Alternatives to System Locker
Compare System Locker alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to System Locker in 2024. Compare features, ratings, user reviews, pricing, and more from System Locker competitors and alternatives in order to make an informed decision for your business.
-
1
Cisco Duo
Cisco
Protect your workforce with simple, powerful access security. We're Cisco Duo. Our modern access security is designed to safeguard all users, devices, and applications — so you can stay focused on what you do best. Secure access for any user and device, to any environment, from anywhere. Get the peace-of-mind only complete device visibility and trust can bring. Respond faster to threats with an easy‑to‑deploy, scalable SaaS solution that natively protects every application. Duo's access security shields any and every application from compromised credentials and devices, and its comprehensive coverage helps you meet compliance requirements with ease. Duo natively integrates with applications to provide flexible, user-friendly security that's quick to roll out and easy to manage. It's a win, win, win for users, administrators, and IT teams alike. Lay the foundation for your zero-trust journey with multi-factor authentication, dynamic device trust, adaptive authentication and secure SSO. -
2
Udentify
Fraud.com
Know the real identity of your customer, user, or employee with the Udentify Identity Verification and Biometric Authentication solution. Challenges we solve: - Identify verification - Onboarding - New account opening - Age verification - Fraud prevention - Biometric authentication - Passwordless authentication - Strong customer authentication - KBA replacement - KYC and AML compliance Behind the scenes, Udentify embeds cutting-edge technologies into our identity verification and biometric authentication solution via a lightweight and flexible SDK. We are constantly investing in our technologies to stay at the forefront of fraud detection, compliance, and user experiences. -
3
MetaMap
MetaMap
Regional data infrastructures, powering global identity verification. MetaMap is the first all-in-one identity verification platform built on regional data sources, consolidated on a global scale. Get to know your users in-depth, from local government checks to Global AML watchlists. A suite of identity verification tools to know your users in-depth. Verify your users without hurting your conversions rates. Quickly verify your users with our default SDK or build your own verification flow via our API. Our customers welcome up to 95% of users who successfully complete our verification flows at the first attempt. Automatically access our regional identity infrastructures, and get clean data from dozens of local databases consolidated in comprehensive user' profiles, no matter where you operate. Use MetaMap dashboard to reduce the time spent on manual verification through smart automation and workflows. You need advice? Our international Customer Success Team is here to help. -
4
Authentication Cloud faster, easier, and more user-friendly. Let customers access your online services without passwords and costly SMS fees. With the Nevis Authentication Cloud, you can offer your customers maximum security and a smooth user experience in no time at all. Authentication as a service – faster, easier and more user-friendly. Enable customers to access your online services without passwords and costly SMS fees. With the Nevis Authentication Cloud you can offer your customers maximum security and a smooth user experience in no time at all. With the Authentication Cloud from Nevis, you can offer your customers maximum security and a smooth user experience in no time at all. Remembering a long, complex password for each individual account no longer fits into today’s fast, mobile world. New solutions with password-free authentication such as fingerprint or face ID are not only faster and more convenient but also significantly more secure for all parties involved.Starting Price: $500 per month
-
5
Symantec VIP
Broadcom
Your key to one swipe two-step authentication. Two-factor authentication is easy to enable and prevents attacks. With just a swipe of a finger, or use of a security code, your information is secure. Your favorite websites offer secured authentication compatible with VIP. To begin, scan a QR code and security codes will be generated for that website every thirty seconds. With Symantec VIP both enterprise and end users can securely authenticate wherever and however they are accessing the services. With hundreds of supported websites and integrations that you can easily set up yourself, multi-factor authentication is a snap. -
6
Microsoft Entra ID
Microsoft
Microsoft Entra ID (formerly known as Azure Active Directory) is a comprehensive identity and access management cloud solution that combines core directory services, application access management, and advanced identity protection. Safeguard your organization with a cloud identity and access management solution that connects employees, customers, and partners to their apps, devices, and data. Protect access to resources and data using strong authentication and risk-based adaptive access policies without compromising user experience. Provide a fast, easy sign-in experience across your multicloud environment to keep your users productive, reduce time managing passwords, and increase productivity. Manage all your identities and access to all your applications in a central location, whether they’re in the cloud or on-premises, to improve visibility and control. -
7
AppSmart Identity
AppSmart
Securely connect everyone to everything. Connecting with people, applications and devices is a key requirement of digital transformation. AppSmart Identity provides identity and access management for every user across all applications to all interconnected systems to securely access and manage your cloud migration services and all other services from a single place. Users don’t want to remember multiple passwords. With single sign-on, uses can access business systems with one account ensuring a seamless user experience for all their cloud migration services and cloud managed services. With multi-factor and strong authentication users can make sure that the identities that access business systems are fully verified. Policy-based MFA prevents unauthorized users from accessing corporate data with passwords alone. One place for all your cloud managed services eg. manage all your users, groups and devices. -
8
REVE Secure
REVE Secure
Dual authentication check of login’s credibility via user’s registered credential (Password) and security token generated at authorized user end only. Passwords are incompetent in securing your logins. Adding 2nd-factor authentication will not only deliver dual authentication security but also ensure safe & secure login & protected account access. With Two Factor Authentication, secure your remote logins and access to Linux/UNIX servers from security breaches and malicious attacks. Integrate a second layer of authentication to existing Windows password-based security to ensure the all-round protection of your enterprise data. Secure & protect logins and access to each different web application and service to avoid unauthorized access and cyber-attacks. Blocks unauthorized login attempts made using passwords. Supports a multitude of platforms and devices. -
9
FacePhi
FacePhi Biometria
The most complete solution for digital onboarding, authentication and security formed by different biometrics and antifraud systems of FacePhi, offered with the best user experience in the market. A combination of biometric and other security systems that creates a complete digital onboarding and identity authentication solution that allows to access, verify and operate different services and products in mobile and web applications. A framework with an easy integration that allows our client to choose which components to activate providing a better and seamless experience for the end user. Face recognition allows us to determine the identity of a person by analyzing the face. Unlike other types of biometry like iris or fingerprint, face recognition is non-intrusive; it does not require cooperation from the user. It just needs to capture the face of the person with a web cam. -
10
Yubico YubiKey
Yubico
Protect your digital world with YubiKey. Stop account takeovers, go passwordless and modernize your multifactor authentication. Get the world’s leading security key for superior security, user experience and return on investment. Designed for personal and business use, the YubiKey comes in a variety of shapes and with different features to fit your needs. Take our quick Product Finder Quiz to find the right key for you. The YubiKey works with hundreds of services and software applications. We’re here to guide you getting started whether for personal or business use. The industry's #1 security key, enabling strong two-factor, multi-factor and passwordless authentication. With a simple touch, the multi-protocol YubiKey protects access to computers, networks, and online services. No more reaching for your smartphone, or re-typing passcodes. Just plug in your YubiKey, tap, and it does the rest for you. -
11
BehavioSec
BehavioSec
Welcome to the next generation of behavioral authentication. Deployed across global 2000 companies, the BehavioSec platform uses deep authentication to continuously verify user identity with zero friction and over 99% accuracy across millions of users and billions of transactions. While organizations invest significant resources to insulate from attacks, Account takeovers remain a menace. To make matters worse, many costly business challenges – like manual fraud analysis and customer attrition from friction – stem from these failed investments meant to protect. BehavioSec stops account takeover with deep authentication, a new method of verification powered by behavioral biometrics. Deep authentication automatically verifies the human behind the digital identity without adding friction – allowing you to keep fraudsters at bay while drastically reducing costs. BehavioSec addresses new account fraud with population profiling powered by Behavioral Biometrics. -
12
Acceptto eGuardian
Acceptto
Acceptto monitors user behavior, transactions, and application activity to create an enriched user profile within each application landscape and subsequently verify if access attempts are legitimate or a threat. No passwords or tokens are required. Acceptto’s risk engine calculates whether an access attempt is legitimate or not by tracking user and device posture pre-authentication, during authentication, and post-authorization. We deliver a continuous, step-up authentication process with real-time threat analytics in an age when identities are persistently under attack. Based on a risk score computed by our proprietary AI/ML algorithms, a dynamic level of assurance (LoA) is computed. Our approach automatically finds the optimal policy for each transaction to maximize security while minimizing friction for the user with machine learning and AI analytics. This provides a smoother user experience without sacrificing enterprise security. -
13
3D Secure
3D Secure
Apart from meeting the Strong Customer Authentication (SCA) compliance under PSD2, there are numerous benefits to the new 3DS 2.0 protocol, especially from a mobile payments standpoint. The improved design dramatically increases the user experience on mobile devices by being fully compatible with mobile wallet applications and in-app transactions. Dramatically increases the user experience on mobile devices, including non-browser based platforms and mobile integration. The merchant’s platform will only require additional authentication if the risk is high – that will happen in only a small percentage of the transactions. Biometric authentication whilst still in the merchant’s app it will likely just feel like a valid security measure. -
14
FortiAuthenticator
Fortinet
FortiAuthenticator provides Identity Access Management and Single Sign-On. FortiAuthenticator provides identity and access management (IAM) services to prevent breaches resulting from unauthorized users gaining access to a network or inappropriate levels of access granted to valid users. FortiAuthenticator ensures only the right person can access your sensitive resources and data at the right time. User identity information from FortiAuthenticator combined with authentication information from FortiToken and/or FIDO2 authentication ensures that only authorized individuals are granted access to your sensitive information. This additional layer of security greatly reduces the possibility of data leaks while helping companies meet audit requirements associated with government and business privacy regulations. -
15
ESET Secure Authentication (ESA) adds Two Factor Authentication (2FA) to Microsoft Active Directory domains or local area network, meaning a one-time password (OTP) is generated and provided along with the generally required username and password. Or a push notification is generated and has to be approved on the user's cell phone running Android OS, iOS, or Windows once the user has successfully authenticated using their general access credentials. The mobile application of ESET Secure Authentication makes it easy to generate OTPs or approve push authentication requests to access computers, services protected by 2FA. The mobile application version 2.40+ supports authentication of multiple users, meaning, if you use several user accounts in a domain/network protected with 2FA, the authentication tokens of all your user accounts may be stored in your one mobile application.
-
16
ThumbSignIn
ThumbSignIn
Any channel, any device – we’ve got you covered. Choose from our suite of user-friendly authentication solutions, from 2FA to passwordless biometrics, to find the right authentication for your business and users. Start with 2FA and progress to more advanced technology like biometrics-based authentication to continue improving user experience and security over time. Our SaaS-based authentication service, REST APIs , mobile SDKs and UI widgets deliver a powerful combination of software components that can be used to build omni-channel authentication experiences that span mobile, web, phone, IoT, chatbots, kiosks, physical access and more. It’s time to take the security burden off of users! Our mission is to democratize access to strong authentication technology and make the digital world safer for everyone. ThumbSignIn provides cost-effective, scalable SaaS-based solutions to help companies select the best way to strengthen their existing systems with two-factor authentication (2FA).Starting Price: $3 per user per month -
17
IPification
IPification
Designed to facilitate instant user access combined with bank-grade security, IPification delivers authentication possibilities outside traditional SMS, Header Enrichment and USSD. IPification’s smooth and secure mobile identity verification lets consumers experience the best of your product, without threatening their online safety. Zero-Click login & registration flows will streamline onboarding and usage. Trusted protocols for user’s ID confirmation based on mobile network data only. By not taking any sensitive app/device information, IPification prevents data leaks. Zero-click compatible login and registration with bank-grade security and the best UX. Streamline onboarding, payment and app usage with an easy authentication process without need for any user action. Irrespective of device, browser or browsing mode, every user log in and registration can be performed seamlessly. -
18
ActivID
HID Global
A versatile, flexible and highly scalable platform for securing access to government and corporate systems and online consumer services. Multi-factor authentication for securing employee remote access to corporate VPNs and other enterprise resources. Multi-factor authentication for securing employee remote access to corporate VPNs and other enterprise resources. Rapidly build and deliver authentication solutions for trusted identity and compliance. Smart card solution for strong authentication to protect workstations, mobile devices and networks. Solution for issuing and managing PIV and PIV-I cards, enterprise access cards and mobile credentials. HID PIV IDMS performs identity proofing, while securely issuing credentials - even to remote users. Leverage service bureau card issuance efficiently and securely. -
19
Google Cloud Identity
Google
A unified identity, access, app, and endpoint management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace. Defend your organization with the BeyondCorp security model and Google’s threat intelligence signals. Control access to SaaS apps, enforce strong multi-factor authentication (MFA) to protect user accounts, manage endpoints, and investigate threats with Security Center. Maximize efficiency by enabling intuitive user experiences on endpoint devices, and unify user, access, app, and endpoint management with a single console. Enable users to access thousands of apps with single sign-on (SSO) and manage their company accounts using the same process as their personal Google accounts. Transition to digital by integrating your existing systems on a reliable, trusted platform. Extend your on-premises directory to the cloud with Directory Sync.Starting Price: $6 per user per month -
20
Trust Swiftly
Trust Swiftly
Only ask what you need to with 10 identity verification methods. Trusted by businesses that block more than 1% of transactions or spend more than 1-hour reviewing customers. Approve more real customers while blocking fraudulent users and risky transactions. Automate identity proofing and populate fraud solutions with more user data. Accept or reject based on user data and leverage it to fight chargebacks. Building a system for reviews or enhanced user authentication takes a lot of time. With Trust Swiftly, we provide multiple methods for your customers to verify themselves and automatically populate it in Sift, allowing for robust workflows. Whether you are an eCommerce store, app, or marketplace, we have the verification levels for you. Require verification adaptively depending on Sift scores or business rules by applying friction smartly.Starting Price: $0.01 per verification -
21
Super Gluu
Gluu
Super Gluu is a push-notification two-factor authentication (2FA) mobile app built to work with the Gluu Server. Super Gluu uses public-key encryption as specified in the FIDO U2F authentication standard. Upon device enrollment, Super Gluu registers its public key against the Gluu Server's FIDO U2F endpoint. When authentication happens, there is a challenge response to ensure that the device has the corresponding private key. Better identity access management for customers, citizens, and remote workforce. Super Gluu is supported by the Gluu Server out-of-the-box -- simply turn it on! Make strong access security as easy as approving a push notification. Make strong access security as easy as approving a push notification. The Gluu Server and Super Gluu can work in the same network, without a DNS server hostname and with a self-signed certificate. There is only one limitation: both components should belong to the same network. -
22
LoginRadius
LoginRadius
LoginRadius empowers businesses to deliver a delightful customer experience without compromising security. Using our customer identity platform, companies can offer a streamlined login process while protecting digital accounts and complying with data privacy regulations. LoginRadius serves over 3,000 businesses with a monthly reach of 700 million users worldwide. Key platform features include registration services, adaptive security, integration with third-party applications, and customer insights. The company has been named an industry leader in customer identity and access management (CIAM) by Gartner, KuppingerCole, and Computer Weekly. Microsoft is a major technology partner and investor. LoginRadius is headquartered in Vancouver, Canada, with additional offices in Toronto, USA, United Kingdom, Australia, and India. LoginRadius Services: API Authentication OAuth Data Management Secure Login Single Sign On SAML SSO Social Sign On Two Factor Authentication -
23
Active Directory
Microsoft
Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.Starting Price: $1 per user per month -
24
Nametag
Nametag
Nametag is the fast, safe, everywhere ID. Our mission is to bring authenticity to the internet and enable people to build trustful relationships. By putting privacy first, Nametag gives you control of sharing your personal information and the power to choose when it’s shared, where it’s shared, and for how long. We empower individuals to share validated details about who they are with other people or companies. We enable businesses to identify their customers in real-time and request the necessary details for a faster and more trusted transaction. Never get locked out. If you lose your phone, lose access to your email, or even get a new driver’s license, you'll still be able to sign in with Nametag. Don’t overshare. With Nametag's Privacy Mask, share only the necessary information and conceal the rest. Companies benefit too by not holding unnecessary personal information (PII). -
25
Asgardeo
WSO2
Asgardeo helps developers implement secure authentication flows to applications in a few simple steps. Easily integrate single page, regular web, and mobile applications. SDKs that enable working with various technology stacks. Enable social sign-in with Google, Facebook, and GitHub using pre-defined templates (with more to follow). Configure external identity providers that can connect with open standards like OpenID Connect and SAML to your application. Manage your customers, employees, and partners with (default) supported onboarding and management workflows. Use Asgardeo provided directory or plug in your own LDAP or Active Directory via an agent. Choose from a variety of methods such as Email OTP, SMS OTP, and TOTP for 2FA. Define multiple steps and configure options according to user requirements. Unlock the full application experience by focusing on the business logic and enable login and secure access to end-users. -
26
BotDelive
BotDelive
BotDelive is a 2FA and push notification service via IM bots for developers. Create an account on BotDelive and get your API credentials. Read our API documentation and start integrating! You will need only 2 API endpoints to integrate 2FA. BotDelive is a cloud communication platform for developers. It allows developers to send and receive 2FA and push notifications over the chat apps by using its APIs. Normally, you have to force your user to install an app to send notifications. But, the chat apps are already installed on millions of devices. Why not use them? BotDelive offers a quick way of 2FA. With only answering the yes/no questions your users can authorize their own accounts. Authenticate users via BotDelive instead of e-mail and password. You can require only once the password and then BotDelive will handle all requests for you. Send important push notifications via chat apps. BotDelive ID is reliable.Starting Price: Free -
27
Memberstack
Memberstack
Beautiful user logins & payments for any website. You control where your website & content lives. 1. Install a JavaScript code snippet to your website. 2. Set membership plans, pricing and permissions for your website. 3. Manage members through a simple dashboard. Say goodbye to authentication and payment problems — gate website pages and content to create web applications. Start accepting payments quickly with our one-click Stripe integration. 100% free, unlimited trial — upgrade only when you're ready to launch. No credit card required. You also get access to Stripe taxes, Free-trials, the Stripe billing portal, and tons of other Stripe features. Offer payment methods that are in demand and relevant to your business model. Reach more customers globally, increase conversions, reduce fraud, and optimize your transaction costs.Starting Price: $25 per month -
28
Security Weaver
Security Weaver
With the frequency of software license audits increasing, enterprises must ensure software license allocations are in compliance to safeguard against unbudgeted license fees come audit time. Our License Management module is the only solution that offers compliant SAP license management automation integrated with automated user provisioning, giving your organization the ability to optimize SAP and other complex licenses. We reduce the work and worry of choosing a governance, risk, and compliance (GRC) solution. Our simple process helps any organization of any size quickly move towards their GRC goals. Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software. Our flagship software suite, Security Weaver is engineered to give customers a unified view of their enterprise-wide application environment so they can reduce the risk of fraud, accelerate the efficiency of operations and ease the burden of ongoing compliance requirements. -
29
VerifyKit
VerifyKit
VerifyKit is a verification solution which allows your users to sign up for your app seamlessly, without the need for a phone number and one-time password for verification. Besides being reliable and customizable, it lets your users choose their preferred platform - i.e. WhatsApp, Telegram or SMS - for verification.Starting Price: $7.90 per month -
30
Boku Identity
Boku
Boku provides a best-in-class mobile identity solution that will protect your business from account takeovers, synthetic identities, and compromised numbers, all through a seamless user experience. Boku Authenticate will protect you against account takeovers (ATOs) that target your customer’s phone number by streamlining your methods for verifying mobile number possession. Instead of sending one-time passcodes (OTPs) that can be stolen or forcing users to implement complicated app based solutions, Boku Authenticate will verify mobile number possession directly on the device by using its built-in connectivity to the mobile operators’ wireless network. The solution is both seamless and secure. Boku Authenticate will reduce user friction while providing the best possible defense against the threat of ATOs. -
31
OneSpan Authentication Servers
OneSpan
Secure access and transactions by deploying multi factor authentication and transaction signing capabilities at mass scale. Leverage proven authentication server and API technologies to secure access and transactions and streamline identity management. Use strong authentication to secure access to corporate resources and banking applications. Enable highly secure transaction signing with user friendly Cronto® technology. Simplify authentication lifecycle management via a single integrated system. Easily support new standards in application and network access security for most major operating systems and platforms. Ensure business continuity – eliminate server downtime and service disruptions. Deploy server solutions regardless of operating system or architecture. OneSpan server solutions validate authentication requests to offer secure and seamless access to a variety of corporate resources and applications. -
32
Stytch
Stytch
The authentication platform for developers. Onboard, authenticate, and engage your users with Stytch’s APIs. Improve security and user experience with flexible, passwordless authentication solutions. Let us build the infrastructure, so you can focus on your product. Our SDKs offer flexible templates that can be tailored to your colors, fonts, and logo, so you can easily create seamless onboarding and authentication experiences that delight users and complement your brand—without the trouble of building UI from the ground up. For even more control over your user experience, choose our direct API integration, which considers both developer and user experience to ensure fast, safe, and easy passwordless authentication flows. We make the integration quick and painless, with clear and comprehensive documentation. -
33
Onfido
Onfido
How do you verify real people in the digital world? Onfido helps companies see real identity, the humans behind the screens, using world-leading AI and identity experts. Your customers can prove their identities, wherever they are, with just an ID and their face. So you’ll have everything you need to grow your business securely. Anchor your user’s digital account to their real identity with just their ID and face. Then re-verify or authenticate them when needed with a selfie. See how Onfido’s identity verification has helped businesses like yours onboard more users, reduce fraud and free up resources for internal teams. Drive business results with identity verification and authentication. Our AI-based technology assesses whether a user’s government-issued ID is genuine or fraudulent, and then compares it against their facial biometrics. That’s how we give companies the assurance they need to onboard customers remotely and securely. -
34
Protectimus
Protectimus Limited
Protectimus SAAS two-factor authentication service is already set up in the cloud and available 24/7, just register and begin the integration via API or using a ready-made integration plugin. The Protectimus On-Premise MFA platform can be deployed on the premises of your organization or in a private cloud. Radius, Citrix NetScaler and XenApp VMWare, Active Directory, LDAP, Windows Logon, and RDP, OWA, ADFS, RoundCube, Dynamic Passwords, API, SDK, customized individual development. Dynamic Strong Password Authentication integrates directly with Microsoft Active Directory (or any other user directory) to add a six-digit password onto users’ static passwords. Today, data violation happens regularly. If you want to assure your data is thoroughly protected, strong authentication methods are vital. We are likely to display personal info without any outside intervention. But when it comes to business, we would not limit user authentication and identification to a single password.Starting Price: $33 per month -
35
eMAS
emudhra
Strong Identity, Authentication and Access Management solution deployed widely across private and public sector. Define granular policies based on risk and severity to enforce access and authentication. Out-of-the-box support for 15 modes of authentication including digital signatures, biometrics, T-OTP with granular policy and risk definitions and the ability to step-up authentication. Support for single sign-on based on SAML/OAUTH with Agentless Desktop SSO for Windows domain logins. Adaptive Authentication engine that leverages Machine Learning for User Behavioral Analytics and Anomaly detection. See how emAS helps you improve your cyber security compliance and access governance. emSigner is eMudhra's market leading document signing and workflow solution deployed across thousands of customers that supports complex workflows with eSignatures, electronic contracting, eInvoicing and several other workflows out of the box. -
36
Entrust Identity as a Service
Entrust
Cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). Secure access to apps, networks, and devices for all of your users — with cloud-based multi-factor authentication. Proximity-based login, adaptive authentication and other advanced features contribute to an optimal user experience. Happy users don’t try to circumvent security measures. Everyone wins. This is easier than anything else you’ve tried. Work-saving touches — like built-in provisioning tools and on-premises and cloud integrations — reduce the workload for IT, from deployment through everyday management. Get strong IAM to move faster into the future. Cloud-based Identity as a Service scales quickly to accommodate new users, expanding use cases, and evolving security threats. -
37
Jumio
Jumio
With identity theft and account takeover on the rise, it’s increasingly difficult for businesses to trust that someone is who they claim to be online. Jumio’s identity proofing and eKYC solutions are powered by the Jumio KYX Platform and leverage biometrics, AI and the latest technologies to quickly and automatically verify the digital identities of new customers and existing users. Jumio provides an automated and intuitive user experience that takes less than a minute to complete. Jumio supports more countries, languages, and document types than any other solution. Jumio seamlessly integrates into websites, iOS or Android applications via APIs, SDKs and webcams. Quickly integrates into your website or mobile app and lets your users shift from a desktop to mobile experience as desired. All data is transmitted and stored with strong AES 256-bit encryption. Jumio is PCI DSS Level 1 compliant which speaks to the seriousness that we take data security and privacy. -
38
Sima
Active Witness
Sima does more than just keep the bad guys out. Sima is a highly secure yet frictionless cloud-based Access Control reader. Sima has the ability to read both mobile credentials (QR codes) and facial biometrics. This allows the integrated cloud-based software to issue both single (QR only) and multi-factor (facial verification) for highly secure and customized facility access. We take your privacy very seriously. We use facial recognition technology to perform facial authentication. This allows us to verify identity and grant access to a location. Facial data will be stored on our servers only for the purpose of identification. Your personal data, including your face picture, will not be shared with third parties.Starting Price: Free -
39
Aerobase
Aerobase
Aerobase is an open-source Identity and access management (IAM) platform that specializes in identity federation, SSO, strong & adaptive authentication, access control, account management & identity provisioning, API & microservices security and privacy regulation. This guide helps you get started with Aerobase. It covers server configuration and use of the default database. Advanced deployment options are not covered. For a deeper description of features or configuration options, consult the other reference guides.Starting Price: $690 per month -
40
WinMagic MagicEndpoint
WinMagic Corp.
As a leading developer of cybersecurity solutions for over 25 years, WinMagic has entered the passwordless secure authentication market in 2022 by releasing MagicEndpoint. Leveraging our pedigree and experience in protecting endpoints and data-at-rest, MagicEndpoint is referred to as the most secure authentication solution with the best possible user experience – no user action required! MagicEndpoint ensures that CISOs and cyber security professionals can easily implement passwordless authentication, addressing their cyber security needs, while eliminating password friction and reducing password management costs. MagicEndpoint addresses a growing industry need for precise, strong user authentication while still protecting the data security within devices, servers, and networks. -
41
Konfirmi
Konfirmi
Konfirmi gives your website or app easy-to-setup verification (which you can combine or use standalone). Verification methods include: - 2 Factor Authentication / Multi Factor Authentication (2FA/MFA) - SMS/Email verification - True age verification (KBA Checks) - True customer name/address/info verification (KBA Checks) - Biometric Authentication - Single Sign On (SSO). Check age, addresses, photo IDs, more. Quickly add to any website or application. Comply with various USA and other laws. Small Business and Enterprise options. Konfirmi‘s patent-pending system allows you to automatically verify your customer’s information, including age, physical address, email address, phone number, and photo ID in any app, user sign up or registration page, e-commerce store, contact form or survey, or other web-facing system. Quickly start using Konfirmi in your website or application.Starting Price: $19 -
42
WatchGuard Passport
WatchGuard Technologies
WatchGuard Passport gives your employees the Cloud-delivered security they need to work freely from the office, at home or on the go. Each of the services in the Passport bundle provides persistent, always-on protection that travels with your user. Authenticate people and enforce strong, multi-factor authentication into VPNs, Cloud applications, endpoints and more. Protect users on the Internet, block phishing attempts and enforce web policy anywhere, anytime without requiring a VPN. Respond by detecting and killing malware and threats while containing ransomware and related C&C channels. WatchGuard’s endpoint security platform delivers maximum protection with minimal complexity to take the guesswork out of endpoint security. -
43
LoginID
LoginID
With just a few lines of code, LoginID enables websites and apps to integrate FIDO/FIDO2 certified multi-factor authentication via our easy to use SDKs and APIs. Our platform leverages the biometrics on the end user's device to create a private key, public key pair that allows for seamless strong customer authentication. No app installation is required and the private key is stored securely on the end user's device, never leaving. Additionally, LoginID offers Transaction Confirmation, where a transaction can be cryptographically signed providing proof of the user’s confirmation of that specific transaction, which is perfect for merchants who want payment authentication services. LoginID is aligned with PSD2, GDPR, CCPA, and HIPPA. We have SDKs for iOS, Android, React-Native, Web, Python, Java, and Node as well as a WordPress Plugin.Starting Price: Free -
44
Everykey Echo
Everykey
Everykey Echo transforms your smartphone and paired device into a FIDO2 passkey that only authenticates when two of the user's paired Everykey devices are within range of each other and form an encrypted connection, replacing passwords or OTP codes with secure public key cryptography. With no credentials to steal, account takeovers are prevented. -
45
MonoCloud
MonoCloud
MonoCloud is a developer-focused platform designed to streamline authentication, authorization, and user management for applications across multiple environments, including web, mobile, IoT devices, and more. It enables developers to easily integrate secure and customizable login processes, supporting a range of authentication methods such as passwords, magic links, one-time passcodes, and social logins like Google, Facebook, and Apple. Built with a strong emphasis on reducing user friction, MonoCloud offers a branded and smooth authentication experience. The platform includes advanced features such as mutual TLS, brute-force protection, and global session management, making it a comprehensive solution for handling user access across various applications and devices. In addition, MonoCloud is designed with developers in mind, providing extensive documentation, integration guides, and support for various front-end and back-end frameworks.Starting Price: $0 -
46
OpenIAM
OpenIAM
Identity Governance and Web Access Management. As new employees join your organization, you face the conundrum of ensuring that they are given rights to all the systems and resources they need to do their work on the day they join the firm. Similarly, when a person changes positions within the firm, access that is no longer relevant must be revoked and access that is needed for their new position must be granted. For the situation of users leaving the firm or being terminated, it is even more imperative that permissions be addressed. Access to sensitive applications and data must be disabled/removed in a timely manner with traceability to avoid the consequences of a disgruntled user. -
47
Keyless Authenticator
Keyless Technologies
Nothing to remember. Nothing to steal. You are the key. Adopt zero-trust authentication to protect your remote workforce and enable strong customer authentication with just a look. Anywhere. Any time. Any device. Embrace passwordless, multi-factor authentication to eliminate fraud, phishing and credential reuse – all while enhancing customer and employee experiences and protecting their privacy. Unique capabilities powered by unique technology. Hardware Agnostic. Since we do not rely on the device hardware or sensors, Keyless can be deployed on a large set of devices and appliances. Drive better outcomes for your organization by eliminating passwords. Top-Notch Security. No central honeypot, no data on user devices. Data can never be stolen or lost because no private information is accessible to anyone but the user. Reduce password associated costs by going passwordless. Password Reset Costs. The average helpdesk labor cost is estimated at $70. -
48
Symantec Advanced Authentication
Broadcom
Mitigate threats and stimulate growth with Advanced Authentication solutions from Symantec. Get real-time protection for your online and mobile applications. Our leading-edge solution can authenticate an employee, partner or contractor while providing a frictionless login experience. This ensures that legitimate users have anytime, anywhere access from any device, which builds trust and brand loyalty. Get a flexible, scalable solution with both strong multi-factor authentication and risk-based methods like device identification, geolocation and user activity. Catastrophic cyber attacks are happening every day. We make sure you’re prepared to defend your business. Earn customer trust and loyalty by providing the simple, seamless experience they’re looking for. With the right data, you can more easily distinguish between legitimate and fraudulent behavior. -
49
Pirean Access: One
Pirean Software
We provide robust authentication and authorization services across web and mobile. Our Access: One platform protects high-value data, equity and IP across critical industries. We partner with some of the world’s largest organizations to protect their services globally. Delivered through our private cloud identity platform, we enable our customers to quickly realize identity services that: Provide a central point of control for managing identities and entitlements. Provide flexible access management, supporting single sign-on and strong user authentication. Deliver an agile and robust IAM API for extending the reach of your identity infrastructure. We are recognized for our innovation, our versatility and our focus on the end user. -
50
WSO2 Identity Server
WSO2
WSO2 Identity Server is API-driven, is based on open standards with the deployment options of on-premise, cloud or hybrid. It supports complex IAM requirements given its high extensibility. WSO2 Identity Server helps you do single sign-on and identity federation backed by strong and adaptive authentication, securely expose APIs, and manage identities by connecting to heterogeneous user stores. Leverage the power of open-source IAM in your enterprise to innovate fast and build secure Customer IAM (CIAM) solutions to provide an experience your users will love