Alternatives to vIDix Identify
Compare vIDix Identify alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to vIDix Identify in 2024. Compare features, ratings, user reviews, pricing, and more from vIDix Identify competitors and alternatives in order to make an informed decision for your business.
-
1
Auth0
Okta
Auth0 by Okta takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO. -
2
Securden Unified PAM
Securden
Discover and consolidate all privileged account credentials into a centralized repository. Regulate access to all critical IT assets. Grant just-in-time access, and enforce least privilege on devices in the organization. • Enforce remote password resets on devices. • Manage Windows domain, service, local admin accounts & their dependencies. • Eliminate hardcoded-credentials from scripts and configuration files. • Automate password access for non-human identities with APIs. • Protect SSH keys, track usage & associate with UNIX devices. • Share accounts with granular access controls. • One-click remote access to assets without revealing passwords. • Grant Just-In-Time access to privileged accounts. • Shadow, Monitor & record live sessions. • Endpoint privilege management with application controls. • Integrate with AD, AzureAD for user provisioning. • Integrate with solutions for MFA, SIEM, ITSM & SSO. • Comply with regulations with audit trails & custom reports -
3
Uniqkey
Uniqkey
Uniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies with enhanced control over their cloud infrastructure, access security, and employee management. Recognized as the easiest tool to use, Uniqkey removes friction from employees’ daily workflows by automating time-consuming authentication and security tasks, thereby increasing productivity. Its intuitive and user-friendly interface makes Uniqkey the perfect choice for employees. Uniqkey combats the most significant threats to company infrastructure by safeguarding critical systems and company credentials with state-of-the-art encryption. It also offers unique insights and a comprehensive view of IT infrastructure, employee access, and security scores, making it a valuable tool for IT teams to monitor security policies and assess the impact of awareness campaigns with confidence. -
4
Dashlane
Dashlane
Dashlane fills all your passwords, payments, and personal details wherever you need them, across the web, on any device. Yes, we're a password manager. But we can radically simplify your whole life online. Security for your business. Simplicity for your employees. Weak, stolen, or reused employee passwords are the #1 cause of breaches. You need a solution for managing them that's as easy to use as it is safe. Businesses choose us for our patented security and employee adoption rates. Control the business credentials you need to, and protect against breaches and hacks. Employees love us because we’re actually easy to use. They can keep their business and personal accounts separate, but manage them in one safe place. Save passwords and logins as you browse. Sync your Dashlane data to every device automatically, whether you’re an Apple diehard, an Android addict, or any combination in between.Starting Price: $4 per user per month -
5
Passwork
Passwork
Passwork provides an advantage of effective teamwork with corporate passwords in a totally safe environment. Employees can quickly access all their passwords, while the rights and actions are closely supervised and managed by local system administrators. All data is encrypted using the AES-256 algorithm while being securely stored on your server and managed solely by system administrators. Passwork runs on PHP and MongoDB and can be installed on Windows and Linux, with or without Docker. Key features: - Set custom permissions for vaults and folders - Store passwords in a structured way - Use the search bar, tags and color labels for quick and easy access - Eliminate unsecured, old, weak or compromised passwords - Track all activities and review previously used passwords - Invite teammates to vaults and shared folders - Role-based access control - Integration with AD, Azure AD and LDAP - Custom settings for individual users and roles - Import and export effortlesslyStarting Price: $480 one-time -
6
vIDix Info
Ban-Koe Companies
vIDix Info safeguards your registration process by accurately capturing and storing detailed visitor information. Accurately capture detailed visitor information. Identify all individuals who visit your facility by scanning an ID and identifying the reason for their visit. vIDix Info enables organizations to efficiently track visitors, print badges, and integrate with facility access control. Define what information to capture and how it will be collected, using a hardware or software solution. To ensure data accuracy, create multiple choice fields for known data such as zip codes and city names. Create and issue professional visitor ID badges using the integrated badge designer. Pre-designed templates are included to make it easier to issue temporary or physically self-expiring badges. Build screen layouts, as simple or complex as needed, to capture necessary information in a site visit. Incorporate videos and questionnaires that are required on arrival or upon exit of a visit. -
7
CI Badge
CI Solutions
CI Badge is a powerful ID card issuance program that serves thousands with flexible image capture, robust data connectivity and unlimited card printing bringing simplicity to complex, secure ID card production. Each version of our CI Badge Card Printing Software is customized to your specific card printing needs. We base our solutions on a number of factors in order to create the best long-term solution for your organization. Start your card printing program by scheduling a demo with us today. Look Up a Record, Take a Photo & Click Print. CI Badge is the software program that connects your camera, card printer, and database. Using a connected camera and CI Badge, you can easily send print jobs to your card printer. You can also import your current database into CI Badge. Simply look up a record in CI Badge, take a photo if needed, and click print. -
8
HID SAFE
HID Global
Through a single, centralized platform, HID SAFE Enterprise advances the security functions of identity management, breaks down the siloed systems and processes within organizations, and enables collaboration across departments and teams. HID SAFE Visitor Manager automates the entire lifecycle of visitors of any organization. This completely web-based solution includes capabilities for visitor pre-registration, security and background checks, access authorization, check-in/check-out, badge printing and centralized reporting, and audit trail functions. HID SAFE Visitor Manager is an extremely flexible solution that can be easily configured for each customer’s unique visitor management requirements. This highly scalable solution allows for easy management of busy sites with high volumes of visitors. HID SAFE Risk Analytics enables organizations to take the power of their physical security data beyond traditional reporting and use it to predict physical security operations. -
9
PersonID
360 Biometrics
The PersonID-Att is a fingerprint-based time and attendance system that allows you to quickly and easily identify employees and other partners, and track their arrival and departure times. This fingerprint attendance software is appropriate for any business with hourly employees, as well as for educational, government and other applications where arrivals and departures need to be tracked. By providing real-time identification (1 : N) of an individual, PersonID-Att attendance system enables you to create a more secure environment, improve efficiency and accuracy, and minimize losses from fraud. Here's how it works. Individuals are enrolled into the system by capturing their fingerprints along with personally identifiable information and a photograph, if desired. When an individual needs to be identified, the system instantly matches the captured fingerprint against the enrolled fingerprints and displays the results with a match score, personal information, a photograph. -
10
walt.id
walt.id
We offer holistic digital identity and wallet infrastructure used by thousands of developers, governments and businesses across industries. The products are open source, based on open standards, compliant with digital identity regulations and available for self-management (on-premise) or as a managed service (SaaS). Our Digital Identity Infrastructure include the following products and functionality: Issuer SDKs, APIs & APPs: Issue credentials or mint tokens with our infrastructure and white label applications. Wallet SDKs, APIs & APPs: Launch a wallet for your organization, employees or customers to manage access, credentials and tokens. Verifier SDKs, APIs & APPs: Verify credentials or tokens, use powerful verification policies and white label apps. Identity Provider: Enable wallet-, credential- and token-based authentication and identification for your apps.Starting Price: Free -
11
MobileID.io
ARIADNEXT
Digital identity is defined as the identity of an entity on the web. It is the technological link between a real entity (a person, a company, an organization) and virtual entities, i.e. its digital representations. The digital identity thus allows the identification of an individual online, as well as his or her connection to services offered on the web. Gone are the lists of identifiers and passwords to remember to authenticate oneself online, from now on digital identity makes it possible to prove that the user is indeed the person he or she claims to be and thus to identify oneself to online services in a secure manner. These digital identities enable governments, public services, private companies and regulated activities (banks, Fintech, online games, etc.) to protect themselves against the risks of fraud and to comply with increasingly restrictive regulations while remaining accessible to the greatest number of people. -
12
Core Access Insight
Fortra
Core Access Insight offers a continuous, comprehensive view and analysis of the relationship between identities, access rights, policies, and resources that occur across your entire environment. Our easy-to-use, easy-to-understand solution applies analytics to the big identity and access data in your organization, empowering you to identify identity-related access risks, and drive provisioning and governance controls to manage that risk within your business. With Access Insight, your governance system does more than just manage access. It provides access intelligence to analyze the identity and access data in your organization, using advanced analytics tools. This enables you to perform data mining, statistical analysis, and data visualization—drawing on specific governance policies, rules, and risk indicators to provide intelligence and valuable information for administrators, analysts, compliance officers, and incident responders. -
13
InstantCard
InstantCard
Get the ID cards you need when you need them, hassle-free. We won’t try to sell your business a printer, we won’t try to sell your company any card stock. Our professional designers will create a custom template based on your specifications. We do not use generic templates, ensuring you get exactly what you need from your employee ID cards. We provide unlimited templates, so you get the identification features you need, where you need them. Get your employee ID badges when you need them with same-day shipping. Since the InstantCard system was designed with single-card orders in mind, this applies to small orders, too. This is just one way we can make the ID card ordering process far more simple for businesses of absolutely any size. You may enter each employee’s information one-at-a-time, or in a bulk upload via a spreadsheet. And, since we have no minimum batch size, you get that cards you need when you need them.Starting Price: $5.80 per card -
14
Touch N Go
Bayometric
Touch N Go – a fast, secure & simple way to integrate biometric fingerprint identification into your solution with just FOUR lines of code. A scalable, reliable and high performing biometric identification solution for seamless integration. Makes implementing and maintaining fingerprint recognition easy with no learning curve for developers. Provides best fit identity solution for workflows with demanding security that keeps developers happy and productive and IT satisfied and in control. Offers organizations a cost-effective turnkey biometric identification system leveraging proven, best of breed technologies so organizations can focus on their core operations. -
15
Tools4ever IAM
Tools4ever
Streamline your operational efficiency and control compliance efforts for HIPPA, SOX, and other requirements. IAM provides user provisioning, centralized account management, and role-based access control by integrating personnel and directory systems. Automated onboarding and offboarding ensure that only the right people have the right access at the right time. Want to get a better understanding of how IAM can operate in your environment? Attempting to manually create, manage, and disable user accounts in today’s complex corporate environment is its own full-time job. Tools4ever’s IAM User Provisioning software creates a connection between HR systems, directory services (e.g., Active Directory, LDAP, GSuite), and downstream services. The entire process is automated, recovering substantial bandwidth for IT staff. -
16
eClear 360
eConnect
Finding affordable, turnkey solutions that can quickly plug into existing systems to scale up operations. eConnect's Identity Management system, eClear 360, leverages multiple data integrations and ties them to our industry-leading facial recognition algorithm. This opens the door for new insights, opportunities, and revenue protection, all from one platform. Key capabilities include: Identifying anonymous high-value patrons, their gaming value, and frequency of visits, detecting excluded patrons, advantage players, and patrons who have committed crimes in the past, a great tool to help the operator with know your customer mandates. The Identity Management system employs patented technology to provide operators with accurate facial identification reinforced with data analytics to identify staff members for time-clock integrations, detect unwanted individuals or valued guests, and improve operational efficiency. -
17
Sima
Active Witness
Sima does more than just keep the bad guys out. Sima is a highly secure yet frictionless cloud-based Access Control reader. Sima has the ability to read both mobile credentials (QR codes) and facial biometrics. This allows the integrated cloud-based software to issue both single (QR only) and multi-factor (facial verification) for highly secure and customized facility access. We take your privacy very seriously. We use facial recognition technology to perform facial authentication. This allows us to verify identity and grant access to a location. Facial data will be stored on our servers only for the purpose of identification. Your personal data, including your face picture, will not be shared with third parties.Starting Price: Free -
18
Blockchains
Blockchains
In the physical world, your identity is generally made up of your name and a government-issued ID card that provides the necessary credentials to prove you are who you say you are. A digital identity works the same way – providing the digital world with credentials that prove you are who you say you are – but goes far beyond your name and possible picture. Our digital identity management system allows users to build digital representations of themselves to prove their identity, the things associated with them – important digital documents, property, devices – and access rights to certain services and information. An attestation framework enables a chain of trust in interacting with other users and business or government entities anchored on the blockchain. Our digital identity solutions give control of personal data back to users while delivering the benefits of trusted, distributed identity to consumers and organizations. -
19
IAMCompare
IAMCompare
IAMCompare is the only solution focused on auditing the integrity of your Provisioning & De-provisioning process. We perpetually identify user access exceptions and track to resolution, reducing both time and cost from your process. IAMCompare is a focused solution that brings companies direct visibility into their account. Our solution provides results at a transparent price point. Next, our clients identify assets (applications, databases, devices, other) that require monitoring and supply relevant account data. IAMCompare unites census and account information and identifies actionable anomalies. View account access for employees as well as authorized contractors, vendors & customers. Leverage IAMCompare to streamline system user access reviews and standardize vendor, customer and other 3rd party user certifications.Starting Price: $500 per month -
20
Sovrin
Sovrin
Personally manage your digital IDs online with the Sovrin Network, an open source project creating a global public utility for self-sovereign identity. It’s time to evolve the current system of siloed identities, endless passwords, and insecure databases. The time is here for the frictionless, secure identity verification of self-sovereign identity. The Sovrin Network is the new standard for digital identity, designed to bring the trust, personal control, and ease-of-use of analog IDs, like driver’s licenses and ID cards, to the Internet. We’ve designed Sovrin as a metasystem for any application to use, giving people, organizations, and things the freedom to prove things about themselves using trustworthy, verifiable digital credentials. “Self-sovereign” means the individual identity holder controls their credentials, using them whenever and however they please, without being forced to request permission of an intermediary. -
21
Juniper Identity Management Service
Juniper Networks
Protecting access to corporate data is one of your top security priorities. Insiders with direct access to corporate data can circumvent weak user controls. To keep your corporate resources safe, user access must be governed and enforced across the enterprise, mobile, and the cloud. Juniper Identity Management Service strengthens enterprise security that authenticates and restricts user access. It’s the first line of defense in preventing corporate breaches and safeguarding corporate assets. Employees are identified and assigned corporate roles that determine what applications and data they are permitted to access. Juniper Identity Management Service seamlessly integrates with SRX Series next-generation firewalls, enabling security teams to match application activity and security policies to user roles. It can then generate detailed user-metrics and audit reports for detailed reporting. -
22
ARCON | IDAM
ARCON
ARCON | IDAM is a solution that ensures the details of an employee’s overall employment tenure are maintained and managed from a single console. This allows administrators to perform access certification and review activity in a much faster and more efficient manner. At the same time, the end users do not have to wait too long to gain legitimate access to business applications, legacy applications, or IT Infrastructure devices. Enhance your digital experience at the workplace by maintaining a digital identity of each individual from the day an employee starts working for you until after they leave the organization, leading to faster development and release cycles. No more waiting for support to reply before you start your work again. Administration activities of adding, deleting, updating user credentials are now easier than ever, reducing help desk support calls such as password change, access requests, and access removal, resulting in reduced total cost of ownership. -
23
HORACIUS IAM
e-trust
The agility of business processes directly depends on the management of access rights to systems, and choosing a platform for IAM Identity Management that guarantees the security of all access, applications and data is one of the most important strategic decisions that will reduce costs and risks, increasing the productivity of the entire company. After all, how do you ensure that all users in your organization have only the appropriate levels of access, applications, data and transactions? In addition, the IAM Identity Management platform can be integrated with the main Human Resources systems, synchronizing information and performing tasks vital to the smooth running of the business. The entire history of people's rights to the systems is managed, from the first access, at the time of admission, until the revocation of rights at the end of the link. -
24
Microsoft Entra
Microsoft
Confidently enable smarter, real-time access decisions for all identities across hybrid, multicloud, and beyond. Safeguard your organization by protecting access to every app and every resource for every user. Effectively secure every identity including employees, customers, partners, apps, devices, and workloads across every environment. Discover and right-size permissions, manage access lifecycles, and ensure least privilege access for any identity. Keep your users productive with simple sign-in experiences, intelligent security, and unified administration. Safeguard your organization with the identity and access management solution that connects people to their apps, devices, and data. Discover, remediate, and monitor permission risks across your multicloud infrastructure with a cloud infrastructure entitlement management (CIEM) solution. Create, issue, and verify privacy-respecting decentralized identity credentials with an identity verification solution. -
25
C2 Identity
Synology C2
Easily grant or revoke user access to company resources with group management. Access the admin console from a browser to manage individual or groups of user accounts. Let users manage their own credentials and personal information through a self-service portal. Centrally manage users, groups, workstations, and single sign-on (SSO) for Software as a Service (SaaS) applications across your entire organization. Easily migrate users from an LDAP server, Windows AD server, Microsoft 365, Google Workspace, or by importing a CSV file. Free up IT teams' workloads by letting users reset their password, secondary email address, phone number, address, and more. Create on-premises LDAP servers for fast local authentication. Streamline authentication for SaaS applications with SSO and user account provisioning. C2 Identity's low-latency hybrid architecture lets you authenticate locally through an LDAP server for fast offline authentication.Starting Price: $19.99 per month -
26
ImageWare CloudID
ImageWare
ImageWare CloudID® is a highly modular, software platform that enabled rapid development and deployment of highly secure, yet flexible biometric identity management solutions. ImageWare CloudID® is easily incorporated into new or existing cloud-enabled environments or integrated as cloud-ready software into traditional networked client server and data center IT infrastructures. Two innovations differentiate this biometric identity platform, virtually any biometric modality and algorithm from any vendor can be quickly incorporated into the system, and the system can be easily scaled to satisfy the requirements of small organizations or entire counties, providing ultra-scalable real-time solutions. ImageWare CloudID’s server platform is a set of configurable, server-based software modules designed to add or enhance biometric identity management and credential issuance capabilities to existing applications or support the development of these capabilities in new end-to-end applications. -
27
Jamf Connect
Jamf
In an increasingly mobile workforce, with employees working from different locations on different devices, organizations need to be able to manage and secure those devices and their company information without the challenges of binding to on-premises Active Directory. With Jamf Connect, a user can unbox their Mac, power it on and access all of their corporate applications after signing on with a single set of cloud-identity credentials. See how cloud identity is changing Mac security and discover the vital role of Jamf Connect to facilitate the process. Download this overview to learn how Jamf Connect allows for simple provisioning of users from a cloud identity service during an Apple provisioning workflow, complete with multi-factor authentication. See the cost, time and resource savings of an identity management solution. As security and deployment needs evolve, businesses must adopt a new approach to identity as part of their enterprise strategy.Starting Price: $2 per user per month -
28
UTMStack
UTMStack
Complete visibility over the entire organization from a centralized management dashboard. All solutions in the stack are fully integrated with each others and report to a central database. This facilitates daily tasks such as monitoring, investigations and incident response. Active and passive vulnerability scanners for early detection, with of the box reports for compliance audits. Track and manage accounts access and permission changes. Get alerted when suspicious activity happens. Remotely manage your environment and respond to attacks right from your dashboard. Keep track of changes and access to classified information. Protect endpoints and servers with advanced threat protection.Starting Price: $25 per device per month -
29
MobiKEY
Route1
Generate exceptional outcomes for your organization with real-time secure delivery of actionable intelligence—whether in a manufacturing plant, in-theater, or in a university parking lot. With the right analysis, your performance potential is limitless. We can put the appropriate technology in place to help you find key insights and remove your limitations, all while assuring military-grade data security. Route1 help organizations of all kinds use the data they have—and data they didn’t even know they had—to make better decisions and gain tremendous advantages…with no compromise in data security. Secure data with patented technologies. Understand data with real-time acquisition and analytics. Visualize data with industrial-grade rugged devices. Leverage data with advanced technologies and services. We can help you leverage the data you have and the data you didn’t know you had to make better decisions, gain tremendous advantages and generate exceptional outcomes. -
30
RadiantOne
Radiant Logic
Make identity a business enabler with a unified platform that transforms your existing infrastructure into a resource for the entire organization. RadiantOne is the cornerstone of complex identity infrastructures. Harness your identity data with intelligent integration to drive better business outcomes, improve security and compliance posture, increase speed-to-market, and more. Without RadiantOne, companies must rely on custom coding, rework, and ongoing maintenance to make new initiatives work with existing environments. Expensive solutions can’t be deployed on time or on budget, negatively impacting ROI and causing employee frustration. Identity frameworks that can’t scale waste time and resources, with employees struggling to deploy new solutions for users. Rigid, static systems can’t meet changing requirements, leading to duplicate efforts and repeated processes. -
31
PlainID
PlainID
PlainID is The Authorization Company. PlainID provides both Business AND Admin teams with a simple and intuitive means to control their organization’s entire authorization process, all based on your own business logic. The platform allows you to implement literally any kind of rules you could imagine, all without coding, and all in fine grained detail. PlainID simplifies Authorization so that thousands of Roles, Attributes and even Environmental Factors can be converted into a few logical SmartAuthorization policies using our Graph Database Decision Engine. In-depth Analytics and Insights: PlainID provides unobstructed visibility with a full audit trail. Compliance, regulation and audit requirements, they’re easy to manage on a simple graph-based UI. Access is determined dynamically and in real time, based on user attributes, environmental attributes (time, location, etc.) as well as event based authorizations. PlainID combines ABAC & RABC to a united policy. -
32
Virtual Badge
Disaster Solutions
If you need a simpler way to issue and use ID cards, look no further than Virtual Badge. Where plastic badges can be annoying & hard to manage, Virtual Badge is easy. If you need a simpler way to issue and use ID cards, look no further than Virtual Badge. Where plastic badges can be annoying & hard to manage, Virtual Badge is easy. Virtual Badge is a quick and easy ID Card solution for events, conferences, meetings, and more. Your people download the Virtual Badge app, request a badge and then you approve it - it’s that easy!Starting Price: $5.00/month/user -
33
AwareABIS
Aware
Aware provides software and solutions for government-sponsored, biometrics-enabled citizen identification and credentialing systems. Aware’s innovative biometric solutions provide critical support to help ensure national security and protect citizen freedoms and liberties. A decades long commitment to R+D has earned us work with more than 80 government agencies. We know biometrics, security and compliance. At the heart of what we do for citizen ID is AwareABIS™, an Automated Biometric Identification System (ABIS) used for large-scale biometric identification and deduplication, with support for fingerprint, face, and iris modalities. Its highly modular architecture allows it to be configured and optimized for either civil or criminal applications. A fully featured biometric search platform, AwareABIS is differentiated by its open architecture and configurability.Starting Price: $2495.00/one-time/user -
34
VeriFinger SDK
Neurotechnology
VeriFinger is a fingerprint identification technology designed for biometric systems developers and integrators. The technology assures system performance with fast, reliable fingerprint matching in 1-to-1 and 1-to-many modes. Available as a software development kit that allows development of stand-alone and network-based solutions on Microsoft Windows, Linux, macOS, iOS and Android platforms. In 1998 Neurotechnology developed VeriFinger, a fingerprint identification technology designed for biometric system integrators. Since that time, Neurotechnology has released more than 10 major and minor versions of the VeriFinger, providing most powerful fingerprint recognition algorithms to date. Numerous awards in competitions and technology evaluations, including NIST MINEX, PFT III and SlapSeg III, have been received by Neurotechnology's fingerprint recognition algorithms. Rolled and flat fingerprint matching that is tolerant to fingerprint translation, rotation and deformation. -
35
VIDchain
Validated ID
Digital identity is not a new challenge. Since the beginning of the online revolution, validating with complete confidence the real identity of people in a digital environment has been a problem both for users, who have had their privacy and control over their personal data removed and for companies that have suffered the cost of inefficient and constant identification security failures. With VIDchain, we offer a decentralized self-rule identity (SSI) service based on Blockchain to provide people control over their identity and facilitate secure user access to online services. It improves processes and reduces identity verification costs. It implements secure identification processes and improves anti-fraud measures in compliance with eIDAS and GDPR. Based on standards that eliminate the need for hundreds of credentials. You can easily validate your digital identity with anyone you want. -
36
Scanovate B-Trust
Scanovate
The design and approval processes of new products in financial services companies can be burdensome due to cumbersome and inefficient internal processes. B-Trust provides a flexible web-based workflow engine to streamline and standardize discussions and approval steps across departments. Apps from our marketplace can support business users by automating the identification of potential risks, for example checking appropriate commission rates. Benefit from a complete identity suite including state-of-the-art onboarding technology. Track the identity lifecycle, managing onboarding, continuance verification, identification and more. Monitor compliance in real-time through key risk indicators and key performance indicators. Integrate with systems of record and third party supply chain through API-first design. -
37
Microsoft Entra Verified ID
Microsoft
Start your decentralized identity journey with Microsoft Entra Verified ID—included free with any Azure Active Directory (Azure AD) subscription. Microsoft Entra Verified ID is a managed verifiable credentials service based on open standards. Digitally validate identity information to ensure trustworthy self-service enrollment and faster onboarding. Quickly verify an individual’s credentials and status to grant least-privilege access with confidence. Replace support calls and security questions with a streamlined self-service process to verify identities. Ensure that credentials are interoperable and reusable with a solution that supports open standards. Confidently issue and verify workplace credentials, citizenship, education status, certifications, or any unique identity attributes in a global ecosystem designed for more secure interaction between people, organizations, and things. -
38
identiMetrics Biometric ID Management
identiMetrics
identiMetrics provides a flexible, unified biometric ID management platform allowing hygienic single sign-on ID for administrative applications. dentiMetrics works with all the leading education software companies. Our award-winning biometric finger scan identification platform uses a single common database for tardy, daily & meeting attendance, food service operations, library & media center, emergency evacuations, staff time & attendance, book store, for dances & athletic events - everywhere when accurate identification is required. identiMetrics simplifies the school day with efficient, accurate, and hassle-free accounting. From seasoned staff down to the kindergarten students, identiMetrics is 100% accurate, safe and secure. As for our customer support and services - our only option is excellence. identiMetrics is a proud signatory of the Student Privacy Pledge. -
39
Simeio
Simeio
Simeio provides the most complete Identity and Access Management (IAM) solution that engages securely with anyone, anywhere, anytime, with an unparalleled “service first” philosophy. Whether you’re managing the identities of customers, partners or employees, we’ve got you protected. From retail to banking, hospitality, healthcare, government, universities and more, our job is to make your access simple, reliable and secure wherever you are…while keeping out those who don’t belong. And by protecting identities, we can protect something else just as important: your brand reputation. We partner with, leverage and interoperate with solutions from the industry’s most trusted companies to create a platform of outstanding reliability and security. Yes, what we do is complex and specialized. But you can leave all the complexity to us. What we deliver simplifies how your company manages identities. -
40
LogMeOnce
LogMeOnce
A formidable cyber security defense should be mindful to thwart internal and external threats. External and internal threats have one common denominator. The end user’s adherence to security, policy, and best practices. External elements exploit an unsuspecting internal user’s adherence to sound security policies to find their way in. Granted, external threats can be addressed with various mechanisms such as firewalls, but, inherently it has its roots and seeds in weak internal shortcomings. However, you can easily curb internal threats by simply establishing “automatic & enforceable” security policies, advising end-users to adhere to secure access protocols with trusted credentials. Thankfully, LogMeOnce Patented Technology offers plenty of ways to protect your team members, credentials, and agency with advanced automated authentication. LogmeOnce dashboard creates powerful and unified access to a user’s entire disparate/numerous set of applications.Starting Price: $3 per user per month -
41
OpenAM
Open Identity Platform
If you have multiple sites and applications in your company, probably you need to provide seamless authentication to all of them. So when user logged in at one of your sites once, he does not need to enter his credentials on other sites. So, OpenAM can help you to solve all this issues. OpenAM ships with more than 20 authentication modules, which you can use to customize your authentication process. Also, you can customize sequence of authentication modules, to provide multi-factor or adaptive authentication. OpenAM can also manage authorization, so you can restrict access to desired resources according to different authorization policies. OpenAM allows to extend just any functionality, from authentication modules to user data source. Besides, it supports UI customization to create separate end-user pages with personal branding. -
42
Assently CoreID
Assently
Offer identification with any of the Nordic electronic IDs, such as Swedish BankID, Norwegian BankID, Danish NemID or through the Finnish Trust Network. It’s easy to integrate CoreID into your systems on any platform. Save time-related to infrastructure, maintenance and upgrades. Improve your online security and offer modern authentication solutions to your customers with electronic ID. Let your customers identify themselves on any device with Swedish BankID, Norwegian BankID, Danish NemID or the Finnish Trust Network. Assently is compliant with GDPR and ISO 27001 certified, the international standard for information security. With Assently’s premium identification solution CoreID, you can easily assert your customers’ identities using electronic IDs. Assently CoreID is easily customized and configured based on your needs. You choose what countries’ eIDs to enable. Use Assently CoreID on any device, mobile, tablet, or desktop on your website. -
43
Intercede
Intercede
MyID® credential management software enables governments and large enterprises to issue and manage digital identities using the most secure method of multi-factor authentication to citizens, large workforces and supply-chains. Today, MyID enables the strong authentication of millions of people to the data, systems and networks they need access to. For those responsible for information security, MyID provides easy integration and control over digital identity issuance and management. For end users, whether citizens or employees, MyID enables seamless, secure access to company systems, networks and resources using multi-factor authentication via a variety of devices. Faced with ever increasing threats of cyber terrorism, identity fraud and crime, MyID® provides a cyber secure credential management software solution. Where data really matters, you will find MyID. The security, reliability and interoperability of MyID software sets it apart. -
44
Ubisecure
Ubisecure
The Ubisecure Identity Platform helps organisations manage the many Digital Identity risks and opportunities. Focused on European B2B and B2C scenarios, Ubisecure combines highly assured Organisation Identity and Individual Identity to reduce fraud and increase efficiency in global trade and supply chain. Ubisecure is now the #1 global issuer of Legal Entity Identifiers (LEI). The Identity platform enables organisations to de-risk homegrown user registration and login solutions, and enable Single Sign-On (SSO) across all platforms and devices. Simplified MFA, including TOTP and Bank ID / Reusuable eIDs, reduce fraud by verifying customer identities, and automated customer credential management workflows for your helpdesk. Advanced identity use cases like consolidation of identity data silos, and Identity Relationship Management & Delegation can increase operational effectiveness, manage data breaches, and reduce IT costs dramatically. -
45
SecureIdentity IAM
SecurEnvoy
SecureIdentity IAM provides enforcement of access decisions around applications and data repositories. By reading information from the Universal Directory it can make dynamic choices as to what programs a user is allowed to run and what file servers or cloud storage areas they are allowed to access. This is enforced by a client on the endpoints that intercepts requests for access to applications or data areas and vetting them against the configured policy. If the action is allowed, the user experience continues as normal with no overhead. If the action is forbidden then access to the appropriate executable or DLL files is dynamically blocked regardless of how it is invoked. Logs of all events are sent back to the platform’s event database to provide a forensic trail of activity. -
46
AuthStack
Buckhill
AuthStack is a host anywhere, Enterprise-grade, Single Sign-On (SSO) and Identity Access Management (IAM) System. It assumes responsibility for logging in users to your own, and optionally third-party websites and applications. Rather than managing multiple different logins for each website and application, AuthStack centralizes your user identity management so the user only has to login once and maintain one password and profile. Integration with AuthStack requires no custom coding if your website or application already supports SAML. If SAML is not supported we provide a Connector Framework, free of charge. We can also help you integrate the Connector if required. There is also no need to migrate your existing user database(s). AuthStack bundles with a Connector Framework which can communicate with any data source, whether that's LDAP, MySQL, SOAP, REST API, etc, to check credentials from existing user databases.Starting Price: €41.25 per month -
47
LastPass
LastPass
LastPass is a cloud-based password manager available on any system or device, ensuring credentials are protected, private, and always within reach. Simple to set up and effortless to use, LastPass delivers the world's most convenient password management experience for consumers and businesses of all sizes and technical requirements. Say goodbye to password fatigue by generating, sharing, accessing, and managing credentials at the click of a button, while preventing bad actors from accessing precious data and account logins. Businesses also utilize LastPass to consolidate their tech stacks or to fill access management gaps with native integrations for MS Entra, Okta, and other IdPs and IAMs. With over 100 customizable policies, flexible privileges, detailed reporting, MFA and passwordless authentication options, LastPass makes it easy for organizations with numerous logins and increasing security risks to standardize password management company wide.Starting Price: $4 per user per month -
48
Logto
Silverhand
Logto is an Auth0 alternative designed for modern apps and SaaS products. It offers a seamless developer experience and is well-suited for individuals and growing companies. 🧑💻 Comprehensive identity solution Enables easy authentication with Logto SDKs. Supports multiple passwordless and social sign-in methods. Offers customizable UI components to match your brand. 📦 Out-of-the-box infrastructure eliminates the need for extra setup. Provides ready-to-use Management API Offers flexible connectors for customization and scaling, and is customized with SAML, OAuth, and OIDC protocols. 💻 Enterprise-ready with role-based access control (RBAC), organizations (multi-tenant apps), user management, audit logs, single sign-on (SSO), and multi-factor authentication (MFA).Starting Price: $0 -
49
Anomalix
Anomalix
Engage with employees from Day 1 and remove barriers to collaboration. Real-time and historical data for access management will reduce compliance costs and empower employees. Passwordless enterprise identity and access management. A secure solution to handle the employee lifecycle events (Joiner, Mover and Leaver) to safeguard sensitive data while affording the least privilege access required for job performance. Identify anomalous and suspicious User and Entity behavior. Create efficient and accurate job roles that provide the right level of access and information. Implement an identity management solution for non-employee individuals and corporate assets. Enable cross-organizational collaboration to increase data quality and reduce problems. Create an authoritative source for all non-employee Identities. Perform the necessary identity related due diligence. Manage all identity lifecycle events for humans and assets (Engage, Change, Disengage, Reengage). -
50
LogonBox
LogonBox
Discover the LogonBox Advantage with our innovative solutions for the modern Enterprise. LogonBox is an independent software vendor that develops software to help organizations manage and secure user identities and credentials. LogonBox solutions reduce helpdesk tickets, increase productivity, secure access across heterogeneous enterprises, and protect network resources by extending authentication beyond the password.