Alternatives to Touch N Go
Compare Touch N Go alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Touch N Go in 2024. Compare features, ratings, user reviews, pricing, and more from Touch N Go competitors and alternatives in order to make an informed decision for your business.
-
1
Cisco Duo
Cisco
Protect your workforce with simple, powerful access security. We're Cisco Duo. Our modern access security is designed to safeguard all users, devices, and applications — so you can stay focused on what you do best. Secure access for any user and device, to any environment, from anywhere. Get the peace-of-mind only complete device visibility and trust can bring. Respond faster to threats with an easy‑to‑deploy, scalable SaaS solution that natively protects every application. Duo's access security shields any and every application from compromised credentials and devices, and its comprehensive coverage helps you meet compliance requirements with ease. Duo natively integrates with applications to provide flexible, user-friendly security that's quick to roll out and easy to manage. It's a win, win, win for users, administrators, and IT teams alike. Lay the foundation for your zero-trust journey with multi-factor authentication, dynamic device trust, adaptive authentication and secure SSO. -
2
ARGOS Identity
Argos Identity
ARGOS Identity is an identity verification service provider (Identity as a Service). Get everything you need for Identity verification at ARGOS. We provide services to help you identify Anyone Anywhere Anytime! Providing simple KYC implementation for identity verification. We empower our clients to deliver a seamless digital onboarding experience. Build your identity management system around your business goals and offer your customers a smooth, hassle-free KYC experience. FACE Identity is a section of user onboarding that utilizes facial recognition technology to search for matching faces within a collection of stored faces. This service helps alleviate the ARGOS Textify is an AI-powered solution that automates the extraction and review of critical data from a wide range of documents, reducing the time and cost of manual verification. -
3
The OptimalCloud
Optimal IdM
The OptimalCloud platform is a full featured, award winning, SSO Federation & IAM solution that provides a single point of authentication, policy management and auditing for a seamless end user experience. The OptimalCloud is deployed in workforce and consumer scenarios, used by some of the most recognizable companies on the globe, and used in some of the most secure environments in the world. Each feature-rich pricing tier comes with multi-factor authentication (MFA), because proper security shouldn't cost extra. The OptimalCloud is integrated with more than eleven thousand applications, simplifying set up and configuration and also has 24 x 7 x 365 support with a guaranteed uptime of 99.99%.Starting Price: $2/user/month -
4
FusionAuth
FusionAuth
FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome. You'll get all the features your app needs plus a customizable, scalable solution you can run on any computer, anywhere in the world. FusionAuth was built from the ground up to easily integrate with any app, language, and framework. Every feature (yes, every single one) is exposed as an API giving you complete flexibility to handle any use case. You get every feature and acronym you need: registration & login, passwordless, SSO, MFA, SAML, OIDC, OAuth, JWT, social login, and more. Comply with GDPR, HIPAA, COPPA, and PCI requirements in seconds. FusionAuth installs on any platform, any computer, anywhere. Host it yourself or use FusionAuth Cloud, our fully managed SaaS hosting service.Starting Price: $0 -
5
Knomi
Aware
Biometrics and multi-factor authentication have emerged as the gold standard when confirming identity. Aware identity verification and management solutions are Bringing Biometrics to Life™ in a variety of environments, from law enforcement and healthcare to financial services and on-site enterprise security. Aware biometrics solutions can capture a range of biometric factors—everything from fingerprints and retina scans to voice and full facial recognition. And the Aware modular architecture makes the system easy to configure for virtually any biometric identity management application. This is the present and the future of identity verification. The Knomi framework provides secure and convenient facial and speaker recognition for mobile, multifactor authentication. From small, customized solutions to large-scale enterprise implementations, Aware’s ABIS offerings are aligned to virtually any customer need. -
6
Ondato
Ondato
Ondato is a tech company that streamlines KYC and AML-related processes. We're providing advanced technological solutions for digital identity verification, business customer onboarding, data validation, fraud detection, and more. All of them meet the highest quality standards available for KYC online or offline onboarding for all business and customer types orchestrated from a single interface. We're turning compliance into a business benefit by creating a safer environment for organizations and individuals alike.Starting Price: €149.00/month -
7
ImageWare CloudID
ImageWare
ImageWare CloudID® is a highly modular, software platform that enabled rapid development and deployment of highly secure, yet flexible biometric identity management solutions. ImageWare CloudID® is easily incorporated into new or existing cloud-enabled environments or integrated as cloud-ready software into traditional networked client server and data center IT infrastructures. Two innovations differentiate this biometric identity platform, virtually any biometric modality and algorithm from any vendor can be quickly incorporated into the system, and the system can be easily scaled to satisfy the requirements of small organizations or entire counties, providing ultra-scalable real-time solutions. ImageWare CloudID’s server platform is a set of configurable, server-based software modules designed to add or enhance biometric identity management and credential issuance capabilities to existing applications or support the development of these capabilities in new end-to-end applications. -
8
Innovatrics ABIS
Innovatrics
Innovatrics ABIS is a biometric identity management system supporting fingerprint, iris and facial recognition. Fast and accurate performance is achieved with minimal hardware requirements. Thanks to its modular architecture, our ABIS is easy to customize. Open APIs allow smooth integration with other systems to avoid vendor lock-in. We have successfully deployed our ABIS to hundreds of large scale biometric projects, including some of the most complex biometric systems worldwide. Utilizing our fingerprint, facial and iris recognition technology, you can easily get a solution tailored to your business processes. Our high-performing algorithms are consistently ranked among the best based on independent NIST tests. With our ABIS modules, you can build an identity management solution tailored to your needs. Add additional modules and upgrade when necessary. Our licensing policies are flexible to suit the needs of each project. -
9
Nomidio
Nomidio
The world's most advanced unified Identity and Authentication Service. At Nomidio we specialise in protecting identities. Using our federated identity cloud, we liberate companies from holding unnecessary PII and enable secure customer identification for loan applications, verification of customers to access account information and much more. It all starts with the Nomidio Identity Cloud, which is an incredibly secure, quantum-ready, identity vault. The ID cloud delivers multiple identity services to multiple organizations, removing the need and expensive risk to companies of propagating identity data as is the standard today. The identity data is secured using our parent company’s patented Quorum multiparty split key cryptography, meaning that anyone wanting to decrypt any one record will require the compliance of other holders of the key fragments. Nomidio IDC is a light touch, highly effective biometric identity and authorization tool, 100% SaaS and can be deployed in minutes.Starting Price: $3.88 per user per month -
10
Veridium
Veridium
Veridium is the most comprehensive Integrated Identity Platform powered by AI-based Behavioral Biometrics, enabling Multi-Factor Authentication (MFA), digital ID verification, and a true enterprise-grade passwordless experience for employees and customers. Low code, agile, and flexible. Eliminating the password for customers removes the friction often associated with passwords and delivers increased security for online connections with our single step multi-factor authentication solution, while providing higher levels of identity assertion for organizations. Veridium provide an end-to-end authentication platform for all your WFH needs and any VPN solution, delivering strong, multi-factor, passwordless workforce authentication. -
11
eClear 360
eConnect
Finding affordable, turnkey solutions that can quickly plug into existing systems to scale up operations. eConnect's Identity Management system, eClear 360, leverages multiple data integrations and ties them to our industry-leading facial recognition algorithm. This opens the door for new insights, opportunities, and revenue protection, all from one platform. Key capabilities include: Identifying anonymous high-value patrons, their gaming value, and frequency of visits, detecting excluded patrons, advantage players, and patrons who have committed crimes in the past, a great tool to help the operator with know your customer mandates. The Identity Management system employs patented technology to provide operators with accurate facial identification reinforced with data analytics to identify staff members for time-clock integrations, detect unwanted individuals or valued guests, and improve operational efficiency. -
12
Imprivata
Imprivata
Imprivata: the digital identity company. At Imprivata, our understanding of unique and complex healthcare workflows and IT systems has made us the world leader in trusted digital identity management for health delivery organizations. At Imprivata, our understanding of unique and complex healthcare workflows and IT systems has made us the world leader in trusted digital identity management for health delivery organizations. Imprivata offers enterprise access, multifactor authentication, identity governance, and patient identification solutions that are developed with, and vetted by, clinicians, to ensure that clinical workflow security and efficiency are always considered. Imprivata solutions track to the Imprivata digital identity framework, which presents a unified, security- and efficiency-focused strategy for managing identities across a healthcare delivery organization. -
13
Entrust Identity as a Service
Entrust
Cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). Secure access to apps, networks, and devices for all of your users — with cloud-based multi-factor authentication. Proximity-based login, adaptive authentication and other advanced features contribute to an optimal user experience. Happy users don’t try to circumvent security measures. Everyone wins. This is easier than anything else you’ve tried. Work-saving touches — like built-in provisioning tools and on-premises and cloud integrations — reduce the workload for IT, from deployment through everyday management. Get strong IAM to move faster into the future. Cloud-based Identity as a Service scales quickly to accommodate new users, expanding use cases, and evolving security threats. -
14
DigitalPersona
HID Global
Go Beyond Multi-factor Authentication with DigitalPersona® software. Expand to risk-based factors, secure every application, offer frictionless access and deploy quickly. Enhance security with industry leading biometric solutions. Simplify processes, speed queues and confirm identities for a range of critical citizen, criminal justice and military applications. Select from an array of U.are.U® readers, modules and sensors. Leading fingerprint technologies to meet your specific OEM, retail, hospitality and commercial identity management requirements. -
15
PortalGuard
BIO-key International
BIO-key PortalGuard IDaaS is a single, flexible cloud-based IAM platform that offers the widest range of options for multi-factor authentication, biometrics, single sign-on, and self-service password reset to support a customer’s security initiatives and deliver an optimized user experience – all at an affordable price point. For over 20 years, industries such as education, including over 200 institutions, healthcare, finance, and government have chosen PortalGuard as their preferred solution.Whether you’re looking for passwordless workflows, support for your Zero Trust architecture, or just implementing MFA for the first time, PortalGuard can easily secure access for both the workforce and customers whether they are remote or on-premises. PortalGuard’s MFA stands out above others as it is the only solution to offer Identity-Bound Biometrics that offer the highest levels of integrity, security, accuracy, availability and are easier to use than traditional authentication methods. -
16
Accops HyID
Accops Systems
Accops HyID is a futuristic identity and access management solution that safeguards critical business applications and data from misuse by internal as well as external users, by managing user identities and monitoring user access. HyID provides enterprises with strong control over endpoints, enabling contextual access, device entry control and flexible policy framework. The out-of-the-box MFA is compatible with all modern and legacy apps, cloud and on-prem apps. It enables strong authentication based on OTP delivered via SMS, email and app, biometrics, and device hardware ID & PKI. Single sign-on (SSO) feature provides better security and convenience. Organizations can monitor security posture of the endpoints, including BYOD devices, and grant or deny access based on real-time risk assessment. -
17
cidaas
WidasConcepts
cidaas is the optimal solution for fast and secure identity management. Thanks to cidaas you create one identity per user across all your channels. cidaas is based on OAuth2.0 and OpenID Connect standards, provides strong API security and with integrated Bot Net Detection and Fraud Detection a secure journey across all your business channels. Modern Identity and Access Management goes like this. Comprehensive feature set for quick and easy integration and implementation of all use cases and systems. We take care of it so you can focus on your core business. No more worrying about maintenance or operation. Countless passwords and pins make life difficult for users and are an unsightly barrier to access on digital channels. With passwordless authentication you secure your digital applications and offer your users a unique customer experience – because the login is the first thing your users see. -
18
MegaMatcher SDK
Neurotechnology
MegaMatcher is designed for large-scale AFIS and multi-biometric systems developers. The technology ensures high reliability and speed of biometric identification even when using large databases. Available as a software development kit that allows the development of large-scale single- or multi-biometric fingerprint, iris, face, voice, or palm print identification products for Microsoft Windows, Linux, macOS, iOS, and Android platforms. Proven in national-scale projects, including passport issuance and voter deduplication. NIST MINEX-compliant fingerprint engine, NIST IREX-proven iris engine. Turnkey multi-biometric solution for national-scale identification projects with MegaMatcher ABIS. High-performance matching for large-scale systems with MegaMatcher Accelerator. Fingerprints, irises, and faces can be matched on smart cards using MegaMatcher On Card. Includes fingerprint, iris, face, voice, and palm print modalities.Starting Price: €2,590 one-time payment -
19
M2SYS Hybrid Biometric Platform
M2SYS Technology
Hybrid Biometric Platform™ is a multimodal biometrics system that supports fingerprint, face, iris, and finger vein identification. Using our Bio-Plugin middleware or CloudABIS API, software developers can integrate Hybrid Biometrics™ in a matter of hours and immediately have the ability to deploy the form of biometric technology that best neutralizes varying user, demographic, and environmental conditions. Why Limit Your success with a biometric SDK? Many biometric hardware manufacturers offer an SDK, but it only works with their devices. That means if you develop your biometric matching software using their biometric SDK, you are forever locked into using their devices. In addition, you are forever locked into a single form of biometric recognition! If it doesn’t work reliably for all users, or you experience challenges with their biometric hardware, your success rate is greatly limited. -
20
Fujitsu Biometrics-as-a-Service
Fujitsu
Fujitsu is transforming the market with its cloud-based identity platform, or Biometrics-as-a-Service, through quick deployment that lowers costs and allows customers to choose and blend modalities to develop the best use case for their particular organization and requirements, permitting rapid integration with existing business intelligence and systems. Fujitsu provides pay per use, plug-n-play biometric-enabled solutions that enable support for more than 50 biometric devices while instantaneously responding to different types of modalities. Offering a rapid deployment cycle and lower costs of biometric enablement with a pay for use business model. Providing financial services, retail, healthcare and manufacturing industries with an agnostic approach, permitting multiple modalities such as voice, facial and fingerprinting applications. -
21
Q5id
Q5id
Eliminate the impact of fraud, identity theft, and data breaches with the patented Q5id Proven Identity solution. Individuals identity should never be assumed, they should be PROVEN. Every business deserves to know who their customers are. Q5id’s Proven Identity solution gives that highest level of assurance so that you NOW know your customers are who they say they are. The Q5id patented solution: • Promotes a more robust KYC/AML solution & regulatory compliance • Expands MFA (multi-factor authentication) • Provides multiple biometrics/passwordless & highest level of assurance • Reduces service costs & eliminates dispute resolutions -
22
FacePhi
FacePhi Biometria
The most complete solution for digital onboarding, authentication and security formed by different biometrics and antifraud systems of FacePhi, offered with the best user experience in the market. A combination of biometric and other security systems that creates a complete digital onboarding and identity authentication solution that allows to access, verify and operate different services and products in mobile and web applications. A framework with an easy integration that allows our client to choose which components to activate providing a better and seamless experience for the end user. Face recognition allows us to determine the identity of a person by analyzing the face. Unlike other types of biometry like iris or fingerprint, face recognition is non-intrusive; it does not require cooperation from the user. It just needs to capture the face of the person with a web cam. -
23
RSA SecurID
RSA Security
RSA SecurID enables organizations of all sizes to mitigate identity risk and maintain compliance without impeding user productivity. It ensures users have appropriate access and confirms they are who they say they are with a modern, convenient user experience. In addition, RSA SecurID provides unified visibility and control across organizations’ many islands of identity. RSA SecurID marries multi-factor authentication with identity governance and lifecycle controls to address the security challenges associated with delivering convenient access to dynamic user populations across complex environments. It evaluates risk and business context to provide identity and access assurance. Digital transformation creates unprecedented authentication, access management and identity governance challenges for organizations. After all, more users need access to more systems from more devices than ever. RSA SecurID helps organizations address these challenges—and the identity. -
24
Griaule Biometric Suite
Griaule
Griaule Biometric Suite. Griaule offers solutions for face, fingerprint, palmprint, latent, newborn, and iris recognition. One of the most precise ABIS in the world. Database migration with deduplication check. Easy and fast scanning of paper-based biometric cards with OCR. Biometric enrollment with quality check and data standardization. Enhancement and search of latent fingerprints. Control over frauds and database quality. Newborn biometric enrollment. Easy biometric identification and verification. Cutting-edge quality enrollment guaranteed. Automatic face monitoring of crowds. Textual search in the database. Biometric integration in deployed systems. Printing of Identification Documents integrated with biometric systems, including document check with OCR. Enrollment and search of biometric data (fingerprint, face). Griaule is a company on the cutting edge of biometric recognition technologies! -
25
TrustLink
AarateK
TrustLink™ is a high-performance biometric identity authentication platform that supports large-scale facial and fingerprint recognition. It is a powerful platform that includes multi-biometric identification technologies and can be used to capture, register, identify, and authenticate fingerprints and faces. It also provides the APIs on the server and client for fast development and deployment into a wide range of applications. TrustLink™ is equipped with Aratek Bione® dynamic optimization algorithm and TrustFace™ face recognition algorithm, it's specialized in the field of large-scale fingerprint and face recognition applications. TrustLink™ is an ideal biometric identity authentication platform for software developers. -
26
MultiSense
MultiSense
MultiSense B.V. is a Start-Up company engaged in the industry of multibiometrics and advanced software solutions. Its unique technology merges multi-biometric factors: face and voice recognition, fingerprint signature, combined with GPS and NFC technologies. The company was established by veterans of the Israeli security forces with backgrounds in technology and security. MultiSense is a Start-Up company that combines biometric and advanced software solutions. The company was established by veterans of the Israeli security forces with backgrounds in technology, security and intelligence. Our vision is to be the leading company in the aforementioned fields and to be at the fore front of technology development while providing the best responses and finding creative solutions most suitable to customer requirements. Security and safety system technologies. Unique systems in the field of biometrics (face and voice recognition). Public data systems. Marketing and advertising systems. -
27
PersonID
360 Biometrics
The PersonID-Att is a fingerprint-based time and attendance system that allows you to quickly and easily identify employees and other partners, and track their arrival and departure times. This fingerprint attendance software is appropriate for any business with hourly employees, as well as for educational, government and other applications where arrivals and departures need to be tracked. By providing real-time identification (1 : N) of an individual, PersonID-Att attendance system enables you to create a more secure environment, improve efficiency and accuracy, and minimize losses from fraud. Here's how it works. Individuals are enrolled into the system by capturing their fingerprints along with personally identifiable information and a photograph, if desired. When an individual needs to be identified, the system instantly matches the captured fingerprint against the enrolled fingerprints and displays the results with a match score, personal information, a photograph. -
28
VeriFinger SDK
Neurotechnology
VeriFinger is a fingerprint identification technology designed for biometric systems developers and integrators. The technology assures system performance with fast, reliable fingerprint matching in 1-to-1 and 1-to-many modes. Available as a software development kit that allows development of stand-alone and network-based solutions on Microsoft Windows, Linux, macOS, iOS and Android platforms. In 1998 Neurotechnology developed VeriFinger, a fingerprint identification technology designed for biometric system integrators. Since that time, Neurotechnology has released more than 10 major and minor versions of the VeriFinger, providing most powerful fingerprint recognition algorithms to date. Numerous awards in competitions and technology evaluations, including NIST MINEX, PFT III and SlapSeg III, have been received by Neurotechnology's fingerprint recognition algorithms. Rolled and flat fingerprint matching that is tolerant to fingerprint translation, rotation and deformation. -
29
Bayometric
Bayometric
Bayometric’s Biometric Single Sign –On software (SSO) is a strong authentication and identity management solution which relieves the burden of password management while providing a more convenient way for users to access their computer or the network. Enterprise Single Sign on allows users to securely connect into the enterprise. It is a cost effective, server based back-end that offers enterprise wide identity management that can be easily deployed and managed by your IT department. Logon to Windows, domain, websites and applications using fingerprints & create a ”password free” environment. Centralized user enrollment, credentials & access rights management. Easy client components installation via AD group policies. The SSO portal provides organizations a well-integrated strong authentication and identity management system that ties easily into their existing infrastructure. -
30
SentryPoint Security Suite
Synaptics
Biometrics-based security, such as fingerprint authentication, is proven to be both more secure and convenient than passwords, making fingerprint sensing an increasingly common, and product-differentiating, feature in smartphones, tablets and PCs. However, fingerprint authentication also raises security concerns that can best be addressed with protections purpose-built for biometrics. Synaptics helps ensure biometric data protection through the SentryPoint Security Suite of features and architectures that accommodate the full range of market needs. This one-way conversion of biometric data into a proprietary template format prevents recreation, reverse-engineering or use for unintended purposes, thereby protecting the user from identity theft. All biometric data is encrypted and digitally signed using strong 256-bit Advanced Encryption Standard and Transport Layer Security technologies to prevent eavesdropping, tampering or fraud. -
31
Verbio
Verbio
Increase security and user experience in daily interactions with the unique potential of voice. An innovative language agnostic, cost-effective and reliable alternative to seamlessly verify and identify users in real-time. Voice biometrics allows to automatically recognize any person through the characteristics of their voice and it can smartly substitute traditional authentication methods (cards, passwords, signature, fingerprint, etc) in security access control, user verification for digital transactions or for fraud prevention and detection. With an easy and cost-effective solution, authentication through voice biometrics brings an innovative and safe experience to users, with a risk-free and remote access. Biometric Authentication and Identification through voice has never been so secure and fast with different operational uttering models for each type of client and advanced anti-spoofing methodologies. -
32
Nexsign
SAMSUNG SDS
Get stronger mobile security that’s uniquely yours. The next step in mobile security is Nexsign. Unlike a password, which can be easily forgotten or duplicated, Nexsign™ verifies your identity with biometric information using your fingerprint, face, and voice. The result? An authentication experience that’s simpler, faster, and even more secure. The days of remembering long, complicated passwords are officially over. Accessing data is as simple as recognizing your fingerprint, face or voice. Enjoy some peace of mind. Nexsign™ will not store your biometric information on the server. And with a strong authentication system using Public-Key Infrastructure (PKI), there is no risk of biometric information leaking. Biometric authentication is just the beginning. Nexsign™ can also work on a range of platforms and environments, such as Mobile OTP or PIN authentication. Now it’s simple and easy to deploy solutions, with standardized development toolkits, APIs, and a web-based admin portal. -
33
FaceOnLive
FaceOnLive
Welcome to FaceOnLive, the leading provider of fully On-Premises Biometrics & ID Verification Solutions. Our robust suite of services includes state-of-the-art technologies such as Face Recognition, Face Liveness Detection, ID Document Recognition, ID Document Liveness Detection, and Touchless Fingerprint Recognition. With our cutting-edge solutions, businesses can enhance security, streamline processes, and combat fraud effectively. Whether for customer onboarding, access control, or fraud prevention, our comprehensive platform ensures secure and reliable identity verification. Join us in shaping the future of biometric authentication and ID verification with FaceOnLive. Experience the unparalleled accuracy, efficiency, and security of our advanced biometric solutions. Elevate your security standards and stay ahead in today's rapidly evolving digital landscape with FaceOnLive's innovative biometric solutions.Starting Price: $0 -
34
Imageware Biometric Engine
Imageware
The Imageware Biometric Engine is a scalable, agnostic, multi-modal biometric technology platform for identity management, ensuring only valid individuals gain access to controlled areas or obtain secure documents. Using one or more biometric technology factors the Biometric Engine conducts 1:1 biometric searches to verify an individual’s identity, 1:N searches to identify an individual within a population, and X:N investigative searches against watch lists and black lists. It is agnostic in biometric algorithm and hardware, supporting the largest number of algorithms and devices on the market. Using two or more biometric types, such as a face and finger, the modalities are processed through different algorithms and the results are merged after programmed logic is applied to the results. Imageware has been developing proven solutions for secure identities since 1997. -
35
Okta
Okta
One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity. -
36
IdRamp
idRamp
Turn your digital identity strategy into a business asset, not a liability. Stop spending time, money, and headcount replatforming insecure identity technology. Simplify authentication complexities with decentralized zero trust Identity from Idramp. Bring order to your identity management chaos. Accelerate delivery of services to meet the speed of business. Eliminate expensive platform upgrade projects with rapid modular deployment. Relieve the pain of bespoke integration with rapid integration that automatically interoperates with existing infrastructure. Tailor your customer experience with a modular architecture that eliminates vendor stack lock-in. Add zero trust identity with automated security policies and adaptive access controls. Control extensible ecosystems with state of the art data protection. Never trust but always verify that your applications and people are safe. -
37
AU10TIX
AU10TIX
AU10TIX, an identity management company headquartered in Israel, is on a mission to obliterate fraud and further a more secure and inclusive world. The company provides critical, modular solutions to verify and link physical and digital identities so businesses and their customers can confidently connect. Over the past decade, AU10TIX has become the preferred partner of major global brands for customer onboarding and customer verification automation. AU10TIX takes verification and authentication to a whole new level of scalability. The power of deep learning lies within the input – the more you feed it, the smarter it becomes. This enables you to scale consumer onboarding and exponentially scale your business. With over 5% of the world identities already scanned and verified, fortune 500 companies are powered by AU10TIX, wiping out fraud while confidently focusing on growth. Our identity has changed over the years. Our principles & pioneering vision haven’t. -
38
LastPass
LastPass
LastPass is a cloud-based password manager available on any system or device, ensuring credentials are protected, private, and always within reach. Simple to set up and effortless to use, LastPass delivers the world's most convenient password management experience for consumers and businesses of all sizes and technical requirements. Say goodbye to password fatigue by generating, sharing, accessing, and managing credentials at the click of a button, while preventing bad actors from accessing precious data and account logins. Businesses also utilize LastPass to consolidate their tech stacks or to fill access management gaps with native integrations for MS Entra, Okta, and other IdPs and IAMs. With over 100 customizable policies, flexible privileges, detailed reporting, MFA and passwordless authentication options, LastPass makes it easy for organizations with numerous logins and increasing security risks to standardize password management company wide.Starting Price: $4 per user per month -
39
iCrypto
iCrypto
Designed to be used with our entire suite of iCrypto cloud-based services, the iCrypto SDK can integrate into existing Enterprise Apps or when deployed as iCrypto App be used as a standalone one-step password-less verification solution. By employing the latest cryptography technologies in combination with device-level security and management, the iCrypto SDK is the ultimate software token that can be used as a biometric ID on the go in a wide variety of industries. iCrypto SDK provides authenticator PKI signatures, a range of cryptographic protocols such as TOTP/HOTP/OCRA/MTP, push-based authentication, on-device as well as network-based biometrics such as fingerprint, iris scan, face/voice/eyeball recognition, third-party authorization, secure storage, context collection and host of security features.Starting Price: Free -
40
Ver-ID
Applied Recognition
Enables online identity verification by comparing a "selfie" with user's government-issued photo ID. Works both with laminated IDs such as drivers' licenses as well as with biometric passports for the most security-essential applications. Reliance on expensive & insecure external services for establishing identity is fast becoming obsolete. Ver-ID Credentials enables a straightforward integration of identity verification directly into any digital business process. For mobile deployments, the identity validity score can be established entirely on the user’s device. With Ver-ID there are no risks associated with export and storage of users’ images without some other business need for retention. Identity-as-a-Service products use ‘bolt-on biometrics’ and so suffer from high false rates or rely on manual checks. Ver-ID Credentials is built on ARI’s core face recognition & liveness detection technology for assured performance across the broadest range of use cases. -
41
Facia
Facia.ai
Founded in 2022, Facia specializes in biometric authentication and facial recognition technology. We leverage advanced AI and ML algorithms to deliver secure solutions for businesses. Our 3D liveness detection technology offers rapid responses in under a second, achieving a 0% False Acceptance Rate (FAR) with an FRR below 1% to prevent unauthorized access. Our services include 1:1 Photo ID Verification, 1:N Face Search, and Age Verification. We offer customizable API and SDK integration options for seamless compatibility. Our system provides real-time 3D face verification, ensuring speed and precision without compromising security. We protect against print and mask-based spoofing. Facia is dedicated to advancing biometric authentication, providing secure identity verification solutions for businesses. -
42
Regula
Regula
Regula is a global developer of forensic devices and identity verification solutions. With 30+ years of experience in forensic research and the largest library of document templates in the world, Regula creates breakthrough technologies in document and biometric verification. Regula hardware and software solutions allow over 1,000 organizations and 80 border control authorities globally to provide top-notch client service without compromising safety, security or speed. -
43
Optimized face biometric deployment options, at the highest level of security. Remote biometric registration. Detects and evaluates face and facial features in real time. Detects head poses, closed eyes, eye gaze, open mouth and spectacles. National identity tokenization. V-OS is V-Key’s core patented technology, a virtual secure element. It is a secure sandbox that is embedded within a native iOS or Android mobile app, and creates a safe operating environment where data can be stored and cryptographic processes can be executed in isolation from the rest of the mobile app. V-OS App Protection solution can detect and protect the mobile app from threats, such as reverse-engineering, hooking, tampering, app integrity checks, library signature validation, code-injection, debugging and more. In an insecure OS environment when the phone is compromised, apps integrated with V-OS Application Protection have rooted and jailbreak detection mechanisms that allows a mobile app to run smoothly.
-
44
Samsung Pass
Samsung
Say goodbye to forgotten passwords. Get past security with just a glance or touch. Just use your biometrics to log in to your apps and websites quickly and securely. Samsung Pass is an ’identity management as-a-service’, enabling secure access through biometric authentication. Simply authenticate through biometrics without ID & Password input. No need to input an ID & Password to log in to websites anymore. Samsung Pass provides an enhanced user experience by integrating advanced biometrics. Your biometric template will be encrypted and secured by Samsung Knox. Samsung Pass adopts FIDO (Fast Identity Online) technology to ensure valid authentications and provide simple and secure biometric authentication services. -
45
LexisNexis Voice Biometrics
LexisNexis
LexisNexis Voice Biometrics is an ideal authentication tool for companies or government agencies that process a significant volume of high risk transactions remotely or within a call center environment. As unique to an individual as a fingerprint, a voice biometric (or "voice print") uses the sound, pattern and rhythm of an individual's voice to determine his or her identity. LexisNexis® Voice Biometrics provides a higher degree of security for remote, high-risk transactions with little to no impact on the customer experience. LexisNexis® Voice Biometrics enhances operational security and the customer experience while significantly reducing the costs and risks associated with remote authentication. This advanced voice biometric-based authentication solution that, when coupled with our identity proofing solutions, provides businesses and government agencies a single source for authenticated enrollment and repeat user authenticated access to the contact center. -
46
LumenVox Voice Biometrics
LumenVox
Using voice biometrics authentication, companies can provide a delightful customer experience without sacrificing security. LumenVox Voice Biometrics technology screens customers by comparing input voice audio to a collection of stored voice samples (“voiceprints”) that are known to be authentic or fraudulent. Just like a fingerprint, each voice is unique. This makes Voice Biometric Authentication an incredibly effective way to validate identity. LumenVox’s flexible voice biometrics technology can be deployed in the method of choice and gives organizations the ability to create a seamless and secure process to verify its customers. LumenVox Voice Biometrics not only creates a better user experience, but also reduces operational costs and strengthens security. Anti-fraud measures such as liveness detection provide an additional security layer. -
47
Unisys Stealth
Unisys
Traditional security controls are insufficient to protect from cyberattacks in the digital age, compelling organizations to adopt a Zero Trust Network. The principles are simple – trust no user or device, inside or outside the private network and grant as little access as possible upon reliable identification. Implementing these principles can be complex – solutions that require expensive, time-consuming upgrades to existing network infrastructure make the move to Zero Trust prohibitive. Unisys Stealth is a flexible cybersecurity software built on identity-based encrypted microsegmentation that transforms your existing network – both on-premises and in the cloud – into a Zero Trust Network. Unisys Stealth products and services offer cybersecurity solutions that maximize your security posture, maintain regulatory compliance and protect your organization. -
48
OARO Identity
OARO
We connect people to their identities using advanced facial recognition, simplifying processes for leading enterprise-sized businesses across all verticals. OARO IDENTITY is an end-to-end solution enabling user authentication and authorization across devices, business lines, and organizational boundaries – reducing cost and complexity while improving overall user experience and security. Identity management and the safeguarding of data are critical functions of all organizations. Traditional solutions are increasingly incapable of providing both the user experience and level of security required by today’s business environment. This trend is evidenced by the growing frequency of massive data breaches among industry leaders and the public sector. OARO IDENTITY is an end-to-end solution enabling our clients to authenticate and authorize users across devices, business lines and organizational boundaries, while reducing complexity, cost and improving user experience and security. -
49
NCheck BioAttendance
Neurotechnology
NCheck BioAttendance is a Multi-Biometric Attendance Management System designed to register and manage employee attendance using face, fingerprint, and iris biometric identification. Powerful features: Face, Fingerprint, and Iris attendance recognition Geofencing and locaton based tracking Contactless and hygienic Identification with face mask Face liveness detection Real-time face detection Multiple face detection Detect stress levelStarting Price: $0 for 5 user -
50
WEB-key
BIO-key
Use our world-class biometric platform to streamline access and secure identity for your enterprise and nations around the globe. Compliant-by-design, BIO-key's solutions are NIST tested and built with integrity. A comprehensive multi-tenant enterprise biometric management platform built around one of the world’s most accurate and scalable biometric engines. API for WEB-key and biometric solutions to include in your application/environment. BIO-key offers a variety of Microsoft-qualified Windows Hello USB scanners that can be used out of the box with Windows Hello and Windows Hello for Business, or for use with our WEB-key biometric platform and PortalGuard MFA/SSPR as one of many supported brands of scanners. Reduce user frustration, down time, and calls to the help desk, or try one of these hybrid approaches. Required with a password for remote and home-based employees, contractors, business partners and other designated external users.