Alternatives to Keyless Authenticator

Compare Keyless Authenticator alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Keyless Authenticator in 2024. Compare features, ratings, user reviews, pricing, and more from Keyless Authenticator competitors and alternatives in order to make an informed decision for your business.

  • 1
    Auth0

    Auth0

    Okta

    Auth0 by Okta takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO.
    Leader badge
    Compare vs. Keyless Authenticator View Software
    Visit Website
  • 2
    Cisco Duo
    Protect your workforce with simple, powerful access security. We're Cisco Duo. Our modern access security is designed to safeguard all users, devices, and applications — so you can stay focused on what you do best. Secure access for any user and device, to any environment, from anywhere. Get the peace-of-mind only complete device visibility and trust can bring. Respond faster to threats with an easy‑to‑deploy, scalable SaaS solution that natively protects every application. Duo's access security shields any and every application from compromised credentials and devices, and its comprehensive coverage helps you meet compliance requirements with ease. Duo natively integrates with applications to provide flexible, user-friendly security that's quick to roll out and easy to manage. It's a win, win, win for users, administrators, and IT teams alike. Lay the foundation for your zero-trust journey with multi-factor authentication, dynamic device trust, adaptive authentication and secure SSO.
    Leader badge
    Compare vs. Keyless Authenticator View Software
    Visit Website
  • 3
    Udentify

    Udentify

    Fraud.com

    Know the real identity of your customer, user, or employee with the Udentify Identity Verification and Biometric Authentication solution. Challenges we solve: - Identify verification - Onboarding - New account opening - Age verification - Fraud prevention - Biometric authentication - Passwordless authentication - Strong customer authentication - KBA replacement - KYC and AML compliance Behind the scenes, Udentify embeds cutting-edge technologies into our identity verification and biometric authentication solution via a lightweight and flexible SDK. We are constantly investing in our technologies to stay at the forefront of fraud detection, compliance, and user experiences.
    Compare vs. Keyless Authenticator View Software
    Visit Website
  • 4
    1Password

    1Password

    1Password

    1Password is a secure, scalable, and easy-to-use password manager that's trusted by the world's leading companies. Using 1Password makes it easy for your employees to stay safe online. Once 1Password is part of their workflow, good security habits will become second nature. 1Password Advanced Protection is now available with 1Password Business. Set Master Password policies, enforce two-factor authentication team-wide, restrict access with firewall rules, review sign-in attempts and require your team to use the latest version of 1Password. Our award-winning apps are available for Mac, iOS, Linux, Windows, and Android. 1Password syncs seamlessly across devices, so your employees always have access to their passwords. When everyone uses 1Password, your risk goes down — and your productivity goes up.
  • 5
    Beyond Identity

    Beyond Identity

    Beyond Identity

    Beyond Identity is fundamentally changing the way the world logs in–eliminating passwords and all phishable factors to provide users with the most secure and frictionless authentication on the planet. Our invisible, passwordless MFA platform enables companies to secure access to applications and critical data, stop ransomware and account takeover attacks, meet compliance requirements, and dramatically improve the user experience and conversion rates. Our revolutionary zero-trust approach to authentication cryptographically binds the user’s identity to their device, and continuously analyzes hundreds of risk signals for risk-based authentication.
    Starting Price: $0/ User/ Month
  • 6
    The OptimalCloud

    The OptimalCloud

    Optimal IdM

    The OptimalCloud platform is a full featured, award winning, SSO Federation & IAM solution that provides a single point of authentication, policy management and auditing for a seamless end user experience. The OptimalCloud is deployed in workforce and consumer scenarios, used by some of the most recognizable companies on the globe, and used in some of the most secure environments in the world. Each feature-rich pricing tier comes with multi-factor authentication (MFA), because proper security shouldn't cost extra. The OptimalCloud is integrated with more than eleven thousand applications, simplifying set up and configuration and also has 24 x 7 x 365 support with a guaranteed uptime of 99.99%.
    Starting Price: $2/user/month
  • 7
    Auth Armor

    Auth Armor

    Auth Armor

    Harness the power of biometrics on smartphones to make authentication easy for any application or website, creating a new approach to logging and authenticating online. Passwordless and 2-factor authentication that lets you authenticate your users with the smartphones in their pockets. Auth Armor puts secure authentication in the hands of every user — no weak passwords or cumbersome codes. We have built powerful APIs, SDKs, libraries, and dashboards to allow you to build what you want to build, how you want to build it. Use our tools to build authentication into any app, using any flow you would like. We offer Consumer facing and workforce protection, giving you the power and flexibility to secure anything, the way you need it. Auth Armor is the fastest and easiest mobile authenticator available. We support instant push messaging directly to user's devices enabling the fastest login and authentication experience.
    Starting Price: FREE for 10,000 active users!
  • 8
    Secret Double Octopus

    Secret Double Octopus

    Secret Double Octopus

    Secret Double Octopus (SDO) provides a “best-in-class” enterprise passwordless MFA solution. In addition to market-leading completeness of features, SDO’s solution is differentiated by its patented automated password rotation approach and flexibility around enabling a “passwordless journey”. Organizations that are apprehensive about the move to passwordless, can progressively achieve Full Passwordless™ by beginning with traditional MFA on desktops or for remote worker use cases and eventually “flipping the switch” when they are ready. The company recently won AITE Novarica’s highest distinction in an evaluation of all major solutions, and has been designated a Gartner Cool Vendor.
    Starting Price: $3/month/user
  • 9
    Authsignal

    Authsignal

    Authsignal

    Authsignal delivers a suite of drop-in authentication and fraud tools to enable consumer-focused businesses to securely authenticate customer identity, mitigate fraud and deliver seamless customer experiences. Trusted by modern product and identity teams around the world, Authsignal plugs into your existing technology stack to streamline the authentication of any customer flow or action in seconds. Effortlessly safeguard customer transactions, mitigate risks, and implement rules all within a single, user-friendly workspace. Easily deploy Passkeys, passwordless authentication, and deliver authentication uplift programs to secure customer data in days. Leverage Authsignal's no-code rules engine to deploy rules and safeguard customer data. - Integrate via OpenID Connect (OIDC). - Integrate with Auth0 - Integrate with ForgeRock - Integrate with Microsoft Entra, Azure AD B2C Marketplace integrations - Veriff - MessageBird - iProove And many more
    Starting Price: $99 USD Per Month
  • 10
    MIRACL

    MIRACL

    MIRACL

    World's fastest MFA with the highest login success rate above 99%. Highly secure, password-free login in just two seconds. MIRACL works on any device or browser, removing the barriers to authentication to optimise the the user experience, decrease costs, and win lost revenue. Protect your users. Simplify their journey. MIRACL Trust offers a safer, smoother authentication experience. One step. No passwords. No problem. Traditional multi-factor authentication is slow and cumbersome. MIRACL is a smoother, safer alternative to traditional MFA. 2 seconds to log in with error rates as low as 1/10th that of passwords. No passwords necessary. One PIN, and you’re in. Our cryptographic technology means that user info stays with users. MIRACL Trust offers an effortless login experience that puts users first, rolls out hassle-free, and keeps data locked up tight. PSD2 SCA compliant, GDPR compliant and satisfies NJ Gaming MFA requirements.
  • 11
    FusionAuth

    FusionAuth

    FusionAuth

    FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome. You'll get all the features your app needs plus a customizable, scalable solution you can run on any computer, anywhere in the world. FusionAuth was built from the ground up to easily integrate with any app, language, and framework. Every feature (yes, every single one) is exposed as an API giving you complete flexibility to handle any use case. You get every feature and acronym you need: registration & login, passwordless, SSO, MFA, SAML, OIDC, OAuth, JWT, social login, and more. Comply with GDPR, HIPAA, COPPA, and PCI requirements in seconds. FusionAuth installs on any platform, any computer, anywhere. Host it yourself or use FusionAuth Cloud, our fully managed SaaS hosting service.
  • 12
    Ping Identity

    Ping Identity

    Ping Identity

    Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.
    Starting Price: $5 per user per month
  • 13
    Authy

    Authy

    Twilio

    Enable 2FA for your favorite sites. Go beyond the password and protect yourself from hackers and account takeovers. Simple to setup, secure cloud backup, multi device support. Defeat cyber criminals & avoid account takeovers with stronger security, for free! Watch the video below to learn more about why you should enable 2FA for your accounts. Relying on just usernames and passwords to secure your online accounts is no longer considered safe. Data breaches occur daily and hackers are always inventing new ways to take over your accounts. Protect yourself by enabling two-factor authentication (2FA). This blocks anyone using your stolen data by verifying your identity through your device. Enable 2FA now to protect your accounts online.
  • 14
    IDmelon Authenticator

    IDmelon Authenticator

    IDmelon Technologies

    IDmelon Authenticator, a mobile app available on Google Play and App Store, allows you to use your ubiquitous smartphone into a FIDO certified security key so as to easily and securely log into websites, online accounts, and apps on your PC. This means when you want to log into your accounts such as Microsoft or GitHub, instead of the traditional way of presenting your username and password, you add a layer of security by using your username and security key., which is an easier, stronger, and phishing-resistant way of authentication. In addition to it, IDmelon Admin Panel, which is a dashboard available on our website for login to manage users and security keys, enables organizations to deploy passwordless authentication within their companies overnight to protect their data and workforce.
    Starting Price: $5.99/user/year
  • 15
    Bravura OneAuth

    Bravura OneAuth

    Bravura Security

    Immediately protect your organization against two of the most prevalent cyberattacks: phishing and brute force attacks by eliminating the threat vector of passwords with Bravura OneAuth powered by HYPR. Provide your workforce with a passwordless sign-in experience that delivers on speed, simplicity, and significantly increased security across your security fabric. Bravura OneAuth uses one-touch biometrics that acts as access points making authentication for your workforce as easy as unlocking a cell phone yet significantly more secure than traditional Multi-Factor Authentication (MFA) solutions. It replaces traditional, tedious, and poorly adopted MFA methods and removes passwords entirely from the solution to reduce the risk of compromised credentials.
  • 16
    Veridium

    Veridium

    Veridium

    Veridium is the most comprehensive Integrated Identity Platform powered by AI-based Behavioral Biometrics, enabling Multi-Factor Authentication (MFA), digital ID verification, and a true enterprise-grade passwordless experience for employees and customers. Low code, agile, and flexible. Eliminating the password for customers removes the friction often associated with passwords and delivers increased security for online connections with our single step multi-factor authentication solution, while providing higher levels of identity assertion for organizations. Veridium provide an end-to-end authentication platform for all your WFH needs and any VPN solution, delivering strong, multi-factor, passwordless workforce authentication.
  • 17
    HYPR

    HYPR

    HYPR | The Passwordless Company

    HYPR fixes the way the world logs in. Organizations are faced with the challenge of achieving secured and seamless authentication coupled with a flawless user experience at a time when it’s more critical than ever. HYPR’s passwordless multi-factor authentication (PMFA) platform decouples authentication from the organization’s current and future identity providers and eliminates the traditional trade-off between security and user experience by providing uncompromising assurance and consumer-grade experience with true passwordless and phishing-resistant MFA. The solution is trusted by more than 60M users worldwide. With deployments taking hours rather than weeks or months, organizations decrease the risk of attack, increase positive user experience, and lower operational costs.
    Starting Price: $4.00 per user/month
  • 18
    LastPass

    LastPass

    LastPass

    LastPass is a cloud-based password manager available on any system or device, ensuring credentials are protected, private, and always within reach. Simple to set up and effortless to use, LastPass delivers the world's most convenient password management experience for consumers and businesses of all sizes and technical requirements. Say goodbye to password fatigue by generating, sharing, accessing, and managing credentials at the click of a button, while preventing bad actors from accessing precious data and account logins. Businesses also utilize LastPass to consolidate their tech stacks or to fill access management gaps with native integrations for MS Entra, Okta, and other IdPs and IAMs. With over 100 customizable policies, flexible privileges, detailed reporting, MFA and passwordless authentication options, LastPass makes it easy for organizations with numerous logins and increasing security risks to standardize password management company wide.
    Leader badge
    Starting Price: $4 per user per month
  • 19
    Entrust Identity as a Service
    Cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). Secure access to apps, networks, and devices for all of your users — with cloud-based multi-factor authentication. Proximity-based login, adaptive authentication and other advanced features contribute to an optimal user experience. Happy users don’t try to circumvent security measures. Everyone wins. This is easier than anything else you’ve tried. Work-saving touches — like built-in provisioning tools and on-premises and cloud integrations — reduce the workload for IT, from deployment through everyday management. Get strong IAM to move faster into the future. Cloud-based Identity as a Service scales quickly to accommodate new users, expanding use cases, and evolving security threats.
  • 20
    ThumbSignIn

    ThumbSignIn

    ThumbSignIn

    Any channel, any device – we’ve got you covered. Choose from our suite of user-friendly authentication solutions, from 2FA to passwordless biometrics, to find the right authentication for your business and users. Start with 2FA and progress to more advanced technology like biometrics-based authentication to continue improving user experience and security over time. Our SaaS-based authentication service, REST APIs , mobile SDKs and UI widgets deliver a powerful combination of software components that can be used to build omni-channel authentication experiences that span mobile, web, phone, IoT, chatbots, kiosks, physical access and more. It’s time to take the security burden off of users! Our mission is to democratize access to strong authentication technology and make the digital world safer for everyone. ThumbSignIn provides cost-effective, scalable SaaS-based solutions to help companies select the best way to strengthen their existing systems with two-factor authentication (2FA).
    Starting Price: $3 per user per month
  • 21
    Secfense

    Secfense

    Secfense

    Protect your company, employees, and customers with simpler and stronger authentication. Deploy 2FA in minutes, not weeks. 2FA (and other user access security policies) built into the fabric of the infrastructure, not rigidly fixed to the applications. Enabling the use of any 2FA methods available on the market now and in the future without changing the core. Protection is available across the entire organization, spanning from on-premise, public and private cloud. Secfense is deployed in between your users and the applications they access. It learns the traffic patterns related to authentication. It can then enforce multi-factor authentication login and other sensitive actions without interfering with the applications existing code or database. Up-to-date 2FA methods are always available on the platform. Application changes don’t affect Secfense and applied methods. Take control over session expiration rules across all apps. Don’t rely on VPNs, base trust on users and their devices.
  • 22
    Microsoft Authenticator
    Go passwordless. Enter your username and confirm your sign-in with your phone. It’s that easy! Passwords can be forgotten, stolen, or compromised. With Authenticator, your phone provides an extra layer of security on top of your PIN or fingerprint. Use Authenticator to sign-in to Outlook, OneDrive, Office, and more. Protect all of your accounts with two-step verification. The app also helps you secure all of your online accounts by using the industry standard time-based OTP (one-time password) codes.
  • 23
    It'sMe

    It'sMe

    Acceptto

    Employees hate using passwords as much as you hate managing password vulnerabilities. More passwords and tokens lead to greater security risk, fatigue, and cost. It’s time to get rid of them for good. 89% of security professionals claim that a more advanced multi-factor authentication tool that provides continuous, behavioral authentication would improve their company’s security posture. Acceptto provides users with Intelligent MFA that intuitively authorizes access to applications and continues authenticating post-authorization. We prevent account takeovers, even if hackers have already acquired passwords. ItsMe™ Intelligent Multi Factor Authentication (MFA) increases your security by authorizing access attempts to a registered device in real-time, be it through a push notification or verification code (SMS, TOTP, email, and etc.). With our timed based one-time password (TOTP), security key, or biometric options, you can authenticate access even when offline.
  • 24
    PortalGuard

    PortalGuard

    BIO-key International

    BIO-key PortalGuard IDaaS is a single, flexible cloud-based IAM platform that offers the widest range of options for multi-factor authentication, biometrics, single sign-on, and self-service password reset to support a customer’s security initiatives and deliver an optimized user experience – all at an affordable price point. For over 20 years, industries such as education, including over 200 institutions, healthcare, finance, and government have chosen PortalGuard as their preferred solution.Whether you’re looking for passwordless workflows, support for your Zero Trust architecture, or just implementing MFA for the first time, PortalGuard can easily secure access for both the workforce and customers whether they are remote or on-premises. PortalGuard’s MFA stands out above others as it is the only solution to offer Identity-Bound Biometrics that offer the highest levels of integrity, security, accuracy, availability and are easier to use than traditional authentication methods.
  • 25
    Yubico YubiKey
    Protect your digital world with YubiKey. Stop account takeovers, go passwordless and modernize your multifactor authentication. Get the world’s leading security key for superior security, user experience and return on investment. Designed for personal and business use, the YubiKey comes in a variety of shapes and with different features to fit your needs. Take our quick Product Finder Quiz to find the right key for you. The YubiKey works with hundreds of services and software applications. We’re here to guide you getting started whether for personal or business use. The industry's #1 security key, enabling strong two-factor, multi-factor and passwordless authentication. With a simple touch, the multi-protocol YubiKey protects access to computers, networks, and online services. No more reaching for your smartphone, or re-typing passcodes. Just plug in your YubiKey, tap, and it does the rest for you.
  • 26
    Unikname

    Unikname

    Unikname

    Prevent phishing hack attempts of your web accounts in integrating the next-gen strong authentication that secures all your web access. Protect your admin account of all your websites that you manage. Offer your clients a password-less experience of registration. Add the next-gen social authentication that respects the privacy life. Easily manage the web access rights of your employees and partners. Install the Unikname solution for all web environments you need in minutes! Easily manage your trust certificates and web access from the dashboard dedicated. Manage the access rights of admins and website users. Enable Unikname as the default authentication system. Disable standard authentication. Fine-tune the style options of the Unikname login button. Unikname relies on the latest OAuth and OpenID Connect authentication protocol standards and allows to generate a trust certificate attached to your web domain name.
    Starting Price: €150 per year
  • 27
    Cipherise

    Cipherise

    Cipherise

    With over 5000 SAML integrations, experience seamless and secure connections with Cipherise - the platform that offers infinite ways to connect with your employees and customers. By integrating with Cipherise, you can easily build authentication into any app, and offload customer identity management to create delightful experiences quickly. With Cipherise's mutual, bi-directional authentication, you get the security, scalability, reliability, and flexibility to build the stack you need. You will know the person who registered continues to be that person, and they know you are you. Plus, you can protect and enable your employees, contractors, and partners with Cipherise enterprise solutions - no matter where they are. One of the key features, that separate Cipherise from all others - Cipherise eliminates Mass Data Breaches. An attack is limited to one user on one system. Additionally, we store no passwords. Cipherise streamlines your identity and access management needs.
    Starting Price: $30 per user per month
  • 28
    Centagate Cloud

    Centagate Cloud

    Centagate Cloud

    CENTAGATE CLOUD offers a centralized login option that protects all applications from security breaches by using FIDO2 passwordless authentication. Control, protect and secure your application access. One login credential for all applications. A system that has strong digital security which eliminates phishing, fraud and password theft. Since the authentication is centralized, only one login credential is needed for all applications. Highly cost-effective with zero CAPEX and minimal OPEX. Some of important features that makes your authentications with CENTAGATE CLOUD more secured and protected. An authentication that requires two or more factor like what you have (device), what you are (biometrics) and what you know (password). An authentication based on previous login’s risk and behavior. Evaluating these risk could stop any trials of security breach. Pre-integrated certified Securemetric FIDO2 server for registration and authentication.
    Starting Price: $2 per month
  • 29
    AuthN by IDEE
    Award winning, Enterprise-wide, Zero Trust Authentication as a Service. AuthN™ by IDEE eliminates all password based risks and reduces the cost of administrative overhead. Your fastest time to market for your transition to passwordless across the enterprise. AuthN™ is interoperable and can be deployed in addition to your existing SSO, hardware-token and password-management investments. Whether stand-alone or integrated, realize a tangible reduction of your risk exposure by completely removing the password. Insider threats and human errors are also reduced with no central credential databases of any kind. Our completely passwordless multi-factor authentication can keep your attackers at bay and keep you out of the headlines of tomorrow. Your favorite applications, SSO and password managers receive a plug & play security upgrade. AuthN™ supports open standards (e.g. RADIUS, SAML, OIDC) and offers custom plugins to help you leverage the additional benefits of AuthN™.
    Starting Price: €3 per user per month
  • 30
    WinMagic MagicEndpoint
    As a leading developer of cybersecurity solutions for over 25 years, WinMagic has entered the passwordless secure authentication market in 2022 by releasing MagicEndpoint. Leveraging our pedigree and experience in protecting endpoints and data-at-rest, MagicEndpoint is referred to as the most secure authentication solution with the best possible user experience – no user action required! MagicEndpoint ensures that CISOs and cyber security professionals can easily implement passwordless authentication, addressing their cyber security needs, while eliminating password friction and reducing password management costs. MagicEndpoint addresses a growing industry need for precise, strong user authentication while still protecting the data security within devices, servers, and networks.
  • 31
    FortressBA

    FortressBA

    Fortress Identity

    Strengthen security and eliminate passwords with a mobile and web biometric user authentication solution. Fortress Identity is simplifying everything about secure authentication by introducing a biometric API into the equation. Implement voice authentication directly in the browser and expand to include the user’s smart phone for true multi-factor authentication. Secure account access and transaction authentication. Secure account access and transaction authentication. Strengthen security to corporate intranets and extranets. Reduce IT overhead cost for password reset. Create an omni-channel unified authentication platform. Protect access to medical records and patient data. Control door access to restricted areas and venues. Use a single API call for authentication and a single API call for enrollment. Use RESTful API to request user authentication (Voice, face, fingerprint).
  • 32
    Trusona

    Trusona

    Trusona

    Trusona, the pioneering leader of passwordless authentication for digital businesses, provides a phishing-resistant alternative to passwords and SMS OTPs. Trusona Authentication Cloud is a passkey-as-a-service platform, offering the simplest, quickest and least expensive way to add passkeys to your website. It improves business growth and profitability with sign-ins that delight your customers, mitigating top threats like phishing and account takeovers (ATOs) while providing a UX designed for the way people live. Organizations in iGaming, travel, financial services, healthcare and more, trust Trusona for their passwordless authentication initiatives.
  • 33
    Axiad Cloud

    Axiad Cloud

    Axiad Cloud

    Systematically authenticate across all users, machines, and interactions with a cloud-based, complete, and flexible authentication platform. Axiad helps organizations move to a passwordless future without the friction and risk of fragmented solutions and ultimately improve their cybersecurity posture and empower their end users. Establish best practices for user security, eliminate silos, and meet compliance requirements with enterprise-grade passwordless MFA. Establish best practices for user security, eliminate silos, and meet compliance requirements with government-grade phishing-resistant authentication. Go beyond an in-place IAM product, establish best practices for user security, and meet compliance requirements with passwordless and phishing-resistant MFA. Enhance machine identity authentication and improve overall security with a unified, highly customizable PKI solution.
  • 34
    Transmit Security

    Transmit Security

    Transmit Security

    The Future of Authentication Is Passwordless. Agile. Instant. Versatile. Eliminate passwords to deliver powerful identity experiences that delight you and all your users. Wherever, whenever. Strong and seamless customer authentication from any device or channel. Use the mobile as the authenticator. Powered by a network of trust to identify each and every user. This is instant technology and installation that gives the ultimate experience and impact. Turn complex authentication, authorization and risk policy decisions into simple journeys. Enjoy flexible policy orchestration engine for all applications and channels. Protect your workplace and workforce whether in the office or remote. No matter what location or device enjoy the benefits of risk based technology that provides impenetrable security. Go passwordless and keep your enterprise secure.
  • 35
    Acceptto eGuardian
    Acceptto monitors user behavior, transactions, and application activity to create an enriched user profile within each application landscape and subsequently verify if access attempts are legitimate or a threat. No passwords or tokens are required. Acceptto’s risk engine calculates whether an access attempt is legitimate or not by tracking user and device posture pre-authentication, during authentication, and post-authorization. We deliver a continuous, step-up authentication process with real-time threat analytics in an age when identities are persistently under attack. Based on a risk score computed by our proprietary AI/ML algorithms, a dynamic level of assurance (LoA) is computed. Our approach automatically finds the optimal policy for each transaction to maximize security while minimizing friction for the user with machine learning and AI analytics. This provides a smoother user experience without sacrificing enterprise security.
  • 36
    LoginTC

    LoginTC

    Cyphercor

    Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more with it's innovative 2fa software. LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more. LoginTC was built with the principle that administrators are users too, and offers a solution that's not just easy for end users day-to-day, but is also simple for administrators to manage and setup. In fact, if you aren't set-up in one hour, the first month of your subscription is on us. LoginTC can help you reduce your insurance costs and meet compliance regulations with ease.
    Starting Price: $3/month/user
  • 37
    LoginID

    LoginID

    LoginID

    With just a few lines of code, LoginID enables websites and apps to integrate FIDO/FIDO2 certified multi-factor authentication via our easy to use SDKs and APIs. Our platform leverages the biometrics on the end user's device to create a private key, public key pair that allows for seamless strong customer authentication. No app installation is required and the private key is stored securely on the end user's device, never leaving. Additionally, LoginID offers Transaction Confirmation, where a transaction can be cryptographically signed providing proof of the user’s confirmation of that specific transaction, which is perfect for merchants who want payment authentication services. LoginID is aligned with PSD2, GDPR, CCPA, and HIPPA. We have SDKs for iOS, Android, React-Native, Web, Python, Java, and Node as well as a WordPress Plugin.
  • 38

    BioSig-ID

    Not Available

    BSI is a cybersecurity company that identifies and eliminates cheating, identity theft, and fraud with a written password. We analyze not what is written but how it is written. Our technology identifies and stops impersonators intent on illegal activities. Clients choose us because our technology is user-friendly, yet highly accurate. In fact, surveys show that 46% of first-time users reported the technology was “Entertaining”, while 98% agreed it’s more secure than a typed password. To the small group who write about difficulties please visit our help desk open 24x7, complete with self-help articles (found by selecting the “?” icon when you enroll or authenticate). As with most things, you must prepare yourself and read or watch our how-to instructions. With over 100M authentications completed worldwide, we report that approximately 99.97% of users experience no problems using our technology. Clients love what we do for them with pages of testimonials on our site.
  • 39
    RSA SecurID

    RSA SecurID

    RSA Security

    RSA SecurID enables organizations of all sizes to mitigate identity risk and maintain compliance without impeding user productivity. It ensures users have appropriate access and confirms they are who they say they are with a modern, convenient user experience. In addition, RSA SecurID provides unified visibility and control across organizations’ many islands of identity. RSA SecurID marries multi-factor authentication with identity governance and lifecycle controls to address the security challenges associated with delivering convenient access to dynamic user populations across complex environments. It evaluates risk and business context to provide identity and access assurance. Digital transformation creates unprecedented authentication, access management and identity governance challenges for organizations. After all, more users need access to more systems from more devices than ever. RSA SecurID helps organizations address these challenges—and the identity.
  • 40
    Hideez

    Hideez

    Hideez

    Hideez Authentication Service is a comprehensive security solution designed to meet the needs of businesses of all sizes. The service includes a range of features designed to enhance security and streamline access control, including secure password management, multi-factor authentication, passwordless SSO and a range of other security tools. With Hideez Service, businesses can manage all of their passwords, securely storing them in an encrypted hardware tokens (Hideez Keys), or try passwordless authentication and contactless desktop logins with a mobile app (Hideez Authenticator). Hideez Server manages authentication tokens, centralizes endpoints associated with them, and stores digital identity information, such as roles, permissions, and other settings. This helps to reduce the risk of password-related cyber threats, such as phishing and credential stuffing.
  • 41
    TraitWare

    TraitWare

    TraitWare

    TraitWare is Real Passwordless Multi-factor authentication (MFA) for True Zero Trust Access. TraitWare's enterprise-class, patented, plug-and-play solution combines Passwordless MFA and SSO – eliminating the need for usernames and passwords, while reducing friction for the user, and increasing security for your company. AND, you’ll save 60% or more on support budgets. With our QR solution, we can also eliminate the need for a username. Not only is our software convenient and easy to use, but it virtually eliminates vulnerabilities associated with traditional username and password logins. By replacing usernames and passwords we eliminate the ability to phish them. Leveraging our Direct login or our QR scan ties a user to the login, eliminating credential theft or sharing.
  • 42
    NoPass

    NoPass

    NoPass

    NoPass™ is a multi-factor authentication add on for remote users. In addition to the username and password, NoPass™ performs two additional factors of authentication – something you have and something you are. This utilizes smartphones and does not require the purchase of additional hardware authentication devices for each user. It also does not use SMS, which can also be costly and is vulnerable to being intercepted. With the increase in phishing and other identity attacks in our day and age, authentication that requires a username and password (like RADIUS) can be potentially at risk. Sophisticated social engineering schemes and clever tactics can fool even the savviest of users. In order to combat this, Identité™ has introduced its NoPass™ Employee MFA solution, a lightweight feature that enhances the overall security and is adaptable with the leading authentication protocols that are in the market.
  • 43
    1Kosmos

    1Kosmos

    1Kosmos

    1Kosmos enables passwordless access for workers, customers and citizens to securely transact with digital services. By unifying identity proofing and strong authentication, the BlockID platform creates a distributed digital identity that prevents identity impersonation, account takeover and fraud while delivering frictionless user experiences. BlockID is the only NIST, FIDO2, and iBeta biometrics certified platform that performs millions of authentications daily for some of the largest banks, telecommunications and healthcare organizations in the world.
  • 44
    GateKeeper Proximity Enterprise

    GateKeeper Proximity Enterprise

    Untethered Labs, Inc.

    Passwordless, proximity login to PCs, Macs, websites, and desktop applications. Hands-free, wireless 2FA and password manager through active proximity-detection. IT admins can dynamically allow users to log in to their computers and websites with a physical key either automatically, by touch, by pressing Enter, or with a PIN. Seamlessly login, switch users, switch computers, and logout without passwords, touch, or trouble - just a key. Once a user walks away, the computer will lock, blocking access to the computer and web passwords. With continuous authentication, users are always being checked to ensure that they require access. No more typing passwords. Admins and compliance can now automate password security from a central admin console: enforce stronger passwords, enforce 2FA, and give employees the power of password-free login without interrupting workflow. Reduce helpdesk tickets related to forgotten passwords/password resets. Login and auto-lock with proximity.
  • 45
    IBM Security Verify
    Infuse cloud IAM with deep context for risk-based authentication to enable frictionless, secure access for your consumers and workforce. As organizations modernize hybrid multi cloud environments using a zero-trust strategy, identity and access management can no longer remain siloed. In a cloud environment, you need to develop cloud IAM strategies that use deep context to automate risk protection and continuously authenticate any user to any resource. Your journey should match your business requirements. Maintain existing investments and protect on-premises applications as you design and customize the right cloud IAM architecture to either replace or complement your infrastructure. Your users want one-click access from any device to any application. Onboard new federated applications to single sign-on (SSO), embed modern multi-factor authentication (MFA) methods, simplify logistics and give developers consumable APIs.
  • 46
    Say-Tec

    Say-Tec

    Finnovant

    Say-Tec is our flagship cybersecurity product, it combines state-of-the-art biometric technology with blockchain technology to ensure the safety of your data. Say-Tec eliminates the need for multiple passwords by using your unique face and voice biometrics to unlock a device, login to an account, and access your private data. Standard web interfaces could include invoking Say-Tec during account set-up, or during the log-in process, or resetting a password when it has been forgotten. Say-Tec can completely replace the user-id and password friction of logging into a website. Say-Tec has been tailored to support the world of decentralized apps, websites, and processing, which is commonly encountered with Blockchain access, cryptocurrency, and crypto wallets and exchanges.
  • 47
    Ory

    Ory

    Ory

    The missing web-scale API for identity and access control. 10x your security, user experience, and PII compliance today. Build secure apps on top of the Ory Network and reach new customers in any geopolitical region of the world with the best login experience ever. Login is more than a username and password. Building it from the ground up is time-consuming and dangerous. Ory's API-first microservice architecture makes it straightforward to integrate projects at any stage. Pay for usage, not features. Get advanced multi-factor to auth on every Ory subscription plan. Plus advanced permissions, SSO, OAuth2, OIDC, multi-tenancy, and so much more. Ory is made for high-performance, high-scale applications in any cloud. Built with developers in mind, Ory lets you quickly build your on-brand user experience and integrate it into your software stack. Ory's focus on open standards and automated data import capabilities makes migrating from legacy systems straightforward.
    Starting Price: $29 per month
  • 48
    LoginRadius

    LoginRadius

    LoginRadius

    LoginRadius empowers businesses to deliver a delightful customer experience without compromising security. Using our customer identity platform, companies can offer a streamlined login process while protecting digital accounts and complying with data privacy regulations. LoginRadius serves over 3,000 businesses with a monthly reach of 700 million users worldwide. Key platform features include registration services, adaptive security, integration with third-party applications, and customer insights. The company has been named an industry leader in customer identity and access management (CIAM) by Gartner, KuppingerCole, and Computer Weekly. Microsoft is a major technology partner and investor. LoginRadius is headquartered in Vancouver, Canada, with additional offices in Toronto, USA, United Kingdom, Australia, and India. LoginRadius Services: API Authentication OAuth Data Management Secure Login Single Sign On SAML SSO Social Sign On Two Factor Authentication
  • 49
    Nomidio

    Nomidio

    Nomidio

    The world's most advanced unified Identity and Authentication Service. At Nomidio we specialise in protecting identities. Using our federated identity cloud, we liberate companies from holding unnecessary PII and enable secure customer identification for loan applications, verification of customers to access account information and much more. It all starts with the Nomidio Identity Cloud, which is an incredibly secure, quantum-ready, identity vault. The ID cloud delivers multiple identity services to multiple organizations, removing the need and expensive risk to companies of propagating identity data as is the standard today. The identity data is secured using our parent company’s patented Quorum multiparty split key cryptography, meaning that anyone wanting to decrypt any one record will require the compliance of other holders of the key fragments. Nomidio IDC is a light touch, highly effective biometric identity and authorization tool, 100% SaaS and can be deployed in minutes.
    Starting Price: $3.88 per user per month
  • 50
    LogMeOnce

    LogMeOnce

    LogMeOnce

    A formidable cyber security defense should be mindful to thwart internal and external threats. External and internal threats have one common denominator. The end user’s adherence to security, policy, and best practices. External elements exploit an unsuspecting internal user’s adherence to sound security policies to find their way in. Granted, external threats can be addressed with various mechanisms such as firewalls, but, inherently it has its roots and seeds in weak internal shortcomings. However, you can easily curb internal threats by simply establishing “automatic & enforceable” security policies, advising end-users to adhere to secure access protocols with trusted credentials. Thankfully, LogMeOnce Patented Technology offers plenty of ways to protect your team members, credentials, and agency with advanced automated authentication. LogmeOnce dashboard creates powerful and unified access to a user’s entire disparate/numerous set of applications.
    Starting Price: $3 per user per month