Compare the Top Risk-Based Authentication Software in Germany as of November 2024

What is Risk-Based Authentication Software in Germany?

Risk-based authentication (RBA) software are authentication tools that take into account informational and behavioral risk when authenticating users attempting to access systems or identity verification. Compare and read user reviews of the best Risk-Based Authentication software in Germany currently available using the table below. This list is updated regularly.

  • 1
    Uniqkey

    Uniqkey

    Uniqkey

    Uniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies with enhanced control over their cloud infrastructure, access security, and employee management. Recognized as the easiest tool to use, Uniqkey removes friction from employees’ daily workflows by automating time-consuming authentication and security tasks, thereby increasing productivity. Its intuitive and user-friendly interface makes Uniqkey the perfect choice for employees. Uniqkey combats the most significant threats to company infrastructure by safeguarding critical systems and company credentials with state-of-the-art encryption. It also offers unique insights and a comprehensive view of IT infrastructure, employee access, and security scores, making it a valuable tool for IT teams to monitor security policies and assess the impact of awareness campaigns with confidence.
    Starting Price: $4.95 per employee, per month
    View Software
    Visit Website
  • 2
    Auth0

    Auth0

    Okta

    Auth0 by Okta takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO.
    Leader badge
    Starting Price: Free plan
    View Software
    Visit Website
  • 3
    Cisco Duo
    Protect your workforce with simple, powerful access security. We're Cisco Duo. Our modern access security is designed to safeguard all users, devices, and applications — so you can stay focused on what you do best. Secure access for any user and device, to any environment, from anywhere. Get the peace-of-mind only complete device visibility and trust can bring. Respond faster to threats with an easy‑to‑deploy, scalable SaaS solution that natively protects every application. Duo's access security shields any and every application from compromised credentials and devices, and its comprehensive coverage helps you meet compliance requirements with ease. Duo natively integrates with applications to provide flexible, user-friendly security that's quick to roll out and easy to manage. It's a win, win, win for users, administrators, and IT teams alike. Lay the foundation for your zero-trust journey with multi-factor authentication, dynamic device trust, adaptive authentication and secure SSO.
    Leader badge
    Starting Price: $3 per user per month
    View Software
    Visit Website
  • 4
    GateKeeper Proximity Enterprise

    GateKeeper Proximity Enterprise

    Untethered Labs, Inc.

    Passwordless, proximity login to PCs, Macs, websites, and desktop applications. Hands-free, wireless 2FA and password manager through active proximity-detection. IT admins can dynamically allow users to log in to their computers and websites with a physical key either automatically, by touch, by pressing Enter, or with a PIN. Seamlessly login, switch users, switch computers, and logout without passwords, touch, or trouble - just a key. Once a user walks away, the computer will lock, blocking access to the computer and web passwords. With continuous authentication, users are always being checked to ensure that they require access. No more typing passwords. Admins and compliance can now automate password security from a central admin console: enforce stronger passwords, enforce 2FA, and give employees the power of password-free login without interrupting workflow. Reduce helpdesk tickets related to forgotten passwords/password resets. Login and auto-lock with proximity.
    Starting Price: $3/user/month
  • 5
    LastPass

    LastPass

    LastPass

    LastPass is a cloud-based password manager available on any system or device, ensuring credentials are protected, private, and always within reach. Simple to set up and effortless to use, LastPass delivers the world's most convenient password management experience for consumers and businesses of all sizes and technical requirements. Say goodbye to password fatigue by generating, sharing, accessing, and managing credentials at the click of a button, while preventing bad actors from accessing precious data and account logins. Businesses also utilize LastPass to consolidate their tech stacks or to fill access management gaps with native integrations for MS Entra, Okta, and other IdPs and IAMs. With over 100 customizable policies, flexible privileges, detailed reporting, MFA and passwordless authentication options, LastPass makes it easy for organizations with numerous logins and increasing security risks to standardize password management company wide.
    Leader badge
    Starting Price: $4 per user per month
  • 6
    FusionAuth

    FusionAuth

    FusionAuth

    FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome. You'll get all the features your app needs plus a customizable, scalable solution you can run on any computer, anywhere in the world. FusionAuth was built from the ground up to easily integrate with any app, language, and framework. Every feature (yes, every single one) is exposed as an API giving you complete flexibility to handle any use case. You get every feature and acronym you need: registration & login, passwordless, SSO, MFA, SAML, OIDC, OAuth, JWT, social login, and more. Comply with GDPR, HIPAA, COPPA, and PCI requirements in seconds. FusionAuth installs on any platform, any computer, anywhere. Host it yourself or use FusionAuth Cloud, our fully managed SaaS hosting service.
    Leader badge
    Starting Price: $0
  • 7
    Okta

    Okta

    Okta

    One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity.
  • 8
    RSA SecurID

    RSA SecurID

    RSA Security

    RSA SecurID enables organizations of all sizes to mitigate identity risk and maintain compliance without impeding user productivity. It ensures users have appropriate access and confirms they are who they say they are with a modern, convenient user experience. In addition, RSA SecurID provides unified visibility and control across organizations’ many islands of identity. RSA SecurID marries multi-factor authentication with identity governance and lifecycle controls to address the security challenges associated with delivering convenient access to dynamic user populations across complex environments. It evaluates risk and business context to provide identity and access assurance. Digital transformation creates unprecedented authentication, access management and identity governance challenges for organizations. After all, more users need access to more systems from more devices than ever. RSA SecurID helps organizations address these challenges—and the identity.
  • 9
    Ondato

    Ondato

    Ondato

    Ondato is a tech company that streamlines KYC and AML-related processes. We're providing advanced technological solutions for digital identity verification, business customer onboarding, data validation, fraud detection, and more. All of them meet the highest quality standards available for KYC online or offline onboarding for all business and customer types orchestrated from a single interface. We're turning compliance into a business benefit by creating a safer environment for organizations and individuals alike.
    Starting Price: €149.00/month
  • 10
    OneLogin

    OneLogin

    OneLogin

    Secure critical company information and empower employees with OneLogin, a trusted identity and access management (IAM) solution for the modern enterprise. Designed to strengthen enterprise security while simplifying business logins, OneLogin is an excellent solution for companies looking to enforce security policies with ease. OneLogin includes top-rated features such as single sign-on (SS), unified directory, user provisioning, adaptive authentication, mobile identitiy, compliance reporting, and more.
  • 11
    The OptimalCloud

    The OptimalCloud

    Optimal IdM

    The OptimalCloud platform is a full featured, award winning, SSO Federation & IAM solution that provides a single point of authentication, policy management and auditing for a seamless end user experience. The OptimalCloud is deployed in workforce and consumer scenarios, used by some of the most recognizable companies on the globe, and used in some of the most secure environments in the world. Each feature-rich pricing tier comes with multi-factor authentication (MFA), because proper security shouldn't cost extra. The OptimalCloud is integrated with more than eleven thousand applications, simplifying set up and configuration and also has 24 x 7 x 365 support with a guaranteed uptime of 99.99%.
    Starting Price: $2/user/month
  • 12
    HYPR

    HYPR

    HYPR | The Passwordless Company

    HYPR fixes the way the world logs in. Organizations are faced with the challenge of achieving secured and seamless authentication coupled with a flawless user experience at a time when it’s more critical than ever. HYPR’s passwordless multi-factor authentication (PMFA) platform decouples authentication from the organization’s current and future identity providers and eliminates the traditional trade-off between security and user experience by providing uncompromising assurance and consumer-grade experience with true passwordless and phishing-resistant MFA. The solution is trusted by more than 60M users worldwide. With deployments taking hours rather than weeks or months, organizations decrease the risk of attack, increase positive user experience, and lower operational costs.
    Starting Price: $4.00 per user/month
  • 13
    SecureAuth

    SecureAuth

    SecureAuth

    With SecureAuth, every digital journey is simple, seamless, and secure to support your Zero Trust initiatives. Protect employees, partners, and contractors with frictionless user experience while reducing business risk and increasing productivity. Enable your evolving digital business initiatives with simple, secure, unified customer experience. SecureAuth leverages adaptive risk analytics, using hundreds of variables like human patterns, device and browser fingerprinting, and geolocation to create each user’s unique digital DNA. This enables real-time continuous authentication, providing the highest level of security throughout the digital journey. Enable employees, contractors and partners with a powerful approach to identity security that simplifies adoption of new applications, accelerates efficiency, increases security and helps drive your digital initiatives. Use insights and analytics to drive digital initiatives and speed up the decision making process.
    Starting Price: $1 per month
  • 14
    UserLock

    UserLock

    IS Decisions

    Secure Active Directory user logins with Multi-Factor Authentication, Single Sign-On, contextual access controls, and real-time monitoring and reporting. UserLock helps administrators to manage and secure access for every user, without obstructing employees or frustrating IT.
    Starting Price: $2.00/month/user
  • 15
    Ping Identity

    Ping Identity

    Ping Identity

    Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.
    Starting Price: $5 per user per month
  • 16
    MonoCloud

    MonoCloud

    MonoCloud

    MonoCloud is a developer-focused platform designed to streamline authentication, authorization, and user management for applications across multiple environments, including web, mobile, IoT devices, and more. It enables developers to easily integrate secure and customizable login processes, supporting a range of authentication methods such as passwords, magic links, one-time passcodes, and social logins like Google, Facebook, and Apple. Built with a strong emphasis on reducing user friction, MonoCloud offers a branded and smooth authentication experience. The platform includes advanced features such as mutual TLS, brute-force protection, and global session management, making it a comprehensive solution for handling user access across various applications and devices. In addition, MonoCloud is designed with developers in mind, providing extensive documentation, integration guides, and support for various front-end and back-end frameworks.
    Starting Price: $0
  • 17
    PortalGuard

    PortalGuard

    BIO-key International

    BIO-key PortalGuard IDaaS is a single, flexible cloud-based IAM platform that offers the widest range of options for multi-factor authentication, biometrics, single sign-on, and self-service password reset to support a customer’s security initiatives and deliver an optimized user experience – all at an affordable price point. For over 20 years, industries such as education, including over 200 institutions, healthcare, finance, and government have chosen PortalGuard as their preferred solution.Whether you’re looking for passwordless workflows, support for your Zero Trust architecture, or just implementing MFA for the first time, PortalGuard can easily secure access for both the workforce and customers whether they are remote or on-premises. PortalGuard’s MFA stands out above others as it is the only solution to offer Identity-Bound Biometrics that offer the highest levels of integrity, security, accuracy, availability and are easier to use than traditional authentication methods.
  • 18
    WSO2 Identity Server
    WSO2 Identity Server is API-driven, is based on open standards with the deployment options of on-premise, cloud or hybrid. It supports complex IAM requirements given its high extensibility. WSO2 Identity Server helps you do single sign-on and identity federation backed by strong and adaptive authentication, securely expose APIs, and manage identities by connecting to heterogeneous user stores. Leverage the power of open-source IAM in your enterprise to innovate fast and build secure Customer IAM (CIAM) solutions to provide an experience your users will love
  • 19
    Plurilock DEFEND

    Plurilock DEFEND

    Plurilock Security

    Plurilock DEFEND provides true real-time authentication for the duration of an active computing sessions using behavioral biometrics and the computing devices your employees already use. DEFEND relies on a lightweight endpoint agent and proprietary machine learning techniques to confirm or reject user's identity with very high accuracy based on their console input stream, without authentication steps that are evident to the user. By integrating with SIEM/SOAR, DEFEND can be used to triage and respond to SOC alerts with high-confidence identity threat intelligence. By integrating with login and application workflows, DEFEND provides just-in-time biometric identity behind the scenes, enabling login workflows to be skipped when biometric identity is already in a confirmed state. DEFEND supports Windows endpoints, Mac OS endpoints, and IGEL and Amazon Workspaces thin and VDI clients.
    Starting Price: $9 per user per month
  • 20
    Akku

    Akku

    CloudNow Technologies

    The corporate user lifecycle, streamlined. Akku is a robust, flexible identity and access management solution created to help you manage every stage of the user lifecycle more effectively. With its range of versatile features, Akku helps improve data security, standards compliance, efficiency and productivity. Akku delivers a powerful cloud SSO solution that can be integrated easily with almost any cloud or in-house application, and packages a range of security and access control features that make user provisioning, management, access control and deprovisioning seamless. Unlike many other IAM solutions, Akku is built on an agentless architecture, without the need for a user agent to be installed on your infrastructure. So you know exactly what parts of your sensitive user information Akku can access, ensuring transparency and control.
    Starting Price: $5.00/year/user
  • 21
    Emailage

    Emailage

    LexisNexis

    Your customer's expect a one-click experience. Use our powerful network intelligence and predictive fraud risk scoring to help enable a seamless user experience. LexisNexis® Emailage is a powerful fraud risk scoring solution fueled by email intelligence. Your customers demand the flexibility to interact with you through multiple channels. Whether using a smartphone, tablet, laptop or other device, they expect you to recognize their identity and grant them fast, easy access to your system. At the same time, they want assurance that their personal information is secure and fraudsters cannot hijack their account. That is an extremely challenging task. With the growth of digital channels for consumers, your ability to assess risk on digital elements is critical. This is especially true if your organization, like so many these days, minimizes the amount of personal identity information you collect to speed up onboarding of new customers and limit data exposure risk.
    Starting Price: $499 per month
  • 22
    LogMeOnce

    LogMeOnce

    LogMeOnce

    A formidable cyber security defense should be mindful to thwart internal and external threats. External and internal threats have one common denominator. The end user’s adherence to security, policy, and best practices. External elements exploit an unsuspecting internal user’s adherence to sound security policies to find their way in. Granted, external threats can be addressed with various mechanisms such as firewalls, but, inherently it has its roots and seeds in weak internal shortcomings. However, you can easily curb internal threats by simply establishing “automatic & enforceable” security policies, advising end-users to adhere to secure access protocols with trusted credentials. Thankfully, LogMeOnce Patented Technology offers plenty of ways to protect your team members, credentials, and agency with advanced automated authentication. LogmeOnce dashboard creates powerful and unified access to a user’s entire disparate/numerous set of applications.
    Starting Price: $3 per user per month
  • 23
    Centagate Cloud

    Centagate Cloud

    Centagate Cloud

    CENTAGATE CLOUD offers a centralized login option that protects all applications from security breaches by using FIDO2 passwordless authentication. Control, protect and secure your application access. One login credential for all applications. A system that has strong digital security which eliminates phishing, fraud and password theft. Since the authentication is centralized, only one login credential is needed for all applications. Highly cost-effective with zero CAPEX and minimal OPEX. Some of important features that makes your authentications with CENTAGATE CLOUD more secured and protected. An authentication that requires two or more factor like what you have (device), what you are (biometrics) and what you know (password). An authentication based on previous login’s risk and behavior. Evaluating these risk could stop any trials of security breach. Pre-integrated certified Securemetric FIDO2 server for registration and authentication.
    Starting Price: $2 per month
  • 24
    BeyondCorp Enterprise
    A zero trust solution that enables secure access with integrated threat and data protection. Provide secure access to critical apps and services. Safeguard your information with integrated threat and data protection. Simplify the experience for admins and end-user with an agentless approach. Improve your security posture with a modern zero trust platform. Built on the backbone of Google’s planet-scale network and infrastructure to provide a seamless and secure experience with integrated DDoS protection, low-latency connections, and elastic scaling. A layered approach to security across users, access, data, and applications that helps protect every click from malware, data loss, and fraud. Integrates posture information and signals from leading security vendors, for extra protection. Easily configure policies based on user identity, device health, and other contextual factors to enforce granular access controls to applications, VMs, and Google APIs.
    Starting Price: $6 per user per month
  • 25
    GateKeeper Client
    The Client application automatically authenticates, authorizes, and logs users on to their computer and websites when they are present, and automatically locks the computer when they walk away. The GateKeeper proximity-based access control system provides unparalleled convenience and security for IT administrators. Wireless proximity authentication for your users and computers. Machine-learning algorithm determines presence of the tokens. Synchronization of users, passwords, keys, and access rules. Works with the GateKeeper Vault and on-demand OTPs. Secure cybersecurity blind spots with auto-locking. Advanced proximity-based authentication for computers and websites. Using real-time presence detection, the application determines when a user has walked away and automatically locks the computer. This eliminates the need for clumsy timeout policies. Using 2-FA (a secret PIN and the token's proximity), GateKeeper increases security while reducing the friction and time it takes to log in.
    Starting Price: $3 per user per month
  • 26
    Strivacity

    Strivacity

    Strivacity

    Strivacity adds secure customer identity and access management (CIAM) capabilities to your online properties fast so you can grow your revenue, stay compliant with fast-changing privacy regulations and personalize your service with the insights you’ll get into how your customers interact with you. We can plug into your existing app, let your customers self-service their accounts and scale as fast as your business can grow. It's OK if you've outgrown your CIAM solution. We use clicks (not code) to reduce your TCO and get your customers where they’re going. Our Isolation by Design™ architecture secures regulated data and satisfies privacy standards like GDPR and CCPA. When you add in requirements from security and legal teams, the focus on the “C” (aka your customers) often gets lost. Strivacity keeps the focus on your customer with one solution that meets everyone’s needs, goes live faster and doesn’t require an army of developers and consultants to feed and water it.
    Starting Price: $500 per month
  • 27
    DigitalPersona

    DigitalPersona

    HID Global

    Go Beyond Multi-factor Authentication with DigitalPersona® software. Expand to risk-based factors, secure every application, offer frictionless access and deploy quickly. Enhance security with industry leading biometric solutions. Simplify processes, speed queues and confirm identities for a range of critical citizen, criminal justice and military applications. Select from an array of U.are.U® readers, modules and sensors. Leading fingerprint technologies to meet your specific OEM, retail, hospitality and commercial identity management requirements.
  • 28
    Kount

    Kount

    Kount

    Industry-leading protection for the entire customer journey – from account creation and login to payments and disputes. Reduce chargebacks, manual reviews, and false positives to increase approval rates and revenue. Identity Trust is the ability to establish the level of trust for each identity behind every payment, account creation, and login event. Linked by AI, Kount’s Identity Trust Global Network TM combines trust and fraud signals from 32 billion annual interactions to block fraud in real-time, and to enable personalized customer experiences. Quick and accurate identity trust decisions deliver safe payments, account creation and login events while reducing digital fraud, chargebacks, false positives, and manual reviews. Decrease false positives. Reduce false positives and friction. Take the guesswork out of decision orders. Accurate identity trust decisions can prevent false positives that can cause friction for good customers. Accept more good orders and increase revenue.
  • 29
    Digital Resolve

    Digital Resolve

    Digital Resolve

    Online Security and Fraud Protection through Real-time Identity Intelligence, Authentication, and Access Control. Proactively secure online accounts, information, transactions and interactions from login to logout. The Digital Resolve platform is a cost-effective and easy-to-deploy solution that effectively mitigates risk on day one of deployment. The platform was designed by a team of seasoned experts to provide a comprehensive view of all transactions and interactions, unlike other solutions that merely detect events in isolation. Furthermore, real-time intervention options and a frictionless user experience mean that you can maintain confidence and trust among your user base- all while providing real-time protection against potential risks.
  • 30
    IBM Security Verify Access
    IBM Security Verify Access, formerly IBM Security Access Manager or ISAM, helps you simplify your users' access while more securely adopting web, mobile, IoT and cloud technologies. It can be deployed on-premises, in a virtual or hardware appliance or containerized with Docker. Verify Access also directly connects with Verify SaaS for a modernized, hybrid IAM approach to enable your organization's migration to identity-as-a-service (IDaaS) at a comfortable pace. Enable convenient and secure access to resources on mobile with the Verify mobile companion app for MFA. Migrate to IDaaS at a comfortable pace with a hybrid approach to access management.
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next