Alternatives to ControlAuth
Compare ControlAuth alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to ControlAuth in 2026. Compare features, ratings, user reviews, pricing, and more from ControlAuth competitors and alternatives in order to make an informed decision for your business.
-
1
Auth0
Okta
Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO. -
2
FusionAuth
FusionAuth
FusionAuth is a modern, developer-focused identity and access management platform built to give you full control over your authentication stack. Whether you’re building a startup app or managing enterprise-scale infrastructure, FusionAuth delivers all the must-have features — from login and SSO to advanced protocols like OAuth2, OIDC, SAML, and WebAuthn — in a self-hostable or cloud-native package. Designed with developers in mind, FusionAuth integrates seamlessly with any language, framework, or architecture. Every capability is API-first and built for extensibility, so you can tailor authentication workflows without getting locked into rigid, inflexible systems. FusionAuth supports all the key use cases — user registration, multi-factor authentication (MFA), passwordless login, role-based access control, and more — while helping you stay compliant with GDPR, HIPAA, PCI, and other regulatory standards.Starting Price: $0 -
3
Auth Armor
Auth Armor
Harness the power of biometrics on smartphones to make authentication easy for any application or website, creating a new approach to logging and authenticating online. Passwordless and 2-factor authentication that lets you authenticate your users with the smartphones in their pockets. Auth Armor puts secure authentication in the hands of every user — no weak passwords or cumbersome codes. We have built powerful APIs, SDKs, libraries, and dashboards to allow you to build what you want to build, how you want to build it. Use our tools to build authentication into any app, using any flow you would like. We offer Consumer facing and workforce protection, giving you the power and flexibility to secure anything, the way you need it. Auth Armor is the fastest and easiest mobile authenticator available. We support instant push messaging directly to user's devices enabling the fastest login and authentication experience.Starting Price: FREE for 10,000 active users! -
4
MIRACL
MIRACL
World's fastest MFA with the highest login success rate above 99%. Highly secure, password-free login in just two seconds. MIRACL works on any device or browser, removing the barriers to authentication to optimise the the user experience, decrease costs, and win lost revenue. Protect your users. Simplify their journey. MIRACL Trust offers a safer, smoother authentication experience. One step. No passwords. No problem. Traditional multi-factor authentication is slow and cumbersome. MIRACL is a smoother, safer alternative to traditional MFA. 2 seconds to log in with error rates as low as 1/10th that of passwords. No passwords necessary. One PIN, and you’re in. Our cryptographic technology means that user info stays with users. MIRACL Trust offers an effortless login experience that puts users first, rolls out hassle-free, and keeps data locked up tight. PSD2 SCA compliant, GDPR compliant and satisfies NJ Gaming MFA requirements. -
5
Google Authenticator
Google
Google Authenticator generates 2-Step Verification codes on your phone. 2-Step Verification provides stronger security for your Google Account by requiring a second step of verification when you sign in. In addition to your password, you’ll also need a code generated by the Google Authenticator app on your phone. You can use your Google Account to more easily and securely sign in to thousands of sites and services on the web, while keeping your privacy choices transparent in one place. Protect your Google Account with Security Checkup. This detailed tool provides you with personalized and practical recommendations to help you strengthen the security of your Google Account. Hacked passwords are more common than you think. Two-step verification protects you from unauthorized access to your account. To do this, it requests a second step after entering the password. -
6
REVE Secure
REVE Secure
Dual authentication check of login’s credibility via user’s registered credential (Password) and security token generated at authorized user end only. Passwords are incompetent in securing your logins. Adding 2nd-factor authentication will not only deliver dual authentication security but also ensure safe & secure login & protected account access. With Two Factor Authentication, secure your remote logins and access to Linux/UNIX servers from security breaches and malicious attacks. Integrate a second layer of authentication to existing Windows password-based security to ensure the all-round protection of your enterprise data. Secure & protect logins and access to each different web application and service to avoid unauthorized access and cyber-attacks. Blocks unauthorized login attempts made using passwords. Supports a multitude of platforms and devices. -
7
Authsmith
Authsmith
Authsmith is a cloud-based authentication platform that simplifies securing and managing user access for applications. The system supports multiple authentication methods including email/password, social logins, and single sign-on, creating a streamlined login experience. The platform includes analytics capabilities that provide insights into user activity and authentication metrics, allowing administrators to monitor system health and identify potential security concerns. Authsmith features multi-factor authentication and automated security alerts that help prevent unauthorized access and maintain compliance with industry standards. User management tools within Authsmith enable control over roles and permissions from a centralized dashboard. The platform offers API access for developers to integrate authentication features into their applications. Authsmith delivers a comprehensive solution for managing user access while maintaining strong security measures.Starting Price: $30 -
8
AppSmart Identity
AppSmart
Securely connect everyone to everything. Connecting with people, applications and devices is a key requirement of digital transformation. AppSmart Identity provides identity and access management for every user across all applications to all interconnected systems to securely access and manage your cloud migration services and all other services from a single place. Users don’t want to remember multiple passwords. With single sign-on, uses can access business systems with one account ensuring a seamless user experience for all their cloud migration services and cloud managed services. With multi-factor and strong authentication users can make sure that the identities that access business systems are fully verified. Policy-based MFA prevents unauthorized users from accessing corporate data with passwords alone. One place for all your cloud managed services eg. manage all your users, groups and devices. -
9
AuthPro
CGI-City
With AuthPro you can password protect your pages from unauthorized access in just few minutes! No any special software, programming or server-side script installation required on your webserver. To get started, just copy and paste links and html codes provided by AuthPro to your website pages. You will get your own login, registration and password reminder forms which you can add to your website. AuthPro supports custom login form for existing members, registration form for new members, free and paid membership types, editable member profiles, lost password reminder, and easy management tool to configure your account settings, manage your members and check their activity/stats. You can also use many optional features to enhance your members area: online or total members list and counters, logout, personal greetings and much more..Starting Price: $4.95 per month -
10
OneMorePass
We-Bridge
Increase user security without sacrificing convenience and ease of use.OneMorePass is a FIDO (Fast Identity Online) solution that uses biometric and quick authentication, eliminating the need for passwords. Using a password-less login, completely eliminate traditional vulnerabilities with password loss and ID user credential theft. Comply with FIDO Alliance International standards based on the public key. Apply various authentication methods and manage the integrated authentication lifecycle. Prevent phishing by sending notifications if there is an unauthorized log-in attempt. Configure your OneMorePass policy and ruleset to meet your company standards and policies. OneMorePass works using multiple authentication methods without the need for passwords. With an increased demand for user authentication technology, OneMorePass guarantees strong security and user convenience. Provide flexibility with multiple authentication methods to suit your needs and the needs of your users. -
11
Better Auth
Better Auth
Better Auth is a framework-agnostic authentication and authorization framework for TypeScript designed to help developers implement secure login systems directly within their own applications and databases. It provides a full set of authentication features out of the box, including email and password login, session management, email verification, password reset, and support for over 40 social login providers such as Google, GitHub, etc., all configurable with minimal code. It is built to work with a wide range of modern frameworks like Next.js, Nuxt, SvelteKit, Astro, and Express, allowing teams to integrate authentication regardless of their tech stack while maintaining strong TypeScript support and type safety. Better Auth includes advanced capabilities such as multi-factor authentication, multi-tenant organization management, and enterprise features like SSO, SAML, and SCIM provisioning, making it suitable for both simple apps and large-scale systems.Starting Price: Free -
12
Skillmine Auth
Skillmine Technology Consulting
Skillmine Auth is a comprehensive Identity and Access Management (IAM) platform that enables organizations to securely manage user identities, access control, and authentication across all business applications. It supports modern standards like SAML, OAuth 2.0, and OpenID Connect, along with custom authentication for legacy systems. Skillmine Auth offers flexible deployment options (Cloud or On-Premises) and integrates seamlessly with Active Directory, HRMS, and other enterprise systems to deliver unified and secure user experiences. -
13
Ory
Ory
The missing web-scale API for identity and access control. 10x your security, user experience, and PII compliance today. Build secure apps on top of the Ory Network and reach new customers in any geopolitical region of the world with the best login experience ever. Login is more than a username and password. Building it from the ground up is time-consuming and dangerous. Ory's API-first microservice architecture makes it straightforward to integrate projects at any stage. Pay for usage, not features. Get advanced multi-factor to auth on every Ory subscription plan. Plus advanced permissions, SSO, OAuth2, OIDC, multi-tenancy, and so much more. Ory is made for high-performance, high-scale applications in any cloud. Built with developers in mind, Ory lets you quickly build your on-brand user experience and integrate it into your software stack. Ory's focus on open standards and automated data import capabilities makes migrating from legacy systems straightforward.Starting Price: $29 per month -
14
Ente Auth
Ente
Ente Auth is a free, open-source two-factor authentication app that helps users generate and manage time-based one-time passwords to secure logins for online accounts with an extra layer of verification beyond just a password, offering end-to-end encrypted backups so you never lose your codes and they remain private even to the service itself. It syncs codes across mobile, desktop, and web clients using fully encrypted channels, lets users import existing 2FA tokens by scanning QR codes or manual entry, and provides features like offline code generation, tagging and searching of codes, pinning favorites, icon identification, and quick “next code” display for faster logins. Backups are encrypted with audited cryptography, giving users peace of mind that only they can decrypt and access their 2FA secrets, and codes can be shared securely with teammates via encrypted links with optional expirations.Starting Price: Free -
15
2FAS Auth
2FAS
2FAS is a two-factor authentication and password management platform centered on its open source 2FAS Authenticator app, which helps users add a strong second layer of login security to online accounts by generating time-based and event-based one-time codes that refresh frequently to defend against unauthorized access, making it easier to secure email, social, financial, and other services that support 2FA. It is designed to be simple, private, and secure, it works offline, does not store passwords or usage metadata, and doesn’t require users to create an account, offering anonymous use while still syncing codes across multiple mobile devices with encrypted backup options, biometric or PIN protection, and support for importing and exporting authentication seeds so you retain control of your data and can migrate between devices or apps.Starting Price: Free -
16
Authorizer
Authorizer
Build secure apps 10x faster. Low code tool and low cost deployment. Own your user data in your preferred database. Authenticate users with multiple auth recipes. Authorize users based on your business roles. OAuth2 and OpenID compatible APIs. Authentication and authorization have never been this simple before. Deploy production-ready Authorizer instance using one-click deployment options available. Open Authorizer instance endpoint in the browser. Sign up as an admin with a secure password. Configure environment variables from the dashboard. Authorizer object can be instantiated with JSON object. You can use Authorizer off the shelf and provide an amazing digital experience in just 3 minutes. We rather have you focused on your core business and build stuff that matters. Auth with best services baked in. Secure Session management implemented with HTTP-only cookies. Authorization Code flow implemented for mobile-based auth. -
17
FortiAuthenticator
Fortinet
FortiAuthenticator provides Identity Access Management and Single Sign-On. FortiAuthenticator provides identity and access management (IAM) services to prevent breaches resulting from unauthorized users gaining access to a network or inappropriate levels of access granted to valid users. FortiAuthenticator ensures only the right person can access your sensitive resources and data at the right time. User identity information from FortiAuthenticator combined with authentication information from FortiToken and/or FIDO2 authentication ensures that only authorized individuals are granted access to your sensitive information. This additional layer of security greatly reduces the possibility of data leaks while helping companies meet audit requirements associated with government and business privacy regulations. -
18
Oloid
Oloid
Retrofit your workplace with modern access control. Flexible options to choose from, face, Bluetooth, or QR code. Easy retrofit with existing badge readers and access control systems. Secure your assets with contactless biometrics & tailgating detection. Turn iPhones, iPads, Android Phones, or tablets into smart readers. Oloid prevents unauthorized access and reduces dependence on manual entry procedures. We support integration with your existing IT systems for a seamless experience. Employees can choose contactless biometrics or mobile credentials to gain physical access. Make the workplace frictionless and secure for Smartphone and non-smartphone users alike. Use computer vision to keep an accurate count of people entering & exiting doors and enforce occupancy limits at the points of entry with Oloid’s rule-based access control. Leverage existing security cameras or install off-the-shelf IP cameras. -
19
NextAuth.js
NextAuth.js
NextAuth.js is an open source authentication solution tailored for Next.js applications, offering seamless integration with popular services like Google, Facebook, Auth0, and Apple. It supports various authentication methods, including OAuth 1.0 & 2.0, email/passwordless sign-ins, and custom username/password systems. Designed for flexibility, NextAuth.js operates efficiently in serverless environments and supports multiple databases such as MySQL, PostgreSQL, MSSQL, and MongoDB, allowing developers to choose between database sessions or JSON Web Tokens (JWT). Security features include signed, prefixed, server-only cookies, HTTP POST with CSRF token validation, and encrypted JWTs using JWS/JWE/JWK standards. The platform facilitates easy setup, enabling developers to add authentication in minutes with minimal configuration. Comprehensive documentation and a supportive community further enhance its accessibility for developers seeking a robust authentication system.Starting Price: Free -
20
SecurePass
eMudhra
SecurePass IAM provides robust security measures like credential vaulting, session monitoring, and least privilege enforcement. This reduces the risk of unauthorized access, ensuring your organization's data remains secure By automating processes like user provisioning, access certifications, and password management, SecurePass IAM simplifies access management. This leads to increased operational efficiency and productivity within your organization With its built-in analytics, reporting capabilities, and access governance features, SecurePass IAM aids in maintaining compliance with various regulatory standards. It supports audit trails, making the auditing process smoother and more efficient -
21
cleanCART
Clean.io
Protect your e-Commerce business from promotion code abuse, journey hijacking, and attribution fraud with cleanCART by clean.io, an easily implemented and effective solution for merchants utilizing affiliate programs and discount codes to drive online sales. Say goodbye to lost or stolen revenue and take back control of your discount strategy and user experience by blocking browser pop-ups and disruptive injections. Stop extensions like Honey & CapitalOneShopping from injecting unauthorized or scraped discount codes at checkout. Scale your business and run promotions with the peace of mind that cleanCART has your back. Say goodbye to shutting down leaked discount codes. Gain the ability to accurately monitor marketing efficacy and affiliate fee attribution with real-time reporting and insights: -Which extensions are being used & how they are affecting your site -Revenue lost to coupon extensions & Revenue Recovered with cleanCART -Prevent Affiliate Attribution FraudStarting Price: $299/month -
22
Auth.js
Auth.js
Auth.js is an open-source authentication library designed to integrate seamlessly with modern JavaScript frameworks, providing a flexible and secure authentication experience. It supports various authentication methods, including OAuth (e.g., Google, GitHub), credentials, and WebAuthn, allowing developers to choose the most suitable approach for their applications. Auth.js is compatible with multiple frameworks, such as Next.js, SvelteKit, Express, Qwik, and SolidStart, enabling developers to implement authentication across different platforms. The library offers built-in support for popular databases like Prisma, Drizzle ORM, Supabase, Firebase, and TypeORM, facilitating user data management. Security features include signed cookies, CSRF token validation, and encrypted JSON Web Tokens (JWTs), ensuring robust protection for user data. Auth.js is designed to operate efficiently in serverless environments and provides comprehensive documentation and examples.Starting Price: Free -
23
Zoho Directory
Zoho
Zoho Directory is a cloud-based identity and access management platform designed to streamline authentication, authorization, and user management for organizations. It offers Single Sign-On (SSO) capabilities, allowing employees to access multiple applications with a single set of credentials, thereby enhancing security and user convenience. The platform supports Multi-Factor Authentication (MFA), adding an extra layer of protection against unauthorized access. Device authentication ensures secure access to both applications and devices, enabling employees to use the same credentials across platforms. Zoho Directory also provides robust provisioning features, allowing IT administrators to create and manage user profiles across various applications directly from the platform, reducing the time spent on repetitive tasks. Integration with existing directories, such as Microsoft Active Directory and Azure AD, is facilitated through directory stores.Starting Price: $1.70/user/month -
24
PropelAuth
PropelAuth
Easy integration and straightforward APIs for developers. Built-in user management for customer-facing teams. Data and insights for PMs and executives. PropelAuth was founded on the idea that a great auth product gets out of your way. We provide you with the right tools out of the box, so you can quickly make your users' experiences as secure and smooth as possible. As soon as you start onboarding users, your team will have a laundry list of things they need to do or see. Organizations are a first-class concept in PropelAuth. You can use our UIs to get started quickly or build your own with our APIs. Start with our default roles, or create your own. We even handle updating existing users when you make changes. The easiest way to integrate with identity providers, like Okta and Azure AD. We provide guides for your users to set up and test their configuration. Set custom session durations per organization, enforce MFA, and more. We handle the complexity so you don't have to.Starting Price: $150 per month -
25
Vault Vision
Vault Vision
Vault Vision is the leading user authentication platform for modern web and mobile apps, built with privacy-first security and passwordless login convenience for end users. Vault Vision's low code platform enables applications to completely secure user logins on React, Python, Go, Node, Webflow and more. Vault Vision protects end user privacy from password breaches by eliminating use of third-party scripts, sdk's and trackers. Our platform helps application owners increase user login engagement with passwordless application logins powered by mobile passkeys, two factor auth (2FA), multi-factor auth (MFA), face id auth, fingerprint auth, USB key auth, pin based auth, SSO with email, OIDC logins for Apple, Google and Microsoft, and more.Starting Price: $25/month for 10k users -
26
Daito
Daito
Daito is a web-based 2FA authenticator for small teams and big companies alike. Securely share access, no phone is needed. Daito does only one thing, manage TOTP 2FA tokens for you and thus offers a fully isolated system, separate from your password manager. Keep your 2FA token management separate from your password management and prevent worst-case scenarios. What do you do when you store usernames, passwords, 2FA seeds, and 2FA tokens in your password manager and this password manager gets breached? The authenticator is web-first and web-only. Access and manage your company's 2FA tokens from any browser and OS. Save money and the accompanying hassle of managing company phones. No more worrying about lost, malfunctioning, or missing devices. Give IT teams and admins full control, and limit regular users. Prevent 2FA seed leakage by limiting access only to generated 2FA tokens, not the underlying seed codes.Starting Price: $19 per month -
27
Clerk
Clerk
Clerk is the user management and authentication platform built for developers. It provides complete solutions for sign-up, sign-in, user profiles, account switching, and multi-tenancy. Clerk integrates seamlessly with frameworks like Next.js, React, Vue, and Nuxt, offering secure APIs, prebuilt UI components, and powerful features like OAuth, SSO, and role management. With Clerk, you can skip building auth from scratch and ship production-ready authentication faster, while maintaining security, scalability, and a great user experience.Starting Price: $0 per month -
28
Obynt
Obynt
Obynt is a Software to Manager, Store and protect sensitive data, such as Passwords, credit card numbers, Assets information or any other important Data. Obynt encrypt sensitive data inside client applications and never reveal the encryption keys to the Database Engine (SQL Database or SQL Server). As a result, Obynt provides a separation between those who own the data and can view it, and those who manage the data but should have no access. By ensuring on-premises database administrators or other high-privileged unauthorized users, can't access the encrypted data! Obynt use MSSQL to store the Data centrally for Single or Multi-User.Starting Price: $0 -
29
AuthPoint
WatchGuard
Our unique multi-factor authentication (MFA) solution not only helps to reduce the likelihood of network disruptions and data breaches arising from lost or stolen credentials, but we deliver this important capability entirely from the Cloud for easy set-up and management. AuthPoint goes beyond traditional 2-Factor Authentication (2FA) by considering innovative ways to positively identify users, and our large ecosystem of 3rd party integrations means that you can use MFA to protect access. Ultimately, WatchGuard AuthPoint is the right solution at the right time to make MFA a reality for the businesses who desperately need it to block attacks. AuthPoint uses a push message, QR code, or one-time password (OTP) as an additional factor proving your identity, and our mobile device DNA matches the authorized user’s phone when granting access to systems and applications. Therefore, any attacker who clones a user’s device in an attempt to access a protected system would be blocked. -
30
Typeauth
TypeAuth
At its core, TypeAuth provides robust authentication services including JWT management, token lifecycle control, and multi-factor authentication, all configurable through simple dashboard controls. This is complemented by our advanced security features including an intelligent rate limiting system, Web Application Firewall (WAF), and geo-blocking capabilities that adapt to your traffic patterns and protect against emerging threats. Rounding out our offering, is a comprehensive monitoring and analytics suite that provides real-time visibility into your security posture, complete with anomaly detection and automated response capabilities. All these features are accessible through our dashboard, requiring only a CNAME configuration to get started, making enterprise-level security accessible to organizations of all sizes.Starting Price: Contact Sales -
31
LastPass
LastPass
LastPass is a cloud-based password manager available on any system or device, ensuring credentials are protected, private, and always within reach. Simple to set up and effortless to use, LastPass delivers the world's most convenient password management experience for consumers and businesses of all sizes and technical requirements. Say goodbye to password fatigue by generating, sharing, accessing, and managing credentials at the click of a button, while preventing bad actors from accessing precious data and account logins. Businesses also utilize LastPass to consolidate their tech stacks or to fill access management gaps with native integrations for MS Entra, Okta, and other IdPs and IAMs. With over 100 customizable policies, flexible privileges, detailed reporting, MFA and passwordless authentication options, LastPass makes it easy for organizations with numerous logins and increasing security risks to standardize password management company wide.Starting Price: $4 per user per month -
32
Loginizer
Loginizer
Loginizer aims at securing your WordPress websites from all attacks. We at Loginizer believe that security is the most important aspect for a website and it should be easy to secure a website for any website owner, hence we work round the clock to craft features that help you achieve that without having to constantly monitor your site. We are constantly woking hard to add more features and think of ways to protect your site from brute-force attacks. All differences of WordPress Core will be reported to the Admin. An email with a temporary login URL. Users can set secondary challenge questions. Two-factor auth using Google Authenticator, Authy, etc. Simply disable XML-RPC with Loginizer. Check logs of failed login attempts. Blacklist an IP or IP range from login. Loginizer has been integrated as a WordPress plugin so you can simply install the plugin from your WordPress dashboard and get started.Starting Price: $24 per year -
33
QR Mark
Trycon Technologies Private Limited
QR Mark is a cutting-edge solution designed to authenticate and verify documents using QR Codes. It combats document fraud by ensuring every document can be validated through a QR Code scan, confirming its authenticity and integrity. Each document gets a unique QR code that, when scanned, directs users to a secure verification portal displaying its original details. This prevents forgery and unauthorized changes. Here are the key features: 1. Unlimited verifications let recipients authenticate documents without restrictions. 2. Custom branding allows you to use your own domain and logo for a personalized experience. 3. Bulk verification enables processing multiple documents at once for efficiency. 4. Multi-user access provides role-based permissions for secure team collaboration. 5. Seamless integration supports Microsoft 365, Google Apps, and APIs for easy verification. 6. Single Sign-On (SSO) simplifies secure access with your company’s authentication system.Starting Price: $9/month -
34
Civic
Civic Technologies
Civic is redefining how teams sign in and get work done with its two core solutions: Civic Auth and Civic Nexus. Civic Auth delivers a simple, secure sign-in experience that works across apps, servers, and assistants, combining Web2 ease with Web3 readiness. Civic Nexus unifies data, SaaS apps, and AI tools into intelligent workflows that automate everything from simple tasks to complex business processes. Together, they create a foundation of trust and efficiency, reducing friction at every step. Developers can integrate Civic with a 5-minute SDK setup and flexible prompts. The result is faster onboarding, safer authentication, and smarter automation for modern teams.Starting Price: $37.50 per month -
35
Keyote
TeskaLabs
Use your smartphone for secure authentication, next-gen logins, and more. Keyote is built by cyber security veterans, following standard authorized cryptography to give you the strongest possible protection. Everyone has a smartphone today, you don't need to have any additional hardware such as a USB token or smart card to be more secure. Software keys are easy to be copied and hence lost. Keyote stores keys in the phone security chip, effectively preventing their extraction. You must authorize the use of keys with biometry such as a fingerprint, Face ID, etc. So even if the phone is lost or stolen, your keys are still safe. Passwords are dead. People have to remember long passwords, and they have to change them frequently. We believe that there is a simpler way how to login: a smartphone. Contemporary mobile phones contain a powerful security chip, which in combination with a biometry authentication such as fingerprint or Face ID allows a user to login very securely and conveniently. -
36
EaseFilter
EaseFilter Technologies
Track file change, control file access in real time, prevent your sensitive data from being accessed by unauthorized users or processes. Secure file sharing with digital rights management(DRM), share files with fully control, grant or revoke the file access at any time. Implement file audit, file access control, file protection and encryption Windows applications with C#,C++ demo source code.Starting Price: $1500 -
37
MojoAuth
MojoAuth
MojoAuth - Passwordless Authentication Leader & CIAM Innovation Platform MojoAuth is the leading passwordless authentication platform that eliminates password security risks with magic links, OTPs, passkeys, and biometric authentication. Deploy secure, frictionless login experiences in days with 40% cost reduction and 300% faster user adoption rates. About MojoAuth - MojoAuth revolutionizes digital security by completely eliminating passwords from authentication workflows. As a specialized passwordless authentication platform, MojoAuth addresses the fundamental security vulnerability that causes 81% of data breaches: stolen or weak passwords. The platform provides magic links, OTPs, WebAuthn passkeys, and biometric authentication through a unified API that integrates seamlessly with existing systems. Core Mission: Transform authentication from a security liability into a competitive advantage by making passwordless authentication accessible, secure, and frictionlessStarting Price: $50 / month -
38
Protect your users and business with seamless Account Takeover (ATO) prevention. Enzoic’s REST API integrates effortlessly into your login, account setup, and password reset workflows, providing real-time detection of compromised credentials from third-party breaches. This allows you to take immediate action, like requiring a password reset or enabling step-up authentication, to keep accounts secure. With Enzoic, you gain the benefits of proactive protection without disrupting the user experience. Our solution reduces fraud and unauthorized access by using a constantly updated database of billions of compromised credentials. Whether the threat is from a recent breach or an older one, Enzoic identifies unsafe credentials and neutralizes risks. Designed for flexibility and ease of use, Enzoic empowers your organization to stay ahead of account takeover threats while maintaining smooth operations.Starting Price: $0
-
39
GateKeeper Enterprise
Untethered Labs, Inc.
Passwordless, proximity login to PCs, Macs, websites, and desktop applications. Hands-free, wireless 2FA and password manager through active proximity-detection. IT admins can dynamically allow users to log in to their computers and websites with a physical key either automatically, by touch, by pressing Enter, or with a PIN. Seamlessly login, switch users, switch computers, and logout without passwords, touch, or trouble - just a key. Once a user walks away, the computer will lock, blocking access to the computer and web passwords. With continuous authentication, users are always being checked to ensure that they require access. No more typing passwords. Admins and compliance can now automate password security from a central admin console: enforce stronger passwords, enforce 2FA, and give employees the power of password-free login without interrupting workflow. Reduce helpdesk tickets related to forgotten passwords/password resets. Login and auto-lock with proximity.Starting Price: $3/user/month -
40
Secuve TOS
Secuve
SECUVE TOS provides stonr user authentication based on digital signature and supports multiple access control policies. To control access privilege to illegal intruders including hackers, crackers and unauthorized internal users. Prevent forgery of modification of homepage or files, and data leakage. Protect computer systems againsts a variety of attacks resulting from security flaws inherent in operating systems. Detection and prevention of unauthorized network access to systems. Control over the execution of critical commands which can affect system operation. Delegation triggered when a system administrator executes a command requiring administrative privileges. Delegation triggered when the users of specific systems require the sessions for managing accounts. Event audit of user processes or background processes at the kernel level. -
41
Imperva's Account Takeover Protection is a comprehensive solution designed to safeguard organizations against unauthorized account access and fraud. It employs a multi-layered detection approach to identify and mitigate threats such as credential stuffing, brute force attacks, and other malicious login attempts. The platform analyzes login traffic patterns in real time, assigns risk scores, and provides immediate threat mitigation, all while maintaining a seamless user experience. Additionally, it proactively identifies compromised credentials through zero-day leaked credentials detection, enabling organizations to take swift action by resetting passwords or notifying users. Advanced analytics are utilized to detect user behavior anomalies, allowing for the identification of suspicious activities before they escalate into fraud. The solution also offers intuitive dashboards for deep insights into login trends, empowering security teams to detect, predict, and prevent account takeovers.
-
42
AuthStack
Buckhill
AuthStack is a host anywhere, Enterprise-grade, Single Sign-On (SSO) and Identity Access Management (IAM) System. It assumes responsibility for logging in users to your own, and optionally third-party websites and applications. Rather than managing multiple different logins for each website and application, AuthStack centralizes your user identity management so the user only has to login once and maintain one password and profile. Integration with AuthStack requires no custom coding if your website or application already supports SAML. If SAML is not supported we provide a Connector Framework, free of charge. We can also help you integrate the Connector if required. There is also no need to migrate your existing user database(s). AuthStack bundles with a Connector Framework which can communicate with any data source, whether that's LDAP, MySQL, SOAP, REST API, etc, to check credentials from existing user databases.Starting Price: €41.25 per month -
43
AuthZed
AuthZed
Unblock your business with an authorization system inspired by Google's Zanzibar white paper. As the creators of SpiceDB, the AuthZed team delivers enterprise-ready permissions systems built for scale and security. The most mature open source Zanzibar implementation designed for both consistency and performance at scale. Define fine-grained access for any object in your application or across your product suite and manage permissions using a centralized schema. Specify consistency requirements per authorization check; tunable consistency features balance performance and correctness according to your use case. SpiceDB returns lists of authorized subjects and accessible resources, helpful when pre-filtering permission-based results. Instrumented with observability tooling, a powerful Kubernetes operator, and load-testing capabilities, SpiceDB prioritizes both developer and platform engineering experiences. -
44
Ivanti Docs@Work
Ivanti
The Ivanti Docs@Work app gives end users an intuitive way to access, annotate, handle multiple shared files, and view documents from email, SharePoint, Office 365, Dropbox, and a variety of other on-premises and cloud repositories. Enterprise productivity depends almost entirely on having reliable access to content of all types, from customer accounts to healthcare records to financial transactions. With Ivanti Docs@Work, your IT admins can enforce data loss prevention (DLP) controls to prevent unauthorized distribution while allowing users to effortlessly download, edit, and share multiple documents from their mobile devices—without compromising corporate data. -
45
AuthMax
Worldpay
Card-not-present (CNP) fraud prevention is an essential building block of every successful ecommerce operation. AuthMax leverages extensive transaction data that immediately boosts incremental approvals on initial authorizations. Higher approval rates and fewer false positives for fraud help you retain customers and generate more revenue. Fraud prevention is essential, but so is providing exceptional experiences to your legitimate customers. AuthMax minimizes false declines and boosts CNP approval rates so you can fully realize potential revenue. Switch our turnkey service on and watch approval rates rise. Leverage insights gained from over 40 billion annual transactions. Behavior-driven models adapt over time to minimize false declines. Combining our knowledge of global markets with our innovative analytics system, we built AuthMax. AuthMax is a switch-it-on data science solution that incorporates numerous authorization-related factors. -
46
EmailAuth.io
EmailAuth
EmailAuth® is a TIER 1 OEM and a market leader in Email Authentication. Available 100% on-premise, or in-country cloud (local cloud) or on AWS/AZURE/GCP globally - We make it easy to unleash the power of email authentication. It is an anti-spoofing, anti-impersonation, and anti-phishing platform that ensures that no one can abuse your domains online. If anyone in the world spoofs your domains, EmailAuth collates data from all across the world to ensure that even a single unauthorized email is caught and rejected by global recipients of the world. It even extracts the IP of the sender, so this threat intelligence can be used to block the attacker across your cyber security fabric (SOAR capable). #StopGettingPhished #BeSpoofProof -
47
Netwrix Endpoint Protector
Netwrix
Netwrix Endpoint Protector is an advanced enterprise-grade Data Loss Prevention (DLP) solution designed to protect sensitive data from unauthorized sharing and malicious extraction from employee endpoints. It offers cross-platform capabilities, supporting Windows, macOS, and Linux operating systems, ensuring comprehensive security across diverse IT environments. The solution provides customizable device control to manage USB and peripheral ports, preventing unauthorized data transfers and mitigating risks associated with data leaks. Additionally, it includes content inspection features that enforce sophisticated policies based on sensitive data categories, keywords, and file types, effectively preventing unauthorized data transfers. Netwrix Endpoint Protector also assists organizations in achieving regulatory compliance with standards such as GDPR, HIPAA, and PCI DSS by securing personally identifiable information, protected health information, and payment card information. -
48
QShield
Quarkslab
Obfuscate your highly valuable source code and protect your sensitive assets thanks to QShield compiler-obfuscator. Protect your applications against static and dynamic analysis. Software running on untrusted environments is at risk of reverse-engineering, an application running on a device that is available to an attacker is vulnerable to a wide range of techniques used to try and extract secrets, and intellectual property. To prevent unauthorized parties from gaining insight, tampering with or even recovering the source code from the binary, software protection mechanisms must be implemented to preserve revenues and intellectual property. 30+ obfuscation schemes are available. Granular control of the protection profile thanks to a file-based policy or comments throughout the code. Build diversification, each compiled application is different with a user-controlled randomness seed. Integrity checks and detection of debuggers, emulators, and hooking frameworks. -
49
Keyless Authenticator
Keyless Technologies
Nothing to remember. Nothing to steal. You are the key. Adopt zero-trust authentication to protect your remote workforce and enable strong customer authentication with just a look. Anywhere. Any time. Any device. Embrace passwordless, multi-factor authentication to eliminate fraud, phishing and credential reuse – all while enhancing customer and employee experiences and protecting their privacy. Unique capabilities powered by unique technology. Hardware Agnostic. Since we do not rely on the device hardware or sensors, Keyless can be deployed on a large set of devices and appliances. Drive better outcomes for your organization by eliminating passwords. Top-Notch Security. No central honeypot, no data on user devices. Data can never be stolen or lost because no private information is accessible to anyone but the user. Reduce password associated costs by going passwordless. Password Reset Costs. The average helpdesk labor cost is estimated at $70. -
50
PasswordFree
Identité
Instant One-Click Logins with 2FA/MFA Security. 90% of shoppers abandon carts due to login friction. PasswordFree eliminates passwords and replaces them with instant, one-click logins and advanced 2FA/MFA security. No passwords, no long forms—just seamless access for your customers and strong protection against fraud. 🔒 Why PasswordFree? ✅ Instant Login – One-click sign-in for a smooth shopping experience ✅ OTP One-Time Pictures – More secure than SMS or email OTPs ✅ 2FA/MFA Security – Prevents credential theft & unauthorized access ✅ Checkout Verification – Stops fake orders & chargebacks before they happen ✅ Protection Against Fake Accounts – Blocks bots and credential sharing ✅ Customizable UI – Matches your store’s design effortlessly 💻 Works across desktop, mobile, and all Shopify themes Let customers log in, register, and check out instantly—while keeping your store safe. 🔥 Try PasswordFree FREE for 14 daysStarting Price: $4.99/month