Alternatives to HearRo

Compare HearRo alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to HearRo in 2024. Compare features, ratings, user reviews, pricing, and more from HearRo competitors and alternatives in order to make an informed decision for your business.

  • 1
    Corda
    A blockchain platform built for business and longevity. Unlock new value and transform your business by building any blockchain application on top of Corda. R3’s vision is of a world where everyone can transact directly and privately with trust. Business partners operate in perfect synchrony, and trustless interactions are a thing of the past. R3’s Corda is an enterprise blockchain platform that delivers privacy, security, interoperability and scalability. Corda underpins top-of-stack applications, CorDapps, built by ecosystem participants. R3 leads the largest blockchain ecosystem in the world. Participation as an app builder or explorer offers comprehensive benefits tailored to your institution’s needs and development stages.
  • 2
    Ping Identity

    Ping Identity

    Ping Identity

    Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.
    Starting Price: $5 per user per month
  • 3
    BitMark

    BitMark

    BitMark

    A blockchain is a new type of computer that can be shared by anyone without having to ask permission. It’s open and yet secure — protected with cryptography and consensus technology. Bitmark was established in 2014, after we saw glimpses of how this could lead to a better society. Institutions require accountants, lawyers, regulators, and police. This increases bureaucracy, risk, and stress to society. Regulation can be captured. In short, our existing institutions are expensive to scale. The breakthrough idea behind the blockchain is that trust can be built through excess computing resources, Code can implement data integrity. Since computing follows Moore’s law, society will have more computing resources for less money over time. Simultaneously, we can increase individual autonomy and reduce corruption. Blockchain programs, known as smart contracts, create and manage data called tokens.
  • 4
    Nok Nok S3 Authentication
    Authentication is the "front door" to digital services. The Nok Nok™ S3 Authentication Suite (S3 Suite) provides passwordless authentication that is more convenient and user friendly than legacy authentication, and is more secure than legacy 2FA, resulting in improved user engagement and greater security. From frictionless on-boarding and progressive profiling, through easy bootstrapping of new devices and account recovery, to suspension and deprovisioning of users. Passwordless authentication support for Desktop Web, Mobile Web, Mobile Apps, Smartwatch Apps and integration for authenticating to call centers. Authentication to cloud services and - in combination with the Nok Nok IoT SDK, to IoT devices. The Nok Nok passwordless customer authentication platform delivers omnichannel, frictionless authentication to any device. The platform’s extensible architecture allows you to support third party biometric products or new authenticators and biometric modalities.
  • 5
    Meeco

    Meeco

    Meeco

    Increase trust, reduce friction through transparent personal data enabled services. As individuals gain the legal rights to manage and control their data, businesses need to re-think how they collect, store and exchange their customers information. Data breaches, identity theft and data malpractice have taken trust to an all-time low.​ Individuals are calling for a new social contract with businesses. As individuals gain the legal rights to manage and control their data, businesses need to re-think how they collect, store and exchange their customers information. The Meeco Labs program provides organisations an opportunity to test hypotheses and prove business value prior to making substantial investments. It is a custom designed process and pathway to new products, services, experiences and business models. Utilising the Meeco Platform and API suite, consent exchanged customer or citizen data is mapped directly to internal CRM, ERP or enterprise systems.
  • 6
    Elliptic

    Elliptic

    Elliptic

    Blockchain analytics, training, and certification for crypto businesses, financial institutions, and regulators. Manage financial crime risk, achieve regulatory compliance, and grow with confidence. Our crypto compliance solutions and services are used by crypto businesses, financial institutions, and regulators to detect and prevent financial crime in cryptoassets. Blockchain analytics across more than 100 cryptoassets and 10 billion+ data points provide accurate, actionable insights that businesses rely on to mitigate risk and be compliant. Elliptic provides blockchain analytics for cryptoasset compliance. Enable your compliance team to manage risk across 100+ cryptoassets and fulfill regulatory requirements. Compliance is a competitive advantage that builds trust with regulators, customers, and partners. Having the most accurate AML monitoring solutions is critical, as is investing in your team to build the knowledge needed to remain compliant.
  • 7
    VIDchain

    VIDchain

    Validated ID

    Digital identity is not a new challenge. Since the beginning of the online revolution, validating with complete confidence the real identity of people in a digital environment has been a problem both for users, who have had their privacy and control over their personal data removed and for companies that have suffered the cost of inefficient and constant identification security failures. With VIDchain, we offer a decentralized self-rule identity (SSI) service based on Blockchain to provide people control over their identity and facilitate secure user access to online services. It improves processes and reduces identity verification costs. It implements secure identification processes and improves anti-fraud measures in compliance with eIDAS and GDPR. Based on standards that eliminate the need for hundreds of credentials. You can easily validate your digital identity with anyone you want.
  • 8
    BlockCypher

    BlockCypher

    BlockCypher

    Our architecture allows us to run in multiple data centers for redundancy and low-latency. Simple and easy web APIs (REST) enable developers to build blockchain applications quickly and confidently. Our modular, cloud-optimized architecture is enterprise-grade for scalability, performance and reliability. We maintain a cluster of distributed databases which contain all transactional data for the entire blockchain. We host full-node blockchains for optimal security in validating and relaying transactions.Our focus is to make our customers successful as they build their next-generation blockchain applications. BlockCypher quickly identifies fraud and transactions likely to confirm.
  • 9
    Evernym Verity
    Meet the first enterprise-grade verifiable credential platform designed around ease of use and interoperability. Our decentralized protocol platform for issuing and verifying digital credentials. Our consumer mobile wallet app for holding and sharing credentials. Embedded SSI wallet functionality for your organization’s existing apps. Issue digital verifiable credentials directly to SSI-based wallets. Verify credentials held in SSI-based wallets simply and easily. Easily integrate with back-end systems, using REST APIs and SDKs in three popular languages. Build for scale, with enterprise-grade architecture designed to support millions of users. Future-proof your credential architecture, through built-in compliance with emerging open standards, including Hyperledger Aries, W3C DIDs, and W3C Verifiable Credentials. Enable customers and end users to manage all of their digital credentials from the safety of their own phone.
    Starting Price: $1,000 per month
  • 10
    Verified.Me

    Verified.Me

    Verified.Me

    Verified.Me, by SecureKey Technologies Inc., is the new and secure way to help you verify your digital identity, so you can quickly get access to the services and products you want online, in person and on the phone. Verified.Me offers a secure and convenient way to help Canadians verify their digital identities. Verified.Me is a digital identity verification network offered by SecureKey Technologies Inc. The Verified.Me service was developed in cooperation with seven of Canada’s major financial institutions – BMO, CIBC, Desjardins, National Bank of Canada, RBC, Scotiabank and TD. The Verified.Me network continues to evolve, with plans of adding new digital identity providers and service providers to make your life easier. SecureKey’s Verified. Me digital identity verification service is now available in an easy-to-use, browser-based version.
  • 11
    Bloom

    Bloom

    Bloom

    Securely prove that your personal information is verified with blockchain technology. You choose what data to include in your BloomID. You determine exactly how it’s used. Re-use your verified data to prove who you say you are in seconds. Verify once, re-use anytime. Use your BloomID to access apps and services anywhere in the world. Secure verifiable credentials are issued to you by trusted providers via the Bloom app. These credentials are stored securely via the Bloom app with end-to-end encryption, meaning you stay in control of the data. The Bloom app allows you to seamlessly share your credentials with third parties, allowing you to stay in control of your data and share the minimum amount of your personal information required to establish trust.
  • 12
    GlobaliD

    GlobaliD

    GlobaliD

    Portable, private, and secure identity. Claim your GlobaliD, get verified, create and join groups, communicate, pay and get paid online. At GlobaliD, we’re building a universal identity solution that is easy to use, ties users to unique names and transcends borders and institutions. We build a self-sovereign identity platform that enables everyday action for people and businesses. GlobaliD's privacy and security solutions help you protect your customers and win their trust, without compromising experience. Our platform delivers a convenient onboarding and single sign-on experience, while empowering users to build digital reputations and to maintain consent-based control over their personal data. Our solutions free our partners from the burden of data storage and security, while providing data integrity and maintaining compliance. From identity management to data security to messaging, GlobaliD’s full-fledged platform does it all.
  • 13
    OnboardID
    OnboardID helps you speed the process of getting customers live, while providing the best protection against fraudulent account creation. We provide you with a white-labeled version of our app that guides customers through the onboarding process, or an SDK to integrate with your own app. Many solutions fail to identify users who aren’t white males. OnboardID recognizes the widest diversity of skin tones to maximize your global reach. OnboardID reads over 5000 global ID documents and can be rapidly trained to read others as needed. If users can’t understand app instructions, they can’t complete the id validation process, forcing manaual intervention. OnboardID is available in 10 different languages, more than other solutions. Servicing a truly global clientele requires a solution that can read ID documents in native character sets. Unlike other solutions, OnboardID recognizes Cyrillic, Arabic and other alphabets to maximize your reach.
  • 14
    Cognito

    Cognito

    Cognito

    Smarter identity verification services and compliance solutions. Our APIs are easy to integrate and our dashboards are built to simplify workflows, not clog them. With robust documentation and hands-on support, you will be integrated in days not months. We've verified and screened millions of customers and have learned a thing or two about what works. Our APIs are built to make doing the right thing the default so you can focus on your business. Extensive API documentation, a dedicated Slack room for your company, and clients SDKs for the most popular programming languages make Cognito quick and easy to integrate. Data security and compliance sit at our core. Sensitive values like SSNs are encrypted on disks with AES-256 and we engage in regular organizational (SOC 2) and app-level security audits.
    Starting Price: $0.99 per identity
  • 15
    Dragonchain

    Dragonchain

    Dragonchain

    Dragonchain is blockchain and currency agnostic. Write your own smart contract to a Docker container. Push it up, interface with whatever public blockchain you want, and execute your own business data within minutes. Let Dragonchain enable you to build the private, secure, scalable and cost-effective solutions and services your business deserves, today. Innovators are already using the blockchain platform to create value and drive disruption in their industries. Dragonchain’s blockchain platform and blockchain development team can assist you in taking your proof of concepts from the testing stage to successful implementation and live production. Our Blockchain as a Service and software solutions provide everything a business needs to build, operate, govern, and grow a working blockchain network.
  • 16
    Web5

    Web5

    TBD

    Building an extra decentralized web that puts you in control of your data and identity. The web democratized the exchange of information, but it's missing a key layer: identity. We struggle to secure personal data with hundreds of accounts and passwords we can’t remember. On the web today, identity and personal data have become the property of third parties. Web5 brings decentralized identity and data storage to your applications. It lets devs focus on creating delightful user experiences, while returning ownership of data and identity to individuals.
  • 17
    Hyperledger Iroha
    Hyperledger Iroha is designed to be simple and easy to incorporate into infrastructural or IoT projects requiring distributed ledger technology. Hyperledger Iroha features a simple construction, modular, domain-driven C++ design, emphasis on client application development and a new, crash fault tolerant consensus algorithm, called YAC. Hyperledger Iroha is a simple blockchain platform you can use to make trusted, secure, and fast applications by bringing the power of permission-based blockchain with Crash fault-tolerant consensus. It’s free, open-source, and works on Linux and Mac OS, with a variety of mobile and desktop libraries. Hyperledger Iroha is a general purpose permissioned blockchain system that can be used to manage digital assets, identity, and serialized data. This can be useful for applications such as interbank settlement, central bank digital currencies, payment systems, national IDs, and logistics, among others.
  • 18
    KILT

    KILT

    KILT Protocol

    Experiment with our KILT Demo Client and request play money from the Mashnet Faucet. See how easy it is to build your own blockchain apps using our KILT SDK. Check out our running KILT blockchain nodes and look at live transactions happening on the KILT Blockchain right now! KILT is a decentralized identity blockchain network, with decisions made by the community of KILT Coin holders using a sophisticated system of governance. The vast amount of users on one service automatically generates a monopoly. Better services coming up have little chance of being recognized, and the monopoly service will not evolve as fast as it could because it does not fear competition. The amount of data collected by only a few services gives these services an unfair advantage in the age of artificial intelligence.
  • 19
    Identity.com

    Identity.com

    Identity.com

    We leverage industry-standard, open-source identifiers called Decentralized Identifiers (DIDs) to enable off-chain authentication. DIDs are a core component of building a native identity layer and can be viewed as a new type of global identifier. We have built and now maintain did:sol, the leading DID method on the Solana blockchain. Designed to both protect against cybercrime and satisfy regulators, the Gateway Protocol enables any business or application to meet identity requirements (such as KYC and AML) without developing their own identity verification system or data storage. Instead, identity verification is completed by gatekeepers in gatekeeper networks.
  • 20
    Concordium

    Concordium

    Concordium

    A blockchain that’s compliance ready with today’s and tomorrow’s economies. That enables private and public transactions. That offers high throughput, fast transactions, and predictable fees. That allows businesses, developers, and traders to harness blockchain’s true power and potential. Concordium’s decentralised blockchain technology is the first with layer-one ID built into the protocol. This means it offers forward-thinking businesses, application developers, and cryptocurrency traders unrivalled security, privacy, transparency and most importantly, compliance with regulations, if and when these come through. Utilizing zero-knowledge-proofs (ZKP) allows parties to verify information without exchanging or storing that information on-chain other than hash functions, so users can trust that their confidential business will become no one else’s business.
    Starting Price: Free
  • 21
    Nxt

    Nxt

    Jelurida Swiss

    Nxt is an open source blockchain platform and the first to rely entirely on a proof-of-stake consensus protocol. Launched in November 2013 and written from scratch in Java, Nxt is proof that blockchain technology is not only about simple transfer of value but also has the potential to revolutionize many aspects of our lives with the various decentralized applications that can be built with it. Today, Nxt remains one of the most tested and reliable platforms in the industry, influencing numerous other projects. With its many easy to use modular built-in features, Nxt covers most of the dApp use cases and at the same time is perfectly suitable for private blockchain implementations. Nxt was the first to implement a pure proof-of-stake consensus protocol.
  • 22
    Metadium

    Metadium

    Metadium

    Metadium powers identification, authentication and crypto transaction management, providing AML compliance and risk management solutions. Our technology is compatible with EVM and provides standard API/SDK, making the integration process fast and convenient. Metadium provides high security features appropriate for corporate compliance like setting node permissions and data encryption for privacy protection. As blockchain technology continues to be accepted and integrated into multiple industries, the need for compliance grows. Metadium’s second generation uses its advanced technology and experience to provide a new ecosystem of compliant services and solutions that serve as the bridge to blockchain’s true potential. Our evergrowing ecosystem includes identity and data protection, innovative metaverse platforms, and highly secure payment and asset management services.
  • 23
    Quadrata

    Quadrata

    Quadrata

    Start building trusted DApps and create a true bot-free experience with Quadrata Identity Passport. Sybil resistant decentralized identities, proof of humanity. Expanded institutional capital with KYC/AML. Increased capital efficiency. Prevent unfair advantage with unique identification. All-in-one Web3 KYC/AML plugin with ongoing monitoring. Swift passport creation with just a few lines of code. Quadrata Passport automatically syncs identity, compliance, and reputation-based data across multiple blockchain networks. Our ecosystem is ever expanding. Join our industry partners today and help create a trusted Web3 experience for all. Quantstamp is a trusted leader in blockchain security and delivers end-to-end blockchain solutions for the world's largest enterprises. CertiK has conducted over 1,800 audits across all major protocols and is trusted as the recommended blockchain and smart contract audit provider by top exchanges like Binance, OKEx, and Huobi.
  • 24
    Microsoft Entra Verified ID
    Start your decentralized identity journey with Microsoft Entra Verified ID—included free with any Azure Active Directory (Azure AD) subscription. Microsoft Entra Verified ID is a managed verifiable credentials service based on open standards. Digitally validate identity information to ensure trustworthy self-service enrollment and faster onboarding. Quickly verify an individual’s credentials and status to grant least-privilege access with confidence. Replace support calls and security questions with a streamlined self-service process to verify identities. Ensure that credentials are interoperable and reusable with a solution that supports open standards. Confidently issue and verify workplace credentials, citizenship, education status, certifications, or any unique identity attributes in a global ecosystem designed for more secure interaction between people, organizations, and things.
  • 25
    Tokeny

    Tokeny

    Tokeny

    Issue digital securities on a hyper-efficient infrastructure. Digitally onboard investors and embed transfer rules to enforce compliance. Codify legal obligations with smart contracts. Realize fast onboarding, cost-efficient management, and rapid transferability of real-world assets. Enforce compliance across the whole lifecycle. Apply control whilst utilizing blockchain technology with the ERC3643 protocol. Improve asset liquidity for your investors. Digitize securities on the most secure and cost-efficient blockchain infrastructure available in the market. Streamline the capital raising process and maximize the potential of your offering through a digital and seamless user experience. Control and manage issuer interfaces, automate corporate actions and digitally manage assets across the entire lifecycle. Embed transfer rules into the securities to enforce compliance and rapidly transfer securities to eligible investors.
  • 26
    ONTO

    ONTO

    Ontology

    One-step management of decentralized identity and data. Self-sovereign Verifiable Credentials powered by Ontology Network. It is a statement to confirm a claim made by one entity about another. The claim is accompanied by a digital signature that can be used by other entities for authentication. ONT Score is a decentralized review system for ONT ID user trust and can assess ONT ID users from multiple dimensions, including identity information, verification information, digital assets, and behavioral features. ONTO helps users create a decentralized digital identity built on Ontology blockchain which fully protect their privacy data through an encryption algorithm, aiming to provide a safe and convenient one-stop service for users worldwide.
  • 27
    Ontology

    Ontology

    Ontology

    Ontology supports identity authentication and data collaboration between users, vehicles, and third parties. Data can only be accessed, used and stored with the consent of the owner. Through the Ontology Trust Framework and Self-Sovereign Data Storage, a number of cryptographic algorithms are implemented to protect user identity and data privacy security. Each data exchange operation requires authorization and selective exchange can be achieved through authorization protocols and cryptographic algorithms. Traceability, authorization and authentication of personal data is possible through blockchain. In some cases, we integrate TEE technology to support data analysis and processing without privacy disclosure. It's time to reclaim control of your digital identity. ONT ID enables autonomous control of your private data. You decide if and when your data is accessible by others.
  • 28
    FYEO

    FYEO

    FYEO

    FYEO secures enterprises and individuals from cyber attacks with security audits, real-time threat monitoring and intelligence, anti-phishing solutions and decentralized identity management. End-to-end blockchain security services and auditing for Web3. Protect your organization and employees from cyberattacks with FYEO Domain Intelligence. Decentralized password management and identity monitoring services made simple. End user breach and phishing alert system. Uncover vulnerabilities and protect both your application and your users. Identify and address cyber risks across a company before you take on the liability. Protect your company from ransomware, malware, insider threats, and more. Our team works collaboratively with your development team to identify potentially critical vulnerabilities before they can be exploited by a malicious actor. FYEO Domain Intelligence delivers real-time cyber threat monitoring and intelligence to help secure your organization.
  • 29
    Affinidi

    Affinidi

    Affinidi

    At Affinidi, our vision is to revolutionize the current paradigm of digital identity, empowering individuals to reclaim ownership of data, regain control over digital identities, and actively engage in safeguarding privacy. Our concept of "holistic identity" encompasses the complete spectrum of discovering, collecting, sharing, storing, and even monetizing personal data in the digital realm. We enable individuals to possess a comprehensive integrated self-view in the digital world, exercise authority over their data, and make informed usage decisions. In the digital realm, our digital selves, constructed from attributes like names, ages, and locations, become fragmented as each site captures only partial aspects, leaving us exposed and vulnerable.
    Starting Price: $199 per month
  • 30
    Peer Mountain

    Peer Mountain

    Peer Mountain

    Peer Mountain goes beyond providing users with ownership and control over their cryptographically secure identities. It is an end-to-end application ecosystem that facilitates secure commerce and exchange of digital and physical services. Gain assurance of reliable and secure independent audits and claim verification. Only share and validate encrypted data according to transaction requirements. Segment services across Peer Mountain deployments securely and transparently. Control your data in a distributed system that makes hacking unfeasible. Peer Mountain serves consumers who want self-sovereign identity, service providers who need continuous, reliable compliance, and trust providers offering validation services who need trust interoperability and portability.
  • 31
    Remme Auth
    Create a unique Auth ID, fill in your first login profile with data like name and email and you're ready to go. Add as many profiles as you need to fit the websites and apps you use most. Auth allows you to build ecosystems where physical and digital experience blend together. Shop online and in store, log in to websites, unlock a car – all with a click of a button. Select flexible recovery options with biometric hardware-based security. Simply packaged to enhance protection. Every single day our digital identities are used to chat, order snacks, and buy stuff. It requires dozens of logins, new accounts, strong passwords, and personal info sharing.
  • 32
    Terradoxa

    Terradoxa

    Terradoxa

    We created Terradoxa to offer the world a new approach to digital personal services. In a world where trust is no longer decreed but earned, and challenged every day, Terradoxa creates a link of trust between people, organizations and administrations. We are citizens, engineers, caregivers and parents, we want to enable democracy to perpetuate its traditional objectives of freedom, equality and fraternity while the threat of digital dictatorship and mass manipulation becomes a reality. Europe is not immune to the use of misguided digital technology, the coupling of which with video surveillance would lock us in an open-air prison. A removable identity to guarantee anonymity by default.
  • 33
    CREDEBL

    CREDEBL

    CREDEBL

    Effortlessly define and tailor credentials with our user-friendly schema template. Customize credentials for employees, customers, students, citizens, or any user, incorporating detailed schema information and intuitive controls for seamless management. Seamlessly issue digital credentials and explore a comprehensive overview on the platform for efficient credential verification and management. Securely connect with and receive credentials from diverse organizations & ecosystems with a simple tap on your screen. Instantly share the verifiable proof of your digital credential certificates. Empower your identity with selective (partial) disclosure on our SSI mobile wallet. Seamlessly present only the data you choose with confidence. Alternatively, you can share your personal milestones (e.g. achievements in sports) on social media directly.
  • 34
    Sudo Platform

    Sudo Platform

    Anonyome Labs

    Sudo Platform is an API-first, developer-focused ecosystem that delivers the tools necessary to empower our partners to quickly and completely deliver to end-user consumers the necessary capabilities to protect and control their personal information while navigating the digital world. It provides a modular, quick to implement, and powerful collection of the most important digital privacy and cyber safety tools. including safe and private browsing, password management, VPN, virtual cards, encrypted and open communications, and decentralized identity. This developer-focused platform includes: Developer-focused documentation API-first ecosystem SDK source code via GitHub Sample applications for test-to-deploy of various capabilities Vendor-brandable (white-label) apps for quick go-to-market deployments.
  • 35
    Nuggets

    Nuggets

    Nuggets

    Whether you’re a bank, subscription service, telco or logistics company, Nuggets self-sovereign decentralized identity helps you deliver on your regulatory expectations while building competitive advantage. While your consumers enjoy more convenience, confidence and choice. With Nuggets, consumers get back control of their data and you become a champion of trust. Nuggets ties every transaction to a verified self-sovereign decentralized identity. This means the customer is verified as legitimate before they even connect to the service. This is a gold standard in digital identity, through private, secure proof of transactions. Nuggets ties every payment to a verified digital identity, preventing fraudsters from compromising identities online. Payment providers and merchants save money from reduced fraud, as well as delivering all the payment options customers want.
    Starting Price: Free
  • 36
    WWPass

    WWPass

    WWPass

    No need to remember, manage, reset, protect or exchange. Consolidation of all logins in one protected authentication token. Easy self-management of the authentication token. Log in with a universal, international digital identity, trusted if required and anonymous if allowed. All data is encrypted by the user with WWPass Key. No need for OTP, SMS, or other extra costly adaptive authentication and login support. User identity is protected by WWPass Key. WWPass MFA is a strong customer authentication compliant with GDPR and NIST. Each user gets a unique key, which helps to log in to an unlimited number of accounts and services without usernames and passwords. Log in to a growing number of online services with your WWPass Key as a universal key to the digital world. Enable next-generation strong multi-factor authentication without usernames and passwords. Simplify and streamline secure access to any business application without a username and password.
    Starting Price: Free
  • 37
    Trust Stamp

    Trust Stamp

    Trust Stamp

    Mitigate fraud, retain customers, and reach a broader base of users worldwide with AI-powered identity solutions at the intersection of biometrics, privacy, and cybersecurity. Trust Stamp delivers trusted identity systems at the heart of how organisations and individuals transact in the connected world and beyond. Trust Stamp's radical innovations in biometrics and data protection empower people to access more with identity that can be safely shared and stored. When our identity technology is used to open a bank account or access a public service, both the individual and organisation achieve higher levels of protection and confidence in the security of their data and the integrity of their systems. Trust Stamp's solutions elevate all sides of an identity system.
  • 38
    Verifiable

    Verifiable

    Verifiable

    A modern provider data engine delivering real-time verifications and powerful automation to simplify credentialing and provider network management. One place to manage all your provider data and workflows, onboarding, network management, and everything in between. Replace manual verification processes with automation to save time, money and be more compliant by removing human error. Deploy lightning fast verifications and advanced network monitoring wherever your business needs. Advanced credentialing and compliance monitoring to notify you of gaps before they become an issue. Get the most accurate, up-to-date data using our proprietary real-time lookups, all delivered via an API that integrates wherever you need. Finally, a healthcare API that is a pleasure to work with. Customize to your needs and seamlessly integrate with your existing systems and workflows.
  • 39
    IdRamp

    IdRamp

    idRamp

    Turn your digital identity strategy into a business asset, not a liability. Stop spending time, money, and headcount replatforming insecure identity technology. Simplify authentication complexities with decentralized zero trust Identity from Idramp. Bring order to your identity management chaos. Accelerate delivery of services to meet the speed of business. Eliminate expensive platform upgrade projects with rapid modular deployment. Relieve the pain of bespoke integration with rapid integration that automatically interoperates with existing infrastructure. Tailor your customer experience with a modular architecture that eliminates vendor stack lock-in. Add zero trust identity with automated security policies and adaptive access controls. Control extensible ecosystems with state of the art data protection. Never trust but always verify that your applications and people are safe.
  • 40
    walt.id

    walt.id

    walt.id

    We offer holistic digital identity and wallet infrastructure used by thousands of developers, governments and businesses across industries. The products are open source, based on open standards, compliant with digital identity regulations and available for self-management (on-premise) or as a managed service (SaaS). Our Digital Identity Infrastructure include the following products and functionality: Issuer SDKs, APIs & APPs: Issue credentials or mint tokens with our infrastructure and white label applications. Wallet SDKs, APIs & APPs: Launch a wallet for your organization, employees or customers to manage access, credentials and tokens. Verifier SDKs, APIs & APPs: Verify credentials or tokens, use powerful verification policies and white label apps. Identity Provider: Enable wallet-, credential- and token-based authentication and identification for your apps.
    Starting Price: Free
  • 41
    BlocTrust

    BlocTrust

    BlocWatch

    BlocTrust provides independent, third-party verification, and assurance along with continuous awareness of the health of your blockchain for private blockchains and DLTs. BlocTrust runs as an endorsement node within a private blockchain network: verifying and endorsing blockchain transactions, providing assurance to all blockchain participants, and demonstrating the accuracy and legitimacy of endorsed transactions. BlocTrust maintains an independent, validated ledger of blockchain transactions. This authoritative record proves vital for following compliance mandates and meeting audit requirements. Designed to be both comprehensive and impartial, you can turn to BlocTrust for addressing disputes among Blockchain participants. BlocTrust generates monthly attestations that summarize the health and activity of the blockchain and display the blockchain operation metrics.
    Starting Price: $2,500 per month
  • 42
    [D/Wallet]

    [D/Wallet]

    Desmo Labs

    Manage your digital identity, verifiable credentials, and digital assets, benefiting from a streamlined experience. Our blockchain-based platform securely manages infrastructure without exposing credential-generating data, allowing access only to permitted participants, and ensuring all actions and business processes are tamper-proof, and permanently recorded as blockchain transactions. Eliminating the often fluctuating and unpredictable fees associated with blockchain operations, making it ideal for widespread adoption. Additionally, it simplifies the user experience by removing the need to manage gas fees, enabling users to focus on their transactions and interactions within the blockchain ecosystem. Users benefit from the strong encryption of digital signatures ensuring their data is protected, while the use of social log-ins simplifies the access process. This integration provides a seamless, yet highly secure user experience, reducing potential friction.
  • 43
    Kaleido

    Kaleido

    Kaleido

    Create blockchain and digital asset solutions without the cost and complexity of building from scratch. Start small and rapidly move into production. Choose from popular cloud properties and hybrid deployment options, geographic regions, protocols, consensus mechanisms and more, all at the click of a button. Makes blockchain just another endpoint so you can accelerate development and deployment of your dapps. A robust, easy-to-use interface to manage everything about your blockchain networks and environments. Onboarding and scaling are built-in and instantaneous with automated tools and workflows so you can grow your business network with ease. Nodes, data and key materials are managed individually by each member. Scale the network with ease using distributed network ownership or single proxy operator. Manage your networks and memberships, users, environments, and more.
    Starting Price: $‍ 0.15 per node per hour
  • 44
    Neo

    Neo

    Neo Team

    The blockchain development platform. Neo provides a full stack of features out of the box, but doesn't keep you boxed in. Native functionality provides all the infrastructure you need to build complete decentralized applications, while advanced interoperability allows you to harness the power of the global blockchain ecosystem. Neo has a unique dual token model that separates governance from utility. NEO token holders are the owners of the network and are able to participate in governance. NEO holders also receive passive distribution of the network utility token, GAS - No staking required. GAS rewards are increased for voting participation. GAS is used to pay for network fees, smart contract deployments, and in dApp purchases.
  • 45
    Hyland Experience Credentials
    Hyland Experience (Hx) Credentials leverages blockchain technology to quickly, accurately and efficiently verify records in a secure, tamper-proof way. Powered by blockchain and Blockcerts Hx Credentials makes it easy to issue records in a format that is fully compliant with the open standard set by Blockcerts.org. Increase security Hx Credentials records are secure, tamper-proof and vendor-independent. All content is stored off-chain for maximum privacy. Prevent fraud Use cryptographic signatures to stop others from impersonating official records. Provides credential ownership to users Users and recipients own their records and can verify them anywhere through a set of APIs, or aggregate them to form lifelong records of achievement. Promote awareness Generate brand awareness with recognizable records that can be shared safely anywhere in the world. Integrate with third-party applications APIs make it easy to establish trust for critical information
  • 46
    Hyperledger Indy

    Hyperledger Indy

    Hyperledger

    Hyperledger Indy provides tools, libraries, and reusable components for providing digital identities rooted on blockchains or other distributed ledgers so that they are interoperable across administrative domains, applications, and any other silo. Indy is interoperable with other blockchains or can be used standalone powering the decentralization of identity. Distributed ledger purpose-built for decentralized identity, correlation-resistant by design. DIDs (Decentralized Identifiers) that are globally unique and resolvable (via a ledger) without requiring any centralized resolution authority. Pairwise Identifiers create secure, 1:1 relationships between any two entities. Verifiable claims are interoperable format for exchange of digital identity attributes and relationships currently in the standardization pipeline at the W3C. Zero Knowledge Proofs which prove that some or all of the data in a set of Claims is true without revealing any additional information.
  • 47
    IAP Network

    IAP Network

    Information Assurance Platform

    The IAP’s innovative combination of blockchain technology, zero-knowledge proofs and meta-consensus protocols allow for any of these parties to cryptographically prove the existence of evidence, states or activities to any interested party. Moreover, they allow for complete transparency without sacrificing the privacy of sensitive data. Allow any party to create a time-stamped proof of the existence of evidence, such as a legal document or an historical event. Third parties, such as auditors or consumers, can independently verify this proof without impinging upon the privacy or confidentiality of the original data.
  • 48
    VeriDoc Certificates
    VeriDoc Certificates offer you an end-to-end solution to store and send your certificates without thinking about how to send them, or will your certificates be secure, and also assures you 100% data transparency. You can now secure your certificates using blockchain technology, keeping your valuable certificates safe forever. With VeriDoc Certificates, your certificates become completely tamper-proof and safe from any scams & fraudsters. You can track, send, and verify the authenticity of any certificates without moving an inch from where you are. Now you can verify, send, and store certificates with ease. With VeriDoc Certificates, you can now store your certificates securely, send them to anyone and anywhere in the world, and verify the authenticity of all certificates whenever needed. VeriDoc Certificates store all your valuable documents in the blockchain which makes them tamper-proof and safe from any fishy activities.
    Starting Price: $30 per month
  • 49
    Factom

    Factom

    Factom

    The Factom Protocol is a data integrity protocol utilized by the U.S Department of Homeland Security and the Bill and Melinda Gates Foundation. The protocol provides easy integration into legacy systems without the need to handle cryptocurrency. Factom’s two token system provides a one-way burning of the volatile native token of the protocol into a non-tradeable fixed-value Entry Credit that allows entry of data onto the protocol. Companies and governments can now utilize a public blockchain without needing to handle volatile cryptocurrencies. Build powerful protocols, audit technologies, and DAPPS with ease using Factom's pure data architecture built for securing data.
  • 50
    3ntity

    3ntity

    Hypermine

    3ntity is a decentralized identity layer for the internet, giving users control of their personal data and identity whilst digital enabling trust for businesses.