Alternatives to Intrinsic ID
Compare Intrinsic ID alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Intrinsic ID in 2026. Compare features, ratings, user reviews, pricing, and more from Intrinsic ID competitors and alternatives in order to make an informed decision for your business.
-
1
Runecast
Runecast Solutions
Runecast is an enterprise CNAPP platform that saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It automates vulnerability assessment, configuration drift management and continuous compliance – for VMware, Cloud and Containers. By proactively using our agentless scanning in real-time admins discover potential risks and remediation solutions before any issues can develop into a major outage. It provides continuous audits against vendor best practices, common security standards, and frameworks such as BSI IT-Grundschutz, CIS, Cyber Essentials, DISA STIG, DORA, Essential 8, GDPR, HIPAA, ISO 27001, KVKK, NIST, PCI DSS, TISAX, VMware Security Hardening Guidelines, and the CISA KEVs catalog. Detect and assess risks and be fully compliant across your hybrid cloud in minutes. Runecast has been recognized with Frost & Sullivan's 2023 European New Product Innovation Award in the CNAPP industry. -
2
Omnissa Horizon 8
Omnissa
Elevate the digital workspace experience with the efficient and secure delivery of virtual desktops and apps from on-premises to the cloud. Horizon 8 is a modern platform for secure delivery of virtual desktops and apps across the hybrid cloud, from the market leader in software-defined data center and digital workspaces. By leveraging unique integration with trusted technology, Horizon 8 helps IT efficiently deploy and scale virtual desktops and apps from a single control plane with rapid provisioning, automation, and simplified management to extend the best digital workspace experience to end users. Efficiently manage desktops and apps across private, hybrid and multi-cloud infrastructure using a cloud-based console and SaaS management services. Leverage intrinsic security built into Horizon infrastructure to gain highly secure remote access to corporate resources - providing protection from the device to the data center to the cloud. -
3
Intrinsic CTMS
Intrinsic Clinical Systems
Intrinsic’s clinical trial management system (Intrinsic’s CTMS®) has been designed with the end user in mind - minimizing data entry and focusing on proactive study management. Cloud-based, with a streamlined interface, the ability to manage studies at any level, and a task-based design, Intrinsic ushers in a new era of trial management tools. Intrinsic® is the world’s first CTMS built with native integration with all Microsoft applications, including Outlook, Excel, SharePoint, and Power BI. With Dynamic Worksheets, users can quickly import bulk data and study updates from CROs (using the CRO clinical trial management software), without the need to integrate systems, as well as create ‘live’ exports for ad-hoc analysis and reporting. Intrinsic CTMS® also leverages Power BI, a cloud-based reporting tool, which enables users to report on data from other clinical systems, such as EDC and IRT, with having to build costly data warehouses. -
4
motivationWorks
Immersyve
Remote work means intrinsic motivation is essential for your workforce. Our motivationWorks software deepens intrinsic motivation, resilience, and engagement for all your employees, no matter where they are, and trains every team to thrive even when at a distance. motivationWorks software trains, coaches, and sustains everyone’s intrinsic motivation, with direct support for every leader, manager, and employee. Get precision metrics from each employee on the experiences that both build and destroy intrinsic motivation, all based on the world's leading motivational science. Our platform shows you where motivation and engagement issues impact performance and well-being, and generates targeted recommendations about what to do next. Everyone, from employees to managers to executives, receives focused feedback and practical recommendations to build intrinsic motivation and resilience. -
5
OD-Map Organizational Effectiveness Survey
OD-Tools.com
Most organizations and managers understand the importance of motivation and retention. The challenge is implementing an effective strategy. MQ and the "Golden Key to Employee Motivation" program provide data and specific answers to managers and organizations with unparalleled levels of detail. MQ provides accurate needs and satisfaction profiles on an individual or group level. In learning and development applications, MQ supports individuals in increasing their self-awareness and intrinsic motivation at work. MQ reports are easy to use and to understand; there is no need for any previous training. MQ builds on well-known models such as Maslow's Hierarchy of Needs, and the concepts of Extrinsic and Intrinsic Motivation. The system also provides unique functions for proactively retaining key employees. It has a built-in Competency Library, and you can add customized competencies. -
6
processWare
processWareDSS
Combining intrinsic features of ERP (enterprise resource planning) and CRM (customer relationship management) solutions, processWare provides a “holistic” approach to formulation, production and related planning, quality assurance, supply-chain, sales-cycle management, and critical regulatory compliance for these “essential” businesses. -
7
Intrinsic
Decoy Technologies
Craft your own policies beyond standard abuse categories and enforce them in just minutes. Intrinsic is a platform for building AI agents for user trust. We hook directly into your existing workflows, and gradually help enhance human review with automation safely and seamlessly. Automate moderation of text, images, videos and reports with a system that gets better with every moderation action. Manage review queues and escalations easily with fine-grained RBAC permissions. Make data-driven decisions based on policy performance reports and platform-wide health monitoring. Access advanced security, AI-powered analytics, and comprehensive information governance. -
8
Attuned
Attuned
Attuned is the only employee engagement tool based on only what matters most to each person, not standardized suppositions. Attuned will help you retain the talent you need to thrive in this scarce market by measuring each person’s intrinsic motivators individually (via a 15 minute assessment). What you get is not only immediately actionable data on candidates and/or employees, but also team culture analyses that point out potential blind spots in management style, real-time employee engagement data and feedback. The tool measures your management’s engagement process over time. Attuned really is employee engagement made personal. Attuned shows you in data what used to take months (or years) of experience to understand: intrinsic motivation. Tap into what means most to them to make on boarding a breeze. Knowing what your team members need to have to be fulfilled on an individual basis shows you where to put your management efforts to make work meaningful.Starting Price: $99 per user per year -
9
Haptik
Haptik
Haptik is one of the world’s largest Conversational AI companies, having reached over 100 million devices, and processed over 2 billion conversations to date. The company’s intelligent virtual assistant solutions enable Fortune 500 brands globally to enhance customer experience while saving costs and increasing sales. Haptik has been the recipient of several industry accolades, including the Frost & Sullivan Award for Conversational AI Company of the Year 2018, and recognition as one of the Top 25 AI Companies in the World 2018 by AI Time Journal. Haptik’s leading clients and partners include Samsung, Oyo Rooms, KFC, Coca-Cola, Tata Group, Club Mahindra, Zurich Insurance among others. Haptik is a part of the Reliance group of companies, who acquired a majority stake in the company in a $100 million deal in April 2019. -
10
Hacker Rangers
Hacker Rangers Security Awareness
Its purpose is to lead the employees of an organization to adopt "cybersecure" habits through intrinsic motivation. Our passwords are essential to protecting all the different online services we use: from bank accounts to streaming and delivery apps. As the number of our online accounts and services increases, we tend to use the same password for several websites, in the hopes of making things easier to remember. And it is precisely this practice that makes the credential stuffing scam possible, and so dangerous. -
11
ID R&D
ID R&D
Frictionless biometric authentication and liveness detection. ID R&D uses the power of AI and the science of biometrics to transform the user experience. Surprisingly effortless. Significantly more secure. ID R&D combines extensive research in the science of biometrics with advances in AI to deliver award-winning voice, face, and behavioral biometric authentication software. We’re on a mission to make authentication simultaneously frictionless and significantly more secure. ID R&D technology works with digital and traditional interaction channels, IoT devices, embedded hardware and more. Text dependent and text independent voice verification software null. Accurately detect fraud attempts that use recording, synthesized or converted voice null. The world’s first entirely passive facial liveness detection software – iBeta tested, ISO 30107-3. Continuous verification of web and mobile users through keystroke detection and more. -
12
iProov
iProov
We authenticate remote users online for onboarding and verification using Genuine Presence Assurance. Organizations using iProov’s biometric authentication for onboarding or authenticating are realizing significant benefits. Clean bill of health from US Government Penetration Review. Unique active threat management system for certified resilience. Independent of platform, format or device. iProov is the world leader in Genuine Presence Assurance. Banks, governments, travel and healthcare providers around the world are using our unique patented technology to verify the online identity of customers and citizens more securely and more effortlessly than ever before. GDPR compliant & eIDAS certified. Credentials not stored on devices. Deployed by the world’s most security conscious organizations. Deployed on five continents. Delivering millions of authentications worldwide. -
13
FirstParty
FirstParty
FirstParty is a data monetization platform that helps companies assess, organize, and deploy their first-party data assets. It employs a proven quantitative methodology, combining full technical documentation of current data, a proprietary 16-point quality assessment, and commercial market-opportunity analysis, to reveal intrinsic value and pinpoint use cases. Its transformation engine ingests and cleanses vast volumes of unstructured transactions, structuring and staging data at near-instant speeds to turn billions of messy records into actionable assets. For deployment, FirstParty provides modules for internal utilization, enabling data-driven decision-making and operational efficiency through customer, product, and process insights, and external monetization, anonymizing, and packaging data products to expand addressable markets and drive new revenue streams. -
14
3Speak
3Speak
3Speak is a place where content creators directly own their onsite assets and their communities. Using blockchain technology, the ownership of these assets and communities are intrinsic to the creator and the user, not 3Speak. They are therefore transferable to other apps that use blockchain technology. This means that if we do not serve the community and creators in the best possible way, they can take the assets they have generated and move them to another app. The result is that 3Speak is censorship resistant, cannot take your assets away or delete your communities. By using the platform, users get rewarded in Hive tokens and can receive donations in our proprietary Speak token. The more of these tokens you hold, the more privileges you have in the eco system. Additionally, the more tokens you hold, the more say you have over the governance of the platform and where it goes in future.Starting Price: Free -
15
Imperative
Imperative Group
Imperative combines AI technology and behavioral science to manage, scale and measure peer coaching programs that address the needs for social connection and learning in the new world of work. Building the networks that are scientifically-proven to drive retention and advancement for diverse employees. Creating the strong bonds between people of all identities to embrace diversity in your culture. Cultivating a growth mindset anchored in purpose and intrinsic motivation. Enabling people to explore different internal career paths and build allies across functions. Developing coaching coaching skills through direct practice. Quickly connecting new people’s purpose to the organization’s and empowering them to own it. Preventing burnout by creating the consistent, positive, and vulnerable relationships people need.Starting Price: $9 per user per month -
16
Dune Security
Dune Security
Dune Security is replacing legacy phishing simulations and security awareness training tools with a unified, automated User Adaptive Risk Management platform. It delivers User Adaptive Testing, Training, and Security to reduce administrative burden and mitigate risk. Unlike one-size-fits-all SAT models, Dune tailors security measures to each individual using intrinsic data (role, tenure), behavioral insights (red team testing), and analytics from a broad range of integrations (IDAM, EDR, DLP). Dune leverages the industry's most comprehensive risk scoring system to holistically assess individual risk, enabling automated, targeted remediation for high-risk users while allowing low-risk users to stay productive. This data-driven approach enhances security efficacy, streamlines operations, and strengthens overall organizational resilience. -
17
Joint Integrity
MODS
Accountable Joint integrity, Flange management software, is critical for leak-free start-up, efficient production, process safety and major hazard avoidance. Operators are under pressure to improve containment, so when it comes to adhering to stringent regulatory requirements, Joint integrity is a top priority. High volumes of data generated surrounding Joint integrity, present several important issues involving control, validation, issuing, tracking, and indexing. Current systems used, such as spreadsheet-based solutions, are time-consuming and prone to error. MODS Joint Integrity and Testing is a Cloud-based Joint integrity software, that uses QR codes and intrinsically safe handheld devices to control the processes associated with Joint management and Pipe systems testing. It has been designed to enable users to interact directly with the database and track each joint online. -
18
Mind Foundry
Mind Foundry
Mind Foundry is an artificial intelligence company operating at the intersection of research, innovation, and usability to empower teams with AI that is built for humans. Founded by world-leading academics, Mind Foundry develops AI solutions that help organisations in the public and private sectors tackle high-stakes problems, focusing on human outcomes and the long-term impact of AI interventions. Our intrinsically collaborative platform powers AI design, testing and deployment and enables stakeholders to manage their AI investment responsibly with key focus on performance, efficiency and ethical impact. Built on a cornerstone of scientific principles and an understanding that you can’t add things like ethics and transparency after the fact. The fusion of experience design and quantitative methods that makes collaboration between humans and AI more intuitive, efficient and powerful. -
19
Moonshot
Buy Moonshots
Moonshot is a mobile application designed to simplify the discovery, purchase, and sale of memecoins. It enables users to convert cash into these digital assets within minutes, offering convenient deposit options through credit and debit cards, as well as straightforward bank transfer withdrawals. The app provides real-time updates on trending memecoins, allowing users to monitor their holdings and share gains with friends. Prioritizing user control and security, Moonshot features Face ID sign-in and functions as a self-custodial wallet, ensuring that only users have access to their funds. Additionally, users can export their wallet keys at any time. It's important to note that Moonshot is not an exchange and does not offer investment advice; memecoins are intended solely for entertainment purposes and lack intrinsic utility or value.Starting Price: Free -
20
MiniValuator
MiniValuator
MiniValuator is a stock valuation tool that helps individual investors and financial analysts estimate the intrinsic value of stocks using Discounted Cash Flow (DCF) and Price-to-Earnings (PE) ratio methodologies. Users can run valuations on US-listed stocks, adjust key assumptions like growth rate and discount rate, and instantly see sensitivity analysis via interactive heatmaps. The platform provides pre-filled financial data from real market sources, a built-in DCF/PE calculator, margin of safety estimates, and sector-level comparison pages. It offers both free credits and subscription plans.Starting Price: $4.99/100 credits -
21
Itesoft
Itesoft
Automation of business processes is an approach that is rooted in many organizations, its implementation is often based on processes with high intrinsic value. The accelerating evolution of practices and markets means that it is now essential to organize operations and internal processes (quality monitoring, HR recruitment, production management) to meet demand and increase responsiveness, or risk being overtaken by competitors. ITESOFT products have been proven time and time again. They are used in various sectors, with no one sector prevailing over the others. As soon as there are workflows orchestrated between several participants, phases to be processed by automated systems or humans or sensitive data to manage connected to existing software packages (ERP, CRM, HRIS, GED, etc.), our technology provides key assets. ITESOFT has set up a wide range of recognized solutions in the area of managing employee arrivals and departures, calculating profit sharing, etc. -
22
Deepen
Deepen
Deepen AI offers advanced multi-sensor data labeling and calibration tools and services to accelerate computer vision training for autonomous vehicles, robotics, and more. Their annotation suite supports various key cases, including 2D and 3D bounding boxes, semantic and instance segmentation, polylines, and key points. The platform is AI-powered, featuring pre-labeling capabilities that can automatically label up to 80 common classes, improving productivity by seven times. It also includes machine learning-assisted segmentation, allowing users to segment objects with just a few clicks, and accurate object detection and tracking across frames to avoid duplicate efforts and save time. Deepen AI's calibration suite supports all key sensor types, such as LiDAR, camera, radar, IMU, and vehicle sensors. The tools enable seamless visualization and inspection of multi-sensor data integrity, and calculation of intrinsic and extrinsic calibration parameters in seconds. -
23
Kodo People
Kodo People
Kodo People is an innovative and disruptive platform to revolutionize the way organizations understand and manage their talent. Cutting-edge technology to reduce dramatically the time you invest in screening candidates. Build more efficient, human, inclusive, diverse, and agile teams. Find candidates with the right behaviors at the right time. Your attrition rates will go down. Kodo People is a cutting-edge talent management SaaS that assesses people's intrinsic behavior using behavioral economics techniques. It's the first touchpoint between candidates and the company. Assess their adaptability, uncertainty management, and job interest before any resume or skills evaluation. Assess the candidates' behavioral style during the process. Trial period. Time to build social relationships in the workplace. Assessing new employees' social preferences is crucial to guarantee onboarding success. Join Kodo People and increase exponentially your productivity.Starting Price: $40 per month -
24
NEON Wallet
NEON
An open-source cross-platform light wallet for the NEO blockchain available on Windows, Mac OS, and Linux. Neo is an open-source, community-driven platform that is leveraging the intrinsic advantages of blockchain technology to realize the optimized digital world of the future. Create a wallet, encrypt a private key, login with Ledger, private key, encrypted private key or a stored account. Import/export wallet accounts (NEP6 Standard). View balance, view prices for GAS and NEO in multiple currencies, send GAS, NEO and any NEP5 token. Claim GAS, send to multiple recipients, address book, switch networks (Test/Main), nep9 QR support. Participate in NEO token sales and view wallet activity. Translation support for Arabic, Chinese, French, German, Italian, Korean, Portuguese, Russian, Turkish and Vietnamese. -
25
Tint
Tint
We help brands embed insurance and assurance into their platform. The key to profitable embedded solutions with high conversion rates is making insurance a feature of your platform - not a standalone product. We’re skilled at delivering off the shelf and bespoke embedded insurance and assurance solutions. We partner with capacity providers, insurers, and more to deliver on our promise of white-labeled, relevant coverage for intrinsic risks. We offer infrastructure to support a wide range of embedded programs and provide expert guidance - helping companies build efficient, compliant and profitable programs. White-labeled embedded protection doesn’t replace the insurance you already have. They're an added layer that improve your customer experience while making you money. -
26
TRON
TRON Foundation
DAppChain is TRON's sidechain project. The goal is to help DApps to operate on TRON with lower energy consumption, faster speed and enhanced safety, providing unlimited capacity for TRON's main network. High throughput is achieved by improving the TPS in TRON, which has surpassed Bitcoin and Ethereum, to a daily-use practical degree. Applications are given a wider variety of ways to be deployed in TRON because of its scalability and highly effective smart contract. It can support enormous numbers of users. More reliable network structure, user asset, intrinsic value and a higher degree of decentralization consensus come with an improved rewards distribution mechanism. A decentralized trading platform under Poloniex, formerly known as TRON's largest decentralized trading platform TRXMarket, and for long ranked among Top 5 in TRON's DApp ecosystem in terms of trading volume. -
27
Beatport
Beatport
Through this commitment, our goal is to constantly drive innovation and inspiration, helping to lead and define the progression of dance music culture. Today, Beatport remains the recognized industry leader for the DJ community with a global footprint of over 36M unique users, 465K DJ customers, 11M curated tracks supplied from 75K label partnerships. As an innovative leader in our industry, we recognize the intrinsic value diversity adds; not only to our business but to society and the DJ community we serve. Beyond the dance floors, we’re committed to building an inclusive and equitable workplace that embraces diversity and values individuality among our employees, artists, and partners. We are a passionate collective of music professionals and technologists combining our talents to support and grow the communities we serve. At our core, we are a family focused on creating authentic relationships with our audience and the artists and labels represented across our platform. -
28
Benefitsolver
Businessolver
We deliver benefits administration solutions and services you and your employees need for today and tomorrow, transforming the annual enrollment experience into a year-round personalized journey. Businessolver® delivers market-changing benefits technology supported by an intrinsic and unwavering responsiveness to your needs, now and down the road. We help you take care of your employees and help them get the most value from their benefits, holistically managing their health and wealth. Our technology and service model is designed to deliver a personalized benefits journey, no matter what, where, or when your members need support. Nothing is more important in benefits enrollment software than having timely and accurate data management built into your online benefits administration platform. Our online benefits enrollment and administration platform, Benefitsolver®, delivers today and is ready for tomorrow. -
29
Formula Stocks
Formula Stocks
A hallmark of successful investing is achieving higher returns without equally higher risk. Benjamin Graham pioneered the concept of a margin of safety, around which our technology is developed. While risk can never be eliminated, we look for wonderful companies trading for considerably less than they are worth, thus minimizing the risks inherent in stock investing. Another approach is quantitative investing, where you invest in a "basket" of stocks, say 40 stocks, which sports certain winning traits. These traits are derived from more than 200 quantitative and qualitative factors, computed for each stock. Called the AI-score, a number between -100 and 100, indicating attractiveness. Joe can help you earn a better return on your capital. He is happy when he can invest in a wonderful business with good growth prospects, a great business model, purchased at a price well below its intrinsic value.Starting Price: $49 per month -
30
Curtain e-locker
Coworkshop Solutions
Nowadays, many industries are facing many intrinsic and extrinsic data security challenges. Some people are already in the market for certain solutions, while their mechanisms for protecting sensitive and confidential info. are not exactly practical and to say nothing of cost-efficiency. For example, scanning, which is utilized by renowned solutions, oftentimes causes false alarms. And the bigger question is yet, patterns are set based on what standards? And we certainly don’t have the critical artificial intelligence to perfect those solutions. That’s why the Curtain e-locker is more suitable for reaching a wider audience. For the specific challenges that some major sectors of our economy are facing, please refer to this. If you want us to demonstrate Curtain blocker's functions and usages for you, please do not hesitate to contact us, we can arrange associates to come to your domain for it, or we can arrange a webinar if you are far away from us. -
31
Classcraft
HMH
Classcraft motivates learners to reach their potential through sustainable, playful learning experiences that promote growth and human connection. With Classcraft’s approach to tiered intervention, educators can improve student behavior by fostering intrinsic motivation, ensuring their implementation maintains consistency, and providing targeted support to at-risk students. Students immediately feel motivated and engaged, with opportunities to collaborate on teams, develop custom avatars they relate to, all while sharing and getting feedback from their peers and teachers. Behavioral management has never been easier with intuitive features to quickly set up clear expectations and reward positive behavior. With access to high-fidelity early intervention data, administrators can see how students are really doing schoolwide and identify those who need the most support, while teachers can track and manage how each student is progressing in their classrooms.Starting Price: $120 per year -
32
Pay Compliment
Pay Compliment
A modern and agile Employee Experience Platform to turn everyday observations into better performance with feedback, goals, appraisals and micro-learning. Developed in conjunction with Neroscience and Psychology experts, Pay Compliment uses intrinsic motivation techniques to support workers in doing their best work every day. 9 modes of connection help managers and their teams to overcome resistance to quality conversations that would lead to high performance or head off engagement and inclusion issues before they develop into worker withdrawal, absenteeism, attrition or wellness problems. Use our 4A framework and templates or configure your own to fit company culture. Use our curated learning and add your own specific learning content to support real-time growth of your team. Enjoy the actionable insights that our comprehensive dashboard and reporting features offer, all in a pay-as-you-go cloud solution that is simple to implement and use.Starting Price: $4.00/month/user -
33
Azure Service Fabric
Microsoft
Focus on building applications and business logic, and let Azure solve the hard distributed systems problems such as reliability, scalability, management, and latency. Service Fabric is an open source project and it powers core Azure infrastructure as well as other Microsoft services such as Skype for Business, Intune, Azure Event Hubs, Azure Data Factory, Azure Cosmos DB, Azure SQL Database, Dynamics 365, and Cortana. Designed to deliver highly available and durable services at cloud-scale, Azure Service Fabric intrinsically understands the available infrastructure and resource needs of applications, enabling automatic scale, rolling upgrades, and self-healing from faults when they occur. Focus on building features that add business value to your application, without the overhead of designing and writing additional code to deal with issues of reliability, scalability, management, or latency in the underlying infrastructure.Starting Price: $0.17 per month -
34
TC2000
TC2000 Software & Brokerage
The condition wizard is the heart & soul of TC2000. If you can think it, you can build a condition for any indicator step-by-step. Formula writing is not necessary, but certainly available. "Flex" conditions unfold over time making a whole new world of possibilities. Historical and streaming bid/ask data means you always know what the market is doing, even when no contracts are trading. Plot intrinsic value, time value and more. Once you see these charts, you'll never go back to anything else. Whether you are changing symbols, sorting a list or plotting an intraday custom indicator, the speed from your fingertips to action is instant. Place multiple exit strategies without worrying about going short. Track which limit orders are closest to executing. We could have built just another trading platform. Instead we innovated time-saving concepts to keep you efficient and focused.Starting Price: $8.32 per month -
35
IoTeX
IoTeX
IoTeX is the fastest, most secure, and most scalable blockchain platform on the market. IoTeX currently leads the world’s premier industry consortiums and standards bodies. The IoTeX platform hosts an ever-growing ecosystem of projects and products that have been developed by members of the IoTeX community. The IoTeX blockchain already powers real devices, including award-winning blockchain-powered cameras from Consumer Electronic Show (CES) and the pebble geo device, perfect for supply chain optimization in any industry. -
36
ASPEC SF
SalesWays
How does your sales team decide which opportunity to work on? And when they do, are they right? ASPEC does the grueling research and planning for them, constantly analyzing every opportunity in the Salesforce list so they don’t have to. ASPEC places an accurate intrinsic value on each one and updates it as the sales cycle progresses. It uses that value and the ASPEC computer model of the opportunity to set a priority, and then organizes the entire list so what’s most important is on top, every day, every time. ASPEC for Salesforce focuses your sales team on one goal – increasing your sales. The patented computer modeling and intelligent analysis of your opportunities uses a graphical and interactive interface to guide you along the way so nothing gets forgotten. The Expert function takes you by the hand and dives deeper into the opportunity, questioning everything to be sure you’ve got it right and are on-track to win. -
37
Everykey Echo
Everykey
Everykey Echo is security software that enables touch-free multi-factor authentication across devices. The Bluetooth-enabled software integrates with identity providers to enable passwordless login, replacing SMS codes, email codes, and hardware keys. It uses FIDO passkey technology for instant, secure access on desktop and mobile. Designed to reduce login time and account lockouts, Everykey can be quickly deployed to secure remote and in-office workforces.Starting Price: $1.99 per user -
38
Keyless Authenticator
Keyless Technologies
Nothing to remember. Nothing to steal. You are the key. Adopt zero-trust authentication to protect your remote workforce and enable strong customer authentication with just a look. Anywhere. Any time. Any device. Embrace passwordless, multi-factor authentication to eliminate fraud, phishing and credential reuse – all while enhancing customer and employee experiences and protecting their privacy. Unique capabilities powered by unique technology. Hardware Agnostic. Since we do not rely on the device hardware or sensors, Keyless can be deployed on a large set of devices and appliances. Drive better outcomes for your organization by eliminating passwords. Top-Notch Security. No central honeypot, no data on user devices. Data can never be stolen or lost because no private information is accessible to anyone but the user. Reduce password associated costs by going passwordless. Password Reset Costs. The average helpdesk labor cost is estimated at $70. -
39
swIDch
swIDch
swIDch’s OTAC technology combines elements of the three most common authentication systems, user ID/passwords, RSA hardware/ software for generating authentication codes, and tokenization. Based on the world’s first 1-way dynamic authentication technology, OTAC sets a new standard for authentication in cyber security beyond the limitations of existing authentication methods. swIDch is an authentication technology expert to help every person and every organization have secure access to the information they want in communication networks through an easy and secure identity authentication process. Our authentication technology guarantees trustworthy access anywhere in the world, regardless of network connection. We prove that authentication is not a difficult technology, but a secure transport that leads to the desired information. swIDch helps to remove CNP frauds in the most secure and cost-effective way. -
40
C21
C21 Systems
C21 Systems delivers the perfect platform to Operate, Analyse and Improve upon all aspects of your operation. Whether you need Current, 'Live' Production Analysis or the latest in Maintenance & Engineering Software, C21 has it all plus much, much more. The key principles behind our great systems is our Strong User Focus. The intrinsic efficiency created from ease-of-use is what really makes C21 work in such a highly productive and seamless manner Our Management Software Suite is modular and scalable so you only pay for the features you choose. C21 is also mostly Cloud-Based, making your system very easy and fast to install and with very few of your existing IT resources being affected. Locally installed systems are also available if preferred. Our fully Live system with analytical tracking helps keep your stock at optimum levels without overstocking. Find and issue items easily whilst in-situ via our Apps. -
41
L7 Defense
L7 Defense
L7 Defense helps organizations protect their infrastructure, applications, customers, employees, and partners against the growing risk of API-borne attacks. APIs have become critical for data sharing and applications integration - as well as an attractive path for malicious attacks that expose organizations to new, continuously evolving threats. With a team of experienced leaders and innovators, L7 Defense revolutionizes the way organizations protect their APIs from attacks and exposure using disruptive, AI-based technology. Ammune(TM). L7 Defense’s core technology, received in 2020 a Product Leadership Award by Frost & Sullivan, thanks to its novel unsupervised learning AI-based approach regarding applicative protection at the API resolution. Cloud frontend with legacy (on premise) backend tiers through APIs exposes financial institutions to cybersecurity risk. -
42
NCP
NCP engineering
For individual workstations, freelancers or smaller installations, NCP Entry Clients offer a wide range of technical features and offer much more than a standard VPN. Our Solution Finder will help you find the right NCP product for your organization. No matter what hardware you use, whether you are looking for a solution for use in your own company or as a partner for your customers, for a few employees or large installations, we will guide you to the right product in just a few steps. With 30 years of experience in remote access environments, NCP is an excellent choice for a complete VPN solution that meets the needs of users, IT administrators and management. NCP’s remote access solutions are fully-automated, highly secure and cost efficient covering important benefits. -
43
uqudo
uqudo
uqudo is MEA's leading digital identity platform, delivering end-to-end verification that safeguards every customer touchpoint. Our award-winning suite seamlessly integrates white-label KYC, KYB, AML Screening, Transaction Monitoring, and Biometric Authentication to embed trust into digital interactions. We empower enterprises and scaleups to accelerate digital transformation, slash operational costs, deliver frictionless user experiences, ensure regulatory compliance, and eliminate fraud. With proven expertise spanning Banking, Telecommunications, Fintech, Trading, and national identity programs, uqudo processes millions of verifications annually across the region. -
44
Fortifyedge IoT Platform
Fortifyedge
Cyber Physical security through Sensor Fusion & Analytics. Situational awareness of your critical infrastructure. Fortifyedge provides improved situational awareness of your critical infrastructure such as fixed and remote assets from perimeter monitoring, waste management, utility usage and protection. Utilizing sensor fusion and analytics from across your ecosystem. Employing our IoT edge computing, tiny machine learning to detect anomalies wherever your assets reside. Fortifyedge is a USAF AFWERX SBIR Awardee, USAF TechStars Accelerator Alumni Company and Multi Award winner for Cyber and Physical security for defense, critical infrastructure and NIST, Behavioral Authentication for first responders. Protecting your critical infrastructure Fortifyedge IoT Platform. Improved situational awareness of responding personnel for incident awareness and analysis. Positive identification at entry control points and then track individual personnel in the secure zone -
45
LoginRadius
LoginRadius
LoginRadius empowers businesses to deliver a delightful customer experience without compromising security. Using our customer identity platform, companies can offer a streamlined login process while protecting digital accounts and complying with data privacy regulations. LoginRadius serves over 3,000 businesses with a monthly reach of 700 million users worldwide. Key platform features include registration services, adaptive security, integration with third-party applications, and customer insights. The company has been named an industry leader in customer identity and access management (CIAM) by Gartner, KuppingerCole, and Computer Weekly. Microsoft is a major technology partner and investor. LoginRadius is headquartered in Vancouver, Canada, with additional offices in Toronto, USA, United Kingdom, Australia, and India. LoginRadius Services: API Authentication OAuth Data Management Secure Login Single Sign On SAML SSO Social Sign On Two Factor Authentication -
46
CyberStrong
CyberSaint Security
CISOs of the Fortune 500 rely on CyberSaint's CyberStrong platform to achieve real-time cyber and IT risk management and continuous compliance from assessment to Boardroom. CyberStrong uses risk quantification, intuitive workflows, and executive reports to build cyber resilience through measurement and improved communication. Patented AI and ML automation eliminate manual effort, saving enterprises millions annually. The platform aligns cyber and business risk for faster, informed decision-making. Enterprises use CyberStrong as a competitive differentiator, mitigating even the most unprecedented risks while automating assessments across frameworks. CyberSaint is a Gartner Cool Vendor for Cyber & IT Risk Management, is named in Gartner's Security Operations, Cyber & IT Risk Management, and Legal & Compliance Hype Cycles, and won numerous awards including 2021 CRN Emerging Vendor, 2021 Cybersecurity Excellence Gold Winner, and 2021 Cyber Defense Magazine Global InfoSec Awards Winner -
47
BioSig-ID
Biometric Signature ID
BSI's BioSig-ID offers a seamless biometric authentication solution accessible on any device—be it a computer, tablet, or mobile phone—using a finger, stylus, or mouse for input. This patented technology enables secure file and information access through multi-factor authentication (MFA) within a single product, fully compatible with HTML5. It eliminates the need for hardware or software downloads and verifies users with a simple four-character password. Unlike traditional biometrics, this solution prioritizes privacy, adhering to privacy laws and sidestepping common concerns. Additionally, it provides real-time alerts for potential data crimes, ensuring proactive security. -
48
OneSpan Authentication Servers
OneSpan
Secure access and transactions by deploying multi factor authentication and transaction signing capabilities at mass scale. Leverage proven authentication server and API technologies to secure access and transactions and streamline identity management. Use strong authentication to secure access to corporate resources and banking applications. Enable highly secure transaction signing with user friendly Cronto® technology. Simplify authentication lifecycle management via a single integrated system. Easily support new standards in application and network access security for most major operating systems and platforms. Ensure business continuity – eliminate server downtime and service disruptions. Deploy server solutions regardless of operating system or architecture. OneSpan server solutions validate authentication requests to offer secure and seamless access to a variety of corporate resources and applications. -
49
ThumbSignIn
ThumbSignIn
Any channel, any device – we’ve got you covered. Choose from our suite of user-friendly authentication solutions, from 2FA to passwordless biometrics, to find the right authentication for your business and users. Start with 2FA and progress to more advanced technology like biometrics-based authentication to continue improving user experience and security over time. Our SaaS-based authentication service, REST APIs , mobile SDKs and UI widgets deliver a powerful combination of software components that can be used to build omni-channel authentication experiences that span mobile, web, phone, IoT, chatbots, kiosks, physical access and more. It’s time to take the security burden off of users! Our mission is to democratize access to strong authentication technology and make the digital world safer for everyone. ThumbSignIn provides cost-effective, scalable SaaS-based solutions to help companies select the best way to strengthen their existing systems with two-factor authentication (2FA).Starting Price: $3 per user per month -
50
ActivID
HID Global
A versatile, flexible and highly scalable platform for securing access to government and corporate systems and online consumer services. Multi-factor authentication for securing employee remote access to corporate VPNs and other enterprise resources. Multi-factor authentication for securing employee remote access to corporate VPNs and other enterprise resources. Rapidly build and deliver authentication solutions for trusted identity and compliance. Smart card solution for strong authentication to protect workstations, mobile devices and networks. Solution for issuing and managing PIV and PIV-I cards, enterprise access cards and mobile credentials. HID PIV IDMS performs identity proofing, while securely issuing credentials - even to remote users. Leverage service bureau card issuance efficiently and securely.