Alternatives to maat.ai

Compare maat.ai alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to maat.ai in 2026. Compare features, ratings, user reviews, pricing, and more from maat.ai competitors and alternatives in order to make an informed decision for your business.

  • 1
    Auth0

    Auth0

    Okta

    Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO.
    Leader badge
    Compare vs. maat.ai View Software
    Visit Website
  • 2
    Cisco Duo
    Cisco Duo is a cloud-based identity security solution that protects organizations from identity-based threats and boosts workforce productivity. Trusted by over 40,000 organizations worldwide, Duo delivers an exceptional access management experience across all users, devices, and applications, making access to resources secure, seamless, and easy. Duo with Cisco Identity Intelligence provides deep visibility across your identity ecosystem, adding a powerful security layer to any identity infrastructure. Offer users a world-class access experience through Duo Passport to eliminate MFA friction and fatigue without sacrificing security. To stop threats, Duo verifies user identities with strong authenticators including Duo passwordless, Verified Duo Push with number matching, and phishing-resistant factors like biometrics and FIDO2 security keys. Paired with deep insights into users’ devices, Duo gives you the control to adaptively limit access based on device health or user risk.
    Leader badge
    Starting Price: $3 per user per month
  • 3
    Twilio Verify
    100% Protection from SMS pumping fraud with Verify. Verify is a fully managed API for multichannel user verification. And it now includes guaranteed protection from SMS pumping fraud with Fraud Guard. Terms apply. A multi-channel user verification solution in one turnkey API. Add seamless two-factor authentication to your onboarding and login flow with a single API that does the work of a full one-time password (OTP) delivery solution. Fraud Guard has already saved customers over $46 million by blocking over 398 million* fraud attempts. With first-to-market innovation, Fraud Guard offers 100% protection against SMS pumping fraud. Quickly integrate a ready-use solution that handles all your connectivity, channels, code generation, fraud monitoring, and more using native software—so you don’t have to. Reduce fraud across your multi-channel user experience with phone number verification that uses one API endpoint to validate users and detect fraud with minimal friction.
    Starting Price: $0.05/successful verification
  • 4
    MetaMap

    MetaMap

    MetaMap

    Regional data infrastructures, powering global identity verification. MetaMap is the first all-in-one identity verification platform built on regional data sources, consolidated on a global scale. Get to know your users in-depth, from local government checks to Global AML watchlists. A suite of identity verification tools to know your users in-depth. Verify your users without hurting your conversions rates. Quickly verify your users with our default SDK or build your own verification flow via our API. Our customers welcome up to 95% of users who successfully complete our verification flows at the first attempt. Automatically access our regional identity infrastructures, and get clean data from dozens of local databases consolidated in comprehensive user' profiles, no matter where you operate. Use MetaMap dashboard to reduce the time spent on manual verification through smart automation and workflows. You need advice? Our international Customer Success Team is here to help.
  • 5
    SecurEnds

    SecurEnds

    SecurEnds

    SecurEnds cloud software enables the world’s most forward-thinking companies to automate: User Access Reviews, Access Certifications, Entitlement Audits, Access Requests, and Identity Analytics. Load employee data from a Human Resources Management System (e.g., ADP, Workday, Ultipro, Paycom) using built-in SecurEnds connectors or files. Use built-in connectors and flex connectors to pull identities across enterprise applications (e.g., Active Directory, Salesforce, Oracle), databases (e.g., SQL Server, MySQL, PostreSQL), and cloud applications (e.g., AWS, Azure, Jira). Perform user access reviews by role or attribute as frequently as needed. Application owners can use delta campaigns to track any changes since the last campaign. Send remediation tickets directly to application owners to perform access updates. Auditors can also be granted access to review dashboards and remediations.
  • 6
    Onfido

    Onfido

    Entrust

    Onfido, an Entrust company, is a technology provider specializing in AI-powered digital identity verification to help businesses securely and efficiently onboard customers. Its Real Identity Platform verifies users by analyzing government-issued IDs and matching them with facial biometrics, ensuring accurate authentication. Supporting various document types, including passports and driver’s licenses, Onfido integrates seamlessly with business systems to create a frictionless user experience. Its solutions help organizations reduce fraud, comply with global regulations, and streamline customer acquisition. With a focus on trust and security, Onfido enables businesses to verify identities with confidence in an increasingly digital world.
  • 7
    Ping Identity

    Ping Identity

    Ping Identity

    Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.
    Starting Price: $5 per user per month
  • 8
    AU10TIX

    AU10TIX

    AU10TIX

    AU10TIX, an identity management company headquartered in Israel, is on a mission to obliterate fraud and further a more secure and inclusive world. The company provides critical, modular solutions to verify and link physical and digital identities so businesses and their customers can confidently connect. Over the past decade, AU10TIX has become the preferred partner of major global brands for customer onboarding and customer verification automation. AU10TIX takes verification and authentication to a whole new level of scalability. The power of deep learning lies within the input – the more you feed it, the smarter it becomes. This enables you to scale consumer onboarding and exponentially scale your business. With over 5% of the world identities already scanned and verified, fortune 500 companies are powered by AU10TIX, wiping out fraud while confidently focusing on growth. Our identity has changed over the years. Our principles & pioneering vision haven’t.
  • 9
    Acceptto Zero Trust Identity (CIAM)
    You need to know that your customers are who they say they are, customers don’t want to jump through hoops to prove it and they want you to keep their credentials safe. Protect your customers identities through a delicate balance of security and a frictionless, pleasant customer experience. Real-time, continuous identity monitoring & validation Post-Authorization. Eliminate account takeover (ATO) instantly with intelligent MFA. Risk-based policy orchestrated continuous authentication. Acceptto is a transformative cybersecurity company driving a paradigm shift in identity access management by treating authentication not as a single event, but rather a continuum. Our AI/ML powered Passwordless Continuous AuthenticationTM technology analyzes and verifies user identity, inferring behavioral data to detect anomalies and eliminate dependence on vulnerable binary authentications. We deliver the smartest, most resilient and breach-proof identity validation technology.
  • 10
    Ubisecure

    Ubisecure

    Ubisecure

    The Ubisecure Identity Platform helps organisations manage the many Digital Identity risks and opportunities. Focused on European B2B and B2C scenarios, Ubisecure combines highly assured Organisation Identity and Individual Identity to reduce fraud and increase efficiency in global trade and supply chain. Ubisecure is now the #1 global issuer of Legal Entity Identifiers (LEI). The Identity platform enables organisations to de-risk homegrown user registration and login solutions, and enable Single Sign-On (SSO) across all platforms and devices. Simplified MFA, including TOTP and Bank ID / Reusuable eIDs, reduce fraud by verifying customer identities, and automated customer credential management workflows for your helpdesk. Advanced identity use cases like consolidation of identity data silos, and Identity Relationship Management & Delegation can increase operational effectiveness, manage data breaches, and reduce IT costs dramatically.
  • 11
    Veriff

    Veriff

    Veriff

    Veriff is the preferred identity verification and authentication platform partner for the world's most innovative growth-driven organizations, including online marketplaces, financial services, gaming and mobility companies, and other sectors. By combining AI and human verification teams, Veriff ensures bad actors are kept at bay, and genuine users experience minimal friction in their customer journey. Veriff enables organizations to build customer trust through seamless, AI-powered identity verification and authentication. The Veriff IDV platform offers secure, scalable solutions trusted by organizations across industries. Veriff’s identity verification platform comes with a 98% check automation rate, a six-second average decision time, more than 12,000 identity documents in our document database, and a first-class UX that allows 95% of users to be verified on the first try.
    Starting Price: $49/month
  • 12
    WSO2 Identity Server
    WSO2 Identity Server is API-driven, is based on open standards with the deployment options of on-premise, cloud or hybrid. It supports complex IAM requirements given its high extensibility. WSO2 Identity Server helps you do single sign-on and identity federation backed by strong and adaptive authentication, securely expose APIs, and manage identities by connecting to heterogeneous user stores. Leverage the power of open-source IAM in your enterprise to innovate fast and build secure Customer IAM (CIAM) solutions to provide an experience your users will love
  • 13
    Stirdie

    Stirdie

    Stirdie

    Secure, auditable, and verifiable communication tools for business. Creating environments designed for data and identity verification audited by a blockchain network. Transform and optimize the way your business communicates forever. Stirdie uses peer-to-peer identity verification and cryptography to achieve data integrity and provide businesses and users alike with a tamper-proof suite of communications tools. By underpinning our suite of communications tools with blockchain technology, we provide a safe environment for businesses and users to transact sensitive data without fear of interception. We're eliminating fraud, and scams and saving businesses and individuals millions. Transactions and actions are recorded on the blockchain via a hash and unique ID, providing auditability of data. All transactions and actions from when data is created, sent, opened, and read are validated against the blockchain to ensure the integrity of the message.
  • 14
    Airlock

    Airlock

    Airlock

    Airlock's Secure Access Hub protects applications, APIs and data from identity theft and the most common attacks on Web applications. Security meets convenience, Airlock offers your customers a customer journey without media breaks with single sign-on, social registration, comprehensive user self-services and consent management. Acting in line with the market means reacting quickly. The Airlock Secure Access Hub therefore provides all important security functions such as registration, authentication and self services. So you can concentrate all your IT resources on your business processes. The Airlock Secure Access Hub helps to meet all international compliance standards - from GDPR over PSD2, PCI-DSS, OWASP to MAS. The upstream enforcement point for access policies onto applications and services allows compliance with regulations without having to make adjustments in each individual application.
  • 15
    Curity

    Curity

    Curity

    The Curity identity server is a standards-based identity and API security platform designed to provide robust authentication and authorization for digital services. It combines identity and API security, enabling scalable customer identity and access management to accelerate digital transformation, growth, and customer loyalty. It offers a range of features, including multi-factor authentication, user journey orchestration, decentralized identity, and secure access management. It supports various identity-related standards such as OAuth, OpenID Connect, and SCIM, ensuring interoperability and compliance with industry protocols. Curity's architecture is built on the principle of separation of concerns, enhancing security, flexibility, and scalability. It provides advanced configuration management with transaction-based changes, rollbacks, and backups, accessible through a web UI, CLI, RESTCONF API, and XML config files.
  • 16
    Intercede MyID
    MyID® credential management software enables governments and large enterprises to issue and manage digital identities using the most secure method of multi-factor authentication to citizens, large workforces and supply-chains. Today, MyID enables the strong authentication of millions of people to the data, systems and networks they need access to. For those responsible for information security, MyID provides easy integration and control over digital identity issuance and management. For end users, whether citizens or employees, MyID enables seamless, secure access to company systems, networks and resources using multi-factor authentication via a variety of devices. Faced with ever increasing threats of cyber terrorism, identity fraud and crime, MyID® provides a cyber secure credential management software solution. Where data really matters, you will find MyID. The security, reliability and interoperability of MyID software sets it apart.
  • 17
    ManageEngine AD360
    AD360 is an integrated identity and access management (IAM) solution for managing user identities, governing access to resources, enforcing security, and ensuring compliance. From user provisioning, self-service password management, and Active Directory change monitoring, to single sign-on (SSO) for enterprise applications, AD360 helps you perform all your IAM tasks with a simple, easy-to-use interface. AD360 provides all these functionalities for Windows Active Directory, Exchange Servers, and Office 365. With AD360, you can just choose the modules you need and start addressing IAM challenges across on-premises, cloud, and hybrid environments from within a single console. Easily provision, modify, and deprovision accounts and mailboxes for multiple users at once across AD, Exchange servers, Office 365 services, and G Suite from a single console. Use customizable user creation templates and import data from CSV to bulk provision user accounts.
    Starting Price: $595.00 / year
  • 18
    cidaas

    cidaas

    WidasConcepts

    cidaas is the optimal solution for fast and secure identity management. Thanks to cidaas you create one identity per user across all your channels. cidaas is based on OAuth2.0 and OpenID Connect standards, provides strong API security and with integrated Bot Net Detection and Fraud Detection a secure journey across all your business channels. Modern Identity and Access Management goes like this. Comprehensive feature set for quick and easy integration and implementation of all use cases and systems. We take care of it so you can focus on your core business. No more worrying about maintenance or operation. Countless passwords and pins make life difficult for users and are an unsightly barrier to access on digital channels. With passwordless authentication you secure your digital applications and offer your users a unique customer experience – because the login is the first thing your users see.
  • 19
    Sphere Identity

    Sphere Identity

    Sphere Identity

    With online forms out of the way, the customer onboarding process is smoothed-out and streamlined. Personal information can be shared and validated seamlessly. Update your subscription as regulations or business requirements change – options range from ‘Zero-knowledge proofs’ to fully-verified documents for KYC compliance. Volume-based pricing lets you pay for the exact data type and quantity your business needs and you can change it as required. Privacy concepts are applied throughout development, during each product’s lifecycle. We take a systematic approach that relies on accepted standards and process frameworks, and are open for external review. Sphere Identity has data protection policies, guidelines and work instructions in place. Every new system, process and policy is adopted by the entire organisation and is monitored throughout its lifetime.
    Starting Price: $1.20 per transaction
  • 20
    Simeio

    Simeio

    Simeio

    Simeio provides the most complete Identity and Access Management (IAM) solution that engages securely with anyone, anywhere, anytime, with an unparalleled “service first” philosophy. Whether you’re managing the identities of customers, partners or employees, we’ve got you protected. From retail to banking, hospitality, healthcare, government, universities and more, our job is to make your access simple, reliable and secure wherever you are…while keeping out those who don’t belong. And by protecting identities, we can protect something else just as important: your brand reputation. We partner with, leverage and interoperate with solutions from the industry’s most trusted companies to create a platform of outstanding reliability and security. Yes, what we do is complex and specialized. But you can leave all the complexity to us. What we deliver simplifies how your company manages identities.
  • 21
    Fischer Identity

    Fischer Identity

    Fischer International Identity

    Fischer empowers organizations to build an effective, predictable and secure Global Identity® Architecture. Securing an Identity Program is the #1 priority now. Fischer Identity provides hardware and software solutions as well as Global Identity® Services to secure and control information technology resources. Leverage our plug & play automation to create predictable, secure provisioning to enable your identities with the access they need on day one as well as deprovision access on-demand. Eliminate the reliance on professional services by automating the Fischer way. Our governance model provides you the control you need to enforce compliance throughout your business. Always know who has access to what, how they obtained the access they have, and remediation when something is not right. Accelerate your digital transformation with Fischer Identity lifecycle management.
  • 22
    Login-Master
    Login-Master Access + User Management redefined. CIAM solution for B2B delivers highest performance for web application users. The modular Customer Identity & Access Management solution was born to meet fundamental needs in a web portal project. Login-Master offers the users’ authentication and access control requirements of a B2B Portal. We had the choice between two Open Source offers: ForgeRock, one of the oldest platforms for CIAM with expensive subscription fees or the young CIAM rocket Keycloak with no subscription fees. We selected Keycloak. With Keycloak we chose one of the best Open Source SSO solutions. It delivers all necessary authentication features. It works perfectly for the storage of up to 500 user accounts. But our customer challenge was: His web portals supported more than 500 users. And there was an important part missing: the User-Life-Cycle management. Therefore, we combined the access management with all necessary identity features to build an holistic CIAM.
  • 23
    Descope

    Descope

    Descope

    Descope is a drag-and-drop customer authentication and identity management platform. Our no / low code CIAM solution enables developers to easily create and customize their entire user journey using visual workflows – from authentication and authorization to MFA and federation. Descope also provides a connectors ecosystem with dozens of third-party services for use cases such as identity verification, fraud prevention, risk-based authentication, and identity orchestration. Descope is built on a scalable multi-tenant architecture with high availability that can support advanced enterprise requirements. Customers use Descope to improve their user onboarding with passwordless authentication, enhance security with MFA and step-up controls, and unify customer identities across business properties. Founded in 2022, Descope is backed by Lightspeed and GGV and is a member of the FIDO Alliance.
    Starting Price: $0.05 per user per month
  • 24
    PortalGuard

    PortalGuard

    BIO-key International

    BIO-key PortalGuard IDaaS is a single, flexible cloud-based IAM platform that offers the widest range of options for multi-factor authentication, biometrics, single sign-on, and self-service password reset to support a customer’s security initiatives and deliver an optimized user experience – all at an affordable price point. For over 20 years, industries such as education, including over 200 institutions, healthcare, finance, and government have chosen PortalGuard as their preferred solution.Whether you’re looking for passwordless workflows, support for your Zero Trust architecture, or just implementing MFA for the first time, PortalGuard can easily secure access for both the workforce and customers whether they are remote or on-premises. PortalGuard’s MFA stands out above others as it is the only solution to offer Identity-Bound Biometrics that offer the highest levels of integrity, security, accuracy, availability and are easier to use than traditional authentication methods.
  • 25
    Nexsign

    Nexsign

    SAMSUNG SDS

    Get stronger mobile security that’s uniquely yours. The next step in mobile security is Nexsign. Unlike a password, which can be easily forgotten or duplicated, Nexsign™ verifies your identity with biometric information using your fingerprint, face, and voice. The result? An authentication experience that’s simpler, faster, and even more secure. The days of remembering long, complicated passwords are officially over. Accessing data is as simple as recognizing your fingerprint, face or voice. Enjoy some peace of mind. Nexsign™ will not store your biometric information on the server. And with a strong authentication system using Public-Key Infrastructure (PKI), there is no risk of biometric information leaking. Biometric authentication is just the beginning. Nexsign™ can also work on a range of platforms and environments, such as Mobile OTP or PIN authentication. Now it’s simple and easy to deploy solutions, with standardized development toolkits, APIs, and a web-based admin portal.
  • 26
    Amazon Cognito
    Amazon Cognito lets you add user sign-up, sign-in, and access control to your web and mobile apps quickly and easily. Amazon Cognito scales to millions of users and supports sign-in with social identity providers, such as Facebook, Google, and Amazon, and enterprise identity providers via SAML 2.0. Amazon Cognito User Pools provide a secure user directory that scales to hundreds of millions of users. As a fully managed service, User Pools are easy to set up without any worries about standing up server infrastructure. With Amazon Cognito, your users can sign in through social identity providers such as Google, Facebook, and Amazon, and through enterprise identity providers such as Microsoft Active Directory via SAML. Amazon Cognito User Pools is a standards-based Identity Provider and supports identity and access management standards, such as Oauth 2.0, SAML 2.0, and OpenID Connect. HIPAA eligible and PCI DSS, SOC, ISO/IEC 27001, ISO/IEC 27017, ISO/IEC 27018, and ISO 9001 compliant.
  • 27
    Thales OneWelcome Identity Platform
    The OneWelcome Cloud Identity Platform is a flexible platform that manages all your use cases for B2C, B2B and gig workers. This core platform can be expanded with a range of identity apps that combine to meet your organization’s specific needs. OneWelcome manages the European complexity of different eID’s, privacy laws, GDPR regulations, and languages for you. Our purpose is to lower the threshold for any European citizen or company that wants to connect. Create frictionless, secure and privacy protected access for your customers. Connect and protect your business-to-business ecosystem. Delegate and manage access to business partners, suppliers and your extended workforce. Get in touch to find out what the OneWelcome Cloud Identity Platform can do for your business and benefit from business enablement, operational efficiency, enhanced customer experience, improved security and facilitated compliance.
  • 28
    Engity

    Engity

    Engity GmbH

    As an Identity & Access Management Solution Provider, we offer European SMEs, start-ups and grown-ups a fully scalable, managed and customizable Keycloak alternative. Engity can ensure full compliance with European data protection regulations by providing all services from European data centers. Furthermore, Engity offers standard security features such as Easy-Ensure Strong Password Check or Breached Password Detection to ensure the highest security standards. In addition to the classic authentication features such as login with username & password, MFA, SSO or biometrics, Engity also brings new solutions to the market, such as authentication environments for directories or sign-up without the need for an e-mail account.
    Starting Price: €0.01/month/user
  • 29
    Omada Identity Suite
    Omada is a global leader in IGA, offering innovative, user-centric solutions to manage and secure digital identities. Omada Identity Cloud delivers a simplified, yet powerful IGA experience leveraging intelligent automation and Gen AI/ML capabilities to enhance security, compliance, and efficiency. Omada empowers organizations with advanced analytics and comprehensive visibility, enabling informed decisions about access rights and identity management. By automating key processes, Omada helps businesses reduce risk exposure, optimize operations, and maintain compliance while streamlining administration to reduce IT costs and improve overall security posture. With Omada, organizations can effectively manage modern identity challenges, ensuring the right people have the right access to the right resources at the right time.
  • 30
    FAD

    FAD

    FAD

    FAD® is a handwritten signature on electronic media, functional equivalent to a handwritten signature on paper. It includes technological components of prevention and security. FAD is a remote identity validation and multimedia signature platform. FAD fights identity theft, promotes democracy and financial inclusion, giving certainty to any documented agreement. Validate any individual identity against the government issued identity document using advanced facial recognition techniques, liveness detection by comparing and authenticating a IDs and applying 50+ forensic and biometrics test, in seconds, utilizing the industry’s largest document library. Recognizes the individual and video records the exact moment of the acceptance, this process provides full attribution of the agreement to the signatory.
  • 31
    OpenText IAM
    Digital transformation can deliver many efficiencies and new sources of value, but it also presents an enormous challenge: providing secure access to information within and outside the firewall. IT must manage user access to internal and cloud-based applications among employees, customers and trading partners. In the digital economy, every person, system and device needs a digital identity. The OpenText Identity and Access Management (IAM) Platform helps enterprises manage all the digital identities that request access to their systems and applications. With OpenText IAM in place, information access becomes manageable, governable and visible. Identity and access management creates and manages user accounts, roles and access rights for individual users, systems and devices. The best IAM solutions manage both employee identities within an organization and across an extended business ecosystem of customers and partners. IAM is also essential to manage the identities of IoT devices.
  • 32
    Okta

    Okta

    Okta

    One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity.
  • 33
    IDCheck.io

    IDCheck.io

    ARIADNEXT

    IDCheck.io is the solution to automatically and instantly verify a person’s identity remotely. With the explosion of the internet and online subscriptions, companies need to be increasingly vigilant in their customer onboarding processes. Fraud and identity theft are on the rise and present numerous risks for both companies and users. Our identity verification service verifies that the user who wishes to subscribe to a service is really who he/she claims to be. This provides you the necessary confidence to enter into a customer relationship, allows you to be in compliance with the various regulations related to your activity, all optimizing the customer experience of your users, who today are looking for seamless, instant and secure journeys. Achieve a high level of seurity by verifying ID documents and their holder. Fight documentary fraud and avoid identity theft. Meet the different regulatory requirements of your industry.
    Starting Price: €1.99 per document
  • 34
    RapidIdentity

    RapidIdentity

    Identity Automation

    Identity Automation delivers the most scalable, full-lifecycle identity, access, governance, and administration solution. As the company's flagship product, RapidIdentity helps organizations increase business agility, embrace security, and deliver an enhanced user experience. For organizations looking to streamline security, reduce risk from network and data breaches, and lessen IT costs, use RapidIdentity today!
  • 35
    CyberArk Customer Identity
    Delight your customers with easy and secure access to your websites and apps that keep them loyal to your business. Expectations for great digital experiences are at an all-time high. Meanwhile, the attack surface is more porous than ever. With CyberArk Customer Identity, you can securely open up your websites and apps to customers with confidence. Seamless integration, intuitive access controls and frictionless sign-on experience. Privacy, consent and identity verification in one platform. Pre-built widgets and open APIs to reduce development effort. Secure access to business apps for human and machine identities. Secure access for machine identities within the DevOps pipeline. Reduce complexity and burden on IT while improving protection of the business. Provide secure single sign-on access to your apps and services.
  • 36
    Assently CoreID
    Offer identification with any of the Nordic electronic IDs, such as Swedish BankID, Norwegian BankID, Danish NemID or through the Finnish Trust Network. It’s easy to integrate CoreID into your systems on any platform. Save time-related to infrastructure, maintenance and upgrades. Improve your online security and offer modern authentication solutions to your customers with electronic ID. Let your customers identify themselves on any device with Swedish BankID, Norwegian BankID, Danish NemID or the Finnish Trust Network. Assently is compliant with GDPR and ISO 27001 certified, the international standard for information security. With Assently’s premium identification solution CoreID, you can easily assert your customers’ identities using electronic IDs. Assently CoreID is easily customized and configured based on your needs. You choose what countries’ eIDs to enable. Use Assently CoreID on any device, mobile, tablet, or desktop on your website.
  • 37
    OneSpan Identity Verification
    Acquire more customers, reduce abandonment, and mitigate fraud with digital identity verification services. Gain access to a wide range of digital identity verification services all through a single platform​. Enable online channel growth with digital ID verification during account opening. Enable remote account opening with digital identity verification and fraud detection​. Select the best verification workflow to optimize for security and UX​. Verify the authenticity of ID documents in real-time and compare facial biometric data. Comply with KYC (Know Your Customer) requirements and assess customer risk. Detect fraudulent ID documents and prevent application fraud in real time. Select the best digital identity verification method to balance CX & risk. Select the best check types for your demographic to optimize adoption rates. Don’t settle for a single provider with limited coverage. Capture a single and complete audit trail tied to the entire transaction.
  • 38
    Enformion

    Enformion

    Enformion

    Founded by a team of industry pioneers and experts in data technology with over two decades of experience, Enformion’s data repository comprises more than 6,000 data sources and 120 billion records available via a cloud-based platform, API, and batch processing. Using state-of-the-art artificial intelligence (AI) and machine learning (ML), we provide an unparalleled and comprehensive view of people, businesses, assets, and their interrelationships. Our family of solutions empower businesses throughout the United States to make informed decisions that maximize knowledge, improve efficiencies, and better serve the needs of their clients. Enformion’s data provides actionable intelligence for Financial Services, Retail and eCommerce, Accounts Receivable Management, Legal, and Government Agencies, including: Identity Verification, Fraud and Risk Detection, and Collections & Investigations.
  • 39
    Anomalix

    Anomalix

    Anomalix

    Engage with employees from Day 1 and remove barriers to collaboration. Real-time and historical data for access management will reduce compliance costs and empower employees. Passwordless enterprise identity and access management. A secure solution to handle the employee lifecycle events (Joiner, Mover and Leaver) to safeguard sensitive data while affording the least privilege access required for job performance. Identify anomalous and suspicious User and Entity behavior. Create efficient and accurate job roles that provide the right level of access and information. Implement an identity management solution for non-employee individuals and corporate assets. Enable cross-organizational collaboration to increase data quality and reduce problems. Create an authoritative source for all non-employee Identities. Perform the necessary identity related due diligence. Manage all identity lifecycle events for humans and assets (Engage, Change, Disengage, Reengage).
  • 40
    authID.ai

    authID.ai

    authID.ai

    Launch the power of mobile facial biometrics to deliver seamless identity fraud protection across the digital identity lifecycle. Onboard customers with ease. Weed out the bad guys early. Ensure user accounts and transactions cannot be compromised by account takeover or identity fraud. Gain increased assurance with cloud-based biometric authentication of high-risk transactions. Eliminate passwords with FIDO2 strong authentication tied to a trusted identity. Confirm the identity of new users remotely- know they are who they say they are. Our mobile biometric solutions help you onboard customers and verify their presence with ease while ensuring their accounts cannot be compromised by account takeover or identity fraud. Learn how authID can help you transform identity management.
  • 41
    NEC Digital ID
    NEC Digital ID solution utilizes its 20+ years of investments for developing its cutting-edge facial recognition technology to provide a secure and easy-to-use identity verification and authentication system. Establishing trust in online interactions is vital with an ever-increasing digital presence today. NEC’s solution offers a robust way to authenticate identities, reduce fraud, and enhance user experiences, aligning perfectly with the current demand for digital security and seamless online experiences. We significantly reduce account takeover identity theft and fraud risks through facial recognition and liveness detection. Our Digital ID solution can be integrated into various industries and applications, from banking and healthcare, stadiums, and theme parks, to retail and education, enabling digital identity verification wherever needed.
  • 42
    Azure Confidential Ledger
    Tamperproof, unstructured data store hosted in trusted execution environments (TEEs) and backed by cryptographically verifiable evidence. Azure confidential ledger provides a managed and decentralized ledger for data entries backed by blockchain. Protect your data at rest, in transit, and in use with hardware-backed secure enclaves used in Azure confidential computing. Ensure that your sensitive data records remain intact over time. The decentralized blockchain structure uses consensus-based replicas and cryptographically signed blocks to make information committed to Confidential Ledger tamperproof in perpetuity. You’ll soon have the option to add multiple parties to collaborate on decentralized ledger activities with the consortium concept, a key feature in blockchain solutions. Trust that your stored data is immutable by verifying it yourself. Tamper evidence can be demonstrated for server nodes, the blocks stored on the ledger, and all user transactions.
    Starting Price: $0.365 per hour per instance
  • 43
    aapi

    aapi

    aapi

    Act on identity events in other apps to make identity experiences more seamless, secure, compliant, and productive. Automatically embed the correct real-time actions for users and teams to efficiently act on data in downstream apps with a single click. Next-generation granular access into specific functions of apps, surpassing existing PAM and CASB solutions for true zero trust. Events, like identity provisioning and suspicious activity, are responded to by aapi to automate identity, application, and security responses. aapi automatically embeds correct real-time actions for users and teams to act on data in downstream apps within their chosen application with a single click, while access is protected by your IAM. Users are given access to only the individual features within apps they need, while keeping everything else safe and secure, all directly through your IAM.
    Starting Price: $4 per user per month
  • 44
    Meeco

    Meeco

    Meeco

    Increase trust, reduce friction through transparent personal data enabled services. As individuals gain the legal rights to manage and control their data, businesses need to re-think how they collect, store and exchange their customers information. Data breaches, identity theft and data malpractice have taken trust to an all-time low.​ Individuals are calling for a new social contract with businesses. As individuals gain the legal rights to manage and control their data, businesses need to re-think how they collect, store and exchange their customers information. The Meeco Labs program provides organisations an opportunity to test hypotheses and prove business value prior to making substantial investments. It is a custom designed process and pathway to new products, services, experiences and business models. Utilising the Meeco Platform and API suite, consent exchanged customer or citizen data is mapped directly to internal CRM, ERP or enterprise systems.
  • 45
    Next Identity

    Next Identity

    Next Reason

    Next Identity is a comprehensive Customer Identity and Access Management (CIAM) platform designed to help businesses create secure, flexible, and seamless customer journeys. It offers features such as passwordless authentication, multi-channel communication, and unified account management to streamline onboarding and improve customer experience. Next Identity enables businesses to manage millions of users with scalable security, modern orchestration, and advanced analytics, all while offering customizable workflows and integrations for digital transformation.
    Starting Price: $29/month
  • 46
    Visual Guard
    Visual Guard is an advanced identity and access management (IAM) tool offering a complete solution for securing sensitive applications and data. With centralized management of users and permissions, Visual Guard facilitates the implementation of robust, standards-compliant security policies. User management : Create, modify & delete user accounts Integration with LDAP or Active Directory directories Automatic synchronization of user information Access control : Precise definition of access rights to features and resources Role and Permission Management Multi-factor authentication (MFA) Single Sign-On (SSO) Security Audit and Monitoring : Permission Matrix Detailed Event log Real-time and Historical Graphs Integration & compatibility : Compatibility with major development platforms, frameworks, and protocols. .NET API Benefits : Simplified access management Enhanced data security Improved regulatory compliance Reduce identity management cost
    Starting Price: 1.55/month/user
  • 47
    FortressID

    FortressID

    Fortress Identity

    Fortress Identity provides a unified, cost effective platform that enables you to verify IDs from 195 countries and continuously KYC (know your customer) from beginning to end. The platform combines onboarding validation, compliance and due diligence, with biometric multifactor authentication that eliminates passwords and enhances the entire user experience. Validate IDs (drivers licenses, passports, National ID cards) from over 195 countries, over 7600 document types. Connect to multiple identity verification databases for fraud detection, OFAC verification, AML monitoring and more. Compares facial features and liveliness (selfie) to image on document(s). Transfers document information (OCR) via XML or REST. Provides programmable rules for multiple documents
  • 48
    Veratad IDResponse
    Global identify verification with Veratad helps you get compliant, fight fraud, and remove friction from your onboarding. Companies that do businesses online need a way to protect themselves from fraud, liability and regulatory penalties. Our IDResponse® platform provides a flexible way for you to verify who your customer is. We streamline onboarding by using the customer information you’re already collecting along with supplementary document capture and biometrics. This protects your business while reducing customer friction. Verify customer identity in real time. There are multiple ways to verify an identity. The traditional way of matching customer provided personal data to trustworthy databases is often the most efficient and cost-effective way. For businesses that require flexibility or higher confidence levels, we provide advanced methods of verification.
  • 49
    SlashID

    SlashID

    SlashID

    Identity is the most common vector for lateral movement and data breaches. SlashID helps you build a secure, compliant, and scalable identity infrastructure. Manage the creation, rotation and deletion of identities and secrets in a single place. Complete inventory of all your identities and secrets, multi-cloud. Detect initial access, privilege escalation, and lateral movement across your IdPs and cloud environments. Add authentication, authorization, conditional access, and tokenization to your services. Detect leaked key materials in real-time and prevent data breaches by rotating them. Automatically block, suspend, rotate or enforce MFA on a detection to reduce the impact of an attack. Add MFA and conditional access to your applications. Add authentication, authorization, credential tokenization, and conditional access to your APIs and workloads.
  • 50
    ReachFive

    ReachFive

    ReachFive

    Improve customer experience through advanced identity management. The Customer Identity and Access Management (CIAM) industry is undergoing fundamental changes as identity management shifts from big data to structured customer identity data. Relationships and interactions between customers and brands is undergoing deep transformation as online and offline boundaries disappear. Organizations need to deliver seamless, personalized customer engagement across multiple channels, and accomplishing this depends on capturing, managing, securing and using customer identity data. ReachFive’s Customer Identity and Access Management (CIAM) solutions help you create a unique user experience, across an integrated, unified platform. Our solutions help you acquire and recognize customers, collect accurate first-party data, build unified customer profiles and facilitate personalized marketing through integrations, driving revenue and loyalty.