Alternatives to Keevo

Compare Keevo alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Keevo in 2026. Compare features, ratings, user reviews, pricing, and more from Keevo competitors and alternatives in order to make an informed decision for your business.

  • 1
    Tangem

    Tangem

    Tangem

    Tangem is redefining the wallet experience by delivering top-level security, simplicity and accessibility. Enjoy complete autonomy and independence while managing your assets with a single tap. Tangem Wallet breaks down barriers for crypto newcomers and enhances the custodial experience for advanced users. During the activation process, the card’s embedded chip generates a random private key, ensuring that the wallet cannot be compromised. A Tangem Wallet set can contain up to three Tangem cards. You get three equal cards to one wallet, just like having three identical keys to your room door. The chip in the card generates a random private key that never gets exposed. The cards establish a secure connection with each other and transfer your encrypted private keys.
    Starting Price: $54.90
  • 2
    Knomi

    Knomi

    Aware

    Biometrics and multi-factor authentication have emerged as the gold standard when confirming identity. Aware identity verification and management solutions are Bringing Biometrics to Life™ in a variety of environments, from law enforcement and healthcare to financial services and on-site enterprise security. Aware biometrics solutions can capture a range of biometric factors—everything from fingerprints and retina scans to voice and full facial recognition. And the Aware modular architecture makes the system easy to configure for virtually any biometric identity management application. This is the present and the future of identity verification. The Knomi framework provides secure and convenient facial and speaker recognition for mobile, multifactor authentication. From small, customized solutions to large-scale enterprise implementations, Aware’s ABIS offerings are aligned to virtually any customer need.
  • 3
    Symantec VIP
    Your key to one swipe two-step authentication. Two-factor authentication is easy to enable and prevents attacks. With just a swipe of a finger, or use of a security code, your information is secure. Your favorite websites offer secured authentication compatible with VIP. To begin, scan a QR code and security codes will be generated for that website every thirty seconds. With Symantec VIP both enterprise and end users can securely authenticate wherever and however they are accessing the services. With hundreds of supported websites and integrations that you can easily set up yourself, multi-factor authentication is a snap.
  • 4
    Deepnet DualShield

    Deepnet DualShield

    Deepnet Security

    If you are looking for an enterprise grade 2-factor authentication (2FA) or multi-factor authentication (MFA) product that can secure all commonly used business applications and also provides a wide range of authentication methods, then you are in the right place. Deepnet DualShield is a multi-factor authentication system that unifies a variety of authentication methods, protocols, solutions and user experience in a single platform. In addition to the MFA functions, DualShield also provides self-service Password Reset, Single Sign-On (SSO), Identity & Access Management (IAM) and Adaptive Authentication. It is one of the most powerful and flexible multi-factor authentication system in the world. Deepnet DualShield can be installed on premises or hosted in a private cloud, which means that you will have the total control of your own user authentication system, and that you will be able to keep your users’ identities and credentials in a safe place.
  • 5
    Armory

    Armory

    Armory

    Armory Secure Wallet the only open-source wallet with cold storage and multi-signature support. Armory makes Bitcoin security best practices accessible to everyone through its unique interface. And most importantly, it’s available for free. Armory was created with developers in mind. Armory is a great base for building Bitcoin apps like exchanges and crowdfunding platforms. Need help managing large Bitcoin balances? We are experts at helping exchanges, trusts, hedge funds, and other large holders of Bitcoin. Armory is the most secure and full featured solution available for users and institutions to generate and store Bitcoin private keys. This means users never have to trust the Armory team and can use it with the Glacier Protocol. Satoshi would be proud! Users are empowered with multiple encrypted Bitcoin wallets and permanent one-time ‘paper backups’. Armory pioneered cold storage and distributed multi-signature.
  • 6
    COLDCARD

    COLDCARD

    Coinkite

    Physical Security. Your seed words are stored in a specialized chip, designed to securely store secrets. All code is open source, and you can compile it yourself. Only hardware wallet with option to never be connected to a computer, for full operation: from seed generation, to transaction signing. Uses PSBT (BIP174) natively! Full-sized numeric keypad makes entering PIN easy and quick. Simple packaging, plain design, no fancy boxes, no redundant cables. Bright, 128x64 pixel OLED screen. Shows all the critical details of your transactions. Real crypto security chip. Your private key is stored in a dedicated security chip, not the main micro's flash. Lovingly soldered in Toronto, Canada. Secure supply chain verified with: tamper-evident numbered bag, with bag number recorded into device. MicroSD card slot for backup and data storage. This allows truly offline signing, by transferring the unsigned/signed transactions on sneakernet.
  • 7
    TRUESigner ONE

    TRUESigner ONE

    Truecopy Credentials

    TrueSigner One by Truecopy is a comprehensive digital signing solution designed to help businesses go completely paperless. It supports a variety of legal signature types, including electronic, Aadhaar-based, HSM, and DSC token signatures, ensuring compliance with global standards such as the IT Act 2000, UETA, ESIGN, and eIDAS. With customizable workflows, multi-signature options, and seamless integration with ERP/CRM systems, TrueSigner One streamlines document signing processes. The platform also features enhanced security with multi-factor authentication, real-time tracking, and a comprehensive audit trail, making it ideal for businesses looking to improve efficiency and security in their document management.
  • 8
    Blockstream Green
    A multi-platform, feature-rich Bitcoin and Liquid wallet. Blockstream Green is our industry-leading Bitcoin wallet, providing Bitcoin users with an unrivaled blend of security and ease-of-use. Blockstream Green is the bitcoin wallet the industry has been waiting for - sending and receiving bitcoin on the go has never been this smooth. Other wallets on the market offer a choice between convenience, security, and control. With Blockstream Green, you get all three. Our innovative multisignature model uses dual private keys - one held by the user, and one by our servers. This allows us to enforce Two-Factor Authentication to protect your funds, while timelock smart contracts guarantee that users always retain full control of their coins. Full integration with Ledger and Trezor devices gets you the best of both worlds: cold storage of your private keys along with Green’s full suite of features and multisignature security. Currently available for Android; coming soon for iOS.
  • 9
    LATOKEN

    LATOKEN

    LATOKEN

    Attend an online panel with investors focused on your industry and introduce your business idea to them. Get the best feedback you can wish for and contacts that may turn into investors for your own company. All private keys for our wallets are encrypted with AES-256 and are stored offline. Passwords in our database are encrypted using Salted SHA-256. 99.5% of our users' funds are kept in a cold storage with multi-signature technology. All data from website is transmitted using encrypted Transport Layer Security (TLS) connections (i.e., HTTPS). Advanced distributed system architecture built to protect against DDoS to ensure that trading cannot be halted by outside attacks. Two-Factor Authentication (2FA) is required for actions such as withdrawals or changes in account settings.
    Starting Price: 0.02% Fee
  • 10
    V-Key Smart Authenticator
    Sign up for the V-Key Smart Authenticator today and get a one-month free trial. Businesses, like relationships, are built on trust. Are your employees working remotely? Do you have a large number of users who need to access your app or system? With organizations moving towards multi-factor authentication (MFA), a simple password is just not enough. Unfortunately, SMS OTPs have been proven insecure, being vulnerable to interception and phishing attacks. Hardware tokens are expensive to deploy, can get lost or stolen, are not user-friendly, and require regular replacement. The V-Key authenticator provides strong and flexible, yet less expensive multi-factor authentication using a mobile authenticator that is ideal for small and medium-sized businesses. The V-Key Smart Authenticator supports many enterprise apps, systems and VPNs. Enterprise-grade multi-factor authentication in 3 easy steps.
    Starting Price: Free
  • 11
    Arculus

    Arculus

    Arculus

    You need a safe, intuitive way to store and manage your crypto on the go. With Arculus' air-gapped cryptocurrency hardware wallet, your private keys sit securely in your pocket, completely inaccessible to anyone but you. Is your crypto as secure as possible? Arculus is a cold storage hardware wallet protected by 3-factor authentication: our security relies on something you are, something you know, and something you have to keep your digital assets safe. With superior security capabilities, the Arculus Wallet™ App is only accessible on your mobile device with your unique biometrics, keeping your crypto safe. Input your private 6-digit PIN when prompted by the Arculus Wallet™ App for the second step in the authentication process. Tap the card to the back of your smartphone to complete the 3-factor authentication process. Now you can securely buy, swap, send, and receive cryptocurrency with Arculus.
    Starting Price: $99 one-time payment
  • 12
    GreenAddress

    GreenAddress

    GreenAddress

    The safer Bitcoin wallet that puts you in control. Protect your bitcoins with both your key and ours, set spending limits, rate limit transactions and always be the only one in control. You can easily login in 'watch-only mode' via custom login without compromising security or privacy. We don't make you choose between security and convenience. And we don't compromise your privacy. Our per-transaction two factor authentication, multi-signature and deterministic wallet allow you unprecedented control over your transactions. And, we never store your private keys, not even encrypted. At the same time we make it trivial to view and transfer your funds. Take control of your future now, at GreenAddress. Safely check your balance and transactions from public Wi-Fi, Starbucks and on the go. With our unique watch-only mode you can quickly check your balance or receive funds without full access to your wallet.
  • 13
    LoginID

    LoginID

    LoginID

    With just a few lines of code, LoginID enables websites and apps to integrate FIDO/FIDO2 certified multi-factor authentication via our easy to use SDKs and APIs. Our platform leverages the biometrics on the end user's device to create a private key, public key pair that allows for seamless strong customer authentication. No app installation is required and the private key is stored securely on the end user's device, never leaving. Additionally, LoginID offers Transaction Confirmation, where a transaction can be cryptographically signed providing proof of the user’s confirmation of that specific transaction, which is perfect for merchants who want payment authentication services. LoginID is aligned with PSD2, GDPR, CCPA, and HIPAA. We have SDKs for iOS, Android, React-Native, Web, Python, Java, and Node as well as a WordPress Plugin.
    Starting Price: Free
  • 14
    Approw

    Approw

    Approw

    Approw is an easy-to-implement, adaptable authentication and authorization platform, built for the cloud, but compatible with many on-premises applications. Approw focus on identity and build a social infrastructure for identity sharing across all SaaS software and users to help companies build a secure modern IT infrastructure that not only protects their business, but also redefines the user experience. Multi-factor Authentication (MFA) is a simple and effective security approach that goes beyond usernames and passwords to Add a layer of security. For example, U-Shield for banks and off-site login require SMS verification. Empower Approw applications to quickly enable multi-factor authentication (MFA), and immediately improve application authentication and access security levels. Compared with traditional multi-factor authentication, "adaptive" multi-factor authentication can choose to apply different MFA methods according to the current security situation.
    Starting Price: $19 per month
  • 15
    EnSecure

    EnSecure

    Enqura

    Strong multi-factor customer authentication designed for secure first time log-in, transaction signing, document verification protecting digital channels against fraud. Digital Identity, created by using multi-factor authentication is crucial for enhancing user experience, guaranteeing the protection of your customers’ assets, and adhering to regulatory requirements. EnSecure offers the ideal solution for end users’ authentication needs across many industries, with two versions based on Soft OTP and Electronic Certificate.
  • 16
    UnifyID

    UnifyID

    UnifyID

    Use UnifyID's authentication platform to remove passwords and one-time passcodes (OTP) from your user experience while improving security and consumer convenience. UnifyID offers Multi-Factor Authentication services that combine deterministic, behavioral biometric and environmental attributes using machine learning to uniquely identify users. Applies advanced machine learning to behavioral biometrics and environmental factors to create a secure digital fingerprint of the user. Passive authentication eliminates painful user experiences, causing poor adoption for Multi-Factor Authentication programs. Say goodbye to annoying passcodes, security questions or even passwords altogether. Our patent-pending technology leverages dynamic user attributes, such as motion and environment, which are neither known by the user nor remotely observable by an attacker; eliminating phishing and bot threats. We designed our solution with developers in mind.
  • 17
    1fs Wealth
    1fs Wealth is an AI‑driven, cloud-native wealth intelligence platform that lets high‑net‑worth individuals and family offices consolidate all assets, including public and private investments, real estate, collectibles, and digital assets, into a single view. It offers secure access with multi‑factor authentication, granular role-based permissions, and enterprise-grade encryption. It provides real-time valuations and market feeds, proprietary risk decomposition tools, concentration metrics, and geolocation tracking. It supports comprehensive succession planning by allocating assets, documents, and ownership guidance to next‑gen beneficiaries. Advanced collaboration features allow advisors, family members, and external professionals to work jointly, with drill-down analytics, peer benchmarking, carbon and ESG insights. Integrations include API connectivity, Plaid-based account aggregation, and hedge‑fund benchmarking via Albourne indices.
    Starting Price: Free
  • 18
    Veridium

    Veridium

    Veridium

    Veridium is the most comprehensive Integrated Identity Platform powered by AI-based Behavioral Biometrics, enabling Multi-Factor Authentication (MFA), digital ID verification, and a true enterprise-grade passwordless experience for employees and customers. Low code, agile, and flexible. Eliminating the password for customers removes the friction often associated with passwords and delivers increased security for online connections with our single step multi-factor authentication solution, while providing higher levels of identity assertion for organizations. Veridium provide an end-to-end authentication platform for all your WFH needs and any VPN solution, delivering strong, multi-factor, passwordless workforce authentication.
  • 19
    ecxx.com

    ecxx.com

    ecxx.com

    X509 SSL HTTPS certificate and 2 factor authentication with IP binding features enables ease of minds. Multi-signature wallet automatically backs up assets with withdrawal limit imposition. Bespoke matching engine built from ground up. Rigorously and constantly load tested to ensure high availability and throughput, your orders will be matched in our order books soonest possible, reducing latency issues. Quick deposits made possible by 24/7 transaction monitoring engine. Processing of withdrawals will be initiated as soon as possible. All your digital asset on ecxx.com will be 100% reserved and won't be used anywhere else. Your withdrawals will be 100% processed in time. ecxx is global. Join the conversation in any of our worldwide communities.
  • 20
    Solar Wallet
    Solar is a free and open source wallet app for Stellar. It is created by SatoshiPay with the explicit goal of making a business-friendly wallet which emphasizes speed, a smooth user experience (UX), and security. Stellar wallet featuring multi-signature accounts, asset management, and more. Enable multi-signature authorization for enterprise-grade security in just a few clicks. Create and protect an account in seconds. Solar is bringing smooth UX to Stellar. The code is published under the GPL license so anybody can audit. Fast and user-friendly, enterprise-grade security, 100% free & open source, multi-signature accounts and transactions, asset/token management. Decentralized Exchange (DEX) integration (trade interface), and non-custodial key storage (your secret key is stored on your device only). Solar is a non-custodial wallet. That means your secret key is never disclosed to anyone, not even to us.
  • 21
    Ledger Stax
    Powered by the Secure Element chip and Ledger’s proprietary OS, battle-tested for years by security experts. You'll be able to access, manage, and retrieve your crypto as long as your Secret Recovery Phrase is safe and accessible only to you. Simply get another Ledger Stax or any other Ledger and recover access to your accounts using the Secret Recovery phrase. Software wallets store private keys on systems or devices that are connected to the internet, making them susceptible to all kinds of attacks. Holding your crypto on an exchange means entrusting the private keys to a third party and not having any control over your funds. Ledger Stax stores your private keys offline on a Secure Element chip, and provides full isolation between the keys and your computer/smartphone to give you complete control over your assets.
  • 22
    Symantec Advanced Authentication
    Mitigate threats and stimulate growth with Advanced Authentication solutions from Symantec. Get real-time protection for your online and mobile applications. Our leading-edge solution can authenticate an employee, partner or contractor while providing a frictionless login experience. This ensures that legitimate users have anytime, anywhere access from any device, which builds trust and brand loyalty. Get a flexible, scalable solution with both strong multi-factor authentication and risk-based methods like device identification, geolocation and user activity. Catastrophic cyber attacks are happening every day. We make sure you’re prepared to defend your business. Earn customer trust and loyalty by providing the simple, seamless experience they’re looking for. With the right data, you can more easily distinguish between legitimate and fraudulent behavior.
  • 23
    Trusted Family

    Trusted Family

    Trusted Family

    Trusted Family is a secure, cloud‑native “family operating system” designed specifically for family businesses and family offices to centralize governance, collaboration, and communication. It offers modular “Spaces” for dedicated project or committee collaboration, private vaults with end‑to‑end encryption and role‑based permissions for secure document sharing, a visual family tree to capture legacy and lineage, and integrated tools for newsfeeds, surveys, events, calendars, and newsletters. It includes smart workflows, such as signature requests, automated reminders, and task assignments, along with real‑time activity insights and analytics. Multi‑factor authentication, SOC 2/SOC 3-ready encryption, GDPR compliance, virus/malware screening, daily backups, and private key architecture ensure top-tier security.
    Starting Price: Free
  • 24
    Triv

    Triv

    Triv

    Triv Exchange is a versatile cryptocurrency trading platform designed to provide users with a seamless and secure experience in the digital asset market. Known for its intuitive interface, Triv caters to both beginners and experienced traders, offering tools for spot trading, market analysis, and portfolio management. The platform supports a diverse range of cryptocurrencies, enabling users to access major coins like Bitcoin and Ethereum, as well as emerging altcoins. Triv emphasizes security through advanced encryption, multi-signature wallets, and two-factor authentication (2FA), ensuring the safety of users' funds and personal data.
  • 25
    imKey

    imKey

    imKey

    imKey is a hardware wallet used to protect the private key and other confidential data. It integrates with CC EAL 6+ secure chip and supports digital assets supported by imToken 2.0, such as BTC, ETH, COSMOS ,EOS and ERC 20 tokens. imKey Pro for every special you, secure, reliable and Easy-to-use. Audit by multiple professional audit agency, TRNG based on security chip and strong protection of private key. Improved production process, integration with festival elements and improved package. One-click upgrade support. Cross-platform exclusive client. Own your hardware wallet and never be hacked. imKey is a specialized digital asset hardware wallet. It now supports all type of digital assets supported by imToken 2.0, such as BTC, ETH, EOS and Cosmos. More types of digital assets will be supported in the future through upgrades. As to security management, imKey integrates the security chip CC EAL 6 +, which meets bank-grade security requirements.
  • 26
    Censornet MFA

    Censornet MFA

    Censornet

    Secure access to a wide range of systems, services and applications using an adaptive, cloud-based multi-factor authentication solution. Protect user accounts with more than just a password and reduce the impact of password reuse when the next large scale data breach happens. 100% cloud-based back end, simplifies implementation and accelerates time to value for organisations of all sizes. Adaptive multi-factor authentication delivers a friction-less user experience, intelligently challenging users only when risk is high. Out-of-the-box support for a wide range of systems, services and applications including all major VPN vendors and cloud applications. Passwords are not enough. Multi-Factor Authentication adds an additional layer of protection to user and privileged accounts, eliminating account compromise and identity related threats. Some OTPs sent by legacy solutions are susceptible to interception and vulnerable to phishing and MITM attacks.
  • 27
    E-Lock

    E-Lock

    E-Lock

    E-Lock offers legally compliant, easy to use digital and electronic signature solutions. E-Lock solutions comprise of desktop, server and web-based signing solutions. Our solutions can seamlessly integrate with any new or existing applications to enable signing and encryption of documents. It has now entered into Authentication space with it's adaptive multi-factor authentication solution AdaptAuth.
  • 28
    OptimalMFA

    OptimalMFA

    Optimal IdM

    The OptimalCloud’s multi-factor authorization and authentication configuration is flexible, which allows you to offer adaptive multi-factor authentication (MFA) based on your own specified business rules. OptimalMFA includes Time-based One-Time Password (TOTP), Short Message Service (SMS), Email and Optimal Push Authentication (OPA). Each can be used as a stand-alone option or in conjunction with a complete Identity Access and Management (IAM) program. OptimalMFA is part of the Optimal IdM OptimalCloud solution. The OptimalCloud offers delegated administration and workflow capabilities that can be customized to meet the specific needs of its clients. The OptimalCloud offers a private, secure and dedicated cloud which is essential for meeting corporate security and compliance restrictions. Further to that, The OptimalCloud’s built-in cloud reporting and analytics system provides real time historical audit record of all activity.
    Starting Price: $2 per user per month
  • 29
    FortiTrust Identity
    FortiTrust Identity is a cloud-based subscription that simplifies identity and access management across enterprise hybrid environments. FortiTrust Identity (FTI) is cloud-based and natively integrated with the Fortinet Security Fabric to deliver a rich set of security controls and centralized management of user authentications, including multi-factor authentication. FTI enables you to begin your zero-trust journey with reliable user verification and strong authentication, plus ease of use for the end user. Adaptive, multi-factor, or passwordless authentication and identity federation for SSO across the enterprise hybrid environment are all included via user-based licensing. Ensure the right people get appropriate access to your data, resources, and applications across the enterprise. Increase certainty of user identity with the verification of another factor and adaptive authentication technique.
  • 30
    Powertech Multi-Factor Authentication
    The latest version of the Payment Card Industry Data Security Standard requires multi-factor authentication (MFA) for all administrator access into the cardholder data environment (CDE), even from within a trusted network. MFA also simplifies compliance with mandates concerned with data privacy, like HIPAA and GDPR. Powertech Multi-Factor Authentication allows you to implement MFA across your environment, including systems like IBM i. Robust auditing and reporting capabilities make it easy to prove compliance. Passwords alone aren’t enough for modern threats. Today’s attackers are adept at stealing login credentials, and 50 percent of users reuse passwords. With more employees working and logging into networks remotely, what organization can tolerate this level of risk? Powertech Multi-Factor Authentication adds an additional layer of security on top of your existing access protection controls, drastically reducing the amount of damage compromised passwords can cause.
  • 31
    Tungsten SignDoc

    Tungsten SignDoc

    Tungsten Automation

    Simplify and expedite processes by replacing wet-ink signing with e-signatures. Integrate electronic signature software into existing systems while gaining insight from in-depth transaction reporting and monitoring. Give customers the communication channels of their choice to e-sign on any device—anytime, anywhere. Decrease manual processes and paper-related costs by switching to electronic signatures. Redirect resources by automating manual tasks within signing and agreement workflows. Accelerate contract completion and approval times with multiple scenarios for e-signing, including e-forms at the point of sale. Experience faster, easier signing ceremonies—whether the customer is in a store, branch, in the field or online. Mitigate fraud risk with multi-factor authentication, digital certificates and signature biometrics.Deploy an out-of-the-box workflow solution to integrate signing orchestration. Execute remote or in-person signing ceremonies, even in offline mode.
  • 32
    FortiToken

    FortiToken

    Fortinet

    ForiTokens help deliver strong and flexible multi-factor authentication. FortiToken helps prevent breaches that occur due to compromised user accounts and passwords by increasing the certainty of the identity of users attempting to access resources. To achieve multi-factor authentication (MFA), FortiToken integrates with FortiAuthenticator and FortiGate Next-Generation Firewalls and is part of the Fortinet Identity and Access Management (IAM) solution. FortiToken allows organizations to deploy a variety of token methods including one-time passwords, SMS tokens, and adaptive authentication. For even greater security, FortiToken lets you provide passwordless authentication for users based on FIDO and FIDO2 specifications.
  • 33
    AuthControl Sentry

    AuthControl Sentry

    Swivel Secure

    Deployed in over 54 countries and implemented across enterprises including finance, government, healthcare, education, and manufacturing, AuthControl Sentry® provides organisations with true multi-factor authentication (MFA). It delivers an intelligent solution to prevent unauthorised access to applications and data. AuthControl Sentry® has the flexibility to support a range of architectural requirements and the ability to ensure maximum adoption, thanks to its variety of authentication factors. Patented PINsafe® technology for ultimate security. Supports on-premise and cloud for changeable architecture. A single tenancy and single-tiered cloud solution ensures optimised customization. Risk-based authentication and single sign-on as standard. Integrates seamlessly with hundreds of applications. Ensures maximum adoption with an extensive range of authenticators.
  • 34
    ActivID

    ActivID

    HID Global

    A versatile, flexible and highly scalable platform for securing access to government and corporate systems and online consumer services. Multi-factor authentication for securing employee remote access to corporate VPNs and other enterprise resources. Multi-factor authentication for securing employee remote access to corporate VPNs and other enterprise resources. Rapidly build and deliver authentication solutions for trusted identity and compliance. Smart card solution for strong authentication to protect workstations, mobile devices and networks. Solution for issuing and managing PIV and PIV-I cards, enterprise access cards and mobile credentials. HID PIV IDMS performs identity proofing, while securely issuing credentials - even to remote users. Leverage service bureau card issuance efficiently and securely.
  • 35
    Tokenize

    Tokenize

    Tokenize

    Tokenize is a team that aspires to build the next generation digital currency exchange that supports established and emerging digital currencies. Navigate through our platform easily. Your trading experience just got better with tokenize exchange's easy & simple to use platform. Trusted platform with intuitive UI/UX allowing users to get in touch with cryptocurrencies with fiat conveniently. Get access to established & emerging cryptocurrencies with our platform. Tokenize Exchange supports fiat-crypto pairings, crypto-crypto pairings & ICO (IEO). IP whitelisting & 2-factor authentication available for extra security. Hybrid wallet mechanism & multi-signature strategy to guarantee asset safety. Users are able to explore & discuss on established & emerging block-chain innovation in our token store online. Workshop will be conducted offline as well to educate newcomers.
  • 36
    LiveEnsure

    LiveEnsure

    LiveEnsure

    LiveEnsure® security authenticates users in real time via their smart device. It goes beyond tokens, certs, PINs, OTPs, push or passwords. LiveEnsure® is strong, seamless multi-factor verification of devices, location, knowledge, time, biometrics and behavior in context with an elegant user experience and individual privacy. Instead of crafting home-grown solutions or relying on vendors who infiltrate your identity stack, LiveEnsure® is simple trust API that gives you the power to verify your users across multiple factors with a single call. Developers can offer their users strong but private authentication by simply mashing up a few lines of code with their site or embed our mobile libraries for iOS and Android in your own app. Get rid of traditional passwords, 2FA and captcha altogether with a single API. There are no confusing tokens, certs or push messages. Just a simple call, present and poll API to our cloud authentication service.
  • 37
    V2verify

    V2verify

    V2verify

    V2verify provides next-generation authentication technology that replaces passwords with secure, user-friendly voice-based multi-factor authentication. Using patented voice biometric technology, V2verify verifies identity through a user’s unique vocal characteristics, along with additional behavioral, device, knowledge, and liveness factors — creating a seamless and AI-resilient 5-Factor Authentication (5FA) process. Built for enterprise, financial, and government environments, V2verify’s authentication platform delivers unmatched security without sacrificing user experience. The solution easily integrates with existing systems and applications to support everything from passwordless logins and remote access to high-value transaction approvals and secure facility entry.
  • 38
    Keyless Authenticator

    Keyless Authenticator

    Keyless Technologies

    Nothing to remember. Nothing to steal. You are the key. Adopt zero-trust authentication to protect your remote workforce and enable strong customer authentication with just a look. Anywhere. Any time. Any device. Embrace passwordless, multi-factor authentication to eliminate fraud, phishing and credential reuse – all while enhancing customer and employee experiences and protecting their privacy. Unique capabilities powered by unique technology. Hardware Agnostic. Since we do not rely on the device hardware or sensors, Keyless can be deployed on a large set of devices and appliances. Drive better outcomes for your organization by eliminating passwords. Top-Notch Security. No central honeypot, no data on user devices. Data can never be stolen or lost because no private information is accessible to anyone but the user. Reduce password associated costs by going passwordless. Password Reset Costs. The average helpdesk labor cost is estimated at $70.
  • 39
    Tuurio ID

    Tuurio ID

    Tuurio GmbH

    Tuurio ID is a white-label identity and authentication platform designed for developers, agencies, and SaaS companies that want to implement secure login systems quickly. The platform allows teams to build and deploy branded authentication flows—including passkeys, multi-factor authentication, and social logins—without maintaining their own identity infrastructure. With EU-hosted data, GDPR compliance, and multi-tenant architecture, Tuurio ID enables organizations to create secure login systems on their own domains while maintaining full control over branding and user management.
    Starting Price: 39€/month (up to 5000 users)
  • 40
    TAPSIGNER

    TAPSIGNER

    Coinkite

    It's a wireless NFC smart card that holds your Bitcoin private key (XPRV) and will sign transactions with a simple tap on your phone. Verifiable entropy, meaning you know 100% that no one but the TAPSIGNER itself has the private key that controls the Bitcoin. Can be easily and securely backed up into a file. A simple Bitcoin wallet in your pocket. Think of it as a Bitcoin private key on a card! You can sign mobile wallet transactions by tapping the card on your phone. Your mobile wallet provides most of the wallet logic and TAPSIGNER holds the secrets. It's essentially a hardware wallet you can slip inside your regular wallet. TAPSIGNER's lower cost makes hardware wallet features and security available to a wider market around the world. TAPSIGNER is a great way to keep your keys separate from your wallet(s). The card form factor makes it easy to carry and easy to conceal. Partially signed Bitcoin transactions (PSBTs) via HWI.
    Starting Price: $6.99 one-time payment
  • 41
    GenVisory

    GenVisory

    DiligenceX GmbH

    DiligenceX's AI-powered platform GenVisory augments M&A and corporate strategy advisory by automating due diligence and strategic analysis. The platform generates tailored red flag reports and full-scale 300+ slide due diligence decks from inputs such as information memoranda, financial models, and complete data-room contents, including direct export into clients’ own Word and PowerPoint templates. DiligenceX also places strong emphasis on GDPR-compliant, EU-hosted data security, operating in a closed environment with dual encryption, multi-factor authentication, and regular independent penetration testing to ensure data sovereignty.
  • 42
    Entrust Identity as a Service
    Cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). Secure access to apps, networks, and devices for all of your users — with cloud-based multi-factor authentication. Proximity-based login, adaptive authentication and other advanced features contribute to an optimal user experience. Happy users don’t try to circumvent security measures. Everyone wins. This is easier than anything else you’ve tried. Work-saving touches — like built-in provisioning tools and on-premises and cloud integrations — reduce the workload for IT, from deployment through everyday management. Get strong IAM to move faster into the future. Cloud-based Identity as a Service scales quickly to accommodate new users, expanding use cases, and evolving security threats.
  • 43
    BitLox

    BitLox

    BitLox

    Mobile with Bluetooth LE for low power usage. Credit card form factor, 4 mm thin, smallest possible! 2" full matrix advanced e-paper display, can display your address QR codes when fully powered off. Indestructible shockproof & weatherproof metal case. Can be charged with any micro-USB cable. Extra flat form factor cables with reversible heads included. Multiple languages supported. Display and sign free-form messages with your address key, proving your identity. Multiple layers of PIN protection for the device, your wallets, and even for individual transactions. Device verification set a custom phrase to be displayed after entering your personal passcode, that way you know it's your BITLOX. NIST certified true random number generator to secure your signatures. Over 100 wallets possible, each of which can generate millions of unique addresses. Hidden Wallets, hidden wallet data is indistinguishable from random bytes, only you can even know they are there.
    Starting Price: $148 one-time payment
  • 44
    Delinea Database Access Controller
    Delinea’s Database Access Controller enables enterprises to adopt modern cloud databases from AWS, Google, Azure, Oracle, Redis, and others while still enforcing appropriate access levels, multi-factor authentication, complete reporting, and auditing workflows. Proxy connections through a centralized portal and restrict direct database access. Protect databases with layered authentication, authorization, and granular role-based access controls. Provides time-based access, auditable logs, and reports to generate alerts and notifications. Gain granular access control to databases, such as Oracle, MySQL, PostgreSQL, MariaDB, MongoDB, Redis, AWS RDS, and Google DB, whether on-premise or in the cloud. See who is accessing databases and govern their database access using capabilities such as multi-factor authentication (MFA) and logging activities for tighter database security. Secure database access to protect your most valuable information.
  • 45
    Intercede MyID
    MyID® credential management software enables governments and large enterprises to issue and manage digital identities using the most secure method of multi-factor authentication to citizens, large workforces and supply-chains. Today, MyID enables the strong authentication of millions of people to the data, systems and networks they need access to. For those responsible for information security, MyID provides easy integration and control over digital identity issuance and management. For end users, whether citizens or employees, MyID enables seamless, secure access to company systems, networks and resources using multi-factor authentication via a variety of devices. Faced with ever increasing threats of cyber terrorism, identity fraud and crime, MyID® provides a cyber secure credential management software solution. Where data really matters, you will find MyID. The security, reliability and interoperability of MyID software sets it apart.
  • 46
    iGRIFFIN

    iGRIFFIN

    Secuve

    iGRIFFIN is the solution for consolidated account and privilege management, also know as 'Identity and Access Management'. It provides consolidated account management, control over exploitable commands, access control, and user event audit, based on multi-factor authentication to check actual users by employing multi-factor authentication methods. Also it enables effective internal control over in-house systems to be made in effect by harnessing automated processes for application and approval in case of user access. Command control over a kind of exploitable commands, which should be prohibited to be used. The control is to be enforced in such a way that only authorized users through application/approval processes can be permitted to use exploitable commands. The control is to be enforced in such a way that only authorized users through application/approval processes should be permitted to access important data.
  • 47
    UserLock

    UserLock

    IS Decisions

    Secure Active Directory user logins with Multi-Factor Authentication, Single Sign-On, contextual access controls, and real-time monitoring and reporting. UserLock helps administrators to manage and secure access for every user, without obstructing employees or frustrating IT.
    Starting Price: $2.00/month/user
  • 48
    ASP.NET

    ASP.NET

    Microsoft

    Blazor is a feature of ASP.NET for building interactive web UIs using C# instead of JavaScript. Blazor gives you real .NET running in the browser on WebAssembly. .NET is a developer platform made up of tools, programming languages, and libraries for building many different types of applications. ASP.NET supports industry standard authentication protocols. Built-in features help protect your apps against cross-site scripting (XSS) and cross-site request forgery (CSRF). ASP.NET provides a built-in user database with support for multi-factor authentication and external authentication with Google, Twitter, and more.
    Starting Price: Free
  • 49
    FortressBA

    FortressBA

    Fortress Identity

    Strengthen security and eliminate passwords with a mobile and web biometric user authentication solution. Fortress Identity is simplifying everything about secure authentication by introducing a biometric API into the equation. Implement voice authentication directly in the browser and expand to include the user’s smart phone for true multi-factor authentication. Secure account access and transaction authentication. Secure account access and transaction authentication. Strengthen security to corporate intranets and extranets. Reduce IT overhead cost for password reset. Create an omni-channel unified authentication platform. Protect access to medical records and patient data. Control door access to restricted areas and venues. Use a single API call for authentication and a single API call for enrollment. Use RESTful API to request user authentication (Voice, face, fingerprint).
  • 50
    Cypherock X1

    Cypherock X1

    Cypherock

    Cypherock X1 is the world's best hardware wallet with no seed phrase vulnerability. Cypherock X1 crypto wallet decentralizes your private keys to give you 10x more security. Without the need for a seed phrase backup, your crypto private keys are cryptographically split into 5 parts using Shamir's Secret Sharing. Each part is uniquely stored on the X1 Vault and the 4 X1 Cards that only you control, which you distribute into geographically different locations. To make a crypto transaction, just fetch and tap any 1 out of the 4 cards on the X1 vault. - More than 3000 coins and tokens supported. - Acts as a wallet backup for your multiple other BIP39 compatible wallets. - Import multiple wallet seed phrases into Cypherock X1 and also view multiple wallet portfolios in a single app. - Trustless Inheritance support is coming soon!