Alternatives to Plurilock DEFEND

Compare Plurilock DEFEND alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Plurilock DEFEND in 2024. Compare features, ratings, user reviews, pricing, and more from Plurilock DEFEND competitors and alternatives in order to make an informed decision for your business.

  • 1
    Auth0

    Auth0

    Okta

    Auth0 by Okta takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO.
    Leader badge
    Compare vs. Plurilock DEFEND View Software
    Visit Website
  • 2
    Cisco Duo
    Protect your workforce with simple, powerful access security. We're Cisco Duo. Our modern access security is designed to safeguard all users, devices, and applications — so you can stay focused on what you do best. Secure access for any user and device, to any environment, from anywhere. Get the peace-of-mind only complete device visibility and trust can bring. Respond faster to threats with an easy‑to‑deploy, scalable SaaS solution that natively protects every application. Duo's access security shields any and every application from compromised credentials and devices, and its comprehensive coverage helps you meet compliance requirements with ease. Duo natively integrates with applications to provide flexible, user-friendly security that's quick to roll out and easy to manage. It's a win, win, win for users, administrators, and IT teams alike. Lay the foundation for your zero-trust journey with multi-factor authentication, dynamic device trust, adaptive authentication and secure SSO.
    Leader badge
    Compare vs. Plurilock DEFEND View Software
    Visit Website
  • 3
    Beyond Identity

    Beyond Identity

    Beyond Identity

    Beyond Identity is fundamentally changing the way the world logs in–eliminating passwords and all phishable factors to provide users with the most secure and frictionless authentication on the planet. Our invisible, passwordless MFA platform enables companies to secure access to applications and critical data, stop ransomware and account takeover attacks, meet compliance requirements, and dramatically improve the user experience and conversion rates. Our revolutionary zero-trust approach to authentication cryptographically binds the user’s identity to their device, and continuously analyzes hundreds of risk signals for risk-based authentication.
    Starting Price: $0/ User/ Month
  • 4
    Auth Armor

    Auth Armor

    Auth Armor

    Harness the power of biometrics on smartphones to make authentication easy for any application or website, creating a new approach to logging and authenticating online. Passwordless and 2-factor authentication that lets you authenticate your users with the smartphones in their pockets. Auth Armor puts secure authentication in the hands of every user — no weak passwords or cumbersome codes. We have built powerful APIs, SDKs, libraries, and dashboards to allow you to build what you want to build, how you want to build it. Use our tools to build authentication into any app, using any flow you would like. We offer Consumer facing and workforce protection, giving you the power and flexibility to secure anything, the way you need it. Auth Armor is the fastest and easiest mobile authenticator available. We support instant push messaging directly to user's devices enabling the fastest login and authentication experience.
    Starting Price: FREE for 10,000 active users!
  • 5
    FusionAuth

    FusionAuth

    FusionAuth

    FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome. You'll get all the features your app needs plus a customizable, scalable solution you can run on any computer, anywhere in the world. FusionAuth was built from the ground up to easily integrate with any app, language, and framework. Every feature (yes, every single one) is exposed as an API giving you complete flexibility to handle any use case. You get every feature and acronym you need: registration & login, passwordless, SSO, MFA, SAML, OIDC, OAuth, JWT, social login, and more. Comply with GDPR, HIPAA, COPPA, and PCI requirements in seconds. FusionAuth installs on any platform, any computer, anywhere. Host it yourself or use FusionAuth Cloud, our fully managed SaaS hosting service.
  • 6
    Ping Identity

    Ping Identity

    Ping Identity

    Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.
    Starting Price: $5 per user per month
  • 7
    Ondato

    Ondato

    Ondato

    Ondato is a tech company that streamlines KYC and AML-related processes. We're providing advanced technological solutions for digital identity verification, business customer onboarding, data validation, fraud detection, and more. All of them meet the highest quality standards available for KYC online or offline onboarding for all business and customer types orchestrated from a single interface. We're turning compliance into a business benefit by creating a safer environment for organizations and individuals alike.
    Starting Price: €149.00/month
  • 8
    Symantec VIP
    Your key to one swipe two-step authentication. Two-factor authentication is easy to enable and prevents attacks. With just a swipe of a finger, or use of a security code, your information is secure. Your favorite websites offer secured authentication compatible with VIP. To begin, scan a QR code and security codes will be generated for that website every thirty seconds. With Symantec VIP both enterprise and end users can securely authenticate wherever and however they are accessing the services. With hundreds of supported websites and integrations that you can easily set up yourself, multi-factor authentication is a snap.
  • 9
    AssureID

    AssureID

    Acuant

    Real Time Multi-Factor Identity Verification Software AssureID offers fast multi-factor authentication to improve customer experiences, increase conversion rates and mitigate fraud. Patented technology authenticates IDs by applying 50+ forensic and biometric tests, in seconds, utilizing the industry's largest document library. Acuant's library is powered by human-assisted machine learning for the highest accuracy. AssureID eliminates manual errors, speeds up the document inspection process, and significantly reduces employee training. Solutions integrate easily into any environment in any industry and read IDs from over 196 countries and all 50 US states. Accurate data population with 50+ forensic tests run in seconds in the same seamless process. Three classes of facial match & liveness tests including NIST algorithm, intuitive & fast. World-class patented image capture that automatically crops & detects document type & region.
  • 10
    GateKeeper Proximity Enterprise

    GateKeeper Proximity Enterprise

    Untethered Labs, Inc.

    Passwordless, proximity login to PCs, Macs, websites, and desktop applications. Hands-free, wireless 2FA and password manager through active proximity-detection. IT admins can dynamically allow users to log in to their computers and websites with a physical key either automatically, by touch, by pressing Enter, or with a PIN. Seamlessly login, switch users, switch computers, and logout without passwords, touch, or trouble - just a key. Once a user walks away, the computer will lock, blocking access to the computer and web passwords. With continuous authentication, users are always being checked to ensure that they require access. No more typing passwords. Admins and compliance can now automate password security from a central admin console: enforce stronger passwords, enforce 2FA, and give employees the power of password-free login without interrupting workflow. Reduce helpdesk tickets related to forgotten passwords/password resets. Login and auto-lock with proximity.
  • 11
    RSA SecurID

    RSA SecurID

    RSA Security

    RSA SecurID enables organizations of all sizes to mitigate identity risk and maintain compliance without impeding user productivity. It ensures users have appropriate access and confirms they are who they say they are with a modern, convenient user experience. In addition, RSA SecurID provides unified visibility and control across organizations’ many islands of identity. RSA SecurID marries multi-factor authentication with identity governance and lifecycle controls to address the security challenges associated with delivering convenient access to dynamic user populations across complex environments. It evaluates risk and business context to provide identity and access assurance. Digital transformation creates unprecedented authentication, access management and identity governance challenges for organizations. After all, more users need access to more systems from more devices than ever. RSA SecurID helps organizations address these challenges—and the identity.
  • 12
    OneLogin

    OneLogin

    OneLogin

    Secure critical company information and empower employees with OneLogin, a trusted identity and access management (IAM) solution for the modern enterprise. Designed to strengthen enterprise security while simplifying business logins, OneLogin is an excellent solution for companies looking to enforce security policies with ease. OneLogin includes top-rated features such as single sign-on (SS), unified directory, user provisioning, adaptive authentication, mobile identitiy, compliance reporting, and more.
  • 13
    Entrust Identity as a Service
    Cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). Secure access to apps, networks, and devices for all of your users — with cloud-based multi-factor authentication. Proximity-based login, adaptive authentication and other advanced features contribute to an optimal user experience. Happy users don’t try to circumvent security measures. Everyone wins. This is easier than anything else you’ve tried. Work-saving touches — like built-in provisioning tools and on-premises and cloud integrations — reduce the workload for IT, from deployment through everyday management. Get strong IAM to move faster into the future. Cloud-based Identity as a Service scales quickly to accommodate new users, expanding use cases, and evolving security threats.
  • 14
    Silverfort

    Silverfort

    Silverfort

    Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative agentless and proxyless technology, Silverfort seamlessly integrates with all existing IAM solutions (e.g., AD, RADIUS, Azure AD, Okta, Ping, AWS IAM), extending coverage to assets that could not previously have been protected, such as legacy applications, IT infrastructure, file systems, command-line tools, and machine-to-machine access. Our platform continuously monitors all access of users and service accounts across both cloud and on-premise environments, analyzes risk in real time, and enforces adaptive authentication and access policies.
  • 15
    eMAS

    eMAS

    emudhra

    Strong Identity, Authentication and Access Management solution deployed widely across private and public sector. Define granular policies based on risk and severity to enforce access and authentication. Out-of-the-box support for 15 modes of authentication including digital signatures, biometrics, T-OTP with granular policy and risk definitions and the ability to step-up authentication. Support for single sign-on based on SAML/OAUTH with Agentless Desktop SSO for Windows domain logins. Adaptive Authentication engine that leverages Machine Learning for User Behavioral Analytics and Anomaly detection. See how emAS helps you improve your cyber security compliance and access governance. emSigner is eMudhra's market leading document signing and workflow solution deployed across thousands of customers that supports complex workflows with eSignatures, electronic contracting, eInvoicing and several other workflows out of the box.
  • 16
    HYPR

    HYPR

    HYPR | The Passwordless Company

    HYPR fixes the way the world logs in. Organizations are faced with the challenge of achieving secured and seamless authentication coupled with a flawless user experience at a time when it’s more critical than ever. HYPR’s passwordless multi-factor authentication (PMFA) platform decouples authentication from the organization’s current and future identity providers and eliminates the traditional trade-off between security and user experience by providing uncompromising assurance and consumer-grade experience with true passwordless and phishing-resistant MFA. The solution is trusted by more than 60M users worldwide. With deployments taking hours rather than weeks or months, organizations decrease the risk of attack, increase positive user experience, and lower operational costs.
    Starting Price: $4.00 per user/month
  • 17
    Secfense

    Secfense

    Secfense

    Protect your company, employees, and customers with simpler and stronger authentication. Deploy 2FA in minutes, not weeks. 2FA (and other user access security policies) built into the fabric of the infrastructure, not rigidly fixed to the applications. Enabling the use of any 2FA methods available on the market now and in the future without changing the core. Protection is available across the entire organization, spanning from on-premise, public and private cloud. Secfense is deployed in between your users and the applications they access. It learns the traffic patterns related to authentication. It can then enforce multi-factor authentication login and other sensitive actions without interfering with the applications existing code or database. Up-to-date 2FA methods are always available on the platform. Application changes don’t affect Secfense and applied methods. Take control over session expiration rules across all apps. Don’t rely on VPNs, base trust on users and their devices.
  • 18
    LastPass

    LastPass

    LastPass

    LastPass is a cloud-based password manager available on any system or device, ensuring credentials are protected, private, and always within reach. Simple to set up and effortless to use, LastPass delivers the world's most convenient password management experience for consumers and businesses of all sizes and technical requirements. Say goodbye to password fatigue by generating, sharing, accessing, and managing credentials at the click of a button, while preventing bad actors from accessing precious data and account logins. Businesses also utilize LastPass to consolidate their tech stacks or to fill access management gaps with native integrations for MS Entra, Okta, and other IdPs and IAMs. With over 100 customizable policies, flexible privileges, detailed reporting, MFA and passwordless authentication options, LastPass makes it easy for organizations with numerous logins and increasing security risks to standardize password management company wide.
    Leader badge
    Starting Price: $4 per user per month
  • 19
    Accops HyID

    Accops HyID

    Accops Systems

    Accops HyID is a futuristic identity and access management solution that safeguards critical business applications and data from misuse by internal as well as external users, by managing user identities and monitoring user access. HyID provides enterprises with strong control over endpoints, enabling contextual access, device entry control and flexible policy framework. The out-of-the-box MFA is compatible with all modern and legacy apps, cloud and on-prem apps. It enables strong authentication based on OTP delivered via SMS, email and app, biometrics, and device hardware ID & PKI. Single sign-on (SSO) feature provides better security and convenience. Organizations can monitor security posture of the endpoints, including BYOD devices, and grant or deny access based on real-time risk assessment.
  • 20
    PortalGuard

    PortalGuard

    BIO-key International

    BIO-key PortalGuard IDaaS is a single, flexible cloud-based IAM platform that offers the widest range of options for multi-factor authentication, biometrics, single sign-on, and self-service password reset to support a customer’s security initiatives and deliver an optimized user experience – all at an affordable price point. For over 20 years, industries such as education, including over 200 institutions, healthcare, finance, and government have chosen PortalGuard as their preferred solution.Whether you’re looking for passwordless workflows, support for your Zero Trust architecture, or just implementing MFA for the first time, PortalGuard can easily secure access for both the workforce and customers whether they are remote or on-premises. PortalGuard’s MFA stands out above others as it is the only solution to offer Identity-Bound Biometrics that offer the highest levels of integrity, security, accuracy, availability and are easier to use than traditional authentication methods.
  • 21
    Entrust Identity Enterprise
    The world's most proven on-prem identity & access management (IAM) solution for strong digital security. Identity Enterprise is an integrated IAM platform that supports a full suite of workforce, consumer, and citizen use cases. Ideally suited for high-assurance applications that require a Zero Trust approach for thousands or millions of users, Identity Enterprise can be deployed on-premises or as a virtual appliance. Never trust, always verify. Protect your organization and user communities both inside and outside the perimeter. Secure workforce, consumer, and citizen identities with high assurance use case coverage including credential-based access, smart card issuance, and best-in-class MFA. Limit user friction with adaptive risk-based authentication, passwordless login, and cloud app federation. Option to use digital certificates (PKI) for a higher level of security when and where warranted, either with a physical smart card or a virtual smart card.
  • 22
    TWOSENSE.AI

    TWOSENSE.AI

    TWOSENSE.AI

    Quickly catch unauthorized users and get a better understanding of your organization's highest risks with our dynamic dashboard, whether that be password reuse, credential sharing, unmanaged device use and more. Integrate with your SIEM to keep alerts in one place. TWOSENSE invisibly authenticates users throughout a session and automatically responds to 95% of MFA challenges for your users reducing MFA friction. Find out exactly how much security fatigue is costing your organization. Our software is SSO enabled, SAML and RADIUS ready which means that you can use your existing login workflows and deploy the same day. Validating employees or customers using behaviors is more secure than usernames and passwords, for several years, the Defense Department has been working on ways to identify employees more securely, in part to augment and perhaps replace its existing identification cards that date back to 2000.
  • 23
    Google Cloud Identity
    A unified identity, access, app, and endpoint management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace. Defend your organization with the BeyondCorp security model and Google’s threat intelligence signals. Control access to SaaS apps, enforce strong multi-factor authentication (MFA) to protect user accounts, manage endpoints, and investigate threats with Security Center. Maximize efficiency by enabling intuitive user experiences on endpoint devices, and unify user, access, app, and endpoint management with a single console. Enable users to access thousands of apps with single sign-on (SSO) and manage their company accounts using the same process as their personal Google accounts. Transition to digital by integrating your existing systems on a reliable, trusted platform. Extend your on-premises directory to the cloud with Directory Sync.
    Starting Price: $6 per user per month
  • 24
    LoginID

    LoginID

    LoginID

    With just a few lines of code, LoginID enables websites and apps to integrate FIDO/FIDO2 certified multi-factor authentication via our easy to use SDKs and APIs. Our platform leverages the biometrics on the end user's device to create a private key, public key pair that allows for seamless strong customer authentication. No app installation is required and the private key is stored securely on the end user's device, never leaving. Additionally, LoginID offers Transaction Confirmation, where a transaction can be cryptographically signed providing proof of the user’s confirmation of that specific transaction, which is perfect for merchants who want payment authentication services. LoginID is aligned with PSD2, GDPR, CCPA, and HIPPA. We have SDKs for iOS, Android, React-Native, Web, Python, Java, and Node as well as a WordPress Plugin.
  • 25
    LoginRadius

    LoginRadius

    LoginRadius

    LoginRadius empowers businesses to deliver a delightful customer experience without compromising security. Using our customer identity platform, companies can offer a streamlined login process while protecting digital accounts and complying with data privacy regulations. LoginRadius serves over 3,000 businesses with a monthly reach of 700 million users worldwide. Key platform features include registration services, adaptive security, integration with third-party applications, and customer insights. The company has been named an industry leader in customer identity and access management (CIAM) by Gartner, KuppingerCole, and Computer Weekly. Microsoft is a major technology partner and investor. LoginRadius is headquartered in Vancouver, Canada, with additional offices in Toronto, USA, United Kingdom, Australia, and India. LoginRadius Services: API Authentication OAuth Data Management Secure Login Single Sign On SAML SSO Social Sign On Two Factor Authentication
  • 26
    Trusona

    Trusona

    Trusona

    Trusona, the pioneering leader of passwordless authentication for digital businesses, provides a phishing-resistant alternative to passwords and SMS OTPs. Trusona Authentication Cloud is a passkey-as-a-service platform, offering the simplest, quickest and least expensive way to add passkeys to your website. It improves business growth and profitability with sign-ins that delight your customers, mitigating top threats like phishing and account takeovers (ATOs) while providing a UX designed for the way people live. Organizations in iGaming, travel, financial services, healthcare and more, trust Trusona for their passwordless authentication initiatives.
  • 27
    Centagate Cloud

    Centagate Cloud

    Centagate Cloud

    CENTAGATE CLOUD offers a centralized login option that protects all applications from security breaches by using FIDO2 passwordless authentication. Control, protect and secure your application access. One login credential for all applications. A system that has strong digital security which eliminates phishing, fraud and password theft. Since the authentication is centralized, only one login credential is needed for all applications. Highly cost-effective with zero CAPEX and minimal OPEX. Some of important features that makes your authentications with CENTAGATE CLOUD more secured and protected. An authentication that requires two or more factor like what you have (device), what you are (biometrics) and what you know (password). An authentication based on previous login’s risk and behavior. Evaluating these risk could stop any trials of security breach. Pre-integrated certified Securemetric FIDO2 server for registration and authentication.
    Starting Price: $2 per month
  • 28
    BehavioSec

    BehavioSec

    BehavioSec

    Welcome to the next generation of behavioral authentication. Deployed across global 2000 companies, the BehavioSec platform uses deep authentication to continuously verify user identity with zero friction and over 99% accuracy across millions of users and billions of transactions. While organizations invest significant resources to insulate from attacks, Account takeovers remain a menace. To make matters worse, many costly business challenges – like manual fraud analysis and customer attrition from friction – stem from these failed investments meant to protect. BehavioSec stops account takeover with deep authentication, a new method of verification powered by behavioral biometrics. Deep authentication automatically verifies the human behind the digital identity without adding friction – allowing you to keep fraudsters at bay while drastically reducing costs. BehavioSec addresses new account fraud with population profiling powered by Behavioral Biometrics.
  • 29
    Symantec Advanced Authentication
    Mitigate threats and stimulate growth with Advanced Authentication solutions from Symantec. Get real-time protection for your online and mobile applications. Our leading-edge solution can authenticate an employee, partner or contractor while providing a frictionless login experience. This ensures that legitimate users have anytime, anywhere access from any device, which builds trust and brand loyalty. Get a flexible, scalable solution with both strong multi-factor authentication and risk-based methods like device identification, geolocation and user activity. Catastrophic cyber attacks are happening every day. We make sure you’re prepared to defend your business. Earn customer trust and loyalty by providing the simple, seamless experience they’re looking for. With the right data, you can more easily distinguish between legitimate and fraudulent behavior.
  • 30
    It'sMe

    It'sMe

    Acceptto

    Employees hate using passwords as much as you hate managing password vulnerabilities. More passwords and tokens lead to greater security risk, fatigue, and cost. It’s time to get rid of them for good. 89% of security professionals claim that a more advanced multi-factor authentication tool that provides continuous, behavioral authentication would improve their company’s security posture. Acceptto provides users with Intelligent MFA that intuitively authorizes access to applications and continues authenticating post-authorization. We prevent account takeovers, even if hackers have already acquired passwords. ItsMe™ Intelligent Multi Factor Authentication (MFA) increases your security by authorizing access attempts to a registered device in real-time, be it through a push notification or verification code (SMS, TOTP, email, and etc.). With our timed based one-time password (TOTP), security key, or biometric options, you can authenticate access even when offline.
  • 31
    LiveEnsure

    LiveEnsure

    LiveEnsure

    LiveEnsure® security authenticates users in real time via their smart device. It goes beyond tokens, certs, PINs, OTPs, push or passwords. LiveEnsure® is strong, seamless multi-factor verification of devices, location, knowledge, time, biometrics and behavior in context with an elegant user experience and individual privacy. Instead of crafting home-grown solutions or relying on vendors who infiltrate your identity stack, LiveEnsure® is simple trust API that gives you the power to verify your users across multiple factors with a single call. Developers can offer their users strong but private authentication by simply mashing up a few lines of code with their site or embed our mobile libraries for iOS and Android in your own app. Get rid of traditional passwords, 2FA and captcha altogether with a single API. There are no confusing tokens, certs or push messages. Just a simple call, present and poll API to our cloud authentication service.
  • 32
    WSO2 Identity Server
    WSO2 Identity Server is API-driven, is based on open standards with the deployment options of on-premise, cloud or hybrid. It supports complex IAM requirements given its high extensibility. WSO2 Identity Server helps you do single sign-on and identity federation backed by strong and adaptive authentication, securely expose APIs, and manage identities by connecting to heterogeneous user stores. Leverage the power of open-source IAM in your enterprise to innovate fast and build secure Customer IAM (CIAM) solutions to provide an experience your users will love
  • 33
    Plurilock AI Cloud

    Plurilock AI Cloud

    Plurilock Security

    Plurilock AI Cloud is a cloud-native single sign-on (SSO), passwordless (FIDO2/webauthn), and cloud access security broker (CASB) platform designed specifically for cloud-centric companies relying on an army of SaaS applications to succeed. With Plurilock AI Cloud, companies enable their employees to sign on once to access all of their applications, and gain extensive, granular control over application and workflow access by device, location, time of day, software versions, groups, and organizational units. Plurilock AI Cloud is part of the Plurilock AI platform, which grows as companies do, with simple expansion paths to full, endpoint-based DLP, and then to true continuous, real-time authentication and user/entity behavior analytics (UEBA) for real-time biometric identity threat detection and response (ITDR). Plurilock AI Cloud is rated top in the industry in customer satisfaction, based on the feedback of actual customers.
    Starting Price: $12/user/year
  • 34
    Axiom Protect

    Axiom Protect

    Axiom Protect

    To empower your multiple IT systems( On-premise, cloud or hybrid) by embedding multifactor security to suit each individual system, service, workflow and user's preference. Central Control to meet your business needs and regulatory compliance comes from policies and settings. Default to Custom all with simple clicks. Inbuild Complex Password Source to external LDAP/Active Directory synchronized user and operator sources for consolidation. Bringing trust through user's devices makes authentication more flexible and stronger. Multiple users on a single device or multiple devices for a single user is a business need. It's not hard if you have a good platform. Everything is DATA. Data at rest & at transit security at mobile, web, iOT device, Server, files / DB. Customised security grades with varied key lengths & algorithms. No expensive VPN. SDK and APIs available. 99%+ accuracy to build your EKYC or remote access authentication comes by pure 100% AI/DL based facial biometrics.
  • 35
    Censornet MFA

    Censornet MFA

    Censornet

    Secure access to a wide range of systems, services and applications using an adaptive, cloud-based multi-factor authentication solution. Protect user accounts with more than just a password and reduce the impact of password reuse when the next large scale data breach happens. 100% cloud-based back end, simplifies implementation and accelerates time to value for organisations of all sizes. Adaptive multi-factor authentication delivers a friction-less user experience, intelligently challenging users only when risk is high. Out-of-the-box support for a wide range of systems, services and applications including all major VPN vendors and cloud applications. Passwords are not enough. Multi-Factor Authentication adds an additional layer of protection to user and privileged accounts, eliminating account compromise and identity related threats. Some OTPs sent by legacy solutions are susceptible to interception and vulnerable to phishing and MITM attacks.
  • 36
    SlashID

    SlashID

    SlashID

    Identity is the most common vector for lateral movement and data breaches. SlashID helps you build a secure, compliant, and scalable identity infrastructure. Manage the creation, rotation and deletion of identities and secrets in a single place. Complete inventory of all your identities and secrets, multi-cloud. Detect initial access, privilege escalation, and lateral movement across your IdPs and cloud environments. Add authentication, authorization, conditional access, and tokenization to your services. Detect leaked key materials in real-time and prevent data breaches by rotating them. Automatically block, suspend, rotate or enforce MFA on a detection to reduce the impact of an attack. Add MFA and conditional access to your applications. Add authentication, authorization, credential tokenization, and conditional access to your APIs and workloads.
  • 37
    Veridium

    Veridium

    Veridium

    Veridium is the most comprehensive Integrated Identity Platform powered by AI-based Behavioral Biometrics, enabling Multi-Factor Authentication (MFA), digital ID verification, and a true enterprise-grade passwordless experience for employees and customers. Low code, agile, and flexible. Eliminating the password for customers removes the friction often associated with passwords and delivers increased security for online connections with our single step multi-factor authentication solution, while providing higher levels of identity assertion for organizations. Veridium provide an end-to-end authentication platform for all your WFH needs and any VPN solution, delivering strong, multi-factor, passwordless workforce authentication.
  • 38
    Super Gluu
    Super Gluu is a push-notification two-factor authentication (2FA) mobile app built to work with the Gluu Server. Super Gluu uses public-key encryption as specified in the FIDO U2F authentication standard. Upon device enrollment, Super Gluu registers its public key against the Gluu Server's FIDO U2F endpoint. When authentication happens, there is a challenge response to ensure that the device has the corresponding private key. Better identity access management for customers, citizens, and remote workforce. Super Gluu is supported by the Gluu Server out-of-the-box -- simply turn it on! Make strong access security as easy as approving a push notification. Make strong access security as easy as approving a push notification. The Gluu Server and Super Gluu can work in the same network, without a DNS server hostname and with a self-signed certificate. There is only one limitation: both components should belong to the same network.
  • 39
    aPersona

    aPersona

    aPersona

    aPersona ASM utilizes machine learning, artificial intelligence (learning, problem solving and pattern recognition) and cognitive behavioral analytics to invisibly protect on-line accounts, web service portals & transactions from fraud. aPersona’s adaptive Multi-Factor authentication adds an extra layer of login security to any web service. aPersona was designed to meet a long list of requirements. Meets GDPR Risk Evaluation Guidelines. It is economical. Invisible to minimize any disruption to the end-user login experience. Tokenless to ensure end-users don’t have to download anything or carry anything. Adaptive intelligence to enable highly tuned forensic checking for changing environments. Dynamic identities that change and migrate over time (nothing static!). Learning Modes to make engaging the service simple and painless. aPersona’s patent pending technology provides additional login security with loads of features that helps any organization address their login security concerns.
  • 40
    Acceptto eGuardian
    Acceptto monitors user behavior, transactions, and application activity to create an enriched user profile within each application landscape and subsequently verify if access attempts are legitimate or a threat. No passwords or tokens are required. Acceptto’s risk engine calculates whether an access attempt is legitimate or not by tracking user and device posture pre-authentication, during authentication, and post-authorization. We deliver a continuous, step-up authentication process with real-time threat analytics in an age when identities are persistently under attack. Based on a risk score computed by our proprietary AI/ML algorithms, a dynamic level of assurance (LoA) is computed. Our approach automatically finds the optimal policy for each transaction to maximize security while minimizing friction for the user with machine learning and AI analytics. This provides a smoother user experience without sacrificing enterprise security.
  • 41
    OpenOTP Security Suite
    OpenOTP Security Suite is a European Enterprise-grade Security all-in-one Solution for Identity & Access Management (IAM), including : - Multi-Factor Authentication (MFA/2FA) with U2F / OTP, applicable even for Legacy Applications - Federation Services (SSO with OpenID & SAML / ADFS) - Network Access Control (protecting Wifi & Ethernet Swiches) - VPN security (via an included Radius Bridge), designed specifically for remote work - Windows logins & Remote Desktop Services (RDS) OpenOTP Security Suite combines mobile technology with proven security standards to offer professionals and non-professionals the best alternative, bringing modularity and flexibility to suit any infrastructure's needs. OpenOTP Security Suite is an enterprise-class European security solution designed for installation on-premises or in a private cloud. ++ Free Token App (and compatible with most existing hardware and software tokens) ++ Free 30-day Trial ++ Freeware (<25 users)
    Starting Price: €1.85/User/M
  • 42
    Ory

    Ory

    Ory

    The missing web-scale API for identity and access control. 10x your security, user experience, and PII compliance today. Build secure apps on top of the Ory Network and reach new customers in any geopolitical region of the world with the best login experience ever. Login is more than a username and password. Building it from the ground up is time-consuming and dangerous. Ory's API-first microservice architecture makes it straightforward to integrate projects at any stage. Pay for usage, not features. Get advanced multi-factor to auth on every Ory subscription plan. Plus advanced permissions, SSO, OAuth2, OIDC, multi-tenancy, and so much more. Ory is made for high-performance, high-scale applications in any cloud. Built with developers in mind, Ory lets you quickly build your on-brand user experience and integrate it into your software stack. Ory's focus on open standards and automated data import capabilities makes migrating from legacy systems straightforward.
    Starting Price: $29 per month
  • 43
    XTN Cognitive Security Platform
    The Cognitive Security Platform® (CSP) is a threat and omnichannel fraud protection solution designed to defend digital businesses, to minimize the risks associated with the provision of digital financial services (home banking and digital payments), and avoid any impact on user experience. We provide a fully packaged, out-of-the-box solution that is digital-ready and can be deployed at lightning-fast speed. Cognitive Security Platform®’s modularity lets you personally activate the functions you need to make your digital business safer. AI proprietary algorithms combined with behavioral biometrics and behavioral analysis provide a frictionless end-user experience while guaranteeing the highest level of security. We also allow you to implement anti-fraud strategies by protecting different channels. The omnichannel view lets you manage all fraud that could affect separate channels from a single console, avoiding vertical management.
  • 44
    BlackBerry Cyber Suite
    Secure and protect your users and devices, even BYOD laptops and smartphones, with a solution that’s focused on earning trust across any endpoint and continuously validating that trust at every event or transaction. Is your organization equipped with the tools to empower your employees, no matter where they’re working? In a situation where employees may be unable to report to the office, it’s essential that they still have secure access to the data and apps they need, whether they use corporate or personal owned devices. The BlackBerry® Cyber Suite provides complete security, effectively preventing breaches and safeguarding against sophisticated threats with advanced AI. It provides a total Zero Trust solution with coverage across the full spectrum of devices, ownership models, network, apps and people. It continuously authenticates users and dynamically adapts security policies to deliver a Zero Touch experience that improves security with no user interruption.
  • 45
    RSA ID Plus

    RSA ID Plus

    RSA Security

    Powerful cloud solutions to support your digital transformation at your own pace — tailored to fit every identity and access management requirement. ID Plus also includes the new, multi-functional DS100 hardware authenticator. All plans can be flexibly deployed in the cloud, on-prem or hybrid. And all can be easily adjusted as your needs change. Try ID Plus cloud multi-factor authentication (MFA) solution — one of the most secure products on the market, and the world’s most deployed MFA. Find out why: sign up for our free 2-week trial.
  • 46
    UserLock

    UserLock

    IS Decisions

    Secure Active Directory user logins with Multi-Factor Authentication, Single Sign-On, contextual access controls, and real-time monitoring and reporting. UserLock helps administrators to manage and secure access for every user, without obstructing employees or frustrating IT.
    Starting Price: $2.00/month/user
  • 47
    IBM Security Verify
    Infuse cloud IAM with deep context for risk-based authentication to enable frictionless, secure access for your consumers and workforce. As organizations modernize hybrid multi cloud environments using a zero-trust strategy, identity and access management can no longer remain siloed. In a cloud environment, you need to develop cloud IAM strategies that use deep context to automate risk protection and continuously authenticate any user to any resource. Your journey should match your business requirements. Maintain existing investments and protect on-premises applications as you design and customize the right cloud IAM architecture to either replace or complement your infrastructure. Your users want one-click access from any device to any application. Onboard new federated applications to single sign-on (SSO), embed modern multi-factor authentication (MFA) methods, simplify logistics and give developers consumable APIs.
  • 48
    Boku Identity
    Boku provides a best-in-class mobile identity solution that will protect your business from account takeovers, synthetic identities, and compromised numbers, all through a seamless user experience. Boku Authenticate will protect you against account takeovers (ATOs) that target your customer’s phone number by streamlining your methods for verifying mobile number possession. Instead of sending one-time passcodes (OTPs) that can be stolen or forcing users to implement complicated app based solutions, Boku Authenticate will verify mobile number possession directly on the device by using its built-in connectivity to the mobile operators’ wireless network. The solution is both seamless and secure. Boku Authenticate will reduce user friction while providing the best possible defense against the threat of ATOs.
  • 49
    SecureAuth

    SecureAuth

    SecureAuth

    With SecureAuth, every digital journey is simple, seamless, and secure to support your Zero Trust initiatives. Protect employees, partners, and contractors with frictionless user experience while reducing business risk and increasing productivity. Enable your evolving digital business initiatives with simple, secure, unified customer experience. SecureAuth leverages adaptive risk analytics, using hundreds of variables like human patterns, device and browser fingerprinting, and geolocation to create each user’s unique digital DNA. This enables real-time continuous authentication, providing the highest level of security throughout the digital journey. Enable employees, contractors and partners with a powerful approach to identity security that simplifies adoption of new applications, accelerates efficiency, increases security and helps drive your digital initiatives. Use insights and analytics to drive digital initiatives and speed up the decision making process.
    Starting Price: $1 per month
  • 50
    MonoCloud

    MonoCloud

    MonoCloud

    MonoCloud is a developer-focused platform designed to streamline authentication, authorization, and user management for applications across multiple environments, including web, mobile, IoT devices, and more. It enables developers to easily integrate secure and customizable login processes, supporting a range of authentication methods such as passwords, magic links, one-time passcodes, and social logins like Google, Facebook, and Apple. Built with a strong emphasis on reducing user friction, MonoCloud offers a branded and smooth authentication experience. The platform includes advanced features such as mutual TLS, brute-force protection, and global session management, making it a comprehensive solution for handling user access across various applications and devices. In addition, MonoCloud is designed with developers in mind, providing extensive documentation, integration guides, and support for various front-end and back-end frameworks.