Alternatives to Modirum

Compare Modirum alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Modirum in 2024. Compare features, ratings, user reviews, pricing, and more from Modirum competitors and alternatives in order to make an informed decision for your business.

  • 1
    Auth0

    Auth0

    Okta

    Auth0 by Okta takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO.
    Leader badge
    Compare vs. Modirum View Software
    Visit Website
  • 2
    Merchanto

    Merchanto

    Merchanto

    Chargeback deflection with the highest efficiency. Say goodbye to chargebacks with our seamless merchant-issuer collaboration. Merchanto offers an easy-to-use, all-in-one solution designed to eliminate chargebacks completely. As an official partner of Visa and MasterCard, Merchanto connects you to a global network, covering over 99% of all Visa and MasterCard issuers with just one simple integration. We enable near-real-time sharing of dispute data and transaction details between financial institutions and merchants. Supported by thousands of issuers worldwide, our platform offers pre-dispute resolution, stopping chargebacks before they even occur. Join Us Today and Safeguard Your Merchant Account Once & Forever.
    Starting Price: $32
  • 3
    Concourse - Disputes
    Concourse – Disputes is a powerful disputes workflow management system that manages the chargeback life cycle from initial claim entry to final resolution for both card issuers and acquirers. Concourse – Disputes manages all aspects of the disputes management process for electronic payment transactions such as credit card, debit card, ATM, POS, and mobile transactions. This includes the creation and management of retrieval requests, chargebacks, representments, arbitration, and other dispute-related activities. Manage dispute activity based on the entire transaction life cycle. Control the initiation of dispute activities based on the characteristics of each transaction. Generate adjustments, chargebacks, representments, and other dispute-related activities. Automate the administration of network-specific dispute regulations such as Visa, MasterCard, Discover, and American Express. Integrate internal processing procedures as workflow steps within dispute plans.
  • 4
    GPayments

    GPayments

    a neurocom company

    GPayment provides a complete range of Fraud Prevention products based on the 3D Secure protocol, Verified by Visa, Mastercard SecureCode, JCB J/Secure, American Express SafeKey and Diners Club International ProtectBuy. Reduce credit card fraud and eliminate chargebacks through liability shift. Reduce the potential for online fraud and stay in control of authenticating transactions. Collect a rich dataset for more accurate risk based authentication. Our ActiveServer hosted service provides a scalable, 24/7 service that helps the client save on both time and infrastructure resources. Hosted service also removes the need for the client to certify with each card scheme, which is needed if the client were to deploy in-house.
  • 5
    AuthControl Sentry

    AuthControl Sentry

    Swivel Secure

    Deployed in over 54 countries and implemented across enterprises including finance, government, healthcare, education, and manufacturing, AuthControl Sentry® provides organisations with true multi-factor authentication (MFA). It delivers an intelligent solution to prevent unauthorised access to applications and data. AuthControl Sentry® has the flexibility to support a range of architectural requirements and the ability to ensure maximum adoption, thanks to its variety of authentication factors. Patented PINsafe® technology for ultimate security. Supports on-premise and cloud for changeable architecture. A single tenancy and single-tiered cloud solution ensures optimised customization. Risk-based authentication and single sign-on as standard. Integrates seamlessly with hundreds of applications. Ensures maximum adoption with an extensive range of authenticators.
  • 6
    TWOSENSE.AI

    TWOSENSE.AI

    TWOSENSE.AI

    Quickly catch unauthorized users and get a better understanding of your organization's highest risks with our dynamic dashboard, whether that be password reuse, credential sharing, unmanaged device use and more. Integrate with your SIEM to keep alerts in one place. TWOSENSE invisibly authenticates users throughout a session and automatically responds to 95% of MFA challenges for your users reducing MFA friction. Find out exactly how much security fatigue is costing your organization. Our software is SSO enabled, SAML and RADIUS ready which means that you can use your existing login workflows and deploy the same day. Validating employees or customers using behaviors is more secure than usernames and passwords, for several years, the Defense Department has been working on ways to identify employees more securely, in part to augment and perhaps replace its existing identification cards that date back to 2000.
  • 7
    TransUnion TruValidate
    TruValidate™ delivers an accurate and comprehensive view of each consumer by linking proprietary data, personal data, device identifiers and online behaviors. Our advanced insights and global network of fraud reporting helps businesses discover anomalies, assess risk and confidently identify good consumers. This allows you to protect your business and focus on offering effective, personalized and friction-right experiences. Confirm user identities against robust, global datasets to expose fraud risks. Secure each point of the consumer journey with customized solutions appropriate for the risk level of each transaction. Proactively identify risky transactions and fraudulent devices in real time while reducing operational expenses.
  • 8
    Digital Resolve

    Digital Resolve

    Digital Resolve

    Online Security and Fraud Protection through Real-time Identity Intelligence, Authentication, and Access Control. Proactively secure online accounts, information, transactions and interactions from login to logout. The Digital Resolve platform is a cost-effective and easy-to-deploy solution that effectively mitigates risk on day one of deployment. The platform was designed by a team of seasoned experts to provide a comprehensive view of all transactions and interactions, unlike other solutions that merely detect events in isolation. Furthermore, real-time intervention options and a frictionless user experience mean that you can maintain confidence and trust among your user base- all while providing real-time protection against potential risks.
  • 9
    BehavioSec

    BehavioSec

    BehavioSec

    Welcome to the next generation of behavioral authentication. Deployed across global 2000 companies, the BehavioSec platform uses deep authentication to continuously verify user identity with zero friction and over 99% accuracy across millions of users and billions of transactions. While organizations invest significant resources to insulate from attacks, Account takeovers remain a menace. To make matters worse, many costly business challenges – like manual fraud analysis and customer attrition from friction – stem from these failed investments meant to protect. BehavioSec stops account takeover with deep authentication, a new method of verification powered by behavioral biometrics. Deep authentication automatically verifies the human behind the digital identity without adding friction – allowing you to keep fraudsters at bay while drastically reducing costs. BehavioSec addresses new account fraud with population profiling powered by Behavioral Biometrics.
  • 10
    Privakey

    Privakey

    Privakey

    Privakey’s transaction intent verification provides a secure channel to streamline high risk exchanges between services and their users. Now available as a cloud service. Fraud is everywhere yet so is your competition. Enterprises are constantly seeking to delight their customers while balancing experience and security. It’s a challenging problem that’s getting tougher every year. So how can you securely engage with your customers, and gain their trust of you during sensitive exchanges, in a way that doesn’t add frustration to the process? The answer is Privakey. Transaction intent verification (TIV) is the combination of strong identity assurance and contextual response into one intuitive user experience. Common examples of TIV include payment confirmations, wire transfer approvals and account update acknowledgements. Our solution utilizes asymmetric cryptography, mobile biometrics and secure notifications to ensure the integrity of every exchange.
  • 11
    SolidPass

    SolidPass

    SolidPass

    SolidPass is a leader in next-generation strong authentication, and protects enterprises and their customers from fraud, digital attacks, and information theft through advanced security software. Solidpass converts mobile phones, internet browsers, and desktop applications into robust security tokens. By eliminating the need for hardware tokens, SolidPass brings the highest levels of security at a fraction of the cost, and without the hassle of traditional, physical two-factor authentication tokens. SolidPass has bridged the traditional trade-off between usability and stronger security, and makes Challenge-Response (CR) and Transaction Data Signing (TDS) simple to use by incorporating advancements such as barcode scanning. Barcode scanning-based authentication can be used for Challenge-Response (CR) and Transaction Data Signing (TDS). Barcode scanning adds usability and convenience.
  • 12
    RiskNet

    RiskNet

    The ai Corporation

    Is real-time and near real-time self-service rules engine for the detection and prevention of any type of payment fraud and suspicious transactions and is used by card issuers, acquirers, PSP's and merchants around the world. It can be supplied as on-premise licensed software or software as a service-based in the Azure cloud. aiRiskNet® is a modular solution designed to protect the entire payment chain. There are three main configurations available that can be used independently or combined as an enterprise-wide solution. aiRiskNet® Acquirer is designed for merchant risk management and fraud detection for POS, ATM and payment type or channel. aiRiskNet® Issuer is designed for fraud detection for card issuers and financial institutions, covering all card payment types e.g. credit, debit, pre-paid, private label, e-wallet etc., and other payment types such as Cheque, ACH and wire transfer.
  • 13
    PerfectGift.com

    PerfectGift.com

    PerfectGift.com

    PerfectGift provides companies with the most requested incentive and recognition solutions from Visa, MasterCard, and American Express as well as a selection of over 300 leading retail merchant gift cards. We deliver competitive pricing with the industry’s highest level of value of prompt, professional and personal service. Our Visa and Mastercard Prepaid Gift Cards are valid for purchase and use within the USA only. They are accepted almost everywhere that accepts Visa or Mastercard debit cards. Use these cards just like you would use a regular debit card. Virtual eGifts are valid for use online only but can be exchanged for a plastic card to use in store! Plastic cards are valid for in-store and online use. Virtual eGifts are valid for use online only but can be exchanged for a plastic card to use in store! Plastic cards are valid for in-store and online use.
  • 14
    CARDS ON THE SPOT (COTS)

    CARDS ON THE SPOT (COTS)

    Matica Technologies Group

    Offer your cardholders the convenience of instantly issuing debit, credit, and ATM cards in your branches. Instantly issuing payment cards has never been so easy. Visa and MasterCard, credit, debit, and ATM cards, whether contact or contactless, are instantly issued and instantly activated in as little as three clicks with Matica’s instant issuance software, Cards on the Spot™. The Cards on The Spot™ software provides a complete, fully integrated browser-based platform that can instantly issue multiple high-quality printed card types. Matica’s Cards On The Spot™ outshines all competitive products. We make it faster, easier, and more accurate than any other solution. Simply deploy, update and maintain browser-based for any card issuance need. The software integrates directly with cores and transaction processing networks. Perpetual-use branch licensing means unlimited users per branch, no cost per card, and no annual license fee.
  • 15
    SnapPay

    SnapPay

    CDI Technology

    SnapPay is the leading North American payment gateway. Not only enable traditional payment solutions like Visa, Mastercard, also have the Chinese payment instruments Alipay, WeChat Pay, and China UnionPay acceptance for North American merchants, permitting safe and secure online, in-store, in-app and mobile transactions. The marketing solutions of SnapPay also help merchants expand their reach to new customers and generate more in-store and online revenue. It is the largest card payment organization (debit and credit cards combined) in the world offering mobile and online payments based on total value of payment transactions, ahead of Visa and Mastercard.
  • 16
    ProPay
    Securely accept credit card payments on your phone or tablet using ProPay’s credit card processing app. Accept payments from all major credit card brands (Visa, MasterCard, Discover and American Express) at rates as low as 1.99% per transaction and no hidden fees. Quickly process credit card payments at low rates with a mobile card reader. Accept chip cards (EMV) and swipe cards. Manually enter card numbers if you aren’t near your card reader. Securely store a customer’s payment information to be charged for future purchases. Accept a credit card payment when you don’t have data coverage and process it as soon as you get back into coverage. Even more processing options are available with your ProPay account online. Access your funds with a ProPay Prepaid debit MasterCard. Quickly transfer funds to your bank account within the mobile app. Include sales tax and allow customers to add a tip to their order.
  • 17
    ChargebackHelp

    ChargebackHelp

    ChargebackHelp

    ChargebackHelp provides merchants with full-spectrum dispute coverage against fraud, friendly fraud, and chargebacks. CBH+ integrates your transaction data with the most effective tools to deflect disputes, resolve chargebacks and recover revenue from friendly fraud. ChargebackHelp prevents disputes, reduces chargebacks and recovers merchant revenue lost to fraud. Our platform simplifies the dispute process into a single endpoint where you can monitor all your disputes and understand the process accurately, in dollars and sense. Reduce chargebacks by up to 40% and win disputes through representment. It’s your revenue; keep it with ChargebackHelp. CBH+DEFLECT extends the merchant’s reach into disputes at the point of cardholder inquiry. Transaction data is sent in real time for the cardholder and their bank to access on demand. So when a cardholder calls their bank to raise a dispute, your company information prevents them from raising disputes in the first place.
  • 18
    Fisa Credit Card
    Modular and integrated software that makes credit and debit card business management easier from the perspective of the issuer, cardholders, and businesses. Quickly and easily, customize and automate the management of credit, debt, and Prepaid Cards according to the requirements of your institution. It implements a transactional engine that manages credit card authorizations around the world. Secure your institution with a technological solution, which includes loss prevention software for transactions made with open and closed credit cards. Manage payments for your business with international security and transactional certifications. Agile creation of new products and payment services to analyze your business and income generation.
  • 19
    Entrust Identity Enterprise
    The world's most proven on-prem identity & access management (IAM) solution for strong digital security. Identity Enterprise is an integrated IAM platform that supports a full suite of workforce, consumer, and citizen use cases. Ideally suited for high-assurance applications that require a Zero Trust approach for thousands or millions of users, Identity Enterprise can be deployed on-premises or as a virtual appliance. Never trust, always verify. Protect your organization and user communities both inside and outside the perimeter. Secure workforce, consumer, and citizen identities with high assurance use case coverage including credential-based access, smart card issuance, and best-in-class MFA. Limit user friction with adaptive risk-based authentication, passwordless login, and cloud app federation. Option to use digital certificates (PKI) for a higher level of security when and where warranted, either with a physical smart card or a virtual smart card.
  • 20
    Arroweye

    Arroweye

    Arroweye

    Our agile and scalable platform enables card programs of any size with any degree of customization and can deliver them to market in a matter of days, not weeks. It’s the first fully digital print production model approved by Visa, Mastercard, American Express, Discover, and Union Pay. This is possible because card campaigns are printed when ordered, Arroweye’s approach completely eliminates forecasting requirements and pre-printed inventory. Card issuers can now respond much faster to changing needs in the marketplace and realize a higher rate of return and better performance. Our web-to-print process combines best-in-class web tools for custom card design with an integrated digital On-Demand production and fulfillment operation. Our approach helps you differentiate your product offerings without investing in inventory.
  • 21
    Splitit

    Splitit

    Splitit

    Splitit powers the next generation of Buy Now, Pay Later (BNPL) through our merchant-branded Installments-as-a-Service platform. We solve the challenges businesses face with legacy BNPL while unlocking BNPL at the point of sale for card networks, issuers and acquirers, all through a single network API. Shoppers can split their purchases into up to 36 interest-free monthly payments using their existing Visa or MasterCard. Shoppers get the chance to try out items for up to 90 days and then decide if they are going to keep it. After they decide, shoppers can then go ahead and pay in in full, or start an installment-payment plan. Shoppers who do not have a sufficient available balance on one card have the option to split their installment payments on two different credit cards. This feature allows for the shopper to get what they want and not have to apply for another credit card or go into debt.
    Starting Price: 1.5% + $1.50 per installment
  • 22
    Kount

    Kount

    Kount

    Industry-leading protection for the entire customer journey – from account creation and login to payments and disputes. Reduce chargebacks, manual reviews, and false positives to increase approval rates and revenue. Identity Trust is the ability to establish the level of trust for each identity behind every payment, account creation, and login event. Linked by AI, Kount’s Identity Trust Global Network TM combines trust and fraud signals from 32 billion annual interactions to block fraud in real-time, and to enable personalized customer experiences. Quick and accurate identity trust decisions deliver safe payments, account creation and login events while reducing digital fraud, chargebacks, false positives, and manual reviews. Decrease false positives. Reduce false positives and friction. Take the guesswork out of decision orders. Accurate identity trust decisions can prevent false positives that can cause friction for good customers. Accept more good orders and increase revenue.
  • 23
    Naturepay

    Naturepay

    Naturepay

    Cannabis merchants must have the same payment options as any other legitimate legal business. The acceptance of credit cards helps build trust and validates the medical and retail marijuana industries. These are common forms of payment which will move the cannabis industry towards the mainstream and public acceptance. We have made the ability to provide merchant accounts to marijuana dispensaries and other cannabis industry businesses our primary goal. We saw the need, put our collective experience and know how to work, and developed a legitimate workable cannabis credit card processing solution. Our system is proprietary and has been established through strategic partnerships, and alliances within the credit card processing industry. We have a solution that will provide any dispensary or marijuana related business with the ability to accept Visa, MasterCard, Discover, American Express, debit and check cards.
  • 24
    XTN Cognitive Security Platform
    The Cognitive Security Platform® (CSP) is a threat and omnichannel fraud protection solution designed to defend digital businesses, to minimize the risks associated with the provision of digital financial services (home banking and digital payments), and avoid any impact on user experience. We provide a fully packaged, out-of-the-box solution that is digital-ready and can be deployed at lightning-fast speed. Cognitive Security Platform®’s modularity lets you personally activate the functions you need to make your digital business safer. AI proprietary algorithms combined with behavioral biometrics and behavioral analysis provide a frictionless end-user experience while guaranteeing the highest level of security. We also allow you to implement anti-fraud strategies by protecting different channels. The omnichannel view lets you manage all fraud that could affect separate channels from a single console, avoiding vertical management.
  • 25
    Accertify

    Accertify

    Accertify

    We solve your digital identity and financial fraud risks, making it simpler to protect your organization. As former in-house fraud and risk managers, we understand the sophisticated and complex threats your organization faces daily. We’ve built the most comprehensive platform available to solve your digital risks. Do you have a reactive approach to fraud prevention? Always feel a step behind? Our comprehensive portfolio of fraud management solutions puts you in control so you can proactively identify online fraud threats. We return a real-time risk assessment for every transaction using our award-winning technology that analyzes transaction risk using criteria such as device intelligence, behavior analysis, location data, customer attributes, payment information, and information on the purchase and related transactions. Then we use state-of-the-art machine learning models and established rules to identify good customers, reduce manual review, and highlight risky transactions.
  • 26
    Sift

    Sift

    Sift

    Sift’s Digital Trust & Safety suite is every fraudster's nightmare. We secure your business at scale support explosive growth. Proactively stop account takeover, payment fraud, and scam content from destroying your brand's integrity. So: what’s your goal?
  • 27
    BeyondCorp Enterprise
    A zero trust solution that enables secure access with integrated threat and data protection. Provide secure access to critical apps and services. Safeguard your information with integrated threat and data protection. Simplify the experience for admins and end-user with an agentless approach. Improve your security posture with a modern zero trust platform. Built on the backbone of Google’s planet-scale network and infrastructure to provide a seamless and secure experience with integrated DDoS protection, low-latency connections, and elastic scaling. A layered approach to security across users, access, data, and applications that helps protect every click from malware, data loss, and fraud. Integrates posture information and signals from leading security vendors, for extra protection. Easily configure policies based on user identity, device health, and other contextual factors to enforce granular access controls to applications, VMs, and Google APIs.
    Starting Price: $6 per user per month
  • 28
    Centagate Cloud

    Centagate Cloud

    Centagate Cloud

    CENTAGATE CLOUD offers a centralized login option that protects all applications from security breaches by using FIDO2 passwordless authentication. Control, protect and secure your application access. One login credential for all applications. A system that has strong digital security which eliminates phishing, fraud and password theft. Since the authentication is centralized, only one login credential is needed for all applications. Highly cost-effective with zero CAPEX and minimal OPEX. Some of important features that makes your authentications with CENTAGATE CLOUD more secured and protected. An authentication that requires two or more factor like what you have (device), what you are (biometrics) and what you know (password). An authentication based on previous login’s risk and behavior. Evaluating these risk could stop any trials of security breach. Pre-integrated certified Securemetric FIDO2 server for registration and authentication.
    Starting Price: $2 per month
  • 29
    ThreatMetrix

    ThreatMetrix

    LexisNexis

    Increase customer conversion rates and improve fraud defenses with dynamic threat intelligence, connected across the digital journey. In the digital marketplace, seconds of delay can cost your business valuable revenue. You need to effectively increase conversion rates and navigate a cybercrime-threat climate that constantly grows more complex. LexisNexis® ThreatMetrix® is an enterprise solution for digital identity intelligence and digital authentication that is trusted by over 5,000 leading global brands to inform daily transaction decisions. By combining digital identity insights built from billions of transactions with leading analytic technology and embedded machine learning, our fraud prevention solutions unify decision analytics across the entire customer journey to help:
  • 30
    IBM Security Trusteer
    IBM Security Trusteer helps you recognize customers and protect against malicious users, across all channels. IBM® Security Trusteer® helps organizations detect fraud, authenticate users and establish identity trust across the omnichannel customer journey. Through cloud-based intelligence, backed by AI and patented machine learning, Trusteer provides a holistic approach to identifying new and existing customers, while improving the user experience. More than 500 leading organizations rely on Trusteer to help secure their customers’ digital journey and support business growth. Transparently identify unauthorized access and activities. Establish cross-organizational, actionable insights through real-time assessments. Assess risk, reduce operational costs, and improve efficiencies and security. Outsmart account takeover attempts with behavioral biometrics, AI and machine learning to build digital identity trust.
  • 31
    cidaas

    cidaas

    WidasConcepts

    cidaas is the optimal solution for fast and secure identity management. Thanks to cidaas you create one identity per user across all your channels. cidaas is based on OAuth2.0 and OpenID Connect standards, provides strong API security and with integrated Bot Net Detection and Fraud Detection a secure journey across all your business channels. Modern Identity and Access Management goes like this. Comprehensive feature set for quick and easy integration and implementation of all use cases and systems. We take care of it so you can focus on your core business. No more worrying about maintenance or operation. Countless passwords and pins make life difficult for users and are an unsightly barrier to access on digital channels. With passwordless authentication you secure your digital applications and offer your users a unique customer experience – because the login is the first thing your users see.
  • 32
    Capital One Merchant Services
    Speed up your business's cash flow with secure and reliable merchant services. Capital One has partnered with Worldpay® from FIS, a leading debit and credit card processor, to offer you flexible payment acceptance solutions. We've made getting paid easier, so you can focus on running your business. Accept payments with virtual and smart terminals, hosted web pages, and mobile readers. Enjoy peace of mind with a suite of data security tools. Stay organized with transparent reporting. Take multiple payment methods. Including swipe, EMV, contactless, keyed-in, phone order, email invoicing, PayPal® and more. Accept major credit cards, Visa®, MasterCard®, Discover®, American Express®, as well as gift and loyalty cards. Take advantage of our evolving payment-processing solutions and let us help you strategically manage your cash flow. Capital One Merchant services powered by Worldpay gives you access to new technologies for emerging payments.
  • 33
    Early Warning

    Early Warning

    Early Warning

    A customer submits a new account application via the branch, online, mobile or contact center channel. Early Warning determines likelihood customer is who they say they are by leveraging our industry-leading bank data. Determine likelihood of a valid identity in real-time. Better detect synthetic and manipulated identities. Early Warning predicts likelihood customer will default due to first-party fraud in first nine months of account opening. Leverage predictive intelligence to better understand customer behavior. Early Warning predicts likelihood customer will default due to account mismanagement in first nine months of account opening. Tailor applicant’s privileges to align with your risk threshold. Leverage real-time, predictive analytics that enables better-informed decisions. Include more customers in the mainstream financial system while managing risk tolerance to potentially increase revenue.
  • 34
    Emailage

    Emailage

    LexisNexis

    Your customer's expect a one-click experience. Use our powerful network intelligence and predictive fraud risk scoring to help enable a seamless user experience. LexisNexis® Emailage is a powerful fraud risk scoring solution fueled by email intelligence. Your customers demand the flexibility to interact with you through multiple channels. Whether using a smartphone, tablet, laptop or other device, they expect you to recognize their identity and grant them fast, easy access to your system. At the same time, they want assurance that their personal information is secure and fraudsters cannot hijack their account. That is an extremely challenging task. With the growth of digital channels for consumers, your ability to assess risk on digital elements is critical. This is especially true if your organization, like so many these days, minimizes the amount of personal identity information you collect to speed up onboarding of new customers and limit data exposure risk.
    Starting Price: $499 per month
  • 35
    SecureAuth

    SecureAuth

    SecureAuth

    With SecureAuth, every digital journey is simple, seamless, and secure to support your Zero Trust initiatives. Protect employees, partners, and contractors with frictionless user experience while reducing business risk and increasing productivity. Enable your evolving digital business initiatives with simple, secure, unified customer experience. SecureAuth leverages adaptive risk analytics, using hundreds of variables like human patterns, device and browser fingerprinting, and geolocation to create each user’s unique digital DNA. This enables real-time continuous authentication, providing the highest level of security throughout the digital journey. Enable employees, contractors and partners with a powerful approach to identity security that simplifies adoption of new applications, accelerates efficiency, increases security and helps drive your digital initiatives. Use insights and analytics to drive digital initiatives and speed up the decision making process.
    Starting Price: $1 per month
  • 36
    BeautyNow

    BeautyNow

    BeautyNow

    Beauty Now is the first App in Portugal that brings Beauty and Aesthetic services to you whenever and wherever you want! You can order the services now or schedule for when you want and receive them comfortably in your home, work or hotel. Beauty Now will allow you to find the best professionals, from your geolocation, to get services in the area of Beauty and Aesthetics 365 days a year, 24 hours a day, in a convenient, quick and easy way. The Beauty Now App will search the professionals that are available in your area. Choose the one that is closest to you, the one with the best rating or the professional you have become accustomed to. All payments are made comfortably through your Beauty Now App, and you can use as a form of payment, Visa, Mastercard, American Express, as well as MB Way. Credit cards are subject to verification and authorization by the issuer of the card.
  • 37
    IBM Security Verify Access
    IBM Security Verify Access, formerly IBM Security Access Manager or ISAM, helps you simplify your users' access while more securely adopting web, mobile, IoT and cloud technologies. It can be deployed on-premises, in a virtual or hardware appliance or containerized with Docker. Verify Access also directly connects with Verify SaaS for a modernized, hybrid IAM approach to enable your organization's migration to identity-as-a-service (IDaaS) at a comfortable pace. Enable convenient and secure access to resources on mobile with the Verify mobile companion app for MFA. Migrate to IDaaS at a comfortable pace with a hybrid approach to access management.
  • 38
    SpecTrust

    SpecTrust

    SpecTrust

    SpecTrust provides an all-in-one defense solution for identity abuse & fraud, enabling your company's talent to stay focused on the core business. SpecTrust's cloud-native solution enables you to detect and verify risky users before they ever reach your servers. Security is job one. SpecTrust secures data using customer-dedicated 256-bit encryption keys and enforces strict TLS encryption whenever data enters or leaves the platform. Our proprietary secure stream processor transforms wild internet traffic into normalized data and valuable insights in 10ms or less with virtually perfect horizontal scalability. That’s over ten times faster than you can blink. SpecTrust’s global-scale architecture takes advantage of automatic replication, endless horizontal scalability, and automated recovery to ensure we’re always up, fast, and on target. Customer-dedicated data shards can be region locked to keep your data right where you want it.
  • 39
    BlackBerry Cyber Suite
    Secure and protect your users and devices, even BYOD laptops and smartphones, with a solution that’s focused on earning trust across any endpoint and continuously validating that trust at every event or transaction. Is your organization equipped with the tools to empower your employees, no matter where they’re working? In a situation where employees may be unable to report to the office, it’s essential that they still have secure access to the data and apps they need, whether they use corporate or personal owned devices. The BlackBerry® Cyber Suite provides complete security, effectively preventing breaches and safeguarding against sophisticated threats with advanced AI. It provides a total Zero Trust solution with coverage across the full spectrum of devices, ownership models, network, apps and people. It continuously authenticates users and dynamically adapts security policies to deliver a Zero Touch experience that improves security with no user interruption.
  • 40
    LogMeOnce

    LogMeOnce

    LogMeOnce

    A formidable cyber security defense should be mindful to thwart internal and external threats. External and internal threats have one common denominator. The end user’s adherence to security, policy, and best practices. External elements exploit an unsuspecting internal user’s adherence to sound security policies to find their way in. Granted, external threats can be addressed with various mechanisms such as firewalls, but, inherently it has its roots and seeds in weak internal shortcomings. However, you can easily curb internal threats by simply establishing “automatic & enforceable” security policies, advising end-users to adhere to secure access protocols with trusted credentials. Thankfully, LogMeOnce Patented Technology offers plenty of ways to protect your team members, credentials, and agency with advanced automated authentication. LogmeOnce dashboard creates powerful and unified access to a user’s entire disparate/numerous set of applications.
    Starting Price: $3 per user per month
  • 41
    BioCatch

    BioCatch

    BioCatch

    BioCatch delivers advanced behavioral insights to provide global organizations with actionable intelligence so you can create a secure customer journey. BioCatch analyzes a user's physical and cognitive digital behaviors to generate insights that distinguish between legitimate applicants and cybercriminals. BioCatch detects behavioral anomalies indicative of human and non-human cyberthreats such as Remote Access Tools attacks, Bots, malware and manual account takeover methods. BioCatch detects subtle behavioral indicators that suggest a victim is being unwittingly guided through a fraudulent money transfer. BioCatch's Al-driven behavioral biometrics technology significantly reduces online fraud and enables online identity verification, without compromising the user experience. BioCatch's patented solution is designed to protect identities online while providing web and mobile users with a frictionless experience.
  • 42
    UnifyID

    UnifyID

    UnifyID

    Use UnifyID's authentication platform to remove passwords and one-time passcodes (OTP) from your user experience while improving security and consumer convenience. UnifyID offers Multi-Factor Authentication services that combine deterministic, behavioral biometric and environmental attributes using machine learning to uniquely identify users. Applies advanced machine learning to behavioral biometrics and environmental factors to create a secure digital fingerprint of the user. Passive authentication eliminates painful user experiences, causing poor adoption for Multi-Factor Authentication programs. Say goodbye to annoying passcodes, security questions or even passwords altogether. Our patent-pending technology leverages dynamic user attributes, such as motion and environment, which are neither known by the user nor remotely observable by an attacker; eliminating phishing and bot threats. We designed our solution with developers in mind.
  • 43
    NuDetect

    NuDetect

    NuData Security

    Our solution combines the power of our four integrated layers of security to verify users based on their inherent behavior. Used by major global brands, this solution protects online environments from login to logout. Don’t miss anything during a session. NuDetect is placed at different points across the environment to monitor users from the moment they enter your website until they leave. Find anomalous activity before it results in fraud. With our real-time solution, threats get blocked as they try to access your environment. Protect your customers passively. By looking at behavioral and device-based information, protect your users while they seamlessly enjoy your environment. No friction added. Evolve without lifting a finger. As we gather billions of data points, NuDetect for Continuous Validation learns to recognize your trusted customers, even as their online habits change. Machine learning capabilities adapt to user changes for higher recognition accuracy.
  • 44
    OpenText NetIQ Advanced Authentication
    Using the NetIQ Risk Service engine, you have the option to consume both static and behavior risk metrics to adapt your users’ authentication experience and access security level. This enables you to keep access as simple as possible for your users while protecting your private information. Beyond Azure AD’s base set of multi-factor authentication options, the NetIQ Advanced Authentication framework gives you the freedom to adopt a wide variety of additional authentication types. It also enables you to secure access across your entire mix of on premises and cloud services, whether or not they reside in your Azure environment. A key component of securing your environment is ensuring authentication across all of your users’ entry points. It’s common for organizations to have multiple authentication infrastructures and policies. NetIQ Advanced Authentication offers a single framework for all of your authentication needs, providing consistent security, simplified administration, etc.
  • 45
    PayZang

    PayZang

    PayZang

    We provide hardware, merchant accounts, and gateways to optimize financial goals and customer engagement all on one user-friendly platform. Our comprehensive resources allow businesses around the world to conduct commerce with streamlined data management and ultramodern payment devices, in unattended and attended environments, online and in-person. All products are compliant with international security standards and feature genius technology and design. Give customers the flexibility to make safe and speedy purchases. Our cashless devices accept mobile pay and all major cards via swipe, tap, or dip; they operate autonomously and can be logo branded. Transactions are fully secure with PCI SSC P2PE, certified by Mastercard, Visa, American Express, and Discover. Modernize vending machines. Expedite long lines. Seamlessly manage all processes on one platform. Our leading-edge technology offers easy plug and play to bolster business in every industry.
  • 46
    TeleSign

    TeleSign

    TeleSign

    Deliver timely, personalized information through global SMS/RCS and voice cloud communications. Gain a deeper understanding of your customers from actionable global phone number and subscriber data intelligence. Code once and message your customers at scale using TeleSign’s Messaging API - complete with waterfall delivery between channels. TeleSign Messaging API includes SMS, RCS, and WhatsApp to help you build secure digital communications that connect you with your customers anywhere in the world. Integrate a single Messaging API and start sending reliable, secure SMS, RCS and WhatsApp messages to your customers today. Choose one or all three channels to broaden your programmable messaging strategy and expand your audience. Reach more customers with 120+ optimized points-of-presence and 700+ direct-to-carrier routes​.
  • 47
    Appsian

    Appsian

    Appsian

    Appsian helps some of the largest organizations in the world fully maximize their ERP investment by natively integrating the modern, sophisticated security solutions required to mitigate today’s threats. By leveraging solutions for Single Sign-On, Multi-Factor Authentication, Location-Based Security, Data Masking, Transaction Logging and Real-Time Analytics, an organization’s granular ERP control and visibility are drastically strengthened. Help establish strong cross-application business process controls, reduce material weaknesses and automate complex user management processes like SoD, access requests, periodic review of access certifications, and more. Streamline access management processes and implement strong controls. Break down the silos between disparate systems that make compliance and audit reporting cumbersome. Implement strong GRC policies across all business applications. Reduce the time and costs associated with internal and external audit reports.
  • 48
    Verifi

    Verifi

    Verifi

    Verifi stands above the crowd as an innovative and reliable partner, dedicated to creating simple solutions that deliver value for today’s sellers, issuers, and acquirers. We work hand-in-hand with our partners to provide solutions that are scalable to your business needs. Sellers can process refunds or cancellations for non-fraud and confirmed fraud, avoiding a dispute. Verifi’s expert team handles all dispute management to maximize wins and recover revenue lost to disputes. Cardholder can review enhanced seller and transaction data to confirm purchases. Improve cardholder experience with enhanced details in online and mobile banking. Obtain automated, real-time resolution for pre-disputes based on seller-defined rules. Supports a better cardholder journey with fast and final resolution. Issuers already sending dispute traffic, globally connected to sellers.
  • 49
    FIS Tokenization
    The solution secures card payments anywhere by concealing sensitive cardholder information everywhere. FIS® Tokenization™ dynamically encrypts your card payments for ultimate security when customers pay online, with their phone or in a store. By replacing sensitive cardholder data with unique tokens that can’t be matched back to the cardholder or their account, our payment tokenization solutions can ease Payment Card Industry Data Security Standard (PCI DSS) compliance, better protect cardholders and manage your risk. Replace sensitive cardholder information with a unique token for reduced fraud risk. Enable cardholders to load card credentials to different payment apps quickly and securely. Simplify compliance by reducing the scope of systems that fall under the PCI DSS.
  • 50
    Visa Token Service
    Visa Token Service can help you build and maintain your digital payment experiences while protecting consumers’ sensitive information from fraud. As more consumers come to expect mobile payment solutions, Visa Token Service provides three essential tools to help you meet the demand. Visa offers standards, specifications, development tools, and turnkey mobile solutions to help partners build and deploy their own tokenized apps to cardholders. Work with us to create your own mobile payment application with the Visa Token Service SDK. Develop payment solutions that integrate directly with token management tools. Contactless mobile transactions are leading the next wave of digital payments, and Visa Token Service can make them simple and secure. With Near Field Communication (NFC) technology and Visa PayWave, secure purchases are as easy as the wave of a hand. Make convenient, on-the-go purchases with compatible iOS devices.