Alternatives to Dapple Security

Compare Dapple Security alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Dapple Security in 2025. Compare features, ratings, user reviews, pricing, and more from Dapple Security competitors and alternatives in order to make an informed decision for your business.

  • 1
    Cisco Duo
    Cisco Duo is a cloud-based identity security solution that protects organizations from identity-based threats and boosts workforce productivity. Trusted by over 40,000 organizations worldwide, Duo delivers an exceptional access management experience across all users, devices, and applications, making access to resources secure, seamless, and easy. Duo with Cisco Identity Intelligence provides deep visibility across your identity ecosystem, adding a powerful security layer to any identity infrastructure. Offer users a world-class access experience through Duo Passport to eliminate MFA friction and fatigue without sacrificing security. To stop threats, Duo verifies user identities with strong authenticators including Duo passwordless, Verified Duo Push with number matching, and phishing-resistant factors like biometrics and FIDO2 security keys. Paired with deep insights into users’ devices, Duo gives you the control to adaptively limit access based on device health or user risk.
    Leader badge
    Compare vs. Dapple Security View Software
    Visit Website
  • 2
    Auth0

    Auth0

    Okta

    Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO.
    Leader badge
    Compare vs. Dapple Security View Software
    Visit Website
  • 3
    Proton Pass

    Proton Pass

    Proton AG

    Proton Pass is an open-source password manager based in Switzerland that encrypts your usernames, passwords, bank cards, and encrypted notes and lets users quickly autofill details across all devices and browsers. Proton Pass goes beyond keeping your password safe, it secures your online identity with its additional features and enables secure sharing of log-in information. Proton Pass is built by the same team of scientists who met at CERN and created Proton Mail, the world’s largest encrypted email service. Proton has been recommended by the United Nations for sharing highly sensitive data, and our encryption is open source and battle tested. Proton Pass is the first password manager built by a security company with a privacy-first philosophy. Join the millions of people who have signed up for Proton to protect their information.
    Compare vs. Dapple Security View Software
    Visit Website
  • 4
    Udentify

    Udentify

    Fraud.com

    Know the real identity of your customer, user, or employee with the Udentify Identity Verification and Biometric Authentication solution. Challenges we solve: - Identify verification - Onboarding - New account opening - Age verification - Fraud prevention - Biometric authentication - Passwordless authentication - Strong customer authentication - KBA replacement - KYC and AML compliance Behind the scenes, Udentify embeds cutting-edge technologies into our identity verification and biometric authentication solution via a lightweight and flexible SDK. We are constantly investing in our technologies to stay at the forefront of fraud detection, compliance, and user experiences.
  • 5
    Oz Liveness

    Oz Liveness

    Oz Forensics

    Oz Liveness is a leading facial recognition and authentication software used by private and public organizations across the globe to lower the risk of biometric fraud by preventing deepfake and spoofing attacks with 100% accuracy. The technology has been validated by the industry’s most rigorous testing standard, ISO 30107-3 iBeta level 1 and 2 certifications. It helps organizations validate they are dealing with a real person within seconds, lowering compliance and fraud risks. Oz Liveness features advanced algorithms able to detect many forms of biometric spoofing, including 3D and 2D masks and photos along with photos or videos displayed on a mobile or a laptop screen. On-device Liveness detection and face biometry checks allow to use of a phone as a personal biometric device. No data is sent to the server from the device and stays in the customer's hands. On-device Liveness is perfect in any customer’s use case, improving the reachability and stability of the services .
    Leader badge
    Starting Price: $2,625/year/12,500 transaction
  • 6
    Auth Armor

    Auth Armor

    Auth Armor

    Harness the power of biometrics on smartphones to make authentication easy for any application or website, creating a new approach to logging and authenticating online. Passwordless and 2-factor authentication that lets you authenticate your users with the smartphones in their pockets. Auth Armor puts secure authentication in the hands of every user — no weak passwords or cumbersome codes. We have built powerful APIs, SDKs, libraries, and dashboards to allow you to build what you want to build, how you want to build it. Use our tools to build authentication into any app, using any flow you would like. We offer Consumer facing and workforce protection, giving you the power and flexibility to secure anything, the way you need it. Auth Armor is the fastest and easiest mobile authenticator available. We support instant push messaging directly to user's devices enabling the fastest login and authentication experience.
    Starting Price: FREE for 10,000 active users!
  • 7
    Secret Double Octopus

    Secret Double Octopus

    Secret Double Octopus

    Secret Double Octopus (SDO) provides a “best-in-class” enterprise passwordless MFA solution. In addition to market-leading completeness of features, SDO’s solution is differentiated by its patented automated password rotation approach and flexibility around enabling a “passwordless journey”. Organizations that are apprehensive about the move to passwordless, can progressively achieve Full Passwordless™ by beginning with traditional MFA on desktops or for remote worker use cases and eventually “flipping the switch” when they are ready. The company recently won AITE Novarica’s highest distinction in an evaluation of all major solutions, and has been designated a Gartner Cool Vendor.
    Starting Price: $3/month/user
  • 8
    Keyless Authenticator

    Keyless Authenticator

    Keyless Technologies

    Nothing to remember. Nothing to steal. You are the key. Adopt zero-trust authentication to protect your remote workforce and enable strong customer authentication with just a look. Anywhere. Any time. Any device. Embrace passwordless, multi-factor authentication to eliminate fraud, phishing and credential reuse – all while enhancing customer and employee experiences and protecting their privacy. Unique capabilities powered by unique technology. Hardware Agnostic. Since we do not rely on the device hardware or sensors, Keyless can be deployed on a large set of devices and appliances. Drive better outcomes for your organization by eliminating passwords. Top-Notch Security. No central honeypot, no data on user devices. Data can never be stolen or lost because no private information is accessible to anyone but the user. Reduce password associated costs by going passwordless. Password Reset Costs. The average helpdesk labor cost is estimated at $70.
  • 9
    Unikname

    Unikname

    Unikname

    Prevent phishing hack attempts of your web accounts in integrating the next-gen strong authentication that secures all your web access. Protect your admin account of all your websites that you manage. Offer your clients a password-less experience of registration. Add the next-gen social authentication that respects the privacy life. Easily manage the web access rights of your employees and partners. Install the Unikname solution for all web environments you need in minutes! Easily manage your trust certificates and web access from the dashboard dedicated. Manage the access rights of admins and website users. Enable Unikname as the default authentication system. Disable standard authentication. Fine-tune the style options of the Unikname login button. Unikname relies on the latest OAuth and OpenID Connect authentication protocol standards and allows to generate a trust certificate attached to your web domain name.
    Starting Price: €150 per year
  • 10
    IdRamp

    IdRamp

    idRamp

    Turn your digital identity strategy into a business asset, not a liability. Stop spending time, money, and headcount replatforming insecure identity technology. Simplify authentication complexities with decentralized zero trust Identity from Idramp. Bring order to your identity management chaos. Accelerate delivery of services to meet the speed of business. Eliminate expensive platform upgrade projects with rapid modular deployment. Relieve the pain of bespoke integration with rapid integration that automatically interoperates with existing infrastructure. Tailor your customer experience with a modular architecture that eliminates vendor stack lock-in. Add zero trust identity with automated security policies and adaptive access controls. Control extensible ecosystems with state of the art data protection. Never trust but always verify that your applications and people are safe.
  • 11
    Nok Nok S3 Authentication
    Authentication is the "front door" to digital services. The Nok Nok™ S3 Authentication Suite (S3 Suite) provides passwordless authentication that is more convenient and user friendly than legacy authentication, and is more secure than legacy 2FA, resulting in improved user engagement and greater security. From frictionless on-boarding and progressive profiling, through easy bootstrapping of new devices and account recovery, to suspension and deprovisioning of users. Passwordless authentication support for Desktop Web, Mobile Web, Mobile Apps, Smartwatch Apps and integration for authenticating to call centers. Authentication to cloud services and - in combination with the Nok Nok IoT SDK, to IoT devices. The Nok Nok passwordless customer authentication platform delivers omnichannel, frictionless authentication to any device. The platform’s extensible architecture allows you to support third party biometric products or new authenticators and biometric modalities.
  • 12
    1Kosmos

    1Kosmos

    1Kosmos

    1Kosmos enables passwordless access for workers, customers and citizens to securely transact with digital services. By unifying identity proofing and strong authentication, the BlockID platform creates a distributed digital identity that prevents identity impersonation, account takeover and fraud while delivering frictionless user experiences. BlockID is the only NIST, FIDO2, and iBeta biometrics certified platform that performs millions of authentications daily for some of the largest banks, telecommunications and healthcare organizations in the world.
  • 13
    Mitek

    Mitek

    Mitek Systems

    Mitek Systems is a leading provider of AI-driven identity verification and fraud prevention solutions designed to secure digital interactions across industries. Their platform offers seamless integration of biometric authentication, identity verification, geolocation, and fraud detection tools to protect customers at every touchpoint. Key products include biometric liveness detection for face, voice, and documents, check fraud detection, and passwordless authentication. Mitek’s solutions help businesses reduce financial losses by preventing account takeover and synthetic identity fraud while ensuring compliance with regulatory mandates such as KYC and AML. The company’s user-friendly no-code platform accelerates deployment and boosts customer confidence with simple, secure user experiences. Trusted by over 7,900 organizations worldwide, Mitek continues to innovate in identity verification and fraud defense.
  • 14
    iCrypto

    iCrypto

    iCrypto

    Designed to be used with our entire suite of iCrypto cloud-based services, the iCrypto SDK can integrate into existing Enterprise Apps or when deployed as iCrypto App be used as a standalone one-step password-less verification solution. By employing the latest cryptography technologies in combination with device-level security and management, the iCrypto SDK is the ultimate software token that can be used as a biometric ID on the go in a wide variety of industries. iCrypto SDK provides authenticator PKI signatures, a range of cryptographic protocols such as TOTP/HOTP/OCRA/MTP, push-based authentication, on-device as well as network-based biometrics such as fingerprint, iris scan, face/voice/eyeball recognition, third-party authorization, secure storage, context collection and host of security features.
  • 15
    HYPR

    HYPR

    HYPR | The Passwordless Company

    HYPR fixes the way the world logs in. Organizations are faced with the challenge of achieving secured and seamless authentication coupled with a flawless user experience at a time when it’s more critical than ever. HYPR’s passwordless multi-factor authentication (PMFA) platform decouples authentication from the organization’s current and future identity providers and eliminates the traditional trade-off between security and user experience by providing uncompromising assurance and consumer-grade experience with true passwordless and phishing-resistant MFA. The solution is trusted by more than 60M users worldwide. With deployments taking hours rather than weeks or months, organizations decrease the risk of attack, increase positive user experience, and lower operational costs.
    Starting Price: $4.00 per user/month
  • 16
    ThumbSignIn

    ThumbSignIn

    ThumbSignIn

    Any channel, any device – we’ve got you covered. Choose from our suite of user-friendly authentication solutions, from 2FA to passwordless biometrics, to find the right authentication for your business and users. Start with 2FA and progress to more advanced technology like biometrics-based authentication to continue improving user experience and security over time. Our SaaS-based authentication service, REST APIs , mobile SDKs and UI widgets deliver a powerful combination of software components that can be used to build omni-channel authentication experiences that span mobile, web, phone, IoT, chatbots, kiosks, physical access and more. It’s time to take the security burden off of users! Our mission is to democratize access to strong authentication technology and make the digital world safer for everyone. ThumbSignIn provides cost-effective, scalable SaaS-based solutions to help companies select the best way to strengthen their existing systems with two-factor authentication (2FA).
    Starting Price: $3 per user per month
  • 17
    FortressBA

    FortressBA

    Fortress Identity

    Strengthen security and eliminate passwords with a mobile and web biometric user authentication solution. Fortress Identity is simplifying everything about secure authentication by introducing a biometric API into the equation. Implement voice authentication directly in the browser and expand to include the user’s smart phone for true multi-factor authentication. Secure account access and transaction authentication. Secure account access and transaction authentication. Strengthen security to corporate intranets and extranets. Reduce IT overhead cost for password reset. Create an omni-channel unified authentication platform. Protect access to medical records and patient data. Control door access to restricted areas and venues. Use a single API call for authentication and a single API call for enrollment. Use RESTful API to request user authentication (Voice, face, fingerprint).
  • 18
    Transmit Security

    Transmit Security

    Transmit Security

    The Future of Authentication Is Passwordless. Agile. Instant. Versatile. Eliminate passwords to deliver powerful identity experiences that delight you and all your users. Wherever, whenever. Strong and seamless customer authentication from any device or channel. Use the mobile as the authenticator. Powered by a network of trust to identify each and every user. This is instant technology and installation that gives the ultimate experience and impact. Turn complex authentication, authorization and risk policy decisions into simple journeys. Enjoy flexible policy orchestration engine for all applications and channels. Protect your workplace and workforce whether in the office or remote. No matter what location or device enjoy the benefits of risk based technology that provides impenetrable security. Go passwordless and keep your enterprise secure.
  • 19
    LastPass

    LastPass

    LastPass

    LastPass is a cloud-based password manager available on any system or device, ensuring credentials are protected, private, and always within reach. Simple to set up and effortless to use, LastPass delivers the world's most convenient password management experience for consumers and businesses of all sizes and technical requirements. Say goodbye to password fatigue by generating, sharing, accessing, and managing credentials at the click of a button, while preventing bad actors from accessing precious data and account logins. Businesses also utilize LastPass to consolidate their tech stacks or to fill access management gaps with native integrations for MS Entra, Okta, and other IdPs and IAMs. With over 100 customizable policies, flexible privileges, detailed reporting, MFA and passwordless authentication options, LastPass makes it easy for organizations with numerous logins and increasing security risks to standardize password management company wide.
    Leader badge
    Starting Price: $4 per user per month
  • 20
    LogMeOnce

    LogMeOnce

    LogMeOnce

    A formidable cyber security defense should be mindful to thwart internal and external threats. External and internal threats have one common denominator. The end user’s adherence to security, policy, and best practices. External elements exploit an unsuspecting internal user’s adherence to sound security policies to find their way in. Granted, external threats can be addressed with various mechanisms such as firewalls, but, inherently it has its roots and seeds in weak internal shortcomings. However, you can easily curb internal threats by simply establishing “automatic & enforceable” security policies, advising end-users to adhere to secure access protocols with trusted credentials. Thankfully, LogMeOnce Patented Technology offers plenty of ways to protect your team members, credentials, and agency with advanced automated authentication. LogmeOnce dashboard creates powerful and unified access to a user’s entire disparate/numerous set of applications.
    Starting Price: $3 per user per month
  • 21
    Veridium

    Veridium

    Veridium

    Veridium is the most comprehensive Integrated Identity Platform powered by AI-based Behavioral Biometrics, enabling Multi-Factor Authentication (MFA), digital ID verification, and a true enterprise-grade passwordless experience for employees and customers. Low code, agile, and flexible. Eliminating the password for customers removes the friction often associated with passwords and delivers increased security for online connections with our single step multi-factor authentication solution, while providing higher levels of identity assertion for organizations. Veridium provide an end-to-end authentication platform for all your WFH needs and any VPN solution, delivering strong, multi-factor, passwordless workforce authentication.
  • 22
    PortalGuard

    PortalGuard

    BIO-key International

    BIO-key PortalGuard IDaaS is a single, flexible cloud-based IAM platform that offers the widest range of options for multi-factor authentication, biometrics, single sign-on, and self-service password reset to support a customer’s security initiatives and deliver an optimized user experience – all at an affordable price point. For over 20 years, industries such as education, including over 200 institutions, healthcare, finance, and government have chosen PortalGuard as their preferred solution.Whether you’re looking for passwordless workflows, support for your Zero Trust architecture, or just implementing MFA for the first time, PortalGuard can easily secure access for both the workforce and customers whether they are remote or on-premises. PortalGuard’s MFA stands out above others as it is the only solution to offer Identity-Bound Biometrics that offer the highest levels of integrity, security, accuracy, availability and are easier to use than traditional authentication methods.
  • 23
    Nomidio

    Nomidio

    Nomidio

    The world's most advanced unified Identity and Authentication Service. At Nomidio we specialise in protecting identities. Using our federated identity cloud, we liberate companies from holding unnecessary PII and enable secure customer identification for loan applications, verification of customers to access account information and much more. It all starts with the Nomidio Identity Cloud, which is an incredibly secure, quantum-ready, identity vault. The ID cloud delivers multiple identity services to multiple organizations, removing the need and expensive risk to companies of propagating identity data as is the standard today. The identity data is secured using our parent company’s patented Quorum multiparty split key cryptography, meaning that anyone wanting to decrypt any one record will require the compliance of other holders of the key fragments. Nomidio IDC is a light touch, highly effective biometric identity and authorization tool, 100% SaaS and can be deployed in minutes.
    Starting Price: $3.88 per user per month
  • 24
    It'sMe

    It'sMe

    Acceptto

    Employees hate using passwords as much as you hate managing password vulnerabilities. More passwords and tokens lead to greater security risk, fatigue, and cost. It’s time to get rid of them for good. 89% of security professionals claim that a more advanced multi-factor authentication tool that provides continuous, behavioral authentication would improve their company’s security posture. Acceptto provides users with Intelligent MFA that intuitively authorizes access to applications and continues authenticating post-authorization. We prevent account takeovers, even if hackers have already acquired passwords. ItsMe™ Intelligent Multi Factor Authentication (MFA) increases your security by authorizing access attempts to a registered device in real-time, be it through a push notification or verification code (SMS, TOTP, email, and etc.). With our timed based one-time password (TOTP), security key, or biometric options, you can authenticate access even when offline.
  • 25
    cidaas

    cidaas

    WidasConcepts

    cidaas is the optimal solution for fast and secure identity management. Thanks to cidaas you create one identity per user across all your channels. cidaas is based on OAuth2.0 and OpenID Connect standards, provides strong API security and with integrated Bot Net Detection and Fraud Detection a secure journey across all your business channels. Modern Identity and Access Management goes like this. Comprehensive feature set for quick and easy integration and implementation of all use cases and systems. We take care of it so you can focus on your core business. No more worrying about maintenance or operation. Countless passwords and pins make life difficult for users and are an unsightly barrier to access on digital channels. With passwordless authentication you secure your digital applications and offer your users a unique customer experience – because the login is the first thing your users see.
  • 26
    Entrust Identity as a Service
    Cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). Secure access to apps, networks, and devices for all of your users — with cloud-based multi-factor authentication. Proximity-based login, adaptive authentication and other advanced features contribute to an optimal user experience. Happy users don’t try to circumvent security measures. Everyone wins. This is easier than anything else you’ve tried. Work-saving touches — like built-in provisioning tools and on-premises and cloud integrations — reduce the workload for IT, from deployment through everyday management. Get strong IAM to move faster into the future. Cloud-based Identity as a Service scales quickly to accommodate new users, expanding use cases, and evolving security threats.
  • 27
    Okta

    Okta

    Okta

    One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity.
  • 28
    TrU Identity Platform
    TruU Identity Platform. The most advanced and complete passwordless identity solution today. TruU utilizes specialized AI and ML algorithms to identify individuals with 99.99% accuracy. Use local phone PIN or biometrics adaptively to secure access across the enterprise, from desktops to VDI. Turn on behavioral biometrics when you are ready for maximum UX that does not sacrifice on security. TruU enables your remote workforce seamlessly through out-of-the-box VPN and VDI integration. Architected for high security throughout an employee's lifecycle, from onboarding to user self-service. Use iOS or Android phones to unlock Windows, Mac or Linux workstations, even when offline. We integrate into leading PACS to eliminate kludgy badges and transform the workplace experience. It’s estimated that 80% of data breaches start with compromised credentials, particularly passwords. It’s also true that strict password policies frustrate end users and lead to behaviors that make compromise easier.
  • 29
    Locurity

    Locurity

    Locurity

    Locurity provides patent pending 360 degree security platform using 'zero trust' security model that continuously defends this new enterprise ‘identity perimeter’. Identity is the new enterprise perimeter, protect it now. Defend against 81% of all cyber attacks. Security breaches often start with compromised identity (Verizon DBIR). Detect cyber attacks proactively. Protect before attacks turn to breaches. Secure your enterprise assets. Prevents numerous identity/credential borne attacks such as - phishing, whaling, hacking, guessing, brute forcing, scraping, social engineering, keylogging, ATO, credential stuffing etc. Decentralized architecture - no honeypot of identity crown jewels. Increase productivity while minimizing cost of login/password/access related helpdesk tickets. Email, VPN, SaaS (Office365, GSuite, Salesforce, BOX, Slack...), Healthcare/Finance apps and many more. Biometric (TouchID/FaceID), Pin/Pattern and elliptic curve cryptography based multi factor authentication.
  • 30
    authID.ai

    authID.ai

    authID.ai

    Launch the power of mobile facial biometrics to deliver seamless identity fraud protection across the digital identity lifecycle. Onboard customers with ease. Weed out the bad guys early. Ensure user accounts and transactions cannot be compromised by account takeover or identity fraud. Gain increased assurance with cloud-based biometric authentication of high-risk transactions. Eliminate passwords with FIDO2 strong authentication tied to a trusted identity. Confirm the identity of new users remotely- know they are who they say they are. Our mobile biometric solutions help you onboard customers and verify their presence with ease while ensuring their accounts cannot be compromised by account takeover or identity fraud. Learn how authID can help you transform identity management.
  • 31
    BioCatch

    BioCatch

    BioCatch

    BioCatch delivers advanced behavioral insights to provide global organizations with actionable intelligence so you can create a secure customer journey. BioCatch analyzes a user's physical and cognitive digital behaviors to generate insights that distinguish between legitimate applicants and cybercriminals. BioCatch detects behavioral anomalies indicative of human and non-human cyberthreats such as Remote Access Tools attacks, Bots, malware and manual account takeover methods. BioCatch detects subtle behavioral indicators that suggest a victim is being unwittingly guided through a fraudulent money transfer. BioCatch's Al-driven behavioral biometrics technology significantly reduces online fraud and enables online identity verification, without compromising the user experience. BioCatch's patented solution is designed to protect identities online while providing web and mobile users with a frictionless experience.
  • 32
    Say-Tec

    Say-Tec

    Finnovant

    Say-Tec is our flagship cybersecurity product, it combines state-of-the-art biometric technology with blockchain technology to ensure the safety of your data. Say-Tec eliminates the need for multiple passwords by using your unique face and voice biometrics to unlock a device, login to an account, and access your private data. Standard web interfaces could include invoking Say-Tec during account set-up, or during the log-in process, or resetting a password when it has been forgotten. Say-Tec can completely replace the user-id and password friction of logging into a website. Say-Tec has been tailored to support the world of decentralized apps, websites, and processing, which is commonly encountered with Blockchain access, cryptocurrency, and crypto wallets and exchanges.
  • 33
    AuthX

    AuthX

    AuthX

    The most advanced authentication platform in the world. Log in online anytime, anywhere with your face, finger, palm, push or any other modality we support. It’s secure authentication that is simple, smart and occasionally magical. Use Authx to on any system and into any application from anywhere. Use any capability to log in and change preferred methodology anytime you like. Authx is secure, scalable and extremely easy to use. Register once and use everywhere. Enjoy Authx with all the time-saving solutions you need to securely authenticate. Authx is always secure and reliable and our experts are here to support you 24/7. Use Authx Mobile for iOS and Android and push an authentication right to your phone. Log in with your Face, Finger or Palm. Authx Mobile enables you to authenticate with Push as well as biometrics on your phone. You can log into your applications with a simple touch of your access card or in range with BLE.
    Starting Price: $2.99 per month
  • 34
    OARO Identity
    We connect people to their identities using advanced facial recognition, simplifying processes for leading enterprise-sized businesses across all verticals. OARO IDENTITY is an end-to-end solution enabling user authentication and authorization across devices, business lines, and organizational boundaries – reducing cost and complexity while improving overall user experience and security. Identity management and the safeguarding of data are critical functions of all organizations. Traditional solutions are increasingly incapable of providing both the user experience and level of security required by today’s business environment. This trend is evidenced by the growing frequency of massive data breaches among industry leaders and the public sector. OARO IDENTITY is an end-to-end solution enabling our clients to authenticate and authorize users across devices, business lines and organizational boundaries, while reducing complexity, cost and improving user experience and security.
  • 35
    Secfense

    Secfense

    Secfense

    Protect your company, employees, and customers with simpler and stronger authentication. Deploy 2FA in minutes, not weeks. 2FA (and other user access security policies) built into the fabric of the infrastructure, not rigidly fixed to the applications. Enabling the use of any 2FA methods available on the market now and in the future without changing the core. Protection is available across the entire organization, spanning from on-premise, public and private cloud. Secfense is deployed in between your users and the applications they access. It learns the traffic patterns related to authentication. It can then enforce multi-factor authentication login and other sensitive actions without interfering with the applications existing code or database. Up-to-date 2FA methods are always available on the platform. Application changes don’t affect Secfense and applied methods. Take control over session expiration rules across all apps. Don’t rely on VPNs, base trust on users and their devices.
  • 36
    Hive.id

    Hive.id

    Hive.id

    Separate fake signups from real users, stop fraudulent accounts and protect your good users from account takeover. Free trials are great, but don’t let bad actors waste your time or money. Align risk with your business objectives and keep fraudsters and bots from signing up and damaging your brand and bottom line. Detect suspicious access on user accounts in real-time without manual overhead. Easily automate alerts, step-up authentication and account recovery process, appropriate to the specific level of risk. Detect email addresses that look undeliverable, or just plain fake. Add different signals, and you've identified most low quality signups. Your user experience is still great, but now it aligns with your business objectives and risk tolerance. Companies of all sizes face the question of whether to build or buy a security solution. Hive gives you a cost effective option with a faster time to market.
  • 37
    Veriff

    Veriff

    Veriff

    Veriff is the preferred identity verification and authentication platform partner for the world's most innovative growth-driven organizations, including online marketplaces, financial services, gaming and mobility companies, and other sectors. By combining AI and human verification teams, Veriff ensures bad actors are kept at bay, and genuine users experience minimal friction in their customer journey. Veriff enables organizations to build customer trust through seamless, AI-powered identity verification and authentication. The Veriff IDV platform offers secure, scalable solutions trusted by organizations across industries. Veriff’s identity verification platform comes with a 98% check automation rate, a six-second average decision time, more than 12,000 identity documents in our document database, and a first-class UX that allows 95% of users to be verified on the first try.
    Starting Price: $49/month
  • 38
    VU Security

    VU Security

    VU Security

    We are a cybersecurity company specialized in fraud prevention and identity protection. Our mission is to provide secure digital experiences without friction, both for citizens and businesses, during the digital transformation process. We use different technologies applied for people recognition, based on their physiological or behavioral characteristics. Once the data has been captured, the system extracts a unique pattern for each individual, which will be used to make comparisons in the future. Transactional analysis of user behavior and channels for fraud detection and prevention. Secure, fast-response exchange of sensitive data through references to a vault of encrypted data. We provide a multi-channel fraud prevention solution that uses machine learning to create intelligent profiles and detect potentially fraudulent operations based on user behavior.
  • 39
    Wink

    Wink

    Wink

    Wink enables any institution to offer simpler and superior identity and payment experiences through biometrics. The Wink platform brings facial and voice recognition-based multi-factor authentication and payments that can eliminate passwords, SMS/OTP, usernames, card numbers, and other older technologies that are memory or device-based. Integrate the Wink streaming checkout plug-in to eliminate fraud with our unique face- and voice-based user recognition. Dramatically improve conversions and eliminate cart abandonments as consumers simply smile to check out. Make long checkout forms and forgotten passwords a thing of the past. The industry’s first multi-factor biometric authentication combines the convenience and security of face-id type experience enhanced by strong digital voice printing. Our unique and patented one-way anonymous encryption technology ensures full privacy protection as the unique Wink ID represents the user’s face and voice data as a 3D model.
    Starting Price: $499 per month
  • 40
    Centagate Cloud

    Centagate Cloud

    Centagate Cloud

    CENTAGATE CLOUD offers a centralized login option that protects all applications from security breaches by using FIDO2 passwordless authentication. Control, protect and secure your application access. One login credential for all applications. A system that has strong digital security which eliminates phishing, fraud and password theft. Since the authentication is centralized, only one login credential is needed for all applications. Highly cost-effective with zero CAPEX and minimal OPEX. Some of important features that makes your authentications with CENTAGATE CLOUD more secured and protected. An authentication that requires two or more factor like what you have (device), what you are (biometrics) and what you know (password). An authentication based on previous login’s risk and behavior. Evaluating these risk could stop any trials of security breach. Pre-integrated certified Securemetric FIDO2 server for registration and authentication.
    Starting Price: $2 per month
  • 41
    BioSig-ID

    BioSig-ID

    Biometric Signature ID

    BSI's BioSig-ID offers a seamless biometric authentication solution accessible on any device—be it a computer, tablet, or mobile phone—using a finger, stylus, or mouse for input. This patented technology enables secure file and information access through multi-factor authentication (MFA) within a single product, fully compatible with HTML5. It eliminates the need for hardware or software downloads and verifies users with a simple four-character password. Unlike traditional biometrics, this solution prioritizes privacy, adhering to privacy laws and sidestepping common concerns. Additionally, it provides real-time alerts for potential data crimes, ensuring proactive security.
  • 42
    Phonexia Voice Verify
    Shorten the time necessary for clients to authenticate over the phone by 30+ seconds and reduce costs significantly. Secure access to your clients’ data conveniently with voice biometrics and detect fraud attempts natively. Verify clients in 3 seconds based on their voice and offer them an immersive, passwordless authentication experience. Offer your customers a seamless, secure, and passwordless authentication experience by identifying them based on voice biometrics instead of hard-to-remember passwords. Phonexia Voice Verify leverages Phonexia Deep Embeddings™ Speaker Identification technology powered by artificial intelligence to provide extremely fast and accurate speaker verification. Phonexia Voice Verify is a cutting-edge voice verification solution designed specifically for contact centers to enhance them with an intuitive security layer.
  • 43
    Quicklaunch

    Quicklaunch

    Quicklaunch

    QuickLaunch is the #1 leader in Identity and Access Management (IAM) for Higher Education. More than 500 organizations trust QuickLaunch’s platform to manage over 2,000,000 identities and integrate over 3,000 applications worldwide. CIOs, CTOs, and CISOs use QuickLaunch IAM technologies to engage with students, faculty, and staff and protect them throughout their journey. QuickLaunch’s technology is vital in protecting the user experience, driving both operational efficiencies and higher productivity for colleges, universities, and institutions. Improves cyber security posture by protecting user accounts from being hacked and thwarting ransomware and phishing cyber attacks. Automatically provisions students from the Student Information System and employees from the Human Resources system so they can quickly get access to the apps they need when they matriculate and join.
    Starting Price: $0.73 per month
  • 44
    SentryPoint Security Suite
    Biometrics-based security, such as fingerprint authentication, is proven to be both more secure and convenient than passwords, making fingerprint sensing an increasingly common, and product-differentiating, feature in smartphones, tablets and PCs. However, fingerprint authentication also raises security concerns that can best be addressed with protections purpose-built for biometrics. Synaptics helps ensure biometric data protection through the SentryPoint Security Suite of features and architectures that accommodate the full range of market needs. This one-way conversion of biometric data into a proprietary template format prevents recreation, reverse-engineering or use for unintended purposes, thereby protecting the user from identity theft. All biometric data is encrypted and digitally signed using strong 256-bit Advanced Encryption Standard and Transport Layer Security technologies to prevent eavesdropping, tampering or fraud.
  • 45
    Blink Identity

    Blink Identity

    Blink Identity

    From front of house to back of house, the right people get right in. The wrong people stay out. Eliminating scalping. Reducing risk. And keeping lines moving. With decades of experience developing identity systems for enterprises in high-risk environments, Blink Identity’s biometric matching system utilizes military-grade technology to reliably identify people at full walking speed in any lighting condition. For individuals, Blink Identity eliminates the worst part of attending an event or concert: waiting in lines. Patrons get to their event faster and easier. Food and merchandise can be purchased with a glance. Customized communications open an array of options for venues to enhance customer experience. And, ticket scalping becomes a thing of the past. For companies, Blink Identity integrates with standard frameworks and workflows, handling everything from implementation and enrollment to privacy compliance.
  • 46
    BlueFletch

    BlueFletch

    BlueFletch

    Advanced enterprise-grade security tools for employee Android devices. BlueFletch's Enterprise Mobile Security (EMS) software helps organizations secure, support, and manage their enterprise mobile Android devices. Our Atlanta-based team of software engineers, project managers, UX designers, business analysts, and QA helps clients move fast and solve business problems through the use of mobile technology. We’ve learned a thing or two over the past 10+ years in enterprise mobility, successfully creating and deploying solutions for some of the world’s top companies. From concept to delivery, we know the best practices and constraints of custom app development and legacy migrations. We’ve even built products to fill the gaps where other management tools fall apart. We are reliable, responsive, agile, and can help execute against your roadmap faster and more cost effectively. Our team is here to help solve your unique mobility challenges and empower your workforce.
    Starting Price: $17 per device
  • 47
    VoiceMe

    VoiceMe

    VoiceMe

    In an always more contactless world, arises the necessity of a new model of digital trust. VoiceMe enables people, companies, and objects to interact with each other through a simple interface and in an ultra-secured way opening the door to a new generation of services. Access restricted physical areas guaranteeing users' identity. Sign with legal validation documents and contracts. Our algorithms pre-identify the user based on behaviors, using also biometric parameters obtained from the upper face and voice. All customer-related data remains exclusively at the user's disposal, offering maximum privacy and respect for GDPR regulation. Each data set is encrypted, divided in pieces, and spread on a network of nodes, making it impossible for an external unauthorized source to extract. At each authorized data usage the inverse process is done to recompose the data set. API or SDK for third-party allows easy integration in already existing systems.
  • 48
    FaiSentry
    FaiSentry includes a cluster-based architecture that provides effective scalability, robustness, and future-proofing, along with the option of hosting on-premise or in a data center. Going beyond passwordless login, FaiSentry enables efficient and frictionless identification of multiple individuals from a single image, with results returned within a fraction of a second. Our facial biometric engine combines enterprise-grade security and ease of use, creating the optimal business and client experience. In contrast to other face authentication products on the market, Aculab, combined with AI-driven technology, has created a solution impervious to race and gender biases. A single camera can monitor key entry and exit points, with FaiSentry identifying multiple individuals simultaneously from each image.
  • 49
    ValidSoft

    ValidSoft

    ValidSoft

    Pretty much anything we do online now requires passwords and security questions. It’s a part of life, really. Keeping track of all this information is frustrating. All of it is meant to protect us, ensuring we are the only ones who can access our accounts and data. Granted we are always hearing news of breaches that circumvent our passwords, but we want fast, easy-to-use login authentication that delivers a better end-user experience and saves on operational costs. We believe voice is the leading authentication factor that will improve your lives. You deliver a simple, quick, secure, password-free login experience for your customers. You significantly reduce password management costs. You achieve compliance with biometric privacy laws. A real-time comparison of an individual’s voice to their unique voiceprint validates the claimed identity. Make sure people are who they say they are. Use one model across many channels for true omnichannel excellence.
  • 50
    Facia

    Facia

    Facia.ai

    Founded in 2022, Facia specializes in biometric authentication and facial recognition technology. We leverage advanced AI and ML algorithms to deliver secure solutions for businesses. Our 3D liveness detection technology offers rapid responses in under a second, achieving a 0% False Acceptance Rate (FAR) with an FRR below 1% to prevent unauthorized access. Our services include 1:1 Photo ID Verification, 1:N Face Search, and Age Verification. We offer customizable API and SDK integration options for seamless compatibility. Our system provides real-time 3D face verification, ensuring speed and precision without compromising security. We protect against print and mask-based spoofing. Facia is dedicated to advancing biometric authentication, providing secure identity verification solutions for businesses.