Alternatives to AuthZed

Compare AuthZed alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to AuthZed in 2026. Compare features, ratings, user reviews, pricing, and more from AuthZed competitors and alternatives in order to make an informed decision for your business.

  • 1
    Frontegg

    Frontegg

    Frontegg

    Frontegg is a Customer Identity and Access Management (CIAM) platform that simplifies authentication, authorization, and user management for SaaS companies. It enables developers to implement advanced identity features quickly, then shift ongoing administration to other teams. With Frontegg, Product, Infosec, and Customer Success teams can take control of key identity tasks like managing user roles, enforcing security policies, and handling customer requests, all without engineering support. Developers reduce toil and regain focus on core product work, while stakeholders move faster without bottlenecks. Frontegg supports modern identity features including SSO, MFA, role-based access control, entitlements, multi-tenancy, and audit logs. Its low-code platform integrates in days and provides a user-friendly admin portal that bridges technical and non-technical teams. Frontegg increases operational efficiency, improves security posture, and enhances the customer experience.
    Leader badge
    Compare vs. AuthZed View Software
    Visit Website
  • 2
    Auth0

    Auth0

    Okta

    Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO.
    Leader badge
    Compare vs. AuthZed View Software
    Visit Website
  • 3
    Kinde

    Kinde

    Kinde

    Authentication happens at some of the most important, and highly impactful, places in your customers' journey. Take control of user authorization with a passwordless authentication, social integrations, and enterprise SSO. Support the branding of all your customers with custom domains and a fully customisable UI by bringing your own pages and designs. Integrate with complex requirements and run your own code during authentication using our powerful workflows. Organise all your business customers using organizations to easily segergate them and fine tune the authentication experience to their individual needs. Monetize your ideas quickly with Kinde's billing tools. Create subscription plans and collect revenue effortlessly. Kinde adapts to your business model, supporting B2C, B2B, and B2B2C with robust organization management and flexible billing logic that scales with your customers.
    Starting Price: Free
  • 4
    SolarWinds Access Rights Manager
    SolarWinds® Access Rights Manager is designed to assist IT & security administrators in quickly & easily provisioning, deprovisioning, managing, & auditing user access rights to systems, data, & files, so they can help protect their organizations from the potential risks of data loss and breaches. By analyzing user authorizations & access permissions, you get visualization of who has access to what, and when they accessed it. Customized reports can be generated to help demonstrate compliance with many regulatory requirements. Provision & deprovision users via role-specific templates to help assure conformity of access privilege delegation, in alignment with security policies.
  • 5
    Aserto

    Aserto

    Aserto

    Aserto helps developers build secure applications. It makes it easy to add fine-grained, policy-based, real-time access control to your applications and APIs.
 Aserto handles all the heavy lifting required to achieve secure, scalable, high-performance access management. It offers blazing-fast authorization of a local library coupled with a centralized control plane for managing policies, user attributes, relationship data, and decision logs. And it comes with everything you need to implement RBAC or fine-grained authorization models, such as ABAC, and ReBAC. Take a look at our open-source projects: - Topaz.sh: a standalone authorizer you can deploy in your environment to add fine-grained access control to your applications. Topaz lets you combine OPA policies with Zanzibar’s data model for complete flexibility. - OpenPolicyContainers.com (OPCR) secures OPA policies across the lifecycle by adding the ability to tag, ver
  • 6
    Oso Cloud
    Customers want features that you can’t build without a refactor. Your code is hand-rolled, fragile and hard to debug. It’s spread throughout the codebase and relies on data from multiple sources. There’s no one place to see who has access to what, that authorization is working, or why requests are or are not authorized. Lay out who's allowed to do what in Workbench, our visual rules editor Start with primitives for common patterns like multi-tenancy and RBAC Extend your logic with custom rules in Polar, our configuration language for authorization. Send core authorization data, like roles and permissions. Make authorization checks and filter lists based on authorization where you used to have IF statements and custom SQL.
    Starting Price: $149 per month
  • 7
    Permify

    Permify

    Permify

    Permify is an authorization service designed to help developers build and manage fine-grained, scalable access control systems within their applications. Inspired by Google's Zanzibar, Permify enables the structuring of authorization models, storage of authorization data in preferred databases, and interaction with its API to handle authorization queries across various applications and services. It supports multiple access control models, including Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC), allowing for the creation of granular permissions and policies. Permify centralized authorization logic, abstracting it from the codebase to facilitate easier reasoning, testing, and debugging. It offers flexible policy storage options and provides a role manager to handle RBAC role hierarchies. The platform also supports filtered policy management for efficient enforcement in large, multi-tenant environments.
    Starting Price: Free
  • 8
    ZITADEL

    ZITADEL

    ZITADEL

    ZITADEL is an open-source identity and access management platform designed to simplify authentication and authorization for applications. It offers a comprehensive suite of features, including customizable hosted login pages, support for modern authentication methods such as Single Sign-On (SSO) and social logins, and enforcement of multifactor authentication to enhance security. Developers can integrate authentication directly into their applications using ZITADEL's APIs or build dedicated login interfaces. The platform supports role-based access control, allowing for precise permission assignments based on user roles, and is inherently multi-tenant, facilitating easy extension of applications to new organizations. ZITADEL's extensibility enables seamless adaptation to various workflows, user management processes, and brand guidelines, with features like ZITADEL Actions that execute workflows after predefined events without the need for additional code deployment.
    Starting Price: $100 per month
  • 9
    OpenFGA

    OpenFGA

    The Linux Foundation

    OpenFGA is an open source authorization solution that enables developers to implement fine-grained access control using a user-friendly modeling language and APIs. Inspired by Google's Zanzibar paper, it supports various access control models, including Relationship-Based Access Control (ReBAC), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC). OpenFGA offers SDKs for multiple programming languages, such as Java, .NET, JavaScript, Go, and Python, facilitating seamless integration into diverse applications. The platform is designed for high performance, capable of processing authorization checks in milliseconds, making it suitable for projects ranging from small startups to large enterprises. Operating under the Cloud Native Computing Foundation (CNCF) as a sandbox project, OpenFGA emphasizes transparency and community collaboration, inviting contributions to its development and governance.
    Starting Price: Free
  • 10
    TopSpice

    TopSpice

    TopSpice

    TopSpice is a true analog/digital/behavioral mixed-mode circuit simulator for the PC. It offers the most advanced SPICE simulator in its price range, compatibility, an easy to use integrated design environment from schematic capture to graphical waveform analysis, and full 64-bit operation for faster performance and larger memory space. With TopSpice you have the choice to design from schematic drawings, text netlist (SPICE) files, or both. All design and simulation functions are available from either the schematic or netlist editor front-ends. TopSpice includes a native full-featured mixed-mode mixed-signal circuit simulator capable of simulating circuits containing any arbitrary combination of analog devices, digital functions and high-level behavioral blocks. With TopSpice you can verify and optimize your design from the system to the transistor level.
    Starting Price: $595 one-time payment
  • 11
    Calico Enterprise
    A self-managed, active security platform with full-stack observability for containers and Kubernetes. Calico Enterprise is the industry’s only active security platform with full-stack observability for containers and Kubernetes. Calico Enterprise extends the declarative nature of Kubernetes to specify security and observability as code. This ensures consistent enforcement of security policies and compliance, and provides observability for troubleshooting across multi-cluster, multi-cloud and hybrid deployments. Implement zero-trust workload access controls for traffic to and from individual pods to external endpoints on a per-pod basis, to protect your Kubernetes cluster. Author DNS policies that implement fine-grained access controls between a workload and the external services it needs to connect to, like Amazon RDS, ElastiCache, and more.
  • 12
    SIMetrix/SIMPLIS

    SIMetrix/SIMPLIS

    SIMPLIS Technologies

    It combines accuracy and speed in a full-featured design environment, enabling 10-50x faster simulation than SPICE for power supply designs. All features of SIMetrix Classic and uses the same GUI environment including its hierarchical schematic editor and waveform viewer. Rapidly locates the steady state operating point of a switching system without having to simulate the startup transient conditions. SPICE transistor and diode model conversion to SIMPLIS format. Converts SPICE models by running a SPICE simulation to perform parameter extraction. The advanced digital simulation library provides a wide variety of digital functions such as counters, ADCs, DACs and much more.
  • 13
    Styra

    Styra

    Styra

    The fastest and easiest way to operationalize Open Policy Agent across Kubernetes, Microservices or Custom APIs, whether you're a developer, an admin, or a bit of both. Need to limit which folks can access your pipeline, based on who is currently on call? Simple. Want to define which microservices can access PCI data? We got you. Have to prove compliance with regulations across your clusters? No sweat. Built on open-source, and declarative by design, Styra Declarative Authorization Service gives you a turnkey OPA control plane to mitigate risk, reduce human error, and accelerate development. A built-in library of policies. Built on our OPA project let you implement and customize authorization policy-as-code. Pre-running lets you monitor and validate policy changes before committing, to mitigate risk before deployment. Declarative model defines desired state to prevent security drift and eliminate errors, before they can occur.
    Starting Price: $70 per month
  • 14
    BlueSpice

    BlueSpice

    BlueSpice

    Find everything immediately. Update knowledge faster: BlueSpice is the enterprise distribution of the famous Wikipedia software MediaWiki. Working with BlueSpice is as simple and uncomplicated as you would expect from wikis and meet the most demanding requirements. Add user-friendly extensions to MediaWiki and make your administrators’ lives easier. An appealing design is included! BlueSpice free is the gratis version for an entry-level solution for businesses. It provides a functional added value for wiki admins and users. BlueSpice pro is a business-critical solution with comprehensive functionalities, a growing number of available extensions and long-term support, updates and patches are also included. Our company was founded to make the technology and concepts of Wikipedia usable for companies. Since 2007 we have been developing the knowledge management platform BlueSpice based on the open source software MediaWiki.
    Starting Price: $215 per month
  • 15
    Logto

    Logto

    Silverhand

    Logto is an Auth0 alternative designed for modern apps and SaaS products. It offers a seamless developer experience and is well-suited for individuals and growing companies. 🧑‍💻 Comprehensive identity solution Enables easy authentication with Logto SDKs. Supports multiple passwordless and social sign-in methods. Offers customizable UI components to match your brand. 📦 Out-of-the-box infrastructure eliminates the need for extra setup. Provides ready-to-use Management API Offers flexible connectors for customization and scaling, and is customized with SAML, OAuth, and OIDC protocols. 💻 Enterprise-ready with role-based access control (RBAC), organizations (multi-tenant apps), user management, audit logs, single sign-on (SSO), and multi-factor authentication (MFA).
  • 16
    NL5 Circuit Simulator
    There are plenty of circuit simulators available on the market. Just read their ads: high performance, extremely fast, industry-standard (i.e. SPICE), easy to use, highly intuitive. If you want to see if a tool is worth using, try it yourself. That's what many NL5 users already did. I hope they will share their encouraging stories soon. A few words about what should you expect from NL5. It is not one more SPICE (and not even close), nor is it a SPICE replacement. For some tasks NL5 is far superior, for others simply good, and some tasks are not for NL5 at all.
    Starting Price: $500 one-time payment
  • 17
    Amazon Verified Permissions
    Amazon Verified Permissions is a fully managed authorization service that uses the provably correct Cedar policy language, so you can build more secure applications. With Verified Permissions, developers can build applications faster by externalizing authorization and centralizing policy management. They can also align authorization within the application with Zero Trust principles. Security and audit teams can better analyze and audit who has access to what within applications. Accelerate application development by decoupling authorization from business logic. Protect application resources and manage user access to the principle of least privilege. Amazon Verified Permissions is a fully managed, Cedar-compatible permissions management and fine-grained authorization service for the applications that you build. Using Cedar, an expressive, performant, and analyzable open source policy language, developers and admins can define policy-based access controls.
    Starting Price: $0.00015 per request
  • 18
    System Frontier
    PowerShell web front end with role based access control, auditing and remote management tools. Delegate granular permissions to manage servers, workstations, network devices and user accounts. Privileged Access Management (PAM). Let System Frontier do all the heavy lifting so you can focus on your enabling your IT teams to get more done without having more permissions than needed.
  • 19
    Casbin

    Casbin

    Casbin

    Casbin is an open-source authorization library that supports various access control models, including Access Control Lists (ACL), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC). It is implemented in multiple programming languages such as Golang, Java, C/C++, Node.js, JavaScript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter), and Elixir, providing a consistent API across different platforms. Casbin abstracts access control models into configuration files based on the PERM metamodel, allowing developers to switch or upgrade authorization mechanisms by simply modifying configurations. It offers flexible policy storage options, supporting various databases like MySQL, PostgreSQL, Oracle, MongoDB, Redis, and AWS S3. The library also features a role manager to handle RBAC role hierarchies and supports filtered policy management for efficient enforcement.
    Starting Price: Free
  • 20
    Authorizer

    Authorizer

    Authorizer

    Build secure apps 10x faster. Low code tool and low cost deployment. Own your user data in your preferred database. Authenticate users with multiple auth recipes. Authorize users based on your business roles. OAuth2 and OpenID compatible APIs. Authentication and authorization have never been this simple before. Deploy production-ready Authorizer instance using one-click deployment options available. Open Authorizer instance endpoint in the browser. Sign up as an admin with a secure password. Configure environment variables from the dashboard. Authorizer object can be instantiated with JSON object. You can use Authorizer off the shelf and provide an amazing digital experience in just 3 minutes. We rather have you focused on your core business and build stuff that matters. Auth with best services baked in. Secure Session management implemented with HTTP-only cookies. Authorization Code flow implemented for mobile-based auth.
  • 21
    Analog FastSPICE Platform
    Foundry-certified, the AFS Platform delivers nm SPICE accuracy, 5x faster than traditional SPICE and >2x faster than parallel SPICE simulators. Offering the fastest nm circuit verification platform for analog, RF, mixed-signal, and custom digital circuits. Now includes new eXTreme technology. For large post-layout circuits, the new AFS eXTreme technology delivers over 100M-element capacity and is 3x faster than post-layout simulators. Supports all leading digital solvers. Best-in-class usability, allowing maximum reuse of verification infrastructure. Advanced verification and debug capabilities to improve verification coverage. Improved design quality, and time-to-market. SPICE accurate, high-sigma verification. 1000x faster than brute-force simulation. Easy to use, and deploy. AFS eXTreme technology is available at no additional cost.
  • 22
    TicketSpice

    TicketSpice

    Webconnex

    Host your most successful event ever with TicketSpice. TicketSpice is easy to use, highly customizable, and unbelievably affordable. At just $0.99 per ticket, you'll save thousands, while offering a seamlessly simple ticketing experience. TicketSpice is flexible and feature rich, offering full branding control, timed ticketing, reserved seating, mobile scanning, box office, merchandise options, and more. If you’re frustrated by expensive and restrictive ticketing systems that put their logo on top of your ticketing page, you’ll love how TicketSpice empowers you to control the entire ticketing experience. Whether in-person, virtual, or hybrid, you’ll have one platform with everything you need to sell tickets, manage attendees, capture data, and more. With over 60,000 customers and twelve years of experience, we’ll be your guide to the most successful and profitable events you’ve ever had.
    Starting Price: $0.99/one-time
  • 23
    Azure Resource Manager
    Azure Resource Manager is the deployment and management service for Azure. It provides a management layer that enables you to create, update, and delete resources in your Azure account. You use management features, like access control, locks, and tags, to secure and organize your resources after deployment. When a user sends a request from any of the Azure tools, APIs, or SDKs, Resource Manager receives the request. It authenticates and authorizes the request. Resource Manager sends the request to the Azure service, which takes the requested action. Because all requests are handled through the same API, you see consistent results and capabilities in all the different tools. All capabilities that are available in the portal are also available through PowerShell, Azure CLI, REST APIs, and client SDKs. Functionality initially released through APIs will be represented in the portal within 180 days of initial release.
  • 24
    Lumos

    Lumos

    Lumos

    Lumos is the internal AppStore for companies. Accelerate access requests, access reviews, and license management through self-service. Cut down on support tickets with automated access requests, approvals, and provisioning. Gain visibility into all your SaaS apps and spend. Remove unused licenses with automated workflows. You're hiring more employees than ever before, and they’re working from everywhere. That means one thing, you’re getting bombarded with help desk tickets asking for access to apps and permissions (and emails asking if you’ve seen their help desk ticket. You have.) Set permissions and approve access for a specific length of time, all within Slack! Before a new hire starts, Lumos will notify their manager and help them set up all apps for their new employee. Not every employee needs access to every app. Avoid headaches by tailoring your AppStore based on employee roles.
  • 25
    Delinea Server Suite
    Easily consolidate complex and disparate identities for Linux and Unix within Microsoft Active Directory. Minimize the risk of a breach and reduce lateral movement with a flexible, just-in-time privilege elevation model. Advanced session recording, auditing, and compliance reporting aid forensic analysis into abuse of privilege. Centralize discovery, management, and user administration for Linux and UNIX systems to enable rapid identity consolidation into Active Directory. Privileged Access Management best practices are easy to follow with the Server Suite. The results are higher levels of identity assurance and a significantly reduced attack surface with fewer identity silos, redundant identities, and local accounts. Manage privileged user and service accounts from Windows and Linux in Active Directory. Just-in-time, fine-grained access control with RBAC and our patented Zones technology. Complete audit trail for security review, corrective action, and compliance reporting.
  • 26
    Identity Confluence

    Identity Confluence

    Tech Prescient

    Identity Confluence is an intelligent Identity Governance and Administration (IGA) platform designed to help IT and security teams manage access, automate identity lifecycles, and maintain continuous compliance across cloud and hybrid environments. Built for modern enterprises, Identity Confluence unifies identity lifecycle management, access control, and governance into a single, scalable platform. Automate Joiner-Mover-Leaver (JML) processes, enforce policy-based access controls (RBAC, ABAC, PBAC), and conduct real-time user access reviews—all from one intuitive interface. Key Features: Lifecycle Automation: Trigger real-time provisioning and deprovisioning across HR, IT, and business systems. Access Controls: Implement dynamic, fine-grained access policies using roles, attributes, and policies. App & Directory Integrations: Out-of-the-box connectors for AD, Azure AD, Okta, Workday, SAP, and more. Access Reviews: Automate certifications, enforce Segregation of Duties
  • 27
    Multisim
    Multisim ™ software integrates industry standard spice simulation with an interactive schematic environment to instantly visualize and analyze the behavior of electronic circuits. Its intuitive interface helps teachers reinforce circuit theory and improve theory retention throughout the engineering curriculum. By adding powerful circuit simulation and analysis to the design flow, Multisim ™ helps researchers and designers reduce iterations of printed circuit board (PCB) prototypes and save development costs. Multisim ™ for Education is circuit teaching application software for analog, digital and power electronics courses and labs. Multisim ™ provides engineers with the SPICE simulation, analysis and PCB design tools to rapidly iterate on designs and improve prototype performance.
  • 28
    OAuth

    OAuth

    OAuth.io

    Focus on your core app and get to market faster. OAuth.io handles identity infrastructure, maintenance, and security overhead, so your team doesn’t have to. Identity can be difficult, OAuth.io makes it easy. Choose identity providers, add custom attributes, customize your login page or use our widget, integrate with your app - identity solved in minutes. Manage your users from our easy to use dashboard - find and manage users, reset passwords, enforce two-factor authentication, and add memberships and permissions through OAuth.io's simple and easy to use User Management. Fully-featured, hyper-secure user authentication using passwords or tokens. From multi-tenant to complex permissions, OAuth.io has your user authorization modeling covered. Force a second factor of user authentication with our popular integrations.
    Starting Price: $19 per month
  • 29
    Ory

    Ory

    Ory

    The missing web-scale API for identity and access control. 10x your security, user experience, and PII compliance today. Build secure apps on top of the Ory Network and reach new customers in any geopolitical region of the world with the best login experience ever. Login is more than a username and password. Building it from the ground up is time-consuming and dangerous. Ory's API-first microservice architecture makes it straightforward to integrate projects at any stage. Pay for usage, not features. Get advanced multi-factor to auth on every Ory subscription plan. Plus advanced permissions, SSO, OAuth2, OIDC, multi-tenancy, and so much more. Ory is made for high-performance, high-scale applications in any cloud. Built with developers in mind, Ory lets you quickly build your on-brand user experience and integrate it into your software stack. Ory's focus on open standards and automated data import capabilities makes migrating from legacy systems straightforward.
    Starting Price: $29 per month
  • 30
    CyberArk Conjur
    A seamless open source interface to securely authenticate, control and audit non-human access across tools, applications, containers and cloud environments via robust secrets management. Secrets grant access to applications, tools, critical infrastructure and other sensitive data. Conjur secures this access by tightly controlling secrets with granular Role-Based Access Control (RBAC). When an application requests access to a resource, Conjur authenticates the application, performs an authorization check against the security policy and then securely distributes the secret. Security policy as code is the foundation of Conjur. Security rules are written in .yml files, checked into source control, and loaded onto the Conjur server. Security policy is treated like any other source control asset, adding transparency and collaboration to the organization’s security requirements.
  • 31
    CircuitLogix

    CircuitLogix

    Logic Design

    It gives you the flexibility to design and test electronic circuits, trying all the "what if" scenarios without ever worrying about faulty parts or bad connections. CircuitLogix supports analog, digital and mixed-signal circuits, and its proven SPICE simulation gives accurate real-world results you can trust. 3DLab is included with both versions of CircuitLogix and is a "virtual reality"-type of lab environment and is designed to closely replicate the appearance and functionality of actual devices and instruments. There are approximately 30 different devices and instruments available in 3DLab, including batteries, switches, meters, lamps, resistors, inductors, capacitors, fuses, oscilloscopes, logic analyzers and frequency counters.
    Starting Price: $145 one-time payment
  • 32
    Alibaba Cloud Bastionhost
    Bastionhost enables you to manage asset O&M permissions in a centralized manner, monitor all O&M operations, and reproduce O&M scenarios in real-time to facilitate identity authentication, access control, and operation audit. You can use Bastionhost to troubleshoot issues, such as difficulties in the management of various assets, unclear responsibilities and authorities, and difficulties in the backtracking of O&M events. Bastionhost provides a centralized portal to access server resources. Bastionhost provides a single sign-on to allow O&M personnel to manage and maintain all server assets, facilitating centralized asset management. Furthermore, Bastionhost supports password-free logon for asset O&M. It manages accounts and passwords in a centralized manner to simplify account management. Bastionhost supports fine-grained user permission assignments to allow different users to perform operations based on the permissions assigned to them.
    Starting Price: $1.65 per month
  • 33
    Ona

    Ona

    Ona

    Ona, formerly Gitpod, is a modern development platform that provides mission control for software projects and engineering agents. It allows developers to keep momentum on any device by offering sandboxed, API-first environments in the cloud or within a company’s VPC. These environments come pre-configured with tools, dependencies, and controls, ensuring a consistent and secure setup for professional software engineering. Ona Agents further enhance productivity by assisting with tasks like scoping, writing, reviewing, and documenting code across the entire development lifecycle. Enterprise-ready guardrails deliver fine-grained permissions, policies, and audit trails, giving organizations full control over compliance and security. Trusted by millions of developers and Fortune 500 companies, Ona integrates seamlessly with tools like GitHub, GitLab, AWS, Copilot, and Amazon Bedrock.
    Starting Price: $20/month
  • 34
    ControlAuth

    ControlAuth

    ControlAuth

    The first-ever system that prevents unauthorized multi-user access and converts sharers into paying customers. ControlAuth is a cutting-edge platform designed to stop account sharing and unauthorized multi-user access for subscription-based businesses, helping them recover lost revenue. With seamless integration and no disruption to users, ControlAuth prevents password sharing and converts unauthorized users into paying customers. Trusted by major companies like Netflix, it helps businesses boost revenue by detecting and blocking shared logins in real-time, ensuring that only authorized users have access. This simple, effective solution offers measurable results, with businesses reporting significant increases in subscribers and revenue.
  • 35
    Okta

    Okta

    Okta

    One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity.
  • 36
    Multifactor

    Multifactor

    Multifactor

    Multifactor is a next-generation account-sharing and access-management platform built around zero-trust, post-quantum cryptography, and fine-grained permissioning. Rather than simply sharing credentials, users store their online accounts (passwords, passkeys, 2FA codes) in a secure vault and grant access to humans or AI agents by sending controlled links. Access can be revoked instantly, and the underlying credentials remain hidden. You can define precise permissions (for example, “read transactions” but not “initiate transfers”), capture detailed non-repudiable audit trails of every action, and enjoy built-in encryption and post-quantum security architecture that ensures only authorized parties ever gain access. The platform can also operate as a full identity-and-access-management suite, supporting authentication (biometrics, hardware tokens), authorization, access auditing, device and network endpoint enforcement, and secure account/resource sharing.
    Starting Price: Free
  • 37
    SpicePay

    SpicePay

    SpicePay

    Open your business to the world with a technology that knows no borders. Accept Bitcoin and other cryptocurrencies. Store it, spend it, or exchange it. Automated trading robots can trade Bitcoin, which has boosted the popularity of automation platforms. You can trade Bitcoin by creating a free demo account and perform trading transactions. Easily integrate blockchain payment functionality on your website, and bring your business into the future, securely and affordably. SpicePay’s wallet puts all of your Bitcoin transactions, payments, withdrawals and exchanges in one very secure, convenient place. Automatically exchange your digital assets for USD, EUR, GBP or CAD, and withdraw by wire transfer, SEPA or PayPal. Use SpicePay’s online retail, eCommerce, billing and donation tools to accept blockchain payments from customers worldwide in Bitcoin and other cryptocurrencies. Access your funds immediately, with no fraud and no chargebacks, and save an average of 2% on every transaction!
  • 38
    Hexnode IdP
    Hexnode IdP is an identity provider designed to help organizations manage authentication, access control, and identity governance from a centralized platform. It enables IT and security teams to verify user identities and enforce secure access to enterprise applications, devices, and resources. By combining identity verification with real-time device posture evaluation, Hexnode IdP supports a Zero Trust approach to access management. The platform includes capabilities such as single sign-on (SSO), multi-factor authentication (MFA), role-based access control (RBAC), and conditional access policies. These controls allow organizations to ensure that only authorized users on compliant devices can access sensitive systems and data. By centralizing authentication and access policies in a single console, organizations can simplify identity management while improving overall security visibility and control.
  • 39
    AgNext Qualix
    Instant on-field quality assessment of grains, oilseeds, pulses, spices, tea, milk animal feed. Real-time untampered visibility of quality during procurement, transit, and storage. Digital records for quality, with un-tampered data for quality & full traceability, lead to better decision making for procurement. Quality digitised on farmer level, farm level, agent level, geographical level, warehouse level, etc, through quality maps that enable better trade value price. Track food through all stages of the supply chain. Digitising transactions in the entire value chain with digital quality assessments.
  • 40
    Gate22

    Gate22

    ACI.dev

    Gate22 is an enterprise-grade AI governance and MCP (Model Context Protocol) control platform that centralizes, secures, and observes how AI tools and agents access and use MCP servers across an organization. It lets administrators onboard, configure, and manage both external and internal MCP servers with fine-grained, function-level permissions, team-based access control, and role-based policies so that only approved tools and functions can be used by specific teams or users. Gate22 provides a unified MCP endpoint that bundles multiple MCP servers into a simplified interface with just two core functions, so developers and AI clients consume fewer tokens and avoid context overload while maintaining high accuracy and security. The admin view offers a governance dashboard to monitor usage patterns, maintain compliance, and enforce least-privilege access, while the member view gives streamlined, secure access to authorized MCP bundles.
    Starting Price: Free
  • 41
    EwIMS

    EwIMS

    Omnex Systems

    Integrated EV-AV (Electric and Autonomous Vehicle) platform to meet Functional Safety (ISO 26262), Automotive SPICE® (ASPICE®), Cybersecurity (ISO 21434), and SOTIF (ISO 21448) standards. Helps develop structure and architecture diagrams, interface function matrices, p-diagram, and more. Manage and develop SysML/UML Diagrams, HARA (Hazard And Risk Analysis), technical safety concepts, hardware and software design (HIS), and more. Supports team collaboration and development of EV-AV work products. A comprehensive and integrated platform to manage functional safety plans, cybersecurity (CySe) plans, Automotive SPICE® software project plans, APQP/PPAP/NPD plans, and more. Manage NPD/APQP projects - track resources, timelines, deliverables, documents, and quality. Collaborate, connect, and monitor program status in real-time. Hassle-free management of project risks, APQP critical paths, project reviews, and more.
  • 42
    Siemens Solido
    The Solido variation-aware design, IP validation, library characterization, and simulation solutions, powered by proprietary AI-enabled technologies, are used by 1000s of designers at the top semiconductor companies worldwide. Integrated suite of AI-accelerated SPICE, Fast SPICE, and mixed-signal simulators designed to help customers dramatically accelerate critical design and verification for next-generation analog, mixed-signal, and custom IC designs. Providing the industry's fastest, most comprehensive integrated IP validation solution, providing complete, seamless IP QA from design to tape-out, across all design views and IP revisions. Comprehensive AI-powered design environment for nominal and variation-aware verification of custom IC circuitry enabling full design coverage in orders-of-magnitude fewer simulations, with the accuracy of brute-force techniques. Providing fast, accurate library characterization tools powered by machine learning.
  • 43
    SPICE Connect

    SPICE Connect

    Spice Technology Group

    Spice Connect connects business partners seamlessly, through one of North America’s largest and most scalable data exchange network. We create frictionless interaction between companies—from the cloud to the client—through a secure, reliable, and data-rich platform. Rolling out a large community of trading partner is our speciality. With a growing community of over 2,000 trading partners active on our cloud EDI/B2B integration platform SPICE Connect, we have perfected the craft of “herding cats” – the art and science of on-boarding & enabling a large community of trading partners. Our Set-Ready-Go™ rollout methodology ensures that your large community of trading partners can be rapidly on-boarded to a set of technical standards, while our technology platform ensures that all your trading partners have easy-to-use, standards-based technical means to connect with you. Try it out and see if it works for you!
    Starting Price: $500/month
  • 44
    Delinea Cloud Access Controller
    Gain granular control over web applications and web-based cloud management platforms. Delinea's Cloud Access Controller provides a comprehensive PAM solution that operates at cloud speed and is quick to deploy and secure access to any web application. With Cloud Access Controller, you can easily integrate your existing authentication solutions with any web application without having to write any additional code. Apply granular RBAC policies that enforce least privilege and zero trust initiatives, even to custom and legacy web applications. Specify what an individual employee is allowed to read or modify within any web application. Grant, manage and revoke access to cloud applications. Specify who gets access to what, at a granular level. Track usage of each and every cloud application. Clientless session recording without agents. Secure access to all web applications, including social media, custom, and legacy web applications.
  • 45
    Regula

    Regula

    Regula

    Regula is a global software and hardware manufacturer focused on the verification of identity documents, banknotes, and securities. Regula’s software product suite includes ID verification, facematching and liveness technologies for mobile applications and web-based solutions, to build a seamless on-premises digital identity and biometric verification workflow. We give our clients and partners the opportunity to perform identity verification with the ultimate level of security, efficiency & customer experience. Regula clients portfolio consists of 500 organisations from Banking, Fintech, Telecom, Aviation, Insurance industries, more than 50 largest KYC providers and 132 border authorities. We produce high-quality products in order to automate all processes related to identity verification and document examination.
  • 46
    TrustBuilder

    TrustBuilder

    TrustBuilder

    TrustBuilder is your reliable partner in cybersecurity. We go beyond the traditional software firm role, focusing on delivering robust and secure solutions that foster trust among enterprises. Through our Access Management Platform, TrustBuilder.io, our commitment is to ensure the secure digital journey of your employees, partners, and customers. With our advanced MFA and CIAM technology, we provide uninterrupted access while safeguarding identities. > TrustBuilder's SaaS MFA provides airtight, phishing-resistant security, passwordless experience, and seamless integration. > TrustBuilder's tailor made CIAM provides PBAC delivering fine grained authorization based on attributes with customisable workflows.
    Starting Price: € 10 per user / per year
  • 47
    TINA-TI

    TINA-TI

    Texas Instruments

    TINA-TI provides all the conventional DC, transient and frequency domain analysis of SPICE and much more. TINA has extensive post-processing capability that allows you to format results the way you want them. Virtual instruments allow you to select input waveforms and probe circuit nodes' voltages and waveforms. TINA's schematic capture is truly intuitive - a real quick start. TINA-TI installation requires approximately 500MB. Installation is straightforward and it can be uninstalled easily if you wish. We bet that you won't. TINA is a product of DesignSoft exclusively for Texas Instruments. This complimentary version is fully functional but does not support some other features available with the full version of TINA.
  • 48
    eLockr

    eLockr

    OnGrid

    eLockr is a Free HR 2.0 platform where ex-employer can write or issue employment credentials of their ex-employees that can be verified instantly and digitally by new employers.Illustrative list of eLockr clients include Shaadi.com, Vedantu, Practo, Delhivery, Kotak Securities, Spice Money, Shoppers Stop, ExpressBees among others.
  • 49
    Visual Guard
    Visual Guard is an advanced identity and access management (IAM) tool offering a complete solution for securing sensitive applications and data. With centralized management of users and permissions, Visual Guard facilitates the implementation of robust, standards-compliant security policies. User management : Create, modify & delete user accounts Integration with LDAP or Active Directory directories Automatic synchronization of user information Access control : Precise definition of access rights to features and resources Role and Permission Management Multi-factor authentication (MFA) Single Sign-On (SSO) Security Audit and Monitoring : Permission Matrix Detailed Event log Real-time and Historical Graphs Integration & compatibility : Compatibility with major development platforms, frameworks, and protocols. .NET API Benefits : Simplified access management Enhanced data security Improved regulatory compliance Reduce identity management cost
    Starting Price: 1.55/month/user
  • 50
    Vsub

    Vsub

    Vsub

    Say goodbye to manual captioning, Vsub's cutting-edge auto-generated captions feature effortlessly transforms your videos into text. Elevate your content with Auto highlight keywords. Watch as your key points shine in seconds, and enhance engagement effortlessly. Spice up your videos with cool templates, and make your content look great with easy-to-use styles created by Vsub team.
    Starting Price: $19 per month