Alternatives to MasterKey

Compare MasterKey alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to MasterKey in 2024. Compare features, ratings, user reviews, pricing, and more from MasterKey competitors and alternatives in order to make an informed decision for your business.

  • 1
    Zengo Wallet
    Zengo is the only self-custodial wallet with no seed phrase vulnerability, making it in effect the most secure wallet. Store, buy, sell, earn, trade, and send over 180+ crypto and Web3 assets, all with the power of MPC security, a guaranteed recovery model, and unparalleled 24/7 customer support. Protect and manage all of your cryptocurrencies and NFTs: What makes Zengo the most secure crypto wallet? Zengo’s unparalleled security is due to its industry-first, enterprise-grade, self-custodial Multi-Party Computation security, a secure recovery model, and premium Zengo Pro offerings. Since its launch in 2018, Zengo has not had a single security incident, and is trusted by over 1 million users.
    Leader badge
    Partner badge
    Compare vs. MasterKey View Software
    Visit Website
  • 2
    Atomic Mail

    Atomic Mail

    Atomic Mail

    Atomic Mail is a secure and user-centric email hosting provider, dedicated to offering privacy-first email services. With features such as alias creation, robust security measures, and seamless account recovery, AtomicMail ensures your email experience is both private and hassle-free. Creation of Aliases (Hide-my-email): Maintain your privacy by creating multiple email aliases; Spam Free, No Ads; Email Password Protection; End-to-End Encryption: only you and your intended recipient can read the message; Zero Access Encryption: Atomic Mail cannot access your emails; Account Recovery with Seed Phrase: Recover access to your account with a unique seed phrase. Can regain control of your email account without compromising security.
  • 3
    UniPass

    UniPass

    UniPass

    Gain peace of mind without using seed phrases, solving crypto adoption key challenges. Pay the gas with any token in any chain. Compatible with all fastest-growing EVM+ blockchains and dApps. Take full control of wallet through on-chain email social recovery. A truly non-custodial, ERC-4337 compatible contract wallet. Easily login via email and password, no blockchain knowledge required. The gaming services can pay the gas for players, or players can pay the gas with the game token. Packaged token transfer, NFT transfer, SWAP, contract call and other complex operations into one transaction. Support ERC20, ERC721 and ERC1155 tokens and connected to all integrated EVM compatible chains. Authorize an asset-independent key to authenticate the user‘s frequent social operations. Aggregate multi-chain‘s assets and identities to form a on-chain reputation system.
  • 4
    Keevo

    Keevo

    Keevo

    Take control of what is yours. Become your own bank. At the heart of Keevo’s revolution in security is our patent-pending Multi-Factor / Multi-Signature Authentication system. And, with our dual chip architecture, private keys are never stored anywhere! Instead, they’re created for every transaction with any 3 out of 4 Factors which never leave Keevo’s EAL 5+ secure MCU and Carbon Key™ Seed phrases suck. They are difficult to remember and are usually stored on piece of paper, which is incredibly insecure. With Keevo’s revolutionary Multi-Factor and Multi-Signature Authentication system and dual chip architecture, private keys are never stored anywhere. Instead, they’re created for every transaction when you authenticate using three of the four factors. No need to share private keys. Simply name a beneficiary and have them encrypt their password and fingerprint on Your Keevo Carbon Key™.
    Starting Price: $3.99 per month
  • 5
    SOURCE.ID

    SOURCE.ID

    Desmo Labs

    Offering secure, private, flexible, and auditable identity verification solutions. Empowering individuals to curate their profiles, control data sharing, and offer issuers the ability to swiftly verify credentials, thereby fostering a trusted platform for all participants. Built-in AML and KYC solutions with standardized interfaces, allowing for open ledger identification verification. Digital signatures for universal authentication and provide tamper-proof with verifiable credentials. Decentralized Identity (DID) technologies streamline the verification process, reducing the time from weeks to mere seconds for tasks ranging from accessing public services to opening a bank account. Simultaneously, they provide easily verifiable credentials, significantly minimizing the manual labor required from front-desk employees. Digital signatures and tamper-proof can be operated with no seed phrases and gas fees.
  • 6
    XDEFI Wallet

    XDEFI Wallet

    XDEFI Wallet

    XDEFI Wallet is a Chrome browser extension that allows users to swap, store and send more than 10,000 cryptocurrencies and NFTs from 15 different blockchains. XDEFI Wallet is trusted by more than 100,000 Weekly Active Users, and has a 5-star rating in the Google Chrome store after 200+ reviews XDEFI Wallet all cryptocurrencies and dApps on: Ethereum Solana THORChain Avalanche Fantom Arbitrum Polygon Bitcoin Binance Chain Binance Smart Chain (BSC) Doge Litecoin Luna v2 Luna Bitcoin cash A single gallery for all your NFTs: A single, customisable gallery for your Ethereum, Avalanche, Fantom, Arbitrum, Polygon, Binance Chain and Luna2 NFTs. Permissionless swaps and bridging: Unlimited swaps for all THORChain assets, all within the wallet. XDEFI Wallet is non-custodial: We never have access to your funds. XDEFI Wallet never stores your seed phrase, your password or any private information. You are always in full control of your funds and data.
  • 7
    Bitamp

    Bitamp

    Bitamp

    Bitamp is an easy-to-use, client-side, open-source Bitcoin wallet. Connect with the blockchain to send and receive Bitcoin from anywhere, or any device, instantly. Generate your own personal Bitcoin wallet. Receive coins to any of your public addresses (1..) (3..) (bc1..) and connect yourself to the blockchain. Use your Bitamp generated seed to access your Bitcoin wallet. Seed phrases from Ledger, Trezor, Electrum, Mycelium and Blockchain also work. Bitamp is an open-source, client-side, free Bitcoin wallet which allows you to send and receive Bitcoin securely on the blockchain. Your anonymity is important to us. Bitamp doesn't store your seed, private key, transactions, ip address or browser details. Directly connect to the Bitcoin blockchain in your browser with Bitamp. Bitcoin doesn't have borders. You can send money to any recipient globally without any restrictions. Your keys, your Bitcoin. Not having access to your private key or seed puts you at risk to lose your Bitcoin.
  • 8
    Sequel

    Sequel

    Sequel Finance

    More than just the best crypto wallet, secure and manage all of your assets in one platform. Bring your portfolio into one dashboard by connecting your wallets, securely store and recover crypto seed phrases, transfer & swap crypto, & develop an estate plan to protect those you love the most. Introducing the Self-Custody Stack Everything you need to secure, command, and control your assets without compromise. Wallet Security Secure, audited cryptography leveraging the cutting-edge OPAQUE protocol ensures that your assets remain yours with our end-to-end encryption (E2EE). Multi-Wallet & Exchanges Multi-wallet, multi-chain infrastructure lets you command and control everything at-a-glance Social Key Recovery Connect with your most trusted contacts and beneficiaries to assist in crypto key and seed phrase recovery Estate Planning & Inheritance Simple estate planning for inheritance of your entire crypto portfolio & Crypto Prices & Portfolio Tracking
  • 9
    Keeper Wallet

    Keeper Wallet

    Crypto Wallets

    Scan the QR code with a camera for authentication and your wallet is connected. This basic action opens up limitless opportunities on the Waves blockchain and potentially on any other chain supporting Keeper accounts. Seed phrases and private keys are encrypted by the AES algorithm and stored on your device locally. Any operation requires access both to your account and device. This means that no one can mess with your funds without either of those. Transfer crypto or NTFs instantly, review every bit of relevant info including transaction history, and arrange your assets however you like. The integration with Swop.fi and Puzzle Swap allows for direct token exchange, which makes Keeper Wallet the only tool you will ever need.
    Starting Price: Free
  • 10
    Ledger Stax

    Ledger Stax

    Ledger

    Powered by the Secure Element chip and Ledger’s proprietary OS, battle-tested for years by security experts. You'll be able to access, manage, and retrieve your crypto as long as your Secret Recovery Phrase is safe and accessible only to you. Simply get another Ledger Stax or any other Ledger and recover access to your accounts using the Secret Recovery phrase. Software wallets store private keys on systems or devices that are connected to the internet, making them susceptible to all kinds of attacks. Holding your crypto on an exchange means entrusting the private keys to a third party and not having any control over your funds. Ledger Stax stores your private keys offline on a Secure Element chip, and provides full isolation between the keys and your computer/smartphone to give you complete control over your assets.
  • 11
    Authereum

    Authereum

    Authereum

    Your wallet where you want it. Log into your favorite dapps with Authereum. No downloads required. No downloads, no seed phrases. Simply, the best Web3 experience at your fingertips. Built by blockchain security experts to keep your assets safe. You and only you can access your funds. Add recovery accounts in case you lose access to your account. Add Google Authenticator or hardware keys as an extra layer of protection for your account. Top decentralized projects trust Authereum. Only you can access your assets. Each account is 100% non-custodial, allowing you and only you to access your funds. You’re safe even if our servers get compromised. Access to your tokens, collectibles and last transactions anytime and with any device. Integrate directly by Authereum or use your favorite web3 library.
  • 12
    Accumulate

    Accumulate

    Accumulate

    Accumulate is a new kind of blockchain protocol that is organized completely around identities. Accumulate Digital Identifiers (ADIs) can be assigned to organizations, devices people, or things. Accumulate’s multi-chain architecture enables greater throughput. The interconnected network of chains results in 70,000 transactions per second (TPS) which makes it one of the fastest protocols. Key hierarchies enable enterprise-grade security. Accumulate users can rotate, recreate, and reassign private keys when necessary. Using key hierarchies results in greater safety of assets.
  • 13
    Trezor

    Trezor

    Trezor

    Trezor Wallet is an easy-to-use interface for your Trezor. Trezor Wallet allows you to easily control your funds, manage your balance and initiate transfers. Online exchanges and wallet providers can disappear, go offline, be hacked. They are not reliable. Hardware wallet is the safest way to manage & trade your cryptocurrencies. Securing your digital assets has never been more straightforward. Audited by security researchers, verified by our track record. You can always recover access to your coins & assets from your offline backup. It only takes 5 minutes. When you first set up your Trezor, it will generate the seed for you. When you need to restore access to your wallet, use this offline backup. Your entire wallet is always accessible via your personal 12 to 24 words long recovery seed. The recovery seed follows a standard created by us at SatoshiLabs, but it is widely used, compatible with many wallet apps.
  • 14
    Cypherock X1

    Cypherock X1

    Cypherock

    Cypherock X1 is the world's best hardware wallet with no seed phrase vulnerability. Cypherock X1 crypto wallet decentralizes your private keys to give you 10x more security. Without the need for a seed phrase backup, your crypto private keys are cryptographically split into 5 parts using Shamir's Secret Sharing. Each part is uniquely stored on the X1 Vault and the 4 X1 Cards that only you control, which you distribute into geographically different locations. To make a crypto transaction, just fetch and tap any 1 out of the 4 cards on the X1 vault. - More than 3000 coins and tokens supported. - Acts as a wallet backup for your multiple other BIP39 compatible wallets. - Import multiple wallet seed phrases into Cypherock X1 and also view multiple wallet portfolios in a single app. - Trustless Inheritance support is coming soon!
    Starting Price: 159
  • 15
    Resiliant

    Resiliant

    Resiliant

    Affordable, secure, user centric password-less ID authentication using blockchain and AI technology. Control your digital risk and protect data while locking out undesired users and devices. One-time onboarding for multiple uses across the web, servers, networks and devices. No more passwords, 2FA codes, or matching images, which do not protect the user and enterprise against SIM swapping or false geolocation. Decentralized IdNFT™ gives the user ownership and control of their identity. Secured by blockchain, no private data is stored or uploaded to the cloud. Zero-knowledge proof permits transfer of information without revealing user credentials.
  • 16
    Maiar

    Maiar

    Maiar

    Maiar is a digital wallet and global payments app that is reimagining the way we interact with money, allowing you to exchange and securely store crypto on your mobile phone. Create a wallet in seconds. No username, no password, no recovery phrase to backup. Just use your phone number. Maiar offers a digital identity layer that starts with a service mapping the phone number to a wallet address while preserving privacy and allowing users to send money to friends and family via their address book. Send crypto from your mobile directly to anyone, instantly and with negligible fees. No banks or intermediaries charging extra fees. This is how you get back value and time, to do what really matters to you. Invite your friends and followers to try Maiar and get up to 100% of our commission every time they buy crypto! They'll receive a nice cashback reward, too. At Maiar we help you protect your crypto with the highest level of security via cryptography and privacy features.
  • 17
    Velas

    Velas

    Velas

    The fork of Solana with embedded EVM integration. Fastest EVM/EBPF hybrid chain inherited best from Solana and applied to EVM world. Supports all smart contracts built on the Ethereum blockchain. Extremely efficient performance at a fraction of the cost. Stake to support decentralization and get rewards. Through the Velas Network users gain access to decentralized services, delegating the security of his passwords, keys or seed-phrases to segmentation algorithms and validators that are interested in data security. Most important, this information will be distributed over the network and not available to any of its participants.
  • 18
    Daito

    Daito

    Daito

    Daito is a web-based 2FA authenticator for small teams and big companies alike. Securely share access, no phone is needed. Daito does only one thing, manage TOTP 2FA tokens for you and thus offers a fully isolated system, separate from your password manager. Keep your 2FA token management separate from your password management and prevent worst-case scenarios. What do you do when you store usernames, passwords, 2FA seeds, and 2FA tokens in your password manager and this password manager gets breached? The authenticator is web-first and web-only. Access and manage your company's 2FA tokens from any browser and OS. Save money and the accompanying hassle of managing company phones. No more worrying about lost, malfunctioning, or missing devices. Give IT teams and admins full control, and limit regular users. Prevent 2FA seed leakage by limiting access only to generated 2FA tokens, not the underlying seed codes.
    Starting Price: $19 per month
  • 19
    Fortmatic

    Fortmatic

    Fortmatic

    Don't let wallets own your UX, let users access your Ethereum app from anywhere. No more browser extensions and seed phrases. Leading blockchain companies around the world have integrated Fortmatic. 65% of our users interact with apps on mobile web – not just desktop. Nothing to change if your app already works with web3 and MetaMask. Fortmatic is a better alternative to MetaMask. Fortmatic is SOC 2 Type 1 compliant with a non-custodial HSM architecture. Slash user onboarding steps by 70% with a familiar Web 2.0 experience. Is customizeable, embedded, and doesn’t take users away from your app. User have access to: OTP code, device 2FA, recovery email, and more. Fortmatic is a collaborative effort from the best. With a track record of building products users love. An out-of-box UI if you want to launch in minutes. Fortmatic SDK allows you to easily integrate your app with the Ethereum blockchain, whether you already have a dApp integrated with web3 or are starting from scratch.
  • 20
    Electrum

    Electrum

    Electrum

    Securing Bitcoin payments since 2011, Electrum is one of the most popular Bitcoin wallets. Electrum is fast, secure and easy to use. It suits the needs of a wide spectrum of users. Be safe from malware Use two-factor authentication by Electrum and Trustedcoin. Electrum is free software. Released under the MIT License. Anyone can run an Electrum server. No single entity controls the network. Electrum supports hardware wallets: Ledger, Trezor, Keepkey. Your private keys are encrypted and never leave your computer. Your funds can be recovered from a secret phrase. Electrum is fast, because it uses servers that index the Bitcoin blockchain. You can export your private keys and use them in other Bitcoin clients. Electrum servers are decentralized and redundant. Your wallet is never down. Electrum Wallet verifies all the transactions in your history using SPV. Keep your private keys offline, and go online with a watching-only wallet.
  • 21
    MyDoge

    MyDoge

    MyDoge

    MyDoge is a free, secure, self-custody social wallet for Dogecoin. Our mission is to increase the number of daily Dogecoin transactions by building a community for Dogecoin enthusiasts to explore the Dogecoin universe and connect/meet with friends. With MyDoge you can buy, send, receive, and store your Dogecoin safely. A fun, social wallet for the Dogecoin community with Profiles, Chat & Tipping. Self-custody means only you can access your Dogecoin. We do not believe that Dogecoin should be held on exchanges in a “not your keys, not your crypto” land. YKYC means you are in charge of your private key and we cannot access your Dogecoin. If MyDoge had an outage and was inaccessible, you could still access your Dogecoin using your seed phrase.
  • 22
    Argent

    Argent

    Argent

    The most simple and secure smart wallet for crypto. Store and send; borrow, earn interest and invest. The future of money. Own it in a tap. Only you can access your assets. Not us. Not anyone else. No seed phrase, no sweat. Easily recover without a paper backup. Peace of mind with daily limits, locking, biometrics and more. Put your assets to work. Earn up to 9% interest with Maker and Compound. The simplest and safest way to access Decentralised Finance (DeFi) on Ethereum. Buy crypto instantly with Apple Pay, card or bank transfer. Get the best rate across 10 decentralized exchanges, including Uniswap and Kyber. Send money as easily as a message to anyone, anywhere. Approve large transfers and select trusted contacts.
  • 23
    Veridium

    Veridium

    Veridium

    Veridium is the most comprehensive Integrated Identity Platform powered by AI-based Behavioral Biometrics, enabling Multi-Factor Authentication (MFA), digital ID verification, and a true enterprise-grade passwordless experience for employees and customers. Low code, agile, and flexible. Eliminating the password for customers removes the friction often associated with passwords and delivers increased security for online connections with our single step multi-factor authentication solution, while providing higher levels of identity assertion for organizations. Veridium provide an end-to-end authentication platform for all your WFH needs and any VPN solution, delivering strong, multi-factor, passwordless workforce authentication.
  • 24
    authID.ai

    authID.ai

    authID.ai

    Launch the power of mobile facial biometrics to deliver seamless identity fraud protection across the digital identity lifecycle. Onboard customers with ease. Weed out the bad guys early. Ensure user accounts and transactions cannot be compromised by account takeover or identity fraud. Gain increased assurance with cloud-based biometric authentication of high-risk transactions. Eliminate passwords with FIDO2 strong authentication tied to a trusted identity. Confirm the identity of new users remotely- know they are who they say they are. Our mobile biometric solutions help you onboard customers and verify their presence with ease while ensuring their accounts cannot be compromised by account takeover or identity fraud. Learn how authID can help you transform identity management.
  • 25
    CBL Data Shredder

    CBL Data Shredder

    CBL Data Recovery

    The CBL Data Shredder is intended to eliminate the chance that information stored on your hard drive may be retrieved by anyone when it, or the computer containing it, is disposed of. Our experience is that files thought to have been deleted years previously, containing personal details, bank account details, credit card numbers, correspondence, etc., can be recovered all too easily, and simply formatting the drive is not an effective means of rendering this data inaccessible. This situation is made worse by the availability of off-the-shelf products that will automate the recovery process in some cases. When used in accordance with the instructions in this guide, the CBL Data Shredder program will do what file deletion and partition formatting cannot: erase the entire contents of a treated hard drive, rendering them irretrievable to existing and future software-based recovery tools.
    Starting Price: Free
  • 26
    FxWallet

    FxWallet

    FxWallet

    Assembling the most popular NFT collections on the market. Curate and sell NFT collections effortlessly while buying NFTs with your preferred tokens. Featured Dapp, taking you on a journey to experience the charm of Web3 applications. Crypto Wallet is a topic that you’ll definitely run into. For crypto beginners, they might get confused by new terms such as public key, private key, address, and mnemonic phrase. Unlike bank account and password, which can be retrieved by your real-name identity, the blockchain networks are decentralized and anonymous, the private key is irretrievable. If you accidentally lose your private key, you will lose control over the assets in your account.
    Starting Price: Free
  • 27
    OST Recovery

    OST Recovery

    Vartika Software Private Limited

    OST Recovery is advance program to fix .OST file corruption issues and make accessible the corrupted OST data for users. The OST emails, contact, calendar, task, notes, journals, scheduled task, embedded images, users created folder and deleted folder items successfully recovered without any data loss. OST Recovery authenticates you to Recover OST to PST, EML, MSG, HTML, PDF and MBOX formats. The 100% harmless and protected recovery of corrupted OST file is assured by this software as well as it also maintains Email integrity while recovery. With the support of this wonderful tool you are eligible to recover data from Encrypted OST files. It gives user-friendly compatibility with all Windows and Microsoft Outlook versions (32-64 Bit). Aside from this, it gives benefit to import OST to Office 365 and Live Exchange Server.
    Starting Price: $49.00/one-time/user
  • 28
    Ontology

    Ontology

    Ontology

    Ontology supports identity authentication and data collaboration between users, vehicles, and third parties. Data can only be accessed, used and stored with the consent of the owner. Through the Ontology Trust Framework and Self-Sovereign Data Storage, a number of cryptographic algorithms are implemented to protect user identity and data privacy security. Each data exchange operation requires authorization and selective exchange can be achieved through authorization protocols and cryptographic algorithms. Traceability, authorization and authentication of personal data is possible through blockchain. In some cases, we integrate TEE technology to support data analysis and processing without privacy disclosure. It's time to reclaim control of your digital identity. ONT ID enables autonomous control of your private data. You decide if and when your data is accessible by others.
  • 29
    Commvault Complete Data Protection
    A unified solution combining Commvault Backup & Recovery with Commvault Disaster Recovery to deliver enterprise-grade data protection that is powerful and easy to use. Ensure data availability and business continuity across your on-prem and cloud environments using a single extensible platform. Comprehensive workload coverage (files, apps, databases, virtual, containers, cloud) from a single extensible platform and user interface. Rapid, granular recovery of data and applications. Easily back up, recover, and move data and workloads to/from/within/between clouds. Fast VM, application, and storage snapshot replication with flexible RPO/RTO. Reduce costs with minimal infrastructure requirements in the cloud or on-premises
  • 30
    IDVoice

    IDVoice

    ID R&D

    Voice biometrics is the science of using a person’s voice as a uniquely identifying characteristic for the purpose of authentication and/or personalizing the user experience. The technology is referred to in a variety of ways including voice verification, speaker verification, speaker identification and speaker recognition. There are two ways we put voice biometrics into practice. The first is Text Independent Voice Verification. This approach does not depend on the person speaking a particular passphrase. The other is Text Dependent Voice Verification. in which the user enrolls using a specific phrase but unlike a password, this phrase is not secret. IDVoice enables both options depending on your use case and in some scenarios they may be used together.
  • 31
    Verida Wallet
    Create decentralized identities, manage your private keys and take control of your digital world. Perform transactions and manage crypto on multiple blockchains. Receive, store and share verifiable credentials across multiple identity networks. Bridge your credentials to applications and blockchains. QR code authentication for a seamless user experience. Simple authentication and anti-phishing architecture provides applications with secure access to your blockchain wallet and encrypted data.‍ Manage public profiles for your decentralized identities that showcase your crypto wallets, NFTs and links to your verified web2 accounts. Encrypted messaging between decentralized identities. Approve data requests, accept incoming data and receive notifications from your favorite web3 applications.
    Starting Price: Free
  • 32
    BitRecover

    BitRecover

    BitRecover Software

    Get the solution for all your problems to recover, repair, convert, view, export, and backup your database. Award Winning Products to Recover Lost Data, Repair Corrupted Files and Email Conversion. BitRecover is the name that most of the IT admins and computer users trust for their data management and data recovery needs. As our brand name says BitRecover, so our motive is to recover every possible bit of data. BitRecover is a Sub-Brand of RecoveryTools. We provide variety of solutions to cater the user demand related to Windows data recovery, Virtual Drive data recovery, VMFS partition data recovery, Storage Media Data Recovery etc. Applications for email conversion and password recovery also makes our product gallery rich.
    Starting Price: $29 one-time payment
  • 33
    SafePal

    SafePal

    SafePal

    SafePal cryptocurrency wallet application is a secure, decentralized, easy-to-use and free application to manage more than 10,000 cryptocurrencies at your fingertips. With the SafePal application, you can store, send, receive, buy and trade cryptocurrencies at ease, with smooth and intuitive user experience! Support wallet import via private key, mnemonic phrase, Keystore or wallet address. Create and manage multiple wallet accounts in one application. Share your public address and receive crypto with your friends on Whatsapp, Twitter or other social platforms. SafePal cryptocurrency wallet application is a decentralized application. The mnemonic phrase is stored by users. SafePal does not read or store sensitive account information including private key and mnemonic phrase. SafePal cryptocurrency wallet application is designed and developed by the top security architects in the industry. It adopts advanced security protocol to make sure that your asset is always safeguarded.
    Starting Price: $39.99 per device
  • 34
    MTM Database Recovery

    MTM Database Recovery

    MoebiusTech STORM

    Designed to assist in recovering lost or corrupted database from the government, enterprise, and judicial sectors. Supports recovery of database tables, views, functions, stored procedures and triggers. Can repair various corrupted MySQL databases and recover data from inaccessible tables. MTM Database Recovery is equipped with advanced algorithms and parallel processing capabilities that enable it to efficiently handle large-scale database recoveries, ensuring minimal downtime and faster recovery times. We offer dedicated technical support to assist users throughout the recovery process. Our team of experts is available to provide guidance, troubleshooting, and assistance to ensure a successful recovery.
    Starting Price: $149 per year
  • 35
    Typhon

    Typhon

    Typhon

    Typhon provides all the features you need to sail the Cardano blockchain. Fully compatible with existing ADA wallets. Store ADA in totally different wallet accounts without managing multiple seed phrases. Delegate to multiple pools of your choice with multi-accounts. Experience up to date stake pool information and track rewards right inside Typhon. Add receipt number for your pizza order, or just send a message to your friend along with ADA payment. Choose your wallet type, HD wallets like Daedalus, or a simple and faster single-address wallet.
  • 36
    Virtual Safe Business Professional
    Virtual Safe Business Professional is business software that allows you and your employees to manage virtual, encrypted directories in your IT infrastructure. Master Data Management: The individual virtual safes can be flexibly expanded to include master data. Expand your safes with an item or customer number or a processing status, for example. Safe-Search: You or your employees can then use the integrated search function to filter according to your master data. Master-Password: Critical operations can be secured with a master password and, of course, all safes can be opened with it. Collaboration: When working in a team, it is important that the software supports you. Therefore the type of access can be selected by the user. The software also recognizes when a safe is already being processed. In this case, all employees can still read the safe data. Company standards are mapped and distributed to business areas via common configuration directories.
    Starting Price: €49/user
  • 37
    Blockstream Jade

    Blockstream Jade

    Blockstream

    Keep the keys to your Bitcoin and Liquid assets safely offline. You can also enhance your security further with Blockstream Green’s Multisig Shield technology. Manage your assets from mobile or desktop. Blockstream Jade is currently supported on Blockstream Green for Android, Windows, macOS, and Linux. Blockstream Jade houses a full-color 240x135 pixel 16-bit display. Display QR codes directly on the device and verify send and receive addresses with ease. Blockstream Green is our industry-leading Bitcoin and Liquid wallet. Gain access to powerful features such as multisig security, full-node verification, and Tor support. Before usage, plug your Blockstream Jade into a power source using the provided cable and charge the device for two hours. Proceed through the verification process to confirm that you have recorded each recovery phrase word correctly. Then, store the recovery phrase in a safe location.
    Starting Price: $45.99 one-time payment
  • 38
    Prokey

    Prokey

    Prokey Technologies

    Keep your coins in a secured place. Protecting your private keys is a critical issue in cryptocurrency, Prokey hardware wallet is an offline, cold storage, and secure device that keeps your private keys offline and protected, while also enabling you to receive, store, and sign transactions to send digital assets like Bitcoins, Ethereum, Litecoins, Tether, and many more! Our Prokey wallet is not simply another cryptocurrency wallet. It sets a new definition of what a secure wallet must offer. This is all about the best optimization, down to each and every detail, offering the most secure device with easy-access to coins without external wallets. We use genuine firmware so there is no need for hologram seals or vendor reputation. You will always be getting a 100% original Prokey device. As long as you have access to your 24 words seed combination, you’re good. It just takes 3 minutes to recover access to your assets through recovery sheet.
  • 39
    Stirdie

    Stirdie

    Stirdie

    Secure, auditable, and verifiable communication tools for business. Creating environments designed for data and identity verification audited by a blockchain network. Transform and optimize the way your business communicates forever. Stirdie uses peer-to-peer identity verification and cryptography to achieve data integrity and provide businesses and users alike with a tamper-proof suite of communications tools. By underpinning our suite of communications tools with blockchain technology, we provide a safe environment for businesses and users to transact sensitive data without fear of interception. We're eliminating fraud, and scams and saving businesses and individuals millions. Transactions and actions are recorded on the blockchain via a hash and unique ID, providing auditability of data. All transactions and actions from when data is created, sent, opened, and read are validated against the blockchain to ensure the integrity of the message.
  • 40
    EVER Wallet

    EVER Wallet

    EVER Wallet

    EVER Wallet lets you manage your seed phrases, private and public keys, and wallets. With the wallet you can, import existing keys or create new ones, choose popular wallet contracts to use, manage the permissions you provide to dApps and protect your data with encrypted local key storage.
  • 41
    Kernel for SQL Database Recovery
    Recover data from damaged SQL MDF and NDF files and get a preview of recovered objects before saving them. Compatibility with all SQL server versions makes this the go-to choice for administrators & experts worldwide. When your SQL MDF database faces corruption, our tool becomes your data savior. The software scans and retrieves all database objects, including tables, views, triggers, and more, from corrupted MDF files. It offers a preview feature to ensure you recover essential elements, such as primary keys, stored procedures, indexes, and user data types. Trust the tool to restore your database seamlessly, preserving its integrity and structure throughout the recovery process. In critical situations demanding prompt recovery and restoration of a corrupted SQL database to a live server, use Kernel for SQL Database Recovery software.
  • 42
    Nervos

    Nervos

    Nervos

    Early internet applications lived on segregated networks needing different ways to access and interact. Now, in today’s decentralized world we again see this segregation into different ecosystems with poor interoperability. The Nervos Network solves for this problem by offering a suite of integrated solutions that allow the developer to build Universal Apps. Choose your interface, choose your crypto and stick with it, but still access the entire space. The frustration of multiple wallets, exchanges and seed phrases is no more with Nervos. Build on Nervos and have the ability to target any Virtual Machine (VM). Port your dApp across with ease and instantly have access to the entire blockchain ecosystem. Sustainable crypto-economics with a built-in store of value mechanism to solve some of the biggest sustainability challenges for public blockchains.
  • 43
    Burner Wallet

    Burner Wallet

    Burner Wallet Collective

    The Burner Wallet is an instant web wallet used to send small amounts of crypto quickly with a simple UX. The Burner wallet works in your mobile web browser so no app download and no seed phrase. It runs on the xDai network so transactions always completed within five seconds, you can do hundreds of them for a penny, and it’s pegged to the dollar so there is low cognitive overhead. The best part is onboarding is as easy as opening your camera. A burner wallet is automatically generated upon visiting xdai.io and your private key is stored in a local storage so it will be there when you come back. However, you should sweep any value you hold to a cold wallet regularly and burn your ephemeral private key. A burner wallet is analogous to cash; you won't carry too much because it can be lost but it's astonishingly easy to exchange. This can also be very handy in everyday use even for the crypto-initiated.
  • 44
    StealthRECOVER
    Fine-grained rollback and recovery for Active Directory. Malicious or accidental changes to AD represent a significant security and performance risk. As the primary authentication and authorization service for the majority of IT systems, the importance of Active Directory (AD) integrity and availability is paramount. Rolling back or recovering changes – whether from human error or malicious intent – leveraging native AD capabilities is difficult at best, and in some cases impossible. While the AD Recycle Bin, when enabled, can recover a deleted object, Microsoft does not offer an out-of-the-box way to rollback changes to directory objects to a previous state. As part of Stealthbits’ Active Directory solution portfolio, StealthRECOVER enables organizations to quickly and easily rollback and recover unintended directory changes. e. Easily browse multiple snapshots and leverage granular full text search to effortlessly rollback and recover only the information that is required.
  • 45
    Chainge Finance

    Chainge Finance

    Chainge Finance

    When it comes to cross-chain, Chainge is the leading authority in the DeFi space. With 13 integrated chains and counting, the app supports over 75 assets so that users can maximize their wealth’s potential and enjoy a secure, flexible & worry-free financial life. Chainge’s unwavering objective is and will remain improving people’s quality of life. So, no matter who you are or where you’re from, you can freely benefit from our wide range of decentralized financial solutions neatly packed up in a flawless UX. Worried about security? Then worry no more. The DCRM tech behind the Chainge app is naturally immune to hacks while your wallet’s seed phrase can easily be encrypted in a QR code you can keep literally anywhere since you’re the only one who can decrypt it. Your assets are split between multiple chains? Well, that doesn’t matter anymore. We deal in universal assets - which means in the Chainge app you have the freedom of performing cross-chain transactions and moving your assets fro
  • 46
    SeedDMS

    SeedDMS

    SeedDMS

    SeedDMS is a free document management system with an easy to use web based user interface for small and medium sized enterprises. It is based on PHP and MySQL or sqlite3 and runs on Linux, MacOS and Windows. Many years of development has made it a mature, powerful and enterprise ready platform for sharing and storing documents. Before you install SeedDMS on your own server feel free to check out our demo installation. Login with 'admin' for user and password. Please note, that the maximum file size for uploading has been limited to 5 MB and the database content will be cleared once in a while without notice. If you prefer to run your own SeedDMS for a limited time, then start your own instance at "Play with Docker" (PWD). Just hit the button below which takes you right to PWD. You need to log in with your docker credentials. Fully web based user inteface, users and groups management, external authentication, and fine grained notifications upon changes.
  • 47
    everID

    everID

    Datarella

    Decentralized public key infrastructure is a fundamental technology that allows users to authenticate themselves, without relying on a trusted centralized authority. Private keys grant the users access and control over their accounts, their assets, and even to their digital identity (SSI). Within everID, everKEY is our decentralized key recovery solution for wallets and other products that require highly secure key management.
  • 48
    Intella X

    Intella X

    Intella X

    Ushering in a new era of Web3 gaming platforms with disruptive innovations. Intella X Wallet is the designated Web3 wallet for the Intella X platform with Web2 and Web3 gamers in mind. Integrated with the Web3Auth solutions, the wallet offers the highest level of security with an intuitive login process for both mainstream Web2 and Web3 users to enable the users to safely and easily access their digital assets as well as gain access to the features of the Intella X platform with the best user experience. Create your Intella X wallet with the familiar login experience that helps bring Web2 mainstream users onto Web3 without seed phrases or external wallets. Experience the security of non-custodial login through enterprise-grade MPC (Multi-party computation) enabled key infrastructure. Integrated with face and touch ID, or conventional passcode, and 2FA for added security. Multi-chain digital asset management support.
    Starting Price: Free
  • 49
    Notebook

    Notebook

    Notebook

    Zero-knowledge cryptography for anonymous KYC and soul-bound credentials. We believe that the future of trust is blockchain. Notebook helps you secure your identity and your data, so you can authenticate yourself in a trustless world. Notebook leverages fragmented identity and Zero-Knowledge Proofs to keep users anonymous. A Notebook is stored on-chain in a smart contract, meaning no individual or corporation owns your identity or data but you. A Notebook is the best way to store summary statistics, such as metrics for credit score and bad-actor behavior. Storing such metrics makes for a more fair world, where people are held accountable for all their actions and believe in the greater good. The PII data required when a user onboards prevents an individual from creating multiple Notebooks, without compromising on their privacy. Notebook's identification system is dissociated from the user's wallet addresses, allowing the same identity to be used cross-chain.
  • 50
    Deepnet DualShield

    Deepnet DualShield

    Deepnet Security

    If you are looking for an enterprise grade 2-factor authentication (2FA) or multi-factor authentication (MFA) product that can secure all commonly used business applications and also provides a wide range of authentication methods, then you are in the right place. Deepnet DualShield is a multi-factor authentication system that unifies a variety of authentication methods, protocols, solutions and user experience in a single platform. In addition to the MFA functions, DualShield also provides self-service Password Reset, Single Sign-On (SSO), Identity & Access Management (IAM) and Adaptive Authentication. It is one of the most powerful and flexible multi-factor authentication system in the world. Deepnet DualShield can be installed on premises or hosted in a private cloud, which means that you will have the total control of your own user authentication system, and that you will be able to keep your users’ identities and credentials in a safe place.