, TrustTech. Our society is powered by data shared through digital channels, but not all information can be relied on. With the rise of AI-driven deepfake data and documents, establishing digital trust in their services has become essential to every organization. The world is experiencing a crisis of trust where individuals, businesses, and governments globally are experiencing the consequences of a rise in unreliable information. However, legacy systems of information sharing face a trade-off between accessibility and security. Enhanced accessibility means relaxing security protocols, opening more avenues for malicious actors to obtain and tamper with sensitive data.
  • 25
    Dock Certs

    Dock Certs

    Dock Certs

    Convert verified ID data into reusable digital credentials, reduce verification friction without compromising security and enable secure data exchanges with fraud-proof data.
  • 26
    Microsoft Entra Verified ID
    Start your decentralized identity journey with Microsoft Entra Verified ID—included free with any Azure Active Directory (Azure AD) subscription. Microsoft Entra Verified ID is a managed verifiable credentials service based on open standards. Digitally validate identity information to ensure trustworthy self-service enrollment and faster onboarding. Quickly verify an individual’s credentials and status to grant least-privilege access with confidence. Replace support calls and security questions with a streamlined self-service process to verify identities. Ensure that credentials are interoperable and reusable with a solution that supports open standards. Confidently issue and verify workplace credentials, citizenship, education status, certifications, or any unique identity attributes in a global ecosystem designed for more secure interaction between people, organizations, and things.
  • 27
    Identity.com

    Identity.com

    Identity.com

    We leverage industry-standard, open-source identifiers called Decentralized Identifiers (DIDs) to enable off-chain authentication. DIDs are a core component of building a native identity layer and can be viewed as a new type of global identifier. We have built and now maintain did:sol, the leading DID method on the Solana blockchain. Designed to both protect against cybercrime and satisfy regulators, the Gateway Protocol enables any business or application to meet identity requirements (such as KYC and AML) without developing their own identity verification system or data storage. Instead, identity verification is completed by gatekeepers in gatekeeper networks.
  • 28
    Verified.Me

    Verified.Me

    Verified.Me

    Verified.Me, by SecureKey Technologies Inc., is the new and secure way to help you verify your digital identity, so you can quickly get access to the services and products you want online, in person and on the phone. Verified.Me offers a secure and convenient way to help Canadians verify their digital identities. Verified.Me is a digital identity verification network offered by SecureKey Technologies Inc. The Verified.Me service was developed in cooperation with seven of Canada’s major financial institutions – BMO, CIBC, Desjardins, National Bank of Canada, RBC, Scotiabank and TD. The Verified.Me network continues to evolve, with plans of adding new digital identity providers and service providers to make your life easier. SecureKey’s Verified. Me digital identity verification service is now available in an easy-to-use, browser-based version.
  • 29
    Infisign

    Infisign

    Infisign

    Infisign is a cutting-edge Identity and Access Management (IAM) platform that revolutionizes digital security by leveraging decentralized identity, passwordless authentication, federation, and privileged access management capabilities. The solution empowers organizations to streamline user authentication, manage access efficiently, and ensure compliance across diverse environments. With its unique approach, Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.
    Starting Price: $4/per month
  • 30
    Everest

    Everest

    Everest

    Everest is a decentralized platform with a massively scalable payment solution, EverChain, with a multi-currency wallet, EverWallet, a native biometric identity system, EverID, a value tracking token, the CRDT, all integrated to existing infrastructure with an easy to deploy software appliance, The Everest API Gateway. Everest delivers a complete solution for a new economy. The financial services toolbox provided by the Everest platform is able to be used to solve many different value transfer, tracking, and delivery challenges that you face every day. Below are some example solutions, contact us to tailor a solution for your specific needs. Cloud Fintech platform providing a regulatory compliance and value transfer toolkit which solves a variety of identity, value transfer, audit, reporting and agent management challenges. Everest is a decentralized platform incorporating a massively scalable payment solution, EverChain, with a multi-currency wallet, EverWallet, etc.
  • 31
    IBM Security Verify
    Infuse cloud IAM with deep context for risk-based authentication to enable frictionless, secure access for your consumers and workforce. As organizations modernize hybrid multi cloud environments using a zero-trust strategy, identity and access management can no longer remain siloed. In a cloud environment, you need to develop cloud IAM strategies that use deep context to automate risk protection and continuously authenticate any user to any resource. Your journey should match your business requirements. Maintain existing investments and protect on-premises applications as you design and customize the right cloud IAM architecture to either replace or complement your infrastructure. Your users want one-click access from any device to any application. Onboard new federated applications to single sign-on (SSO), embed modern multi-factor authentication (MFA) methods, simplify logistics and give developers consumable APIs.
  • 32
    Nxt

    Nxt

    Jelurida Swiss

    Nxt is an open source blockchain platform and the first to rely entirely on a proof-of-stake consensus protocol. Launched in November 2013 and written from scratch in Java, Nxt is proof that blockchain technology is not only about simple transfer of value but also has the potential to revolutionize many aspects of our lives with the various decentralized applications that can be built with it. Today, Nxt remains one of the most tested and reliable platforms in the industry, influencing numerous other projects. With its many easy to use modular built-in features, Nxt covers most of the dApp use cases and at the same time is perfectly suitable for private blockchain implementations. Nxt was the first to implement a pure proof-of-stake consensus protocol.
  • 33
    3ntity

    3ntity

    Hypermine

    3ntity is a decentralized identity layer for the internet, giving users control of their personal data and identity whilst digital enabling trust for businesses.
  • 34
    Trust Stamp

    Trust Stamp

    Trust Stamp

    Mitigate fraud, retain customers, and reach a broader base of users worldwide with AI-powered identity solutions at the intersection of biometrics, privacy, and cybersecurity. Trust Stamp delivers trusted identity systems at the heart of how organisations and individuals transact in the connected world and beyond. Trust Stamp's radical innovations in biometrics and data protection empower people to access more with identity that can be safely shared and stored. When our identity technology is used to open a bank account or access a public service, both the individual and organisation achieve higher levels of protection and confidence in the security of their data and the integrity of their systems. Trust Stamp's solutions elevate all sides of an identity system.
  • 35
    Finema

    Finema

    Finema

    We provide a holistic solution to all your credential ownership and management. Not only applicable to a wide range of scenarios, it is secure, convenient and fully owned by you. You can check whether the information presented is a real human, real transcript, authentic brand-name bag, or malevolent fraudster from barely revealing any data, thanks to our cryptographic technique. Our platform provides secure, privacy-preserving and cost-effective — the way to help people manage their identity on the internet.
  • 36
    Affinidi

    Affinidi

    Affinidi

    At Affinidi, our vision is to revolutionize the current paradigm of digital identity, empowering individuals to reclaim ownership of data, regain control over digital identities, and actively engage in safeguarding privacy. Our concept of "holistic identity" encompasses the complete spectrum of discovering, collecting, sharing, storing, and even monetizing personal data in the digital realm. We enable individuals to possess a comprehensive integrated self-view in the digital world, exercise authority over their data, and make informed usage decisions. In the digital realm, our digital selves, constructed from attributes like names, ages, and locations, become fragmented as each site captures only partial aspects, leaving us exposed and vulnerable.
    Starting Price: $199 per month
  • 37
    OARO Identity
    We connect people to their identities using advanced facial recognition, simplifying processes for leading enterprise-sized businesses across all verticals. OARO IDENTITY is an end-to-end solution enabling user authentication and authorization across devices, business lines, and organizational boundaries – reducing cost and complexity while improving overall user experience and security. Identity management and the safeguarding of data are critical functions of all organizations. Traditional solutions are increasingly incapable of providing both the user experience and level of security required by today’s business environment. This trend is evidenced by the growing frequency of massive data breaches among industry leaders and the public sector. OARO IDENTITY is an end-to-end solution enabling our clients to authenticate and authorize users across devices, business lines and organizational boundaries, while reducing complexity, cost and improving user experience and security.
  • 38
    WWPass

    WWPass

    WWPass

    No need to remember, manage, reset, protect or exchange. Consolidation of all logins in one protected authentication token. Easy self-management of the authentication token. Log in with a universal, international digital identity, trusted if required and anonymous if allowed. All data is encrypted by the user with WWPass Key. No need for OTP, SMS, or other extra costly adaptive authentication and login support. User identity is protected by WWPass Key. WWPass MFA is a strong customer authentication compliant with GDPR and NIST. Each user gets a unique key, which helps to log in to an unlimited number of accounts and services without usernames and passwords. Log in to a growing number of online services with your WWPass Key as a universal key to the digital world. Enable next-generation strong multi-factor authentication without usernames and passwords. Simplify and streamline secure access to any business application without a username and password.
    Starting Price: Free
  • 39
    Veres One

    Veres One

    Veres One

    Veres One is a secure, privacy-preserving, and cost-effective way for you to control and manage your identity on the web. Ledgers enable us to reduce identifier management costs through shared common infrastructure. Veres One is optimized for identity, which further reduces costs. As a result, network operating costs and fees are a fraction of those of general-purpose ledgers like Bitcoin and Ethereum. Unlike many other networks, Veres One does not use a scarce network token. This removes price volatility and regulatory risks associated with speculative token networks. Veres One charges low, stable fees that decrease as the network scales. Distributed systems enable competitors to cooperate on common infrastructure. These systems naturally resist centralization, surveillance, and censorship, which are threats to identity. Veres One utilizes decentralized technology and governance to protect your identifiers.
  • 40
    Remme Auth
    Create a unique Auth ID, fill in your first login profile with data like name and email and you're ready to go. Add as many profiles as you need to fit the websites and apps you use most. Auth allows you to build ecosystems where physical and digital experience blend together. Shop online and in store, log in to websites, unlock a car – all with a click of a button. Select flexible recovery options with biometric hardware-based security. Simply packaged to enhance protection. Every single day our digital identities are used to chat, order snacks, and buy stuff. It requires dozens of logins, new accounts, strong passwords, and personal info sharing.
  • 41
    Quadrata

    Quadrata

    Quadrata

    Start building trusted DApps and create a true bot-free experience with Quadrata Identity Passport. Sybil resistant decentralized identities, proof of humanity. Expanded institutional capital with KYC/AML. Increased capital efficiency. Prevent unfair advantage with unique identification. All-in-one Web3 KYC/AML plugin with ongoing monitoring. Swift passport creation with just a few lines of code. Quadrata Passport automatically syncs identity, compliance, and reputation-based data across multiple blockchain networks. Our ecosystem is ever expanding. Join our industry partners today and help create a trusted Web3 experience for all. Quantstamp is a trusted leader in blockchain security and delivers end-to-end blockchain solutions for the world's largest enterprises. CertiK has conducted over 1,800 audits across all major protocols and is trusted as the recommended blockchain and smart contract audit provider by top exchanges like Binance, OKEx, and Huobi.
  • 42
    Optable

    Optable

    Optable

    End-to-end data clean room platform, integrated for activation. Publishers and advertisers use Optable data clean room technology to securely plan, activate and measure advertising campaigns. A new generation of privacy-preserving data collaboration software. Optable customers can collaborate with their customers and partners, including those who aren't Optable customers themselves. This can be done using the platform's Flash Nodes, allowing to invite other parties into a secure environment. Optable offers a decentralized identity infrastructure, allowing to build of private identity graphs. The infrastructure provides means for creating purpose-limited, permission data clean rooms that minimize data movement. Interoperability with data warehouses and other data clean rooms is key. The use of our open-source software allows third-party platforms to match data with Optable customers, as well as implement secure clean room functions for their own use.
  • 43
    Authentiq

    Authentiq

    Authentiq

    Strong authentication, without the passwords. Add secure authentication options to any website or application. Easy and without headaches. Authentiq Connect lets users decide when to step up their security, and whether to use a second factor like TOTP (e.g. Google Authenticator) or U2F (e.g. Yubikey), or go passwordless with Authentiq ID right away. Authentiq Connect is compatible with OAuth 2.0 and OpenID Connect; getting started is as simple as adding a social network button to a site. Authentiq Connect is compatible with OAuth 2.0 and OpenID Connect; getting started is as simple as adding a social network button to a site. The passwordless experience you want without the lock-in. Authentiq ID simply allows you to use your phone to authenticate to things online, share your identity details safely, and sign out again remotely. It also supersedes Google Authenticator by supporting more secure TOTP authentication, making it a one-stop-app for everyone interested.
    Starting Price: $49
  • 44
    Terradoxa

    Terradoxa

    Terradoxa

    We created Terradoxa to offer the world a new approach to digital personal services. In a world where trust is no longer decreed but earned, and challenged every day, Terradoxa creates a link of trust between people, organizations and administrations. We are citizens, engineers, caregivers and parents, we want to enable democracy to perpetuate its traditional objectives of freedom, equality and fraternity while the threat of digital dictatorship and mass manipulation becomes a reality. Europe is not immune to the use of misguided digital technology, the coupling of which with video surveillance would lock us in an open-air prison. A removable identity to guarantee anonymity by default.
  • 45
    Sudo Platform

    Sudo Platform

    Anonyome Labs

    Sudo Platform is an API-first, developer-focused ecosystem that delivers the tools necessary to empower our partners to quickly and completely deliver to end-user consumers the necessary capabilities to protect and control their personal information while navigating the digital world. It provides a modular, quick to implement, and powerful collection of the most important digital privacy and cyber safety tools. including safe and private browsing, password management, VPN, virtual cards, encrypted and open communications, and decentralized identity. This developer-focused platform includes: Developer-focused documentation API-first ecosystem SDK source code via GitHub Sample applications for test-to-deploy of various capabilities Vendor-brandable (white-label) apps for quick go-to-market deployments.
  • 46
    Metadium

    Metadium

    Metadium

    Metadium powers identification, authentication and crypto transaction management, providing AML compliance and risk management solutions. Our technology is compatible with EVM and provides standard API/SDK, making the integration process fast and convenient. Metadium provides high security features appropriate for corporate compliance like setting node permissions and data encryption for privacy protection. As blockchain technology continues to be accepted and integrated into multiple industries, the need for compliance grows. Metadium’s second generation uses its advanced technology and experience to provide a new ecosystem of compliant services and solutions that serve as the bridge to blockchain’s true potential. Our evergrowing ecosystem includes identity and data protection, innovative metaverse platforms, and highly secure payment and asset management services.
  • 47
    Hyperledger Iroha

    Hyperledger Iroha

    Hyperledger

    Hyperledger Iroha is designed to be simple and easy to incorporate into infrastructural or IoT projects requiring distributed ledger technology. Hyperledger Iroha features a simple construction, modular, domain-driven C++ design, emphasis on client application development and a new, crash fault tolerant consensus algorithm, called YAC. Hyperledger Iroha is a simple blockchain platform you can use to make trusted, secure, and fast applications by bringing the power of permission-based blockchain with Crash fault-tolerant consensus. It’s free, open-source, and works on Linux and Mac OS, with a variety of mobile and desktop libraries. Hyperledger Iroha is a general purpose permissioned blockchain system that can be used to manage digital assets, identity, and serialized data. This can be useful for applications such as interbank settlement, central bank digital currencies, payment systems, national IDs, and logistics, among others.
  • 48
    BitMark

    BitMark

    BitMark

    A blockchain is a new type of computer that can be shared by anyone without having to ask permission. It’s open and yet secure — protected with cryptography and consensus technology. Bitmark was established in 2014, after we saw glimpses of how this could lead to a better society. Institutions require accountants, lawyers, regulators, and police. This increases bureaucracy, risk, and stress to society. Regulation can be captured. In short, our existing institutions are expensive to scale. The breakthrough idea behind the blockchain is that trust can be built through excess computing resources, Code can implement data integrity. Since computing follows Moore’s law, society will have more computing resources for less money over time. Simultaneously, we can increase individual autonomy and reduce corruption. Blockchain programs, known as smart contracts, create and manage data called tokens.
  • 49
    HearRo

    HearRo

    HearRo

    Companies struggle to connect with their customers in a highly personalized yet efficient way through a traditional call center approach. And sadly, most customers have given up expecting to get good service over the phone or internet. HearRo redefines what a phone system can be by leveraging blockchain technology to create secure digital identities, which allow for effortless communication and a more personalized customer service experience. Most existing phone, chat and messaging systems built for call centers are surprisingly out of date and behind the times. When we call customer service, we have to endure a seemingly endless cycle of menu options, waiting on hold, repeating information, transfers and starting over.
  • 50
    Stacks

    Stacks

    Stacks

    Stacks makes Bitcoin programmable, enabling decentralized apps and smart contracts that inherit all of Bitcoin’s powers. Build apps and smart contracts on Bitcoin. Stacks connects to Bitcoin, enabling you to build apps, smart contracts, and digital assets that are integrated with Bitcoin's security, capital, and network. Lock your STX temporarily to support the network’s security and consensus. As a reward, you’ll earn Bitcoin that miners transfer as part of Proof of Transfer. Stacks makes Bitcoin's $760B of capital programmable with smart contracts. Build a better financial system on top of Bitcoin that’s open, composable, and without intermediaries. Run your app’s logic on the blockchain with Clarity smart contracts. Clarity is a more secure and predictable language that prevents many bugs and exploits. Perfect for high-stakes code where bugs are not an option.