Alternatives to Precise YOUNiQ
Compare Precise YOUNiQ alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Precise YOUNiQ in 2024. Compare features, ratings, user reviews, pricing, and more from Precise YOUNiQ competitors and alternatives in order to make an informed decision for your business.
-
1
Spintly
Spintly
Truly wireless, cloud-based door access control system for a seamless, hassle-free, and contactless user experience. A modern access management system that combines the power of the cloud, smartphone, and wireless technology. Spintly is transforming the physical security industry with its fully wireless, cloud-based access control system. It removes the complexity of the process of deploying an access control solution in a building. With absolutely no wiring the installers can save more than 60% of their time and cost and be more productive. Our vision is to make the built world smarter and simpler by providing a frictionless access control experience to users and to make the building smarter with our fully wireless mesh platform for smart building devices. Spintly offers solutions to various industry segments with its fully wireless access control hardware along with cloud-based software. -
2
Alcatraz AI
Alcatraz AI
Connects seamlessly with fast and easy implementation. Our robust access control unit combines superior intelligence with a modern design. Powered by machine learning at the door, the Rock ensures real-time authentication, analytics, and access control. With 2D and 3D sensors onboard capturing data, the Rock’s analytical prowess outclasses other security options. Get ready for incredible accuracy and effortless user interaction. With 3D facial mapping and deep neural networks, the Rock can authenticate users in real time for the smoothest experience possible. Pair the access control system with any third-party badge reader for a 2F or 3F security solution in more restricted areas. A long scanning range and field of view allow the Rock to detect and prevent tailgating. Auto-tagging and alerts allow the admin to address concerns without the need for specialized guards or other hardware. AI assembles profiles based on a few device interactions. -
3
Sima
Active Witness
Sima does more than just keep the bad guys out. Sima is a highly secure yet frictionless cloud-based Access Control reader. Sima has the ability to read both mobile credentials (QR codes) and facial biometrics. This allows the integrated cloud-based software to issue both single (QR only) and multi-factor (facial verification) for highly secure and customized facility access. We take your privacy very seriously. We use facial recognition technology to perform facial authentication. This allows us to verify identity and grant access to a location. Facial data will be stored on our servers only for the purpose of identification. Your personal data, including your face picture, will not be shared with third parties.Starting Price: Free -
4
STANLEY Security
STANLEY Security
STANLEY Security offers a wide range of access control systems to help you protect your assets and create a safer environment for employees and visitors. The right access control system is the cornerstone of your entryway security, enabling you to manage who enters, when, and how, with visibility to all that’s going on. STANLEY Security has the technology and expertise you need for your access control security: for global and small business, schools and campuses, manufacturing facilities, and for commercial enterprises of all kinds. Find your solution today. The right access security supports a healthy and safe environment for your employees and visitors. STANLEY Security can build you a commercial access control system that's tailored to your needs. Limit and personalize access to restricted areas to only those who need it, with the flexibility to grant secure temporary access to visitors. -
5
Door Cloud
SPICA GROUP
Door Cloud comes with an outstanding user experience. Secure your workspace while ensuring maximum mobility for your workforce, and open your doors from anywhere using a smartphone. The Door Cloud app turns a smartphone into an access control tool. It eliminates the need for ID card readers and ID cards, and significantly reduces implementation time and the costs of access control. Our solution offers a secure and convenient way to unlock doors. Keep your facilities safe and secure for employees, contractors, and outside visitors. Easily enable access to the right people at the right time. Monitor real-time happenings in your facilities and increase operational efficiency while our security protocols ensure the highest security standards for your business. Door Cloud access control works with standard electric locks and does not require any specific smart lock. It offers professional access control management, which is scalable to hundreds of doors and thousands of users. -
6
Touch N Go
Bayometric
Touch N Go – a fast, secure & simple way to integrate biometric fingerprint identification into your solution with just FOUR lines of code. A scalable, reliable and high performing biometric identification solution for seamless integration. Makes implementing and maintaining fingerprint recognition easy with no learning curve for developers. Provides best fit identity solution for workflows with demanding security that keeps developers happy and productive and IT satisfied and in control. Offers organizations a cost-effective turnkey biometric identification system leveraging proven, best of breed technologies so organizations can focus on their core operations. -
7
Phonexia Voice Verify
Phonexia
Shorten the time necessary for clients to authenticate over the phone by 30+ seconds and reduce costs significantly. Secure access to your clients’ data conveniently with voice biometrics and detect fraud attempts natively. Verify clients in 3 seconds based on their voice and offer them an immersive, passwordless authentication experience. Offer your customers a seamless, secure, and passwordless authentication experience by identifying them based on voice biometrics instead of hard-to-remember passwords. Phonexia Voice Verify leverages Phonexia Deep Embeddings™ Speaker Identification technology powered by artificial intelligence to provide extremely fast and accurate speaker verification. Phonexia Voice Verify is a cutting-edge voice verification solution designed specifically for contact centers to enhance them with an intuitive security layer. -
8
ImageWare Authenticate
ImageWare Systems
Increase the fidelity of user access management with biometrics. Simple to use and easy to deploy, Authenticate provides true user assurance across your enterprise applications and end customer base. Add your existing environments and its self-enrollment feature to quickly get users up and running. For simple passwordless login, the users can choose the most convenient option from the enabled modalities. When a more secure authentication is needed, you can enforce use of two or more modalities to reach a higher level of security. Facial Authentication: using a mobile phone or laptop webcam, users look at the camera similar to taking a selfie. Highest level of authentication, particularly when combined with the NIST compliant Biointellic Anti-Spoofing technology. Voice Recognition: users speak a randomized phrase, typically using a mobile phone. -
9
ThumbSignIn
ThumbSignIn
Any channel, any device – we’ve got you covered. Choose from our suite of user-friendly authentication solutions, from 2FA to passwordless biometrics, to find the right authentication for your business and users. Start with 2FA and progress to more advanced technology like biometrics-based authentication to continue improving user experience and security over time. Our SaaS-based authentication service, REST APIs , mobile SDKs and UI widgets deliver a powerful combination of software components that can be used to build omni-channel authentication experiences that span mobile, web, phone, IoT, chatbots, kiosks, physical access and more. It’s time to take the security burden off of users! Our mission is to democratize access to strong authentication technology and make the digital world safer for everyone. ThumbSignIn provides cost-effective, scalable SaaS-based solutions to help companies select the best way to strengthen their existing systems with two-factor authentication (2FA).Starting Price: $3 per user per month -
10
Honeywell WIN-PAK
Honeywell
Honeywell’s WIN-PAK 4.8 software solution provides a cost-effective way to integrate and manage access control, video surveillance, and intrusion detection through a single interface. Building upon WIN-PAK’s legendary and robust workstation-based management system, WIN-PAK 4.8 provides an intuitive browser-based interface allowing users to perform everyday access control actions from virtually anywhere. WIN-PAK 4.8 can be easily scaled from a single site to a multi-region, enterprise-level solution without restrictions on the number of users or sites being managed. WIN-PAK 4.8 supports third-party integrations such as HID's Mobile Access®, BioConnect® Suprema®, Morpho biometrics, point-of-sale systems, visitor management, and HR applications. Using the included WIN-PAK API, your software developers can create custom integrations to meet your integration needs. Integrated access, video, intrusion, and fire systems through one interface. -
11
Swiftlane
Swiftlane
Swiftlane combines convenience and high security to ensure every community is a safe, desirable place to live. Our cloud-based end-to-end smart technology provides access to every point in a building using face recognition access, mobile access, video intercom, visitor PINs, key card access, and voice-enabled unlock. At Swiftlane, we care deeply about protecting and elevating multifamily communities through smart access technology with features that provide safety, security, and peace of mind. What residents want and demand has drastically changed. Now, residents expect amenities like keyless entry, visitor access, and secure package and delivery management. Swiftlane is focused on solving the major challenges and pain points for the multifamily industry to ensure residents are happy and safe, investors are profitable, and property managers are operationally efficient. Swiftlane smart access technology provides safer, more secure access solutions for multifamily communities.Starting Price: Free -
12
MRI MIRRA
MRI Software
A data integration solution that connects building and occupier level access control systems. One card for building and occupier access control with instant activations, updates, and de-activations. Meet stringent privacy, security, and compliance standards to protect people and organizations. Synchronize data between building and occupier systems to eliminate time-consuming, error-prone manual procedures. Are multiple access control systems getting in the way of a smooth welcome or infallible security in your building? Credentials management is error-prone and time-consuming without integrated building and occupier systems. Give occupiers the convenience of one credential and one card, synchronized across both systems. Your building is worth so much more when it’s hassle-free. Streamline credentials management and tighten security with MRI MIRRA. Data integration between disparate access control systems provides instant card activations, modifications, and de-activations. -
13
CERTIFY Access Control
CERTIFY
Introducing CERTIFY Access Control, the Revolutionary solution for secure access, physical access control, identity management, and contactless authentication systems. Workplaces are adopting a new set of working guidelines for today's work environment, and the burden of following these guidelines grows. As a result, standard documentation and manual paperwork is required for entry into your office. With cutting-edge facial recognition technology, CERTIFY SnapXT scans the facial features and compares them with the images stored in the database. With 99.9% accuracy for detecting faces, thus winning the trust of your visitors and maintaining your organization’s reputation. CERTIFY SnapXT device has a thermal sensor that detects the body temperature of the user who enters your facility and transmits the data wirelessly to the server. The data then will be analyzed, and it denies access to the user if their temperature exceeds the set parameter.Starting Price: $9.95 per month -
14
Senstar
Senstar
With intelligent video management, video analytics, access control and innovative perimeter intrusion detection systems, Senstar offers a comprehensive suite of proven, integrated technologies. A modular solution for security management and data intelligence, as well as an open, highly scalable video management system with built-in video analytics, it includes full-featured access control and perimeter intrusion detection modules. Senstar’s product portfolio is the industry’s best. By selling what we manufacture, Senstar can service, customize and adjust for any project. Where multiple layers of security are needed, Senstar products can work together for complete facility-level solutions. -
15
Hirsch Velocity Software
Identiv
Identiv’s Hirsch Velocity Software is an integrated security management system that manages access control and security operations in hundreds of different facilities, from single high secure rooms to multi-building, multi-location campuses. What if a person enters a building and is later found to be symptomatic of an illness? Hirsch Velocity Software with Contact Tracing can pull a report of everyone who entered the same door who can then be notified to either get tested or self-quarantine. Hirsch Velocity Software provides the security and functionality expected from high-end systems with the ease-of-use found in entry level packages. Velocity delivers stringent security compliance, interoperability, and expansion and flexibility options designed to accommodate the evolution of security technology and meet the needs of even the most complex business, personnel, and facility requirements. -
16
Verbio
Verbio
Increase security and user experience in daily interactions with the unique potential of voice. An innovative language agnostic, cost-effective and reliable alternative to seamlessly verify and identify users in real-time. Voice biometrics allows to automatically recognize any person through the characteristics of their voice and it can smartly substitute traditional authentication methods (cards, passwords, signature, fingerprint, etc) in security access control, user verification for digital transactions or for fraud prevention and detection. With an easy and cost-effective solution, authentication through voice biometrics brings an innovative and safe experience to users, with a risk-free and remote access. Biometric Authentication and Identification through voice has never been so secure and fast with different operational uttering models for each type of client and advanced anti-spoofing methodologies. -
17
HID Origo
HID
HID Origo is HID Global’s physical access control cloud platform that enables technology partners to build integrated access control solutions through the cloud. This platform provides seamless and consistent service while improving how access control solutions are delivered. In addition, HID Origo opens opportunities for the adoption of new, more flexible service subscription models while reducing costs and increasing operational efficiency. Trust a secure infrastructure backed by the world’s leading cloud vendors, validated by industry certifications, and delivered via HID Global’s service level agreements and support. Access and manage a trusted ecosystem of cloud-connected access control devices, applications, and trusted mobile identities in one place. Utilize data to ensure a seamless user experience, provide operational efficiency and make decisions to guide the business forward. HID Origo offers a scalable and secure infrastructure that ensures top-tier service delivery. -
18
CloudABIS
M2SYS Technology
Built with nearly 20 years of experience in large-scale biometric technology projects, CloudABIS™ is a superscalar, biometrics-as-a-service (BaaS) matching system that removes the burden & cost associated with building and maintaining a reliable biometric identification system. CloudABIS™ can compare millions biometric templates/sec for fast 1:N matching & de-duplication requirements. Customers simply connect through our API or CloudApper™ software & instantly have the ability to perform fast 1:N matching. Our software supports many fingerprint readers & device activation is seamless with our CloudScanr™ app. CloudScanr™ also enables the biometric system to instantly work across any web browser. There are many viable fingerprint readers on the market. Most fingerprint SDKs allow you to generate a standard ISO template since this is a universal format. -
19
DERMALOG Biometric Software
DERMALOG Identification Systems
The world's fastest and most accurate software. DERMALOG high-speed identification software provides a crucial contribution to prevent identity fraud. It is continuously improved to guarantee reliable products. The software traces identities and duplicates of biometric documents such as national IDs, ePassports, for instance in border control, voters and refugee registration. DERMALOG offers scalable and customizable software that allows performing a wide variety of tasks for processing, editing, searching, retrieving and storing biometric templates and subject records. In addition to the DERMALOG fingerprint technology the German innovation leader presents multi-modal biometric systems which can combine fingerprint identification with an iris or face modality. DERMALOG provides the world's fastest Fingerprint matching. DERMALOG Face Identification provides highest accuracy and speed. DERMALOG Palm Identification for effective crime solving. -
20
Alice Biometrics
Alice Biometrics
ALICE offers a frictionless, automatic, immediate and accurate online identity verification solution with the highest level of security at an efficient cost, which is purchased without commercial assistance and integrates in minutes. Alice Biometrics is the perfect solutions for companies with a need to verify users either for business operations (shared mobility) or due to legal requirements (fintech). We provide leading anti-fraud technology with more than 10 years of research and 64 technical papers published. Our algorithm has been evaluated by NIST (National Institute of Standards and Technology).Starting Price: Free -
21
Innovatrics ABIS
Innovatrics
Innovatrics ABIS is a biometric identity management system supporting fingerprint, iris and facial recognition. Fast and accurate performance is achieved with minimal hardware requirements. Thanks to its modular architecture, our ABIS is easy to customize. Open APIs allow smooth integration with other systems to avoid vendor lock-in. We have successfully deployed our ABIS to hundreds of large scale biometric projects, including some of the most complex biometric systems worldwide. Utilizing our fingerprint, facial and iris recognition technology, you can easily get a solution tailored to your business processes. Our high-performing algorithms are consistently ranked among the best based on independent NIST tests. With our ABIS modules, you can build an identity management solution tailored to your needs. Add additional modules and upgrade when necessary. Our licensing policies are flexible to suit the needs of each project. -
22
SpeechPro
SpeechPro
SpeechPro is a reseller of intelligent speech technologies, voice and facial biometrics, as well as solutions for audio and video recording, processing and analysis. SpeechPro is one of the few companies in the world that offers both biometric modalities: face and voice. SpeechPro's goal is to build and maintain long-term trust-based customer relationships. Technologies and solutions offered by SpeechPro are used by private companies and public sector in over 70 countries of the world. We share our experience and help our clients to become experts in our products by providing training services, professional consulting services and customization. SpeechPro delivers innovative products and technologies to empower people, make the interaction of human and the digital environment safe, confidential and comfortable, and eventually to help client's business to succeed. Audio forensics solutions from an industry leader. -
23
Optimized face biometric deployment options, at the highest level of security. Remote biometric registration. Detects and evaluates face and facial features in real time. Detects head poses, closed eyes, eye gaze, open mouth and spectacles. National identity tokenization. V-OS is V-Key’s core patented technology, a virtual secure element. It is a secure sandbox that is embedded within a native iOS or Android mobile app, and creates a safe operating environment where data can be stored and cryptographic processes can be executed in isolation from the rest of the mobile app. V-OS App Protection solution can detect and protect the mobile app from threats, such as reverse-engineering, hooking, tampering, app integrity checks, library signature validation, code-injection, debugging and more. In an insecure OS environment when the phone is compromised, apps integrated with V-OS Application Protection have rooted and jailbreak detection mechanisms that allows a mobile app to run smoothly.
-
24
Jumio
Jumio
With identity theft and account takeover on the rise, it’s increasingly difficult for businesses to trust that someone is who they claim to be online. Jumio’s identity proofing and eKYC solutions are powered by the Jumio KYX Platform and leverage biometrics, AI and the latest technologies to quickly and automatically verify the digital identities of new customers and existing users. Jumio provides an automated and intuitive user experience that takes less than a minute to complete. Jumio supports more countries, languages, and document types than any other solution. Jumio seamlessly integrates into websites, iOS or Android applications via APIs, SDKs and webcams. Quickly integrates into your website or mobile app and lets your users shift from a desktop to mobile experience as desired. All data is transmitted and stored with strong AES 256-bit encryption. Jumio is PCI DSS Level 1 compliant which speaks to the seriousness that we take data security and privacy. -
25
Rohos Face Logon
Rohos
The program is designed to make the standard Windows logon procedure more convenient and offer greater security. It allows accessing a Windows computer in an easy, fast and secure way by using any Windows-compatible camera. The user’s login is performed automatically once the face has been recognized by the program. Rohos Face Logon provides user identification by biometric verification in an automatic continuous process, based on neural network technology. Automatic login or unlocking the desktop when your face is recognized. Self-training helps to avoid face recognition failure. Use an additional USB flash drive as a key for your computer or notebook. Ability to combine both face recognition and a USB stick for login or use them separately. Multi-user support, you can register the faces of several users for any user account! All registered face patterns are saved and any unsatisfactory ones may be deleted.Starting Price: $11.90 one-time payment -
26
FaceTec
FaceTec
The FaceTec interface makes 3D Liveness Detection and 3D Face Matching fast, easy, and incredibly secure for everyone, regardless of their device. During onboarding, FaceTec’s two-second video-selfie verifies 3D liveness, matches the user’s 3D Face to their Photo ID, OCRs the text on their ID, and sets up their new account. Every time they return, FaceTec’s ongoing user authentication again proves 3D Liveness and compares their new 3D FaceMap to the one stored from onboarding. If they match, they get instant access; no password required! Login from any smartphone, tablet, PC or Laptop, and unlock everything from your car door to your bank account. Real users gain access easily, but bad actors, bots and hackers are rebuffed by level 1&2 anti-spoofing certified by NIST/NVLAP. FaceTec is the 3D face matching market leader and provides more security, flexibility, and convenience than any other biometric modality. -
27
Yoti
Yoti
We’ve partnered with Post Office to provide accessible and inclusive identity services across the UK. The Yoti app is your secure digital ID. It’s the safe place to store your personal details, encrypted so only you can access them. When you need to prove your age, identity or other details about yourself, you can securely share just the details required without revealing everything about yourself. Give your customers a safe way to prove who they are with your business. Our verification solutions can be integrated into your website, app, terminal or managed through our custom platforms. Our systems are built in a way that means we cannot mine or sell data to third parties. Once we’ve completed our security checks, we can’t access any user details. We’re trusted by regulators for adhering to the highest standards of security. Yoti was founded on a strong set of principles that we uphold to ensure we continue to only build tech for good. -
28
Nametag
Nametag
Nametag is the fast, safe, everywhere ID. Our mission is to bring authenticity to the internet and enable people to build trustful relationships. By putting privacy first, Nametag gives you control of sharing your personal information and the power to choose when it’s shared, where it’s shared, and for how long. We empower individuals to share validated details about who they are with other people or companies. We enable businesses to identify their customers in real-time and request the necessary details for a faster and more trusted transaction. Never get locked out. If you lose your phone, lose access to your email, or even get a new driver’s license, you'll still be able to sign in with Nametag. Don’t overshare. With Nametag's Privacy Mask, share only the necessary information and conceal the rest. Companies benefit too by not holding unnecessary personal information (PII). -
29
Oloid
Oloid
Retrofit your workplace with modern access control. Flexible options to choose from, face, Bluetooth, or QR code. Easy retrofit with existing badge readers and access control systems. Secure your assets with contactless biometrics & tailgating detection. Turn iPhones, iPads, Android Phones, or tablets into smart readers. Oloid prevents unauthorized access and reduces dependence on manual entry procedures. We support integration with your existing IT systems for a seamless experience. Employees can choose contactless biometrics or mobile credentials to gain physical access. Make the workplace frictionless and secure for Smartphone and non-smartphone users alike. Use computer vision to keep an accurate count of people entering & exiting doors and enforce occupancy limits at the points of entry with Oloid’s rule-based access control. Leverage existing security cameras or install off-the-shelf IP cameras. -
30
IDenticard
IDenticard
Design the perfect program for your facility and people. Our deep portfolio allows us to be your one-stop shop for everything from robust access control and visitor management solutions to branded ID cards and accessories. Design the perfect program for your facility and people. Our deep portfolio allows us to be your one-stop shop for everything from robust access control and visitor management solutions to branded ID cards and accessories. Empower your faculty and staff to get help quickly during an emergency by replacing outdated and ineffective communication methods with a modern panic button solution. Process guests with ease to ensure maximum safety at your site. IDenticard’s solutions specialists will work with you to assess your site’s Visitor Management needs before helping you implement the ideal solution for your campus. -
31
Samsung Pass
Samsung
Say goodbye to forgotten passwords. Get past security with just a glance or touch. Just use your biometrics to log in to your apps and websites quickly and securely. Samsung Pass is an ’identity management as-a-service’, enabling secure access through biometric authentication. Simply authenticate through biometrics without ID & Password input. No need to input an ID & Password to log in to websites anymore. Samsung Pass provides an enhanced user experience by integrating advanced biometrics. Your biometric template will be encrypted and secured by Samsung Knox. Samsung Pass adopts FIDO (Fast Identity Online) technology to ensure valid authentications and provide simple and secure biometric authentication services. -
32
Imageware Biometric Engine
Imageware
The Imageware Biometric Engine is a scalable, agnostic, multi-modal biometric technology platform for identity management, ensuring only valid individuals gain access to controlled areas or obtain secure documents. Using one or more biometric technology factors the Biometric Engine conducts 1:1 biometric searches to verify an individual’s identity, 1:N searches to identify an individual within a population, and X:N investigative searches against watch lists and black lists. It is agnostic in biometric algorithm and hardware, supporting the largest number of algorithms and devices on the market. Using two or more biometric types, such as a face and finger, the modalities are processed through different algorithms and the results are merged after programmed logic is applied to the results. Imageware has been developing proven solutions for secure identities since 1997. -
33
TrulySecure
Sensory
The fusion of face & voice biometric authentication creates a highly secure, hassle free experience. Sensory’s proprietary speaker verification, face recognition, and biometric fusion algorithms leverage Sensory’s deep strength in speech processing, computer vision, and machine learning. The unique combination of face and voice recognition provides maximum security, yet remains fast, convenient and easy to use, while ensuring the highest verification rates for the user. Biometrics aren’t just beneficial for their security—they’re also more convenient than other methods. Not all biometric solutions are created equal, and some have been known to accept false positives (a phenomenon called “spoofing”). Sensory’s novel approach utilizing passive face liveness, active voice liveness, or a combination of the two leverages a deep learning model that nearly eliminates spoofs from fraudsters using 3D masks, photos, video recordings, and more. -
34
WEB-key
BIO-key
Use our world-class biometric platform to streamline access and secure identity for your enterprise and nations around the globe. Compliant-by-design, BIO-key's solutions are NIST tested and built with integrity. A comprehensive multi-tenant enterprise biometric management platform built around one of the world’s most accurate and scalable biometric engines. API for WEB-key and biometric solutions to include in your application/environment. BIO-key offers a variety of Microsoft-qualified Windows Hello USB scanners that can be used out of the box with Windows Hello and Windows Hello for Business, or for use with our WEB-key biometric platform and PortalGuard MFA/SSPR as one of many supported brands of scanners. Reduce user frustration, down time, and calls to the help desk, or try one of these hybrid approaches. Required with a password for remote and home-based employees, contractors, business partners and other designated external users. -
35
TypingDNA
TypingDNA
A smarter, user-friendly authentication that replaces SMS 2FA codes, reducing costs by an order of magnitude. Protect user accounts with powerful typing biometrics analysis, accurately and passively. Available anywhere people type, with a flexible API and low-code integration. TypingDNA records typing biometrics data, also known as keystroke dynamics. The data consists of timings and durations of various key press events. Every new user enrolls typing patterns to store a baseline of their typing behavior. Once a user is enrolled, new typing patterns are collected and analyzed by our engine to verify a user’s identity with typing biometrics. Seamless SCA with keystroke dynamics for stellar user experience, compliant with PSD2 and EBA approved. Use typing behavior to deliver high security and great user experience at an unprecedented value. Maintain the integrity of your assessments with a friendlier user experience based on the way learners type.Starting Price: $ 0.2 per user per month -
36
DigitalPersona
HID Global
Go Beyond Multi-factor Authentication with DigitalPersona® software. Expand to risk-based factors, secure every application, offer frictionless access and deploy quickly. Enhance security with industry leading biometric solutions. Simplify processes, speed queues and confirm identities for a range of critical citizen, criminal justice and military applications. Select from an array of U.are.U® readers, modules and sensors. Leading fingerprint technologies to meet your specific OEM, retail, hospitality and commercial identity management requirements. -
37
Say-Tec
Finnovant
Say-Tec is our flagship cybersecurity product, it combines state-of-the-art biometric technology with blockchain technology to ensure the safety of your data. Say-Tec eliminates the need for multiple passwords by using your unique face and voice biometrics to unlock a device, login to an account, and access your private data. Standard web interfaces could include invoking Say-Tec during account set-up, or during the log-in process, or resetting a password when it has been forgotten. Say-Tec can completely replace the user-id and password friction of logging into a website. Say-Tec has been tailored to support the world of decentralized apps, websites, and processing, which is commonly encountered with Blockchain access, cryptocurrency, and crypto wallets and exchanges.Starting Price: Free -
38
Access control is an essential component of building security. You need truly reliable software to manage the access profiles of different users of your facility. Our access control software (Access Management System) is a future-proof access management system for medium- to large-sized applications. It is easy to use, operate and expand. It offers the highest data security and several features found only in high-end security solutions. On top of this, the software is also open for integration with third-party systems, thus making it a very versatile solution for your access control projects. Our access control solution can easily grow with the needs of the customer. The software is offered in three pre-configured software bundles for different-sized enterprises, Lite, Plus, and Professional. The bundles offer each a large range of cardholders and doors enabling an easy upgrade when your organization grows. Up to 400.000 cardholders and up to 10.000 doors can be administered.
-
39
Zoox Pass
Zoox
Once you have made a contactless web check-in, you can access your services through your Zoox Pass. The identification is automatic and the release is immediate. Our API (Application Programming Interface) for biometric authentication and facial recognition already operates integrated to the main management systems in the hospitality and healthcare segments with Zoox Pass hospitality and Zoox Pass Health. The Zoox Pay technology is available for Zoox Pass Hospitality subscribers. It is integrable with several payment gateways (in Brazil and abroad) and generates safer and faster payment flows, using tokenized data from virtual wallets and acquiring contracts. Whether through webapps or self-service totems of the systems developed by your company, the possibilities are many. Less queues and quicker processes, as payments, releases and check-ins. No need for an app to download. Make use of authentication and facial recognition APIs in apps your own or developed by third-parties. -
40
B-Line
B-Line
B-Line is an all-in-one smart building platform that helps property managers and employers automate digital access, amenity booking, space management, and HVAC controls under one platform. By seamlessly integrating with existing security and HVAC systems, our AI-powered interior positioning system provides real-time and historical data to visualize your building performance, occupancy dynamics, and move management to help to optimize your assets and enable your organization to perform at its highest level. -
41
SwiftConnect
SwiftConnect
Access control should be an automated downstream event from the reason for access, and with SwiftConnect it is. Directories, space management systems, mobile device managers, and other upstream sources of truth and applications can all add or revoke access permissions and credentials for employees and tenants. Our software system can support an Apple credential, which you can access through your Apple wallet. Seamlessly bring your company into the era of hybrid work by providing the scalable infrastructure for employees to book and access space from anywhere to anywhere. SwiftConnect provides centralized office management, which makes hybrid and flexible workplaces possible. Any owner or property manager can turn their siloed and separate buildings into a network of assets. Tenants can benefit from amenities, services, and flex spaces across the whole portfolio, not just their building. -
42
BlueDiamond
LenelS2
With multi-technology readers, a feature-rich mobile app and the ability to support mobile and physical credentials, organizations can upgrade to the BlueDiamond™ experience at their own pace. The BlueDiamond mobile user experience enables employees to turn any smartphone into a device for effortless, touchless access. The BlueDiamond solution leverages Carrier’s 20 years of experience developing mobile credential technology. With over 4,000,000 Bluetooth® locking devices deployed across multiple industries – including Energy, Financial, Hospitality and Real Estate. LenelS2 is proud to be a part of the Carrier Healthy Buildings Program, which includes the BlueDiamond touchless access offering. Designed to work seamlessly with existing infrastructure and leverage open credentialing standards, BlueDiamond multi-technology access control readers are platform agnostic and support the standard output protocols.Starting Price: Free -
43
DoorFlow
NetNodes
Cloud-based access control for your building, that works with your existing locks and user directory. While DoorFlow can work as a standalone system, most of our customers benefit from the fact that we integrate with user directory, co-working space management systems and sport club systems out of the box. What makes DoorFlow unique is that it’s a fully automated, setup-and-forget solution. Building access rights policies are assigned once to groups like HR, Sales or Cleaners. So once a new person joins your organization, they automatically get the right access based on the groups you assigned to the user either in DoorFlow or directly in systems like Office365/Google and many more. You don’t need a technical background or need to become an access control guru to implement DoorFlow and smart locks. We help everybody from one-door sports clubs, hotel facilities to 100.000 employee multi-site enterprises, from A to Z.Starting Price: $35 per month -
44
iCrypto
iCrypto
Designed to be used with our entire suite of iCrypto cloud-based services, the iCrypto SDK can integrate into existing Enterprise Apps or when deployed as iCrypto App be used as a standalone one-step password-less verification solution. By employing the latest cryptography technologies in combination with device-level security and management, the iCrypto SDK is the ultimate software token that can be used as a biometric ID on the go in a wide variety of industries. iCrypto SDK provides authenticator PKI signatures, a range of cryptographic protocols such as TOTP/HOTP/OCRA/MTP, push-based authentication, on-device as well as network-based biometrics such as fingerprint, iris scan, face/voice/eyeball recognition, third-party authorization, secure storage, context collection and host of security features.Starting Price: Free -
45
Latch
Latch
The app that makes life in your space, personal and delightful. The most flexible access experience, dioramic controls, and concierge. A single management platform to control your spaces. Mission control, matter, and concierge ensure an elegantly orchestrated property is always at your fingertips. Whether you’re a distributor, integrator, service provider, delivery operator, hospitality brand, or technology company, Latch can be the right partner for you. We make spaces better places to live, work, and visit. LatchOS is a full-building operating system of software, products, and services designed to make every building better. Celebrating 100 million unlocks this year and announcing LatchOS2. LatchOS2 with dioramic controls and concierge, we will make even more spaces better places to live, work, and visit. Live, ensure, manage, and partner with Latch. Visit the Latch support site for quick answers and instructional articles.Starting Price: Free -
46
Wink
Wink
Wink enables any institution to offer simpler and superior identity and payment experiences through biometrics. The Wink platform brings facial and voice recognition-based multi-factor authentication and payments that can eliminate passwords, SMS/OTP, usernames, card numbers, and other older technologies that are memory or device-based. Integrate the Wink streaming checkout plug-in to eliminate fraud with our unique face- and voice-based user recognition. Dramatically improve conversions and eliminate cart abandonments as consumers simply smile to check out. Make long checkout forms and forgotten passwords a thing of the past. The industry’s first multi-factor biometric authentication combines the convenience and security of face-id type experience enhanced by strong digital voice printing. Our unique and patented one-way anonymous encryption technology ensures full privacy protection as the unique Wink ID represents the user’s face and voice data as a 3D model.Starting Price: $499 per month -
47
Alloy Access
SmartRent
Alloy Access Cloud-based access control for multi-tenant and commercial buildings. Our cloud-based access control system provides hands-free access solutions to address communities current needs while ensuring scalability for the future. Alloy Access is a frictionless platform that can be utilized to protect communities and assets through the use of control panels, smart access locks and intercoms, with integrations to property management software and customer relationship platforms to keep data in one place. Combining Alloy Access with our other smart home products provides customers the ability to create a truly connected community. Flexible Options with Alloy Access. With Alloy Access, you have the flexibility to choose different access methods for each entry point. Customize how residents, employees and visitors access all perimeter doors, amenity spaces, garages and units. Bluetooth locks & mobile passes. Key fobs - use existing key fobs or cards. Smart locks & custom pin -
48
Paxton Net2
Paxton Access
Designed to make the management of any building very simple. Net2 is our networked access control system. It can be administered using one or more PCs and can be monitored and managed from a central location. It is a complete solution that encompasses wireless and door entry. Net2 is designed with simplicity in mind and is easily scalable depending on your current or future needs. Our systems have been developed so that you can add one door at a time using a wired or wireless controller or door entry for versatile security and building management. We design our products to be easy to install and make the management of any building very simple. The software is intuitive and comes with a range of features that move beyond the basics of locking or unlocking a door. There are two versions available – Net2 Lite, which is ideal for most sites and is free of charge, and Net2 Pro, which offers extra features for more flexible and advanced access control. -
49
QuickPass Visitor Management
QuickPass
Want to eliminate long lines at your gates and speed up entry for residents & their guests? Get QuickPass, the most advanced visitor management technology on the market today! QuickPass is a superior access-control solution for high-end gated communities. Using the latest RFID and license plate recognition technology available, QuickPass streamlines resident and visitor entries and eliminates the need for multiple databases, all without sacrificing security. The app, known as QuickBlue, ties into any existing access control system without equipment or infrastructure upgrades. Security and approved administrative staff gets real-time access to accurate data and vital community information, all without exiting their vehicles. QuickPass is a superior web-based access control solution created specifically for managing the unique needs of gated communities. Security personnel get easy hand-held traffic processing from the gatehouse, driveway or vehicle and real-time access to information. -
50
PortalGuard
BIO-key International
BIO-key PortalGuard IDaaS is a single, flexible cloud-based IAM platform that offers the widest range of options for multi-factor authentication, biometrics, single sign-on, and self-service password reset to support a customer’s security initiatives and deliver an optimized user experience – all at an affordable price point. For over 20 years, industries such as education, including over 200 institutions, healthcare, finance, and government have chosen PortalGuard as their preferred solution.Whether you’re looking for passwordless workflows, support for your Zero Trust architecture, or just implementing MFA for the first time, PortalGuard can easily secure access for both the workforce and customers whether they are remote or on-premises. PortalGuard’s MFA stands out above others as it is the only solution to offer Identity-Bound Biometrics that offer the highest levels of integrity, security, accuracy, availability and are easier to use than traditional authentication methods.