84 résultats
Pourquoi Capterra est gratuit
Auth0 offre une plateforme d'autorisation de base facile à mettre en œuvre, avec des points de personnalisation et d'extensibilité puissants pour des cas d'utilisation spécifiques. Cette plateforme vous permet d'authentifier et d'autoriser, offrant un accès sécurisé aux applications, aux appareils et aux utilisateurs. Auth0 offre la simplicité, l'extensibilité et l'expertise nécessaires pour évoluer et protéger toutes les applications, pour tout public. Intégrez Auth0, quelle que soit l'application et quels que soient le langage et le cadre. En savoir plus sur Auth0 Auth0 est une plateforme d'entreprise pour l'identité moderne. En savoir plus sur Auth0
Plateforme de vérification d'identité en ligne pour entreprises à croissance rapide. Intégrez Mati en quelques minutes et commencez à vérifier l'identité de vos utilisateurs (authentification de documents, preuve de vie, IP, email, ...). Avec Mati, respectez les réglementations locales et internationales KYC / AML, réduisez la fraude sur votre plateforme et ajoutez une couche de confiance à votre communauté. Rapide, sécurisé et très précis. Réservez une demo! En savoir plus sur Mati Plateforme de vérification d'identité en ligne pour les entreprises à croissance rapide. Respectez les lois KYC / AML européennes. En savoir plus sur Mati
Destiné aux entreprises comptant plus de 100 utilisateurs, OneLogin propose une solution de gestion des identités et des accès (IAM) basée sur le cloud qui offre des authentifications uniques (SSO) simples. Il permet aux entreprises de sécuriser et de gérer plus facilement l'accès aux applications web aussi bien en cloud que derrière un pare-feu. Votre entreprise travaille avec au moins trois logiciels en tant que service (SaaS) ou applications web internes ? Alors la sécurité offerte par la solution OneLogin à authentification unique basée sur le cloud est faite pour vous. En savoir plus sur OneLogin Solutions de gestion des identités (GIA) et des signatures uniques (SSO) pour les entreprises de toutes tailles. Démarrez immédiatement avec la version d'essai gratuite. En savoir plus sur OneLogin
VaultCore est une solution de gestion des clés de cryptage unique qui permet d'automatiser le processus du cycle de vie des clés. Elle a la capacité de prendre en charge des centaines de millions de clés et propose une intégration réseau transparente pour protéger les actifs contre les attaques visant les appareils et l'infrastructure. Au service des secteurs de la banque et de la finance, des soins de santé, du stockage de données, des télécommunications, de l'énergie, de l'informatique et des transports, VaultCore est surtout reconnue pour son évolutivité, son interopérabilité, sa puissante automatisation et sa facilité d'utilisation. En savoir plus sur VaultCore Puissant outil de cryptage pour la gestion des clés offrant un contrôle et une sécurité totale de l'ensemble du cycle de vie des clés pour chaque technologie applicable. En savoir plus sur VaultCore
Les solutions métier LastPass aident les équipes et les entreprises à prendre le contrôle de leurs pratiques en matière de mots de passe, permettent le partage sécurisé des mots de passe et éliminent les obstacles liés aux mots de passe qui font perdre des ressources et un temps précieux tout en mettant en danger l'entreprise. LastPass Enterprise propose des fonctionnalités de sécurité avancées, des options d'approvisionnement automatisé, telles que la synchronisation Active Directory et des intégrations supplémentaires pour une expérience plus personnalisée, aidant ainsi les entreprises à être plus sécurisées, à assurer la conformité et à augmenter leur productivité. Le gestionnaire de mots de passe LastPass aide les entreprises à gagner du temps, à renforcer la sécurité et à découvrir des processus efficaces.
Okta est le principal fournisseur d'identité pour l'entreprise. Okta Identity Cloud connecte et protège les employés de bon nombre des plus grandes entreprises du monde. Il relie également de manière sécurisée les entreprises à leurs partenaires, fournisseurs et clients. Avec des intégrations approfondies dans plus de 5 000 applications, Okta Identity Cloud permet un accès simple et sécurisé depuis n'importe quel appareil. Des milliers de clients, parmi lesquels Experian, 20th Century Fox, LinkedIn et Adobe, font confiance à Okta pour travailler plus rapidement, booster leurs revenus et maintenir la sécurité. Okta est la base pour des relations sécurisées entre les personnes et la technologie. Utilisez le cloud pour accéder aux applications à tout moment et depuis n'importe quel appareil.
Sa mission est de protéger votre mission. Duo Security rend la sécurité indolore, vous pouvez donc vous concentrer sur ce qui est important. Cette plateforme Trusted Access évolutive et sur le cloud répond aux menaces de sécurité avant qu'elles ne deviennent un problème. Elle vérifie l'identité de vos utilisateurs et la santé de leurs appareils avant de se connecter aux applications auxquelles vous voulez qu'ils accèdent. La plateforme Trusted Access sans faille de Duo Security protège les utilisateurs, les données et les applications contre les pirates malveillants et les violations de données.
JumpCloud Directory-as-a-Service, c'est Active Directory et LDAP réinventés. JumpCloud gère et connecte en toute sécurité vos utilisateurs à leurs systèmes, applications, fichiers et réseaux. JumpCloud gère les utilisateurs et leurs systèmes sous Mac, Linux ou Windows et fournit un accès aux ressources dans le cloud et sur site tel qu'Office 365, Suite G, AWS, Salesforce et Jira. Le même login connecte les utilisateurs aux réseaux et aux partages de fichiers via RADIUS et Samba, respectivement, en sécurisant le WiFi de votre entreprise. JumpCloud Directory-as-a-Service gère et connecte en toute sécurité vos utilisateurs à leurs systèmes, applications, fichiers et réseaux.
Une solution d'authentification forte qui vous permet de gérer le cycle de vie complet de l'authentification et d'accéder aux applications métier et ressources de votre entreprise en toute sécurité. Solution qui vous permet de gérer le cycle de vie complet de l'authentification et d'accéder aux applications métier et ressources de votre entreprise en toute sécurité.
Une solution professionnelle d'assurance des identités qui aide les organisations à gérer efficacement les exigences d'accès à l'aide de diverses méthodes d'authentification. Une solution professionnelle d'assurance des identités conçue pour gérer efficacement les exigences d'accès à l'aide de diverses méthodes d'authentification.
ADSelfService Plus ajoute une couche de protection supplémentaire à vos ressources réseau critiques en permettant une authentification à deux facteurs pour les connexions Windows locales et à distance. En outre, cette solution sécurise également la réinitialisation des mots de passe d'Active Directory et des applications d'entreprises en obligeant les utilisateurs à prouver leur identité à l'aide de facteurs secondaires tels que les OTP via SMS et e-mail, Google Authenticator, Mobile Authenticator, etc. ADSelfService Plus aide les administrateurs à améliorer la sécurité d'ouverture de session Windows en appliquant une authentification à deux facteurs.
Seul Avatier propose en quelques minutes une plateforme de gestion des identités sous forme d'instance privée, indépendante du cloud ou sur site à l'aide de conteneurs Docker. Les organisations peuvent ainsi évoluer et innover plus rapidement, maîtriser et adopter le changement et dominer la concurrence. Avatier gère l'accès à toutes les ressources et applications professionnelles pour les administrer comme un tout. Seul Avatier propose en quelques minutes une plateforme de gestion des identités avec prise en charge native de la connexion sur n'importe quel cloud ou sur site.
FusionAuth provides authentication, authorization, and user management for any app. Built for developers, FusionAuth easily integrates with any language and framework and can be deployed anywhere in minutes. Every feature is exposed as an API giving you complete flexibility to handle any use case. FusionAuth is the only authentication, authorization, and user management built for devs. It works with any app, using any framework.
Routee est une solution cloud API et web qui propose des solutions sécurisées d’authentification à deux facteurs, fiables, flexibles et facilement intégrées à votre entreprise. Routee s’aide de protocoles GSM pour protéger votre entreprise avec des SMS à deux facteurs, des appels/messages vocaux, Viber ou des appels manqués. Contrairement aux autres, cet outil offre des options de basculement. Quel que soit le fournisseur réseau utilisé par votre entreprise ou les fournisseurs de services auxquels vos clients ont souscrit, les services de basculement vous permettent d’envoyer des messages d’authentification à deux facteurs en toute sécurité. L'authentification à deux facteurs renforce la sécurité de vos activités en protégeant les informations sensibles.
Application de connexion à la demande unique qui gère l'accès des employés aux systèmes web et de bureau dans une entreprise. Application de connexion à la demande unique qui gère l'accès des employés aux systèmes web et de bureau dans une entreprise.
Sécurité renforcée pour les connexions Windows. UserLock fonctionne aux côtés d'Active Directory pour protéger l'accès aux systèmes Windows. Grâce à des contrôles d'accès contextuels et une surveillance en temps réel, UserLock réduit le risque d'attaques externes et de violations de la sécurité interne tout en aidant à respecter la réglementation. Sécuriser, contrôler et auditer l'accès des utilisateurs aux réseaux Microsoft Windows Server et protéger les ressources et les données qu'ils contiennent.
Solution de gestion des utilisateurs et des identités avec connexion via les réseaux sociaux, authentification multifacteur et fonctionnalité de gestion des autorisations. Solution de gestion des utilisateurs et des identités avec connexion via les réseaux sociaux, authentification multifacteur et fonctionnalité de gestion des autorisations.
Touchless, automated proximity-based authentication into computers, websites, and software. Passwordless login and auto-lock PCs. Authenticate with your presence and log in instantly with password autofill. No more locked out accounts. When the token moves out of range, GateKeeper automatically locks the computer. Be preventative against expensive and disruptive data breaches. Your password caddie for a password-free experience. Never go back to memorizing and typing passwords. Automated proximity-based authentication into computers and websites. Passwordless login and auto-lock PCs.
Protectimus Solutions provides a powerful multi-factor authentication service. We offer 2FA SaaS platform and on-premise version of the product which supports a great variety of TOTP tokens and program tokens for OTP delivery. Powerful multi-factor authentication solution.
ESET Secure Authentication provides an easy way for businesses of all sizes to implement MFA across commonly utilized systems such as VPNs, Remote Desktop, Office 365, Outlook Web Access, operating system login and more. A simple, effective way for businesses of all sizes to implement multi-factor authentication across commonly utilized systems.
B2B email prospecting tool that aids in filling pipeline. B2B email prospecting tool that aids in filling pipeline.
PixelPin est précurseur en matière d'authentification basée sur l'image, offrant aux entreprises et à leurs utilisateurs un moyen sûr, personnel et convivial de se connecter à leurs comptes en ligne. Avec PixelPin, les utilisateurs n'ont plus besoin de se souvenir de mots de passe alphanumériques compliqués, ils peuvent maintenant se connecter à n'importe quel compte en appuyant sur 4 points situés sur leur image favorite. Un jeu d'enfant ! PixelPin peut être facilement intégré à n'importe quelle application ou n'importe quel système et fonctionne sur n'importe quel appareil via un écran tactile ou une souris. Solution logicielle non biométrique, sans mot de passe, qui permet aux utilisateurs de se connecter en utilisant une photo personnelle et en sélectionnant 4 points.
Mobile based protection from phishing attacks and other malicious activities. Mobile based protection from phishing attacks and other malicious activities.
Today's workforce expects flexibility and mobile has been the technology that empowers employees to work wherever and whenever they want. Use cases like seamlessly providing secure access to business-critical resources, resetting an Active Directory password or simply comply with the expiration policies either required the employee to use a computer or forced organizations to come up with non-standard workarounds. Hypergate turns your mobile device in a fully-fledged Active Directory client. Hypergate Authenticator is a managed application on the mobile device that delivers a seamless and secure Single Sign-On solution.
DruID is a customer identity and access manager that helps companies to capture, validate and authenticate consumer identities in B2C environments, in order to provide an improved CX, increase your consumer knowledge, guarantee data security and increase the efficiency of marketing actions in a steady way. DruID is a secure Customer Identification and Access Management solution focused on user identification, activation and acquisition.
AuthX provides you with secure & seamless log-in capabilities. We make logging in easy, enabling you to focus on your business. Our enterprise class authentication solutions provides anywhere access to any applications and any user. AuthX provides multi-factor authentication (MFA) solution, biometric authentication, AD integration and Push Authentication that is easy to use and deploy, all while providing visibility, transparency and control. Start using AuthX today! Provides secure & seamless multi-factor log-in capabilities. We make logging in easy, enabling you to focus on your business.
Ondato compliance platform is a must have solution for the financial institutions that enables to automate the customer boarding (private and corporate), KYC data gathering and monitoring (ODD). It saves recourses on the compliance and data management and also enables remote customer onboarding real time online. ID verification solutions offered by Ondato supports both - fully independent self boarding with liveness test and Live video customer boarding. Full compliance platform for financial institutions that allows customer onboarding, ID verification, data validation and monitoring.
Entersekt is an innovator of mobile-first fintech solutions. Banks and other institutions rely on its patented mobile identity technology to secure their customers digital journeys, all while delivering a world-class user experience irrespective of the channel in use. Whether pursuing compliance through state-of-the-art app security and strong authentication, or striving to meet consumer demand for on-the-go payment capabilities, Entersekt's customers always enjoy a competitive advantage. Provides innovative fintech solutions that fast-track digital transformation in financial services, payments, insurance & healthcare.
You can use Specops Password Policy to enforce password rules, remove leak passwords and meet compliance requirements. Specops Password Policy extends the functionality of Group Policy and allows you to configure a different set of rules for different types of users. Specops Password Policy is a component of the Specops Password Management solution. Specops Password Management addresses both security and flexibility needs by enabling organizations to reach their appropriate level Specops Password Policy helps you increase password security in your Active Directory environment.
Open source provisioning solution for real-time user management lifecycle automation. Open source provisioning solution for real-time user management lifecycle automation.
Produit open source de gestion des identités et des accès, avec authentification web et authentification unique SSO de l'entreprise, gestion des comptes privilégiés. Produit open source de gestion des identités et des accès, avec authentification web et authentification unique SSO de l'entreprise, gestion des comptes privilégiés.
Simple, Secure and Customizable Identity & Access Control. Aerobase is based on standard protocols and provides support for OpenID Connect, OAuth2, and SAML2. Open Source Identity & Access Management
The IntelliTrust cloud authentication service secures access to devices, applications and resources with an analyst top-rated solution that has been proven across critical banking, government and healthcare infrastructures for more than 25 years. Point-and-click provisioning and out-of-the-box integrations with a variety of on-premises and cloud applications make the IntelliTrust cloud authentication service easy to deploy, so you can be up and running in under 30 minutes. Secure access to apps with handsfree, passwordless authentication that makes users happy, unburdens IT staff & drives digital growth.
Our unique multi-factor authentication (MFA) solution not only helps to reduce the likelihood of network disruptions and data breaches arising from lost or stolen credentials, but we deliver this important capability entirely from the Cloud for easy set-up and management. AuthPoint goes beyond traditional 2-Factor Authentication (2FA) by considering innovative ways to positively identify users, and our large ecosystem of 3rd party integrations means that you can use MFA to protect access. WatchGuard's cloud-based MFA solution, AuthPoint, protects access to the network, VPNs, and Cloud applications.
Out of band multi factor authentication solution that employs secondary channel communication to defend your application.With CyLock MFA you can be assured your enterprise services, apps, employees and end-users are being protected by the latest in second factor authentication technology. Out of band multi factor authentication solution that employs secondary channel communication to defend your application.
(0 avis)
Voir profil
Security services solution that offers dual factor authentication, adaptive access control, and transaction signing. Security services solution that offers dual factor authentication, adaptive access control, and transaction signing.
(0 avis)
Voir profil
Identity and provisioning management solution for users rights administration and authorization management. Identity and provisioning management solution for users rights administration and authorization management.
(0 avis)
Voir profil
MIRACL garantit l'intégrité de l'identité des personnes, des applications et des éléments nécessaires à la gestion d'une entreprise numérique. MIRACL garantit l'intégrité de l'identité des personnes, des applications et des éléments nécessaires à la gestion d'une entreprise numérique.
(0 avis)
Voir profil
Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites. Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites.
(0 avis)
Voir profil
Solutions logicielles de gestion des informations d'identification et d'authentification des utilisateurs qui fournissent un service de validation des certificats et un suivi du cycle de vie des identités.
Multi-factor authentication solution for preventing fraud through various authentication methods. Multi-factor authentication solution for preventing fraud through various authentication methods.
(0 avis)
Voir profil
Mobile authentication framework that includes biometric SDKs for commercial enterprises and banks to enable secure login to their mobile applications using biometric authentication from mobile devices of their employees and customers. Web-based authentication solution that provides biometric authentication through identity proofing, document authentication and more.
(0 avis)
Voir profil
Biometric-based authentication solution that integrates the mobile SDK and biometric capabilities and allows enterprises to replace passwords with biometrics to verify user identity and access company's critical assets. Biometric authentication solution that allows enterprises to replace passwords with biometrics to access company's critical assets.
(0 avis)
Voir profil
Multi-factor authentication solution that helps you create your own trusted enterprise network of users, devices, and applications. Multi-factor authentication solution that helps you create your own trusted enterprise network of users, devices, and applications.

NCP

(0 avis)
Voir profil
NCP develops universally applicable software components enabling end devices to easily and securely connect to the corporate network via public networks in conjunction with a fully automated central remote access VPN management. NCP's Secure Communication Products are made for many different scenarios e.g. mobility, M2M, IIoT and classic VPN scenarios. NCP offers solutions for professional work in a VPN, VPN client/server components, central VPN management and software for IIoT.
Allows for single sign-on and strong multi-factor authentication to protect your enterprise from threat vulnerabilities and control access to cloud, on-premises, and mobile applications. Allows for single sign-on and strong multi-factor authentication to control access to cloud, on-premises, and mobile applications.
(0 avis)
Voir profil
Strengthens the security of online accounts via two-factor authentication (2FA) after standard user name & password. Strengthens the security of online accounts via two-factor authentication (2FA) after standard user name & password.
(0 avis)
Voir profil
Onegini is a strong CIAM vendor with a very complete solutions offering. USP's such as Web and Mobile (other than competitors not just an authenticator app, but a strong end to end mobile security platform, allowing companies to create customer apps with tier one bank grade security), Saas and On premise, Flexible Boarding functionality, Strong integration options for IOT, out of the box canned use case, continious security fraud detection, GDPR ready, and PSD2 enabler. Onegini Connect allows you to connect, manage, and engage with your customers. Start accelerating customer onboarding and access now!
(0 avis)
Voir profil
Combines device intelligence, behavioral analytics, and real-time decisions to stop fraud before it starts. Combines device intelligence, behavioral analytics, and real-time decisions to stop fraud before it starts.
Founded in 2006, VEXXHOST Inc. is a Canadian cloud computing provider offering OpenStack powered public cloud, private cloud and OpenStack consulting services to its customers. Other cloud solutions involve Openstack Upgrades, Kubernetes Enablement and Managed Zuul. From small businesses to governments in over 150 different countries, VEXXHOST delivers high-level expertise to help clients optimize their cloud infrastructure. VEXXHOST provides Private Cloud and Public Cloud services using OpenStack platform along with several powerful cloud solution offerings
(0 avis)
Voir profil
OpenOTP est une solution d'authentification utilisateur de niveau entreprise basée sur des normes ouvertes. OpenOTP fournit de nombreux schémas d'authentification (hautement configurables) pour vos utilisateurs du domaine. Il prend en charge à la fois l'authentification unique et l'authentification multifacteur avec les technologies OTP et FIDO U2F. La solution OpenOTP est composée de plusieurs composants, notamment WebADM server, RADIUS Bridge et des applications en libre service. OpenOTP prend en charge les VPN, Citrix, l'authentification unique pour le web, ADFS, Linux, Microsoft, le Wi-Fi, les applications web, etc. OpenOTP est une solution d'authentification multifacteur basée sur des normes ouvertes.
(0 avis)
Voir profil
Avencis SSOX, a France Cybersecurity labelled solution, is a solution for access control and unified strong authentication (SSO) which guarantees the security of connections while also improving user experience. Avencis SSOX enables more robust primary authentication supporting multiple authentication methods and provides advanced features in terms of password safe, identity aggregation and all access traceability. Avencis SSOX is a solution for access control and unified strong authentication (SSO).
(0 avis)
Voir profil
Rublon enables your workforce to securely access your organization's networks, servers and applications. Protect your data via easy-to-use multi-factor authentication and comply with data protection regulations like GDPR. Deploy Rublon organization-wide, enabling MFA for all your cloud apps, VPNs, servers, workstations, internal as well as on-premise apps. Secure access to networks, servers and applications using multi-factor authentication with software and hardware authentication methods
ToothPic Key Protection SDK protects cryptographic keys stored on smartphones from malware and unauthorized use, tying them to a hardware characteristic of devices: the fingerprint of their camera sensor. The SDK can be easily integrated into existing Android and iOS apps. Everytime a user needs to authenticate, sign or authorize a transaction, the SDK securely unlocks the required credential. Only the authorized device can use the credential, turning every smartphone into a secure hardware key ToothPic Key Protection SDK protects cryptographic keys stored on smartphones from malware, tying them to the fingerprint of the camera
Voir profil
Secure authentication solution built to simplify login and payment workflow with the use of biometrics and multi-factor authentication. Secure authentication solution built to simplify login and payment workflow with the use of biometrics and multi-factor authentication.
(0 avis)
Voir profil
A digital credential platform that enables organizations to offer a decentralized, self-sovereign identity solution for their users. A digital credential platform that enables organizations to offer a decentralized, self-sovereign identity solution for their users.
(0 avis)
Voir profil
Behaviosec is a behavioral biometrics tool that tracks activity to ensure your accounts are kept safe. Behaviosec is a behavioral biometrics tool that tracks activity to ensure your accounts are kept safe.
(0 avis)
Voir profil
Authenticate actual identities with behavioral, environmental, and contextual factors. Authenticate actual identities with behavioral, environmental, and contextual factors.
(0 avis)
Voir profil
Identity verification service based on video live streaming and artificial intelligence. Identity verification service based on video live streaming and artificial intelligence.
Voir profil
Multi-factor and passwordless authentication to websites and applications. Multi-factor and passwordless authentication to websites and applications.
(0 avis)
Voir profil
Offers OEM partners a robust, accurate and readily scalable, API driven system for remote, voice biometric-based ID verification and/or identification, for integration with any telephony-related application to help businesses increase security, improve customer satisfaction, and differentiate their brand, enabling end users to improve key performance indicators and get an ROI across all important operational metrics. Offers remote, voice biometric-based ID verification and/or identification, for integration with any telephony-related application.
Callsign is an identity proving and authentication company. Our Intelligence Driven Authentication solutions positively identify that your customers truly are who they say they are. By passively collecting and analyzing data across device, location and behavior throughout each event we can build up a unique picture of each individual no matter what the channel. We work with some of the worlds largest banks and offer bank grade identification to public and private sector clients. World Leading Positive Identification
(0 avis)
Voir profil
SUBROSA is a patented photo/digital image-based authentication and encrypted key generation software more secure than PINS or user-generated passwords. Users can choose from a selection of photos or their own personal photos, then choose a customized tile pattern that is personal to them. The chosen tile pattern is converted into 65,000+ character long, randomized, encrypted key as their password. This allows users to exceed password best practices in being very strong, random, and encrypted. SUBROSA is an authentication gateway that can be seamlessly integrated into distributed applications as a password replacement.
(0 avis)
Voir profil
Secure and convenient passwordless authentication. Secure and convenient passwordless authentication.
Strong suite of multi-factor authentication and transaction confirmation. Strong suite of multi-factor authentication and transaction confirmation.
Phonexia Voice Verify is a market-leading voice verification solution for contact centers in banks and insurance, telco, and utilities companies, as well as for conversational AI interfaces, such as voicebots. Powered by cutting-edge artificial intelligence, it can already verify clients with over 90% accuracy after only 3 seconds of speech (based on the NIST SRE16 dataset). The solution is quick to evaluate via a demo and sandbox, and a PoC can be finished in a matter of weeks. Phonexia Voice Verify is a highly accurate and extremely fast voice verification solution for contact centers
Verimatrixs Passwordless Authentication solution complements existing solutions with password-less, two-factor or multi-factor authentication (2FA/MFA) and transaction-authorization capabilities. Deployed on premises or in a SaaS model, the solution enables consumers to use a secure smartphone app and biometrics instead of or in addition to passwords when accessing any digital channel. Complements existing solutions with password-less, two-factor or multi-factor authentication and transaction-authorization capabilities
(0 avis)
Voir profil
Provides user behavior, online fraud attack trained models to enable risk-based authentication to stop cybercriminal access. Provides user behavior, online fraud attack trained models to enable risk-based authentication to stop cybercriminal access.
Enhance your existing IAM solution with zero-knowledge multi-factor biometric authentication. Bring the convenience of facial recognition to your workforce authentication journeys while leaving behind any related GDPR concerns. Zero-Knowledge Biometric Authentication and Personal Identity Management Platform.
(0 avis)
Voir profil
All the tools and the support team you need to offer an amazing Guest Wi-Fi experience Deployed in 1,500+ properties in 70+ countries Integrated with the major PMS/CRS/CRM vendors Conference tool integrated with major WAP controllers Authentication and data collection through Social Networks (Facebook, LinkedIn, Twitter) User-friendly editor for Login Portal and marketing Campaigns Redundant gateways and authentication servers Dashboard and API for Monitoring, Reporting & Analytics Robust Guest Internet Access Management
(0 avis)
Voir profil
Gate any content or asset with the BioSig-ID password, a gesture biometric that identifies people by four characters they draw Gate any content or asset with the BioSig-ID password, a gesture biometric that identifies people by four characters they draw
(0 avis)
Voir profil
Biometric authentication software. Biometric authentication software.
Go passwordless to eliminate PUSH attacks and 2FA breaches. Go passwordless to eliminate PUSH attacks and 2FA breaches.
Secret Double Octopus is the passwordless authentication solution for the enterprise. We liberate end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication. The Octopus Passwordless Enterprise technology provides unified user experience and a consistent way to access workstations, remote services, cloud applications and on-prem systems while providing stronger protection against cyber-attacks. From being named a Gartner Coo Enterprise-ready strong passwordless authentication.
(0 avis)
Voir profil
Trusona, the pioneering leader of passwordless MFA for enterprises, secures the identity behind every digital interaction. The company's solutions provide a complete alternative to usernames and passwords, making authentication more secure and more convenient across all enterprise use cases. Organizations in financial services, healthcare, higher education, media and more, trust Trusona for omni-channel authentication across any digital asset. Passwordless MFA that improves security and login experience.
(0 avis)
Voir profil
Konfirmi gives your website or app easy-to-setup verification (which you can combine or use standalone). Verification methods include: - 2 Factor Authentication / Multi Factor Authentication (2FA/MFA) - SMS/Email verification - True age verification (KBA Checks) - True customer name/address/info verification (KBA Checks) - Biometric Authentication - Single Sign On (SSO) Comprehensive user verification and authentication for users on websites and ecommerce platforms as well as apps.
(0 avis)
Voir profil
VerifyKit is a new, cost-effective verification solution. With a choice of verification methods WhatsApp, Telegram or SMS you can cut your SMS verification costs by 80%. VerifyKit ensures a seamless and quick login experience for end users and offers easy app integration. Efficient solution to verify phone numbers with its easy to integrate SDK and API. It lets users access apps quickly.
Provides frictionless mobile fraud prevention. Provides frictionless mobile fraud prevention.
(0 avis)
Voir profil
Provides a unique zero latency, multi-factor authenticated protection service for managing bot traffic, at scale. Provides a unique zero latency, multi-factor authenticated protection service for managing bot traffic, at scale.
Venture-backed platform revolutionising how business activities are captured, secured and shared across any supply chain Venture-backed platform revolutionising how business activities are captured, secured and shared across any supply chain
(0 avis)
Voir profil
Bi-Directional authentication software for service provider and customer. Bi-Directional authentication software for service provider and customer.

XTN

(0 avis)
Voir profil
Authentication software offering behavioral-based threat and fraud protection Authentication software offering behavioral-based threat and fraud protection
(0 avis)
Voir profil
Tesseract offers a platform for authentication, cryptographic, and user management. Tesseract offers a platform for authentication, cryptographic, and user management.
(0 avis)
Voir profil
BioThenticate combines proprietary, high-speed iris and facial recognition with the biometric sensors that already exist on todays smartphones and is complementary to existing identity and access management and MFA solutions. The platform integrates with your organizations active directory, LDAP and identity governance tools. BioThenticate enables Zero Trust security by authenticating users to all resources and adopting a least privilege model to enforce access control. BioThenticate® is a next generation multi-factor authentication solution.