Alternatives to OneMorePass

Compare OneMorePass alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to OneMorePass in 2024. Compare features, ratings, user reviews, pricing, and more from OneMorePass competitors and alternatives in order to make an informed decision for your business.

  • 1
    Auth0

    Auth0

    Okta

    Auth0 by Okta takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO.
    Leader badge
    Compare vs. OneMorePass View Software
    Visit Website
  • 2
    Nevis Authentication Cloud
    Authentication Cloud faster, easier, and more user-friendly. Let customers access your online services without passwords and costly SMS fees. With the Nevis Authentication Cloud, you can offer your customers maximum security and a smooth user experience in no time at all. Authentication as a service – faster, easier and more user-friendly. Enable customers to access your online services without passwords and costly SMS fees. With the Nevis Authentication Cloud you can offer your customers maximum security and a smooth user experience in no time at all. With the Authentication Cloud from Nevis, you can offer your customers maximum security and a smooth user experience in no time at all. Remembering a long, complex password for each individual account no longer fits into today’s fast, mobile world. New solutions with password-free authentication such as fingerprint or face ID are not only faster and more convenient but also significantly more secure for all parties involved.
    Starting Price: $500 per month
  • 3
    Auth Armor

    Auth Armor

    Auth Armor

    Harness the power of biometrics on smartphones to make authentication easy for any application or website, creating a new approach to logging and authenticating online. Passwordless and 2-factor authentication that lets you authenticate your users with the smartphones in their pockets. Auth Armor puts secure authentication in the hands of every user — no weak passwords or cumbersome codes. We have built powerful APIs, SDKs, libraries, and dashboards to allow you to build what you want to build, how you want to build it. Use our tools to build authentication into any app, using any flow you would like. We offer Consumer facing and workforce protection, giving you the power and flexibility to secure anything, the way you need it. Auth Armor is the fastest and easiest mobile authenticator available. We support instant push messaging directly to user's devices enabling the fastest login and authentication experience.
    Starting Price: FREE for 10,000 active users!
  • 4
    Google Authenticator
    Google Authenticator generates 2-Step Verification codes on your phone. 2-Step Verification provides stronger security for your Google Account by requiring a second step of verification when you sign in. In addition to your password, you’ll also need a code generated by the Google Authenticator app on your phone. You can use your Google Account to more easily and securely sign in to thousands of sites and services on the web, while keeping your privacy choices transparent in one place. Protect your Google Account with Security Checkup. This detailed tool provides you with personalized and practical recommendations to help you strengthen the security of your Google Account. Hacked passwords are more common than you think. Two-step verification protects you from unauthorized access to your account. To do this, it requests a second step after entering the password.
  • 5
    Trusona

    Trusona

    Trusona

    Trusona, the pioneering leader of passwordless authentication for digital businesses, provides a phishing-resistant alternative to passwords and SMS OTPs. Trusona Authentication Cloud is a passkey-as-a-service platform, offering the simplest, quickest and least expensive way to add passkeys to your website. It improves business growth and profitability with sign-ins that delight your customers, mitigating top threats like phishing and account takeovers (ATOs) while providing a UX designed for the way people live. Organizations in iGaming, travel, financial services, healthcare and more, trust Trusona for their passwordless authentication initiatives.
  • 6
    Unikname

    Unikname

    Unikname

    Prevent phishing hack attempts of your web accounts in integrating the next-gen strong authentication that secures all your web access. Protect your admin account of all your websites that you manage. Offer your clients a password-less experience of registration. Add the next-gen social authentication that respects the privacy life. Easily manage the web access rights of your employees and partners. Install the Unikname solution for all web environments you need in minutes! Easily manage your trust certificates and web access from the dashboard dedicated. Manage the access rights of admins and website users. Enable Unikname as the default authentication system. Disable standard authentication. Fine-tune the style options of the Unikname login button. Unikname relies on the latest OAuth and OpenID Connect authentication protocol standards and allows to generate a trust certificate attached to your web domain name.
    Starting Price: €150 per year
  • 7
    Google Titan Security Key
    A stronger way to protect your account. Like a second lock after your password, Titan Security Keys help prevent phishing and keep out anyone who shouldn’t have access to your online accounts, including Gmail. Backed by Titan security. Titan Security Keys include special firmware engineered by Google to verify the key’s integrity and are built on FIDO® open standards, so you can use them with many apps and services. Works with the Advanced Protection Program. Titan Security Keys are compatible with the Advanced Protection Program, Google's strongest security offering. For use with Android and iOS devices. You can also use the Micro USB to USB-A connecting cable to connect to your computer. Titan Security Keys work with Google phones, Chromebooks, tablets, Google’s Advanced Protection Program, and virtually anything running Google Chrome.
  • 8
    LastPass

    LastPass

    LastPass

    LastPass is a cloud-based password manager available on any system or device, ensuring credentials are protected, private, and always within reach. Simple to set up and effortless to use, LastPass delivers the world's most convenient password management experience for consumers and businesses of all sizes and technical requirements. Say goodbye to password fatigue by generating, sharing, accessing, and managing credentials at the click of a button, while preventing bad actors from accessing precious data and account logins. Businesses also utilize LastPass to consolidate their tech stacks or to fill access management gaps with native integrations for MS Entra, Okta, and other IdPs and IAMs. With over 100 customizable policies, flexible privileges, detailed reporting, MFA and passwordless authentication options, LastPass makes it easy for organizations with numerous logins and increasing security risks to standardize password management company wide.
    Leader badge
    Starting Price: $4 per user per month
  • 9
    Fingerprint

    Fingerprint

    Fingerprint

    Stop fraud, spam, and account takeovers with 99.5% accurate browser fingerprinting as a service. Access suspicious visitor activity and geolocation at lightspeed. Integrate our API into your server-side business rules or signup process. Receive instant notifications delivered securely to your backend systems, ideal for building scalable and asynchronous processes. Powerful account takeover protection for any web application. Keep your customers' accounts safe by accurately identifying threats before they cause damage. Users that re-use passwords across multiple services are at risk of having their accounts accessed by fraudsters who purchased or hacked their account information from elsewhere. Catch these attempts by associating multiple login attempts from bot networks. Social engineering is still one of the most reliable methods for fraudsters to access accounts. Require new visitors to provide additional authentication to stop phished accounts from being accessed easily.
    Starting Price: $80 per month
  • 10
    Bravura OneAuth

    Bravura OneAuth

    Bravura Security

    Immediately protect your organization against two of the most prevalent cyberattacks: phishing and brute force attacks by eliminating the threat vector of passwords with Bravura OneAuth powered by HYPR. Provide your workforce with a passwordless sign-in experience that delivers on speed, simplicity, and significantly increased security across your security fabric. Bravura OneAuth uses one-touch biometrics that acts as access points making authentication for your workforce as easy as unlocking a cell phone yet significantly more secure than traditional Multi-Factor Authentication (MFA) solutions. It replaces traditional, tedious, and poorly adopted MFA methods and removes passwords entirely from the solution to reduce the risk of compromised credentials.
  • 11
    Safenet MobilePASS
    Evolve your authentication infrastructure to include One Time Password (OTP) solution, as well as advanced security applications. With a Mobile Pass permits a user to use one set of login credentials to access multiple applications. Automated processes, over-the air activation and installation for software tokens, and intuitive self-service tools ensure extensive support for end users and lower Helpdesk costs. Our Authentication Suite is filled with every tool you will need to manage the security of your business from Two-Factor Authentication (2FA) to Single Sign-On (SSO) and much, much more. The success of your organization depends on your ability to give authorized customers, partners and employees access to online applications, corporate networks, and business portals from anywhere.
  • 12
    IDmelon Authenticator

    IDmelon Authenticator

    IDmelon Technologies

    IDmelon Authenticator, a mobile app available on Google Play and App Store, allows you to use your ubiquitous smartphone into a FIDO certified security key so as to easily and securely log into websites, online accounts, and apps on your PC. This means when you want to log into your accounts such as Microsoft or GitHub, instead of the traditional way of presenting your username and password, you add a layer of security by using your username and security key., which is an easier, stronger, and phishing-resistant way of authentication. In addition to it, IDmelon Admin Panel, which is a dashboard available on our website for login to manage users and security keys, enables organizations to deploy passwordless authentication within their companies overnight to protect their data and workforce.
    Starting Price: $5.99/user/year
  • 13
    Skillmine Authenticator

    Skillmine Authenticator

    Skillmine Technology Consulting

    All Users, All Apps, All Devices, Just One Authenticator! AUTH is a unified authentication platform that supports all major protocols and can be integrated with enterprise applications, partners applications, and social media platforms without making any changes. Use Skillmine Authenticator to centralize authentication and simplify access management across multiple applications in an organization and improve the security of the user login process. Why Skillmine Authenticator? 1. Is a one-stop solution to manage all your passwords at once. 2. Allows businesses to interact with various authentication and authorization protocols. 3. Supports multiple methods of login and works well irrespective of the platform. 4. Supports OAuth 2.0, OpenID Connect, SAML, AD, LDAP. 5. Supports various online platforms like Facebook and Google. 6. Classical logins, password-less logins, social logins are possible with Skillmine Authenticator.
  • 14
    Keyote

    Keyote

    TeskaLabs

    Use your smartphone for secure authentication, next-gen logins, and more. Keyote is built by cyber security veterans, following standard authorized cryptography to give you the strongest possible protection. Everyone has a smartphone today, you don't need to have any additional hardware such as a USB token or smart card to be more secure. Software keys are easy to be copied and hence lost. Keyote stores keys in the phone security chip, effectively preventing their extraction. You must authorize the use of keys with biometry such as a fingerprint, Face ID, etc. So even if the phone is lost or stolen, your keys are still safe. Passwords are dead. People have to remember long passwords, and they have to change them frequently. We believe that there is a simpler way how to login: a smartphone. Contemporary mobile phones contain a powerful security chip, which in combination with a biometry authentication such as fingerprint or Face ID allows a user to login very securely and conveniently.
  • 15
    REVE Secure

    REVE Secure

    REVE Secure

    Dual authentication check of login’s credibility via user’s registered credential (Password) and security token generated at authorized user end only. Passwords are incompetent in securing your logins. Adding 2nd-factor authentication will not only deliver dual authentication security but also ensure safe & secure login & protected account access. With Two Factor Authentication, secure your remote logins and access to Linux/UNIX servers from security breaches and malicious attacks. Integrate a second layer of authentication to existing Windows password-based security to ensure the all-round protection of your enterprise data. Secure & protect logins and access to each different web application and service to avoid unauthorized access and cyber-attacks. Blocks unauthorized login attempts made using passwords. Supports a multitude of platforms and devices.
  • 16
    MonoCloud

    MonoCloud

    MonoCloud

    MonoCloud is a developer-focused platform designed to streamline authentication, authorization, and user management for applications across multiple environments, including web, mobile, IoT devices, and more. It enables developers to easily integrate secure and customizable login processes, supporting a range of authentication methods such as passwords, magic links, one-time passcodes, and social logins like Google, Facebook, and Apple. Built with a strong emphasis on reducing user friction, MonoCloud offers a branded and smooth authentication experience. The platform includes advanced features such as mutual TLS, brute-force protection, and global session management, making it a comprehensive solution for handling user access across various applications and devices. In addition, MonoCloud is designed with developers in mind, providing extensive documentation, integration guides, and support for various front-end and back-end frameworks.
  • 17
    Veridium

    Veridium

    Veridium

    Veridium is the most comprehensive Integrated Identity Platform powered by AI-based Behavioral Biometrics, enabling Multi-Factor Authentication (MFA), digital ID verification, and a true enterprise-grade passwordless experience for employees and customers. Low code, agile, and flexible. Eliminating the password for customers removes the friction often associated with passwords and delivers increased security for online connections with our single step multi-factor authentication solution, while providing higher levels of identity assertion for organizations. Veridium provide an end-to-end authentication platform for all your WFH needs and any VPN solution, delivering strong, multi-factor, passwordless workforce authentication.
  • 18
    GateKeeper Proximity Enterprise

    GateKeeper Proximity Enterprise

    Untethered Labs, Inc.

    Passwordless, proximity login to PCs, Macs, websites, and desktop applications. Hands-free, wireless 2FA and password manager through active proximity-detection. IT admins can dynamically allow users to log in to their computers and websites with a physical key either automatically, by touch, by pressing Enter, or with a PIN. Seamlessly login, switch users, switch computers, and logout without passwords, touch, or trouble - just a key. Once a user walks away, the computer will lock, blocking access to the computer and web passwords. With continuous authentication, users are always being checked to ensure that they require access. No more typing passwords. Admins and compliance can now automate password security from a central admin console: enforce stronger passwords, enforce 2FA, and give employees the power of password-free login without interrupting workflow. Reduce helpdesk tickets related to forgotten passwords/password resets. Login and auto-lock with proximity.
    Starting Price: $3/user/month
  • 19
    GateKeeper Proximity Password Manager
    Proximity-based passwordless login to PCs, Macs, websites, and desktop applications. Hands-free, wireless 2FA and password manager through active proximity-detection. IT admins can dynamically allow users to log in to their computers and websites with a physical key either automatically, by touch, by pressing Enter, or with a PIN. Seamlessly login, switch users, switch computers, and logout without passwords, touch, or trouble - just a key. Once a user walks away, the computer will lock, blocking access to the computer and web passwords. With continuous authentication, users are always being checked to ensure that they require access. No more typing passwords. Admins and compliance can now automate password security from a central admin console: enforce stronger passwords, enforce 2FA, and give employees the power of password-free login without interrupting workflow. Reduce helpdesk tickets related to forgotten passwords/password resets. Login and auto-lock with presence-detection.
    Starting Price: $3/user/month
  • 20
    WatchGuard Passport

    WatchGuard Passport

    WatchGuard Technologies

    WatchGuard Passport gives your employees the Cloud-delivered security they need to work freely from the office, at home or on the go. Each of the services in the Passport bundle provides persistent, always-on protection that travels with your user. Authenticate people and enforce strong, multi-factor authentication into VPNs, Cloud applications, endpoints and more. Protect users on the Internet, block phishing attempts and enforce web policy anywhere, anytime without requiring a VPN. Respond by detecting and killing malware and threats while containing ransomware and related C&C channels. WatchGuard’s endpoint security platform delivers maximum protection with minimal complexity to take the guesswork out of endpoint security.
  • 21
    Keyless Authenticator

    Keyless Authenticator

    Keyless Technologies

    Nothing to remember. Nothing to steal. You are the key. Adopt zero-trust authentication to protect your remote workforce and enable strong customer authentication with just a look. Anywhere. Any time. Any device. Embrace passwordless, multi-factor authentication to eliminate fraud, phishing and credential reuse – all while enhancing customer and employee experiences and protecting their privacy. Unique capabilities powered by unique technology. Hardware Agnostic. Since we do not rely on the device hardware or sensors, Keyless can be deployed on a large set of devices and appliances. Drive better outcomes for your organization by eliminating passwords. Top-Notch Security. No central honeypot, no data on user devices. Data can never be stolen or lost because no private information is accessible to anyone but the user. Reduce password associated costs by going passwordless. Password Reset Costs. The average helpdesk labor cost is estimated at $70.
  • 22
    Symantec Email Security.cloud
    Safeguard Microsoft Office 365, Google G Suite, and on-premises email with the industry’s most complete email security solution. Insulate users from spear phishing, credential theft and ransomware attacks by using Email Threat Isolation. Prevent insidious email threats such as spear phishing, ransomware, business email compromise and email spam. Stop spear phishing emails with multiple layers of protection, threat isolation, spam filtering, advanced security email analytics, built-in user awareness, education tools, and more. Block the latest ransomware with content defense, sandboxing, and link protection technologies that detect emerging, stealthy, and zero-day attacks. Defeat business email compromise with impersonation protection, sender authentication enforcement and brand protection controls. Protect your brand reputation by using automation to solve the practical issues of enforcing sender authentication (DMARC, DKIM and SPF) with Symantec Email Fraud Protection.
  • 23
    WinMagic MagicEndpoint
    As a leading developer of cybersecurity solutions for over 25 years, WinMagic has entered the passwordless secure authentication market in 2022 by releasing MagicEndpoint. Leveraging our pedigree and experience in protecting endpoints and data-at-rest, MagicEndpoint is referred to as the most secure authentication solution with the best possible user experience – no user action required! MagicEndpoint ensures that CISOs and cyber security professionals can easily implement passwordless authentication, addressing their cyber security needs, while eliminating password friction and reducing password management costs. MagicEndpoint addresses a growing industry need for precise, strong user authentication while still protecting the data security within devices, servers, and networks.
  • 24
    Asgardeo
    Asgardeo helps developers implement secure authentication flows to applications in a few simple steps. Easily integrate single page, regular web, and mobile applications. SDKs that enable working with various technology stacks. Enable social sign-in with Google, Facebook, and GitHub using pre-defined templates (with more to follow). Configure external identity providers that can connect with open standards like OpenID Connect and SAML to your application. Manage your customers, employees, and partners with (default) supported onboarding and management workflows. Use Asgardeo provided directory or plug in your own LDAP or Active Directory via an agent. Choose from a variety of methods such as Email OTP, SMS OTP, and TOTP for 2FA. Define multiple steps and configure options according to user requirements. Unlock the full application experience by focusing on the business logic and enable login and secure access to end-users.
  • 25
    Acceptto eGuardian
    Acceptto monitors user behavior, transactions, and application activity to create an enriched user profile within each application landscape and subsequently verify if access attempts are legitimate or a threat. No passwords or tokens are required. Acceptto’s risk engine calculates whether an access attempt is legitimate or not by tracking user and device posture pre-authentication, during authentication, and post-authorization. We deliver a continuous, step-up authentication process with real-time threat analytics in an age when identities are persistently under attack. Based on a risk score computed by our proprietary AI/ML algorithms, a dynamic level of assurance (LoA) is computed. Our approach automatically finds the optimal policy for each transaction to maximize security while minimizing friction for the user with machine learning and AI analytics. This provides a smoother user experience without sacrificing enterprise security.
  • 26
    Google Advanced Protection Program
    The Advanced Protection Program safeguards users with high visibility and sensitive information from targeted online attacks. New protections are automatically added to defend against today’s wide range of threats. Gmail blocks over 100 million phishing attempts every day. But sophisticated phishing tactics can trick the most savvy users into giving their sign-in credentials to hackers. Advanced Protection requires you to use a security key to verify your identity and sign in to your Google account. Unauthorized users won’t be able to sign in without your username and password. Safe browsing on Chrome protects 4 billion devices against risky sites, and Advanced Protection performs even more stringent checks before each download. It flags or even blocks you from downloading, files that may be harmful. Only app installations from verified stores, like Google Play Store and your device manufacturer’s app store, are allowed.
  • 27
    Centagate Cloud

    Centagate Cloud

    Centagate Cloud

    CENTAGATE CLOUD offers a centralized login option that protects all applications from security breaches by using FIDO2 passwordless authentication. Control, protect and secure your application access. One login credential for all applications. A system that has strong digital security which eliminates phishing, fraud and password theft. Since the authentication is centralized, only one login credential is needed for all applications. Highly cost-effective with zero CAPEX and minimal OPEX. Some of important features that makes your authentications with CENTAGATE CLOUD more secured and protected. An authentication that requires two or more factor like what you have (device), what you are (biometrics) and what you know (password). An authentication based on previous login’s risk and behavior. Evaluating these risk could stop any trials of security breach. Pre-integrated certified Securemetric FIDO2 server for registration and authentication.
    Starting Price: $2 per month
  • 28
    OmniDefend
    OmniDefend secures your employees, contractors and vendors by using strong authentication and universal single sign-on to access and secure business applications and processes. OmniDefend eliminates customer fraud by using multi-factor authentication to identify and secure customer transactions online or on-premise. OmniDefend allows you to quickly add authentication to your website so you can deliver a password-less experience for your customers and secure e-commerce transaction. When it comes to security, OmniDefend implements standards that have been proven in the industry. OmniDefend supports OpenId, OAuth 2.0, and SAML for maximum compatibility and security for single-sign on applications. SCIM 2.0 allows OmniDefend to work seamlessly alongside identity management and user provisioning.
  • 29
    LoginID

    LoginID

    LoginID

    With just a few lines of code, LoginID enables websites and apps to integrate FIDO/FIDO2 certified multi-factor authentication via our easy to use SDKs and APIs. Our platform leverages the biometrics on the end user's device to create a private key, public key pair that allows for seamless strong customer authentication. No app installation is required and the private key is stored securely on the end user's device, never leaving. Additionally, LoginID offers Transaction Confirmation, where a transaction can be cryptographically signed providing proof of the user’s confirmation of that specific transaction, which is perfect for merchants who want payment authentication services. LoginID is aligned with PSD2, GDPR, CCPA, and HIPPA. We have SDKs for iOS, Android, React-Native, Web, Python, Java, and Node as well as a WordPress Plugin.
    Starting Price: Free
  • 30
    HYPR

    HYPR

    HYPR | The Passwordless Company

    HYPR fixes the way the world logs in. Organizations are faced with the challenge of achieving secured and seamless authentication coupled with a flawless user experience at a time when it’s more critical than ever. HYPR’s passwordless multi-factor authentication (PMFA) platform decouples authentication from the organization’s current and future identity providers and eliminates the traditional trade-off between security and user experience by providing uncompromising assurance and consumer-grade experience with true passwordless and phishing-resistant MFA. The solution is trusted by more than 60M users worldwide. With deployments taking hours rather than weeks or months, organizations decrease the risk of attack, increase positive user experience, and lower operational costs.
    Starting Price: $4.00 per user/month
  • 31
    AppSmart Identity
    Securely connect everyone to everything. Connecting with people, applications and devices is a key requirement of digital transformation. AppSmart Identity provides identity and access management for every user across all applications to all interconnected systems to securely access and manage your cloud migration services and all other services from a single place. Users don’t want to remember multiple passwords. With single sign-on, uses can access business systems with one account ensuring a seamless user experience for all their cloud migration services and cloud managed services. With multi-factor and strong authentication users can make sure that the identities that access business systems are fully verified. Policy-based MFA prevents unauthorized users from accessing corporate data with passwords alone. One place for all your cloud managed services eg. manage all your users, groups and devices.
  • 32
    OpenAM

    OpenAM

    Open Identity Platform

    If you have multiple sites and applications in your company, probably you need to provide seamless authentication to all of them. So when user logged in at one of your sites once, he does not need to enter his credentials on other sites. So, OpenAM can help you to solve all this issues. OpenAM ships with more than 20 authentication modules, which you can use to customize your authentication process. Also, you can customize sequence of authentication modules, to provide multi-factor or adaptive authentication. OpenAM can also manage authorization, so you can restrict access to desired resources according to different authorization policies. OpenAM allows to extend just any functionality, from authentication modules to user data source. Besides, it supports UI customization to create separate end-user pages with personal branding.
  • 33

    BioSig-ID

    Not Available

    BSI is a cybersecurity company that identifies and eliminates cheating, identity theft, and fraud with a written password. We analyze not what is written but how it is written. Our technology identifies and stops impersonators intent on illegal activities. Clients choose us because our technology is user-friendly, yet highly accurate. In fact, surveys show that 46% of first-time users reported the technology was “Entertaining”, while 98% agreed it’s more secure than a typed password. To the small group who write about difficulties please visit our help desk open 24x7, complete with self-help articles (found by selecting the “?” icon when you enroll or authenticate). As with most things, you must prepare yourself and read or watch our how-to instructions. With over 100M authentications completed worldwide, we report that approximately 99.97% of users experience no problems using our technology. Clients love what we do for them with pages of testimonials on our site.
  • 34
    swIDch

    swIDch

    swIDch

    swIDch’s OTAC technology combines elements of the three most common authentication systems, user ID/passwords, RSA hardware/ software for generating authentication codes, and tokenization. Based on the world’s first 1-way dynamic authentication technology, OTAC sets a new standard for authentication in cyber security beyond the limitations of existing authentication methods. swIDch is an authentication technology expert to help every person and every organization have secure access to the information they want in communication networks through an easy and secure identity authentication process. Our authentication technology guarantees trustworthy access anywhere in the world, regardless of network connection. We prove that authentication is not a difficult technology, but a secure transport that leads to the desired information. swIDch helps to remove CNP frauds in the most secure and cost-effective way.
  • 35
    Retruster

    Retruster

    Retruster

    Protect all users against Phishing emails, Ransomware and Fraud. 90% of cyber attacks use a fake email to gain access to your business. Just 1 Phishing email can lead to massive costs often reaching the hundreds of thousands, plus Ransomware, Identity Theft and Data Breaches. Do business knowing that you're protected with the leading phishing solution. All employees are covered, and you're never left wondering if an email is a threat. When it comes to how to prevent email phishing, Retruster is your answer. All you need is your Microsoft username and password, and you're set. No downloads required. Retruster is a member of the Microsoft™ Partner Network and Microsoft™ Appsource. It's the ultimate Office 365 anti phishing tool. It’s also compatible with any other solutions you have.
  • 36
    Axiad Cloud

    Axiad Cloud

    Axiad Cloud

    Systematically authenticate across all users, machines, and interactions with a cloud-based, complete, and flexible authentication platform. Axiad helps organizations move to a passwordless future without the friction and risk of fragmented solutions and ultimately improve their cybersecurity posture and empower their end users. Establish best practices for user security, eliminate silos, and meet compliance requirements with enterprise-grade passwordless MFA. Establish best practices for user security, eliminate silos, and meet compliance requirements with government-grade phishing-resistant authentication. Go beyond an in-place IAM product, establish best practices for user security, and meet compliance requirements with passwordless and phishing-resistant MFA. Enhance machine identity authentication and improve overall security with a unified, highly customizable PKI solution.
  • 37
    Trust Swiftly

    Trust Swiftly

    Trust Swiftly

    Only ask what you need to with 10 identity verification methods. Trusted by businesses that block more than 1% of transactions or spend more than 1-hour reviewing customers. Approve more real customers while blocking fraudulent users and risky transactions. Automate identity proofing and populate fraud solutions with more user data. Accept or reject based on user data and leverage it to fight chargebacks. Building a system for reviews or enhanced user authentication takes a lot of time. With Trust Swiftly, we provide multiple methods for your customers to verify themselves and automatically populate it in Sift, allowing for robust workflows. Whether you are an eCommerce store, app, or marketplace, we have the verification levels for you. Require verification adaptively depending on Sift scores or business rules by applying friction smartly.
    Starting Price: $0.01 per verification
  • 38
    Microsoft Authenticator
    Go passwordless. Enter your username and confirm your sign-in with your phone. It’s that easy! Passwords can be forgotten, stolen, or compromised. With Authenticator, your phone provides an extra layer of security on top of your PIN or fingerprint. Use Authenticator to sign-in to Outlook, OneDrive, Office, and more. Protect all of your accounts with two-step verification. The app also helps you secure all of your online accounts by using the industry standard time-based OTP (one-time password) codes.
  • 39
    Material

    Material

    Material

    Email is an essential repository of sensitive content, the key to countless accounts, and the most ubiquitous business application. When attackers have multiple ways in, blocking messages is no longer enough. Secure critical messages without sacrificing productivity. Material automatically classifies and redacts sensitive content in email, keeping it safe even if someone gets in. A quick verification step brings the original message back into the mailbox. Limit the scope of a breach by preventing attackers from using email accounts to hijack other services. The material adds a simple verification step before granting access to password resets and other critical messages. Phishing training is an incomplete best practice, while one user reports an attack, others fall for it. Material allows a single report from any employee to instantly protect the entire organization. Get unprecedented visibility and control over your entire email footprint.
  • 40
    Authgear

    Authgear

    Oursky

    Authgear is a highly customizable authentication solution to help businesses better manage their users, mitigate fraud, alleviate password fatigue, and accelerate development team's timeline. It offers a simple, secure, and scalable solution for developers to easily integrate 2FA, Session Management, Magic-link, Biometric, Social Login, and other security features into their own apps within a few minutes. In addition, Authgear also has an Admin Portal for developers and IT support to manage user access, user sessions, and analyze event logs.
    Starting Price: $100 / month
  • 41
    Everykey Echo
    Everykey Echo transforms your smartphone and paired device into a FIDO2 passkey that only authenticates when two of the user's paired Everykey devices are within range of each other and form an encrypted connection, replacing passwords or OTP codes with secure public key cryptography. With no credentials to steal, account takeovers are prevented.
  • 42
    eMAS

    eMAS

    emudhra

    Strong Identity, Authentication and Access Management solution deployed widely across private and public sector. Define granular policies based on risk and severity to enforce access and authentication. Out-of-the-box support for 15 modes of authentication including digital signatures, biometrics, T-OTP with granular policy and risk definitions and the ability to step-up authentication. Support for single sign-on based on SAML/OAUTH with Agentless Desktop SSO for Windows domain logins. Adaptive Authentication engine that leverages Machine Learning for User Behavioral Analytics and Anomaly detection. See how emAS helps you improve your cyber security compliance and access governance. emSigner is eMudhra's market leading document signing and workflow solution deployed across thousands of customers that supports complex workflows with eSignatures, electronic contracting, eInvoicing and several other workflows out of the box.
  • 43
    ThumbSignIn

    ThumbSignIn

    ThumbSignIn

    Any channel, any device – we’ve got you covered. Choose from our suite of user-friendly authentication solutions, from 2FA to passwordless biometrics, to find the right authentication for your business and users. Start with 2FA and progress to more advanced technology like biometrics-based authentication to continue improving user experience and security over time. Our SaaS-based authentication service, REST APIs , mobile SDKs and UI widgets deliver a powerful combination of software components that can be used to build omni-channel authentication experiences that span mobile, web, phone, IoT, chatbots, kiosks, physical access and more. It’s time to take the security burden off of users! Our mission is to democratize access to strong authentication technology and make the digital world safer for everyone. ThumbSignIn provides cost-effective, scalable SaaS-based solutions to help companies select the best way to strengthen their existing systems with two-factor authentication (2FA).
    Starting Price: $3 per user per month
  • 44
    Secfense

    Secfense

    Secfense

    Protect your company, employees, and customers with simpler and stronger authentication. Deploy 2FA in minutes, not weeks. 2FA (and other user access security policies) built into the fabric of the infrastructure, not rigidly fixed to the applications. Enabling the use of any 2FA methods available on the market now and in the future without changing the core. Protection is available across the entire organization, spanning from on-premise, public and private cloud. Secfense is deployed in between your users and the applications they access. It learns the traffic patterns related to authentication. It can then enforce multi-factor authentication login and other sensitive actions without interfering with the applications existing code or database. Up-to-date 2FA methods are always available on the platform. Application changes don’t affect Secfense and applied methods. Take control over session expiration rules across all apps. Don’t rely on VPNs, base trust on users and their devices.
  • 45
    AP Lens

    AP Lens

    AP Lens

    AP Lens is a Sandbox Browser that isolates networks using DNS Whitelisting. We stop the attack before it reaches the network. What does AP Lens provide? - Web Filtering: Flexible and user-friendly content blocking. - Anti-Phishing: Stop look-alike domains with 100% accuracy. - Ransomware Protection: Isolate the network without affecting business applications. - Secure Remote Work: Enforce internet usage policies without VPN slowness. - No More 0-Day Attacks: Escape the limits of blacklisting with AP Lens Augmented Whitelist. - Compliant: AP Lens meets regulatory requirements requested by cybersecurity insurance policies. - One-Click Installation: No need for a lengthy setup process or updating from the user's side. - No Maintenance: Stop malware and phishing without continuous monitoring. Our team builds on over 20 years of experience in cyber security, cloud security, and information protection in industries such as private banking and the public sector.
  • 46
    ID R&D

    ID R&D

    ID R&D

    Frictionless biometric authentication and liveness detection. ID R&D uses the power of AI and the science of biometrics to transform the user experience. Surprisingly effortless. Significantly more secure. ID R&D combines extensive research in the science of biometrics with advances in AI to deliver award-winning voice, face, and behavioral biometric authentication software. We’re on a mission to make authentication simultaneously frictionless and significantly more secure. ID R&D technology works with digital and traditional interaction channels, IoT devices, embedded hardware and more. Text dependent and text independent voice verification software null. Accurately detect fraud attempts that use recording, synthesized or converted voice null. The world’s first entirely passive facial liveness detection software – iBeta tested, ISO 30107-3. Continuous verification of web and mobile users through keystroke detection and more.
  • 47
    OneLogin

    OneLogin

    OneLogin

    Secure critical company information and empower employees with OneLogin, a trusted identity and access management (IAM) solution for the modern enterprise. Designed to strengthen enterprise security while simplifying business logins, OneLogin is an excellent solution for companies looking to enforce security policies with ease. OneLogin includes top-rated features such as single sign-on (SS), unified directory, user provisioning, adaptive authentication, mobile identitiy, compliance reporting, and more.
  • 48
    Daito

    Daito

    Daito

    Daito is a web-based 2FA authenticator for small teams and big companies alike. Securely share access, no phone is needed. Daito does only one thing, manage TOTP 2FA tokens for you and thus offers a fully isolated system, separate from your password manager. Keep your 2FA token management separate from your password management and prevent worst-case scenarios. What do you do when you store usernames, passwords, 2FA seeds, and 2FA tokens in your password manager and this password manager gets breached? The authenticator is web-first and web-only. Access and manage your company's 2FA tokens from any browser and OS. Save money and the accompanying hassle of managing company phones. No more worrying about lost, malfunctioning, or missing devices. Give IT teams and admins full control, and limit regular users. Prevent 2FA seed leakage by limiting access only to generated 2FA tokens, not the underlying seed codes.
    Starting Price: $19 per month
  • 49
    Futurae

    Futurae

    Futurae Technologies

    The Futurae Authentication Platform provides a comprehensive platform for legacy, web and mobile applications. One platform with multiple solutions that can be used for MFA and transactions signing. Forget the days of being charged for every transaction or authentication, we charge per active user per month. Modular solutions that you can define for your specific platform, application or user groups. Whether integrating through API or our web widget, you will be able to define fallback solutions in case the user is experiencing difficulty with the primary method. Smartphone, feature phone or landline, we have the right solution to make sure that you can reach each and every one of your users. Using push notifications, users can authenticate or confirm a transaction by tapping approve on the mobile authenticator app. A timed security passcode will be delivered to the user via SMS that the user will need to enter in order to confirm their action.
    Starting Price: $0.20 per user per month
  • 50
    Symantec Advanced Authentication
    Mitigate threats and stimulate growth with Advanced Authentication solutions from Symantec. Get real-time protection for your online and mobile applications. Our leading-edge solution can authenticate an employee, partner or contractor while providing a frictionless login experience. This ensures that legitimate users have anytime, anywhere access from any device, which builds trust and brand loyalty. Get a flexible, scalable solution with both strong multi-factor authentication and risk-based methods like device identification, geolocation and user activity. Catastrophic cyber attacks are happening every day. We make sure you’re prepared to defend your business. Earn customer trust and loyalty by providing the simple, seamless experience they’re looking for. With the right data, you can more easily distinguish between legitimate and fraudulent behavior.