Alternatives to Locurity
Compare Locurity alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Locurity in 2026. Compare features, ratings, user reviews, pricing, and more from Locurity competitors and alternatives in order to make an informed decision for your business.
-
1
Auth0
Okta
Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO. -
2
Beyond Identity
Beyond Identity
Beyond Identity is fundamentally changing the way the world logs in–eliminating passwords and all phishable factors to provide users with the most secure and frictionless authentication on the planet. Our invisible, passwordless MFA platform enables companies to secure access to applications and critical data, stop ransomware and account takeover attacks, meet compliance requirements, and dramatically improve the user experience and conversion rates. Our revolutionary zero-trust approach to authentication cryptographically binds the user’s identity to their device, and continuously analyzes hundreds of risk signals for risk-based authentication.Starting Price: $0/ User/ Month -
3
Ping Identity
Ping Identity
Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.Starting Price: $5 per user per month -
4
Protect your organization from credential-stuffing attacks and third-party data breaches. Hundreds of billions of records, including email addresses, user credentials, and passwords, have been breached. Hackers use these records to brute-force their way into organizations’ systems and networks to carry out targeted attacks. HEROIC EPIC is an Identity Breach Intelligence Platform™ that discovers and prevents credential stuffing and account takeover attacks
-
5
Entrust Identity Enterprise
Entrust
The world's most proven on-prem identity & access management (IAM) solution for strong digital security. Identity Enterprise is an integrated IAM platform that supports a full suite of workforce, consumer, and citizen use cases. Ideally suited for high-assurance applications that require a Zero Trust approach for thousands or millions of users, Identity Enterprise can be deployed on-premises or as a virtual appliance. Never trust, always verify. Protect your organization and user communities both inside and outside the perimeter. Secure workforce, consumer, and citizen identities with high assurance use case coverage including credential-based access, smart card issuance, and best-in-class MFA. Limit user friction with adaptive risk-based authentication, passwordless login, and cloud app federation. Option to use digital certificates (PKI) for a higher level of security when and where warranted, either with a physical smart card or a virtual smart card. -
6
Quicklaunch
Quicklaunch
QuickLaunch is the #1 leader in Identity and Access Management (IAM) for Higher Education. More than 500 organizations trust QuickLaunch’s platform to manage over 2,000,000 identities and integrate over 3,000 applications worldwide. CIOs, CTOs, and CISOs use QuickLaunch IAM technologies to engage with students, faculty, and staff and protect them throughout their journey. QuickLaunch’s technology is vital in protecting the user experience, driving both operational efficiencies and higher productivity for colleges, universities, and institutions. Improves cyber security posture by protecting user accounts from being hacked and thwarting ransomware and phishing cyber attacks. Automatically provisions students from the Student Information System and employees from the Human Resources system so they can quickly get access to the apps they need when they matriculate and join.Starting Price: $0.73 per month -
7
SecureKi
SecureKi
Secure access for your business, customers, or employees with our unparalleled identity security backed by a zero–trust philosophy. When it comes to protecting your data, passwords are the weakest link. That is why multifactor authentication has become the identity and access management standard for preventing unauthorized access. Verify the identity of all users with SecureKi. Compromised access and credentials most often are the leading attack vectors of a security breach. Our comprehensive privileged access management is designed to manage and monitor privileged access to accounts and applications, alert system administrators on high-risk events, reduce operations complexity, and meet regulatory compliance with ease. Privilege escalation is at the core of most cyber-attacks and system vulnerabilities. -
8
Baits
MokN
Baits is an innovative deception-based security solution designed to detect and neutralize credential theft before attackers can exploit stolen identities. By deploying realistic decoy authentication portals (e.g., VPN SSL, webmail), Baits tricks attackers into revealing compromised credentials, providing organizations with real-time threat intelligence and enabling them to act before a breach occurs. Unlike traditional monitoring solutions, Baits intercepts credentials that aren’t found on the dark web, as attackers often use them directly. The platform integrates seamlessly into security operations, helping organizations detect, track, and neutralize credential-based threats. Baits is ideal for enterprises looking to enhance proactive threat detection, strengthen identity security, and stay ahead of attackers. -
9
Cincinnati Insurance
The Cincinnati Insurance Companies
Focus on your business, knowing you have the necessary cyber risk coverage to keep your organization protected. Tailor your coverage through our three options: Cincinnati Data Defender™, Cincinnati Network Defender™ and Cincinnati Cyber Defense™. Coverage for responding to a data breach, including expenses for assisting all those affected. Financial protection for legal action following a data breach. Reimbursement and personal services to help owners or key employees with recovery following identity theft. Coverage to recover from a cyberattack, such as ransomware, including cyber extortion expenses, data and system restoration, lost income and public relations expenses. Financial protection for legal action following a computer attack or allegations of injuries arising from your electronic communications. -
10
Cipherise
Cipherise
With over 5000 SAML integrations, experience seamless and secure connections with Cipherise - the platform that offers infinite ways to connect with your employees and customers. By integrating with Cipherise, you can easily build authentication into any app, and offload customer identity management to create delightful experiences quickly. With Cipherise's mutual, bi-directional authentication, you get the security, scalability, reliability, and flexibility to build the stack you need. You will know the person who registered continues to be that person, and they know you are you. Plus, you can protect and enable your employees, contractors, and partners with Cipherise enterprise solutions - no matter where they are. One of the key features, that separate Cipherise from all others - Cipherise eliminates Mass Data Breaches. An attack is limited to one user on one system. Additionally, we store no passwords. Cipherise streamlines your identity and access management needs.Starting Price: $30 per user per month -
11
Tenable Identity Exposure
Tenable
Unleash a new level of end-to-end protection from identity-based attacks. Collapse enterprise silos and unify identities across Active Directory and Entra ID. Evaluate your identities using risk scoring to locate the riskiest ones that require attention. Use step-by-step prioritization to rapidly close security gaps with the highest likelihood of identity-based exploits. Identities are the new perimeter, compromised identities are at the center of nearly every successful cyberattack. By exposing and closing the security gaps where identity-based exploits thrive, Tenable Identity Exposure strengthens your security posture and confidently prevents attacks before they occur. Tenable Identity Exposure continuously validates your Active Directory and Entra ID environments for weaknesses, misconfiguration, and activity that can lead to damaging attacks. Integrating deep identity context into the Tenable One exposure management platform can further help you see risky toxic combinations. -
12
Dapple Security
Dapple Security
Dapple is committed to creating cutting-edge technology utilizing responsible biometrics and privacy by design principles to protect human digital identity and defend against phishing attacks, all while simplifying the user experience. We believe that people should never have to sacrifice privacy for security and will never charge a premium for security or privacy features in our products. Dapple security is creating cutting-edge technology utilizing responsible biometrics that protects people and privacy through a first-of-its-kind passwordless platform. We’re creating a brand and culture using privacy by design, where we give power back to people and the planet through our shared values. -
13
Hideez
Hideez
Hideez Authentication Service is a comprehensive security solution designed to meet the needs of businesses of all sizes. The service includes a range of features designed to enhance security and streamline access control, including secure password management, multi-factor authentication, passwordless SSO and a range of other security tools. With Hideez Service, businesses can manage all of their passwords, securely storing them in an encrypted hardware tokens (Hideez Keys), or try passwordless authentication and contactless desktop logins with a mobile app (Hideez Authenticator). Hideez Server manages authentication tokens, centralizes endpoints associated with them, and stores digital identity information, such as roles, permissions, and other settings. This helps to reduce the risk of password-related cyber threats, such as phishing and credential stuffing.Starting Price: $3 -
14
Microsoft Defender for Identity
Microsoft
Help Security Operations teams protect on-premises identities and correlate signals with Microsoft 365 using Microsoft Defender for Identity. Helps eliminate on-premises vulnerabilities to prevent attacks before they happen. Helps Security Operations teams use their time effectively by understanding the greatest threats. Helps Security Operations by prioritizing information so they focus on real threats, not false signals. Get cloud-powered insights and intelligence in each stage of the attack lifecycle with Microsoft Defender for Identity. Help Security Operations identify configuration vulnerabilities and get recommendations for resolving them with Microsoft Defender for Identity. Identity security posture management assessments are integrated directly with Secure Score for visibility. Prioritize the riskiest users in your organization using a user investigation priority score based on observed risky behavior and number of prior incidents. -
15
Semperis
Semperis
In today’s cloud-first, mobile-first world, dependency on Active Directory is rapidly growing—and so is the attack surface. Expose blind spots. Paralyze attackers. Minimize downtime. Identity-driven cyber resilience for the hybrid enterprise. With the ever-expanding ecosystem of mobile workers, cloud services, and devices, identity is the only remaining control plane for keeping the bad guys out. And identity-centric security relies on the integrity of Active Directory to be effective. Semperis protects the heart of your identity infrastructure so you can go forth boldly into the digital future. For 90% of enterprises, Active Directory is the primary source of trust for identity and access. But it’s also the cyber kill chain’s weakest link – exploited in virtually every modern attack. And since Active Directory extends to the cloud, any tampering of it will cause a ripple effect across the entire identity infrastructure. -
16
ExchangeDefender
BlockSafe Technologies
Crypto exchanges have hot wallets and cold wallets. The wallets store user secret keys as well as the exchange’s secret keys. Most of the keys are stored offline in vaults (cold wallet). A portion of the keys are stored on servers connected to the internet (hot wallet) to facilitate transactions. These servers are susceptible to a data breach just like any other hacker attack. Exchange Defender comprises two products to protect the internal systems of the crypto exchange. These are – CryptoDefender™ (described earlier) and ProtectID®. ™protects the exchange’s computers and mobile devices from keylogging, screen capture and clickjack attacks. ProtectID® secures access to the internal systems via two factor out-of-band authentication. -
17
Elasticito
Elasticito Limited
We alert organisations to Risks & Threats. Our approach integrates state-of-the-art automation with the seasoned expertise of our Cyber Specialists, offering you exceptional visibility & control over the evolving cyber threats your business faces. We deliver the intelligence needed to proactively defend against attacks & understand third-party exposures. Through ongoing analysis of your security infrastructure, we identify areas of strength, uncover weaknesses & prioritise critical fixes based on potential business damage. Achieve a clear understanding of your security posture, benchmark against competitors & ensure regulatory compliance. Our Crown Jewel Protection, Detection & Response Solutions, aligned with the MITRE ATT&CK Framework, secure your critical assets at every stage. -
18
FYEO
FYEO
FYEO secures enterprises and individuals from cyber attacks with security audits, real-time threat monitoring and intelligence, anti-phishing solutions and decentralized identity management. End-to-end blockchain security services and auditing for Web3. Protect your organization and employees from cyberattacks with FYEO Domain Intelligence. Decentralized password management and identity monitoring services made simple. End user breach and phishing alert system. Uncover vulnerabilities and protect both your application and your users. Identify and address cyber risks across a company before you take on the liability. Protect your company from ransomware, malware, insider threats, and more. Our team works collaboratively with your development team to identify potentially critical vulnerabilities before they can be exploited by a malicious actor. FYEO Domain Intelligence delivers real-time cyber threat monitoring and intelligence to help secure your organization. -
19
BeyondTrust Pathfinder
BeyondTrust
BeyondTrust Pathfinder offers a comprehensive identity-centric security platform designed to protect enterprises from privilege-based attacks by delivering visibility, control, and governance across human and non-human identities, credentials, and access paths. At the core is the Pathfinder Platform, which dynamically maps paths to privilege across endpoints, servers, clouds, IdPs, SaaS, and databases, exposing hidden over-privileged accounts, orphaned identities, and attack vectors. Other key components include Identity Security Insights for unified detection and risk-based prioritization of identity threats, Password Safe to discover, vault, manage and audit privileged credentials and session activity, Privileged Remote Access for secure, rule-based access with full session monitoring, Entitle for automating cloud permissions and just-in-time access, Endpoint Privilege Management for enforcing least-privilege on endpoints with application control and file-integrity monitoring. -
20
ACSIA
DKSU4Securitas Ltd
ACSIA it is a ‘post-perimeter’ security tool which complements a traditional perimeter security model. It resides at the Application or Data layer. It monitors and protects the the platforms (physical/ VM/ Cloud/ Container platforms) where the data is stored which are the ultimate target of every attacker. Most companies secure their enterprise to ward off cyber adversaries by using perimeter defenses and blocking known adversary indicators of compromise (IOC). Adversary pre-compromise activities are largely executed outside the enterprise’s field of view, making them more difficult to detect. ACSIA is focused on stopping cyber threats at the pre attack phase. It is a hybrid product incorporating a SIEM (Security Incident and Event Management), Intrusion Detection Systems (IDS) Intrusion Prevention Systems (IPS), Firewall and much more. - Built for linux environments - Also monitors Windows servers - Kernel Level monitoring - Internal Threat detectionStarting Price: Depends on number of servers -
21
TruU Identity Platform. The most advanced and complete passwordless identity solution today. TruU utilizes specialized AI and ML algorithms to identify individuals with 99.99% accuracy. Use local phone PIN or biometrics adaptively to secure access across the enterprise, from desktops to VDI. Turn on behavioral biometrics when you are ready for maximum UX that does not sacrifice on security. TruU enables your remote workforce seamlessly through out-of-the-box VPN and VDI integration. Architected for high security throughout an employee's lifecycle, from onboarding to user self-service. Use iOS or Android phones to unlock Windows, Mac or Linux workstations, even when offline. We integrate into leading PACS to eliminate kludgy badges and transform the workplace experience. It’s estimated that 80% of data breaches start with compromised credentials, particularly passwords. It’s also true that strict password policies frustrate end users and lead to behaviors that make compromise easier.
-
22
Nomidio
Nomidio
The world's most advanced unified Identity and Authentication Service. At Nomidio we specialise in protecting identities. Using our federated identity cloud, we liberate companies from holding unnecessary PII and enable secure customer identification for loan applications, verification of customers to access account information and much more. It all starts with the Nomidio Identity Cloud, which is an incredibly secure, quantum-ready, identity vault. The ID cloud delivers multiple identity services to multiple organizations, removing the need and expensive risk to companies of propagating identity data as is the standard today. The identity data is secured using our parent company’s patented Quorum multiparty split key cryptography, meaning that anyone wanting to decrypt any one record will require the compliance of other holders of the key fragments. Nomidio IDC is a light touch, highly effective biometric identity and authorization tool, 100% SaaS and can be deployed in minutes.Starting Price: $3.88 per user per month -
23
Jericho Security
Jericho Security
Train your team to defend against the latest cyber attacks with our complete cybersecurity platform. Run hyper-realistic, scarily personalized attack simulations in just a few clicks. Phishing attacks are responsible for more than 80% of reported security incidents an about 90% of data breaches. Replicate techniques used by today's attackers to help your people spot and stop AI-generated threats, With tests and training materials tailored to each team member we help you increase cyber security efficiency. -
24
Cross Identity
Cross Identity
Cross Identity is a converged Identity and Access Management (IAM) platform designed to eliminate the security and complexity risks caused by traditional IAM point solutions. It unifies Access Management, PAM, IGA, CIEM, ISPM, and ITDR into a single, purpose-built architecture with shared genetics. By removing stitched integrations and fragile connectors, Cross Identity dramatically reduces attack surface and operational failure points. The platform delivers advanced risk intelligence through its OneBrain™ and Warchief™ engines, providing real-time user, application, and entitlement risk scoring. Cross Identity enables organizations to strengthen their security posture from day one while simplifying implementation and long-term maintenance. It is built to meet modern threat vectors without introducing new system complexity or downtime. -
25
OARO Identity
OARO
We connect people to their identities using advanced facial recognition, simplifying processes for leading enterprise-sized businesses across all verticals. OARO IDENTITY is an end-to-end solution enabling user authentication and authorization across devices, business lines, and organizational boundaries – reducing cost and complexity while improving overall user experience and security. Identity management and the safeguarding of data are critical functions of all organizations. Traditional solutions are increasingly incapable of providing both the user experience and level of security required by today’s business environment. This trend is evidenced by the growing frequency of massive data breaches among industry leaders and the public sector. OARO IDENTITY is an end-to-end solution enabling our clients to authenticate and authorize users across devices, business lines and organizational boundaries, while reducing complexity, cost and improving user experience and security. -
26
SlashID
SlashID
Identity is the most common vector for lateral movement and data breaches. SlashID helps you build a secure, compliant, and scalable identity infrastructure. Manage the creation, rotation and deletion of identities and secrets in a single place. Complete inventory of all your identities and secrets, multi-cloud. Detect initial access, privilege escalation, and lateral movement across your IdPs and cloud environments. Add authentication, authorization, conditional access, and tokenization to your services. Detect leaked key materials in real-time and prevent data breaches by rotating them. Automatically block, suspend, rotate or enforce MFA on a detection to reduce the impact of an attack. Add MFA and conditional access to your applications. Add authentication, authorization, credential tokenization, and conditional access to your APIs and workloads. -
27
QSafe
C9Lab
QSafe is an AI-powered Digital Risk Protection Platform designed to help businesses detect, monitor, and respond to external cyber threats in real time. The platform identifies brand impersonation, phishing domains, fake social media accounts, leaked credentials, dark web exposure, and emerging attack vectors. QSafe provides continuous monitoring across domains, social media, mobile apps, and underground sources, enabling security teams to take rapid action before threats escalate into incidents. It is built for enterprises, BFSI, startups, and growing organizations that need visibility beyond traditional perimeter security. -
28
DynaRisk Breach Defence
DynaRisk
As your technology footprint evolves, so does your risk profile; make sure you are protected, with DynaRisk's Breach Defence. Alongside our protection capabilities, teach your staff the cyber security basics with our expert training guides and simulated phishing scams so they don’t fall victim to attacks that could expose your business. Our Dark Web Monitor alerts you to leaked data records like credentials, personal information, credit cards and more. We monitor over 350 cyber criminal communities to find data that can be used to break into your accounts and systems. Our Hack Monitor scours the Internet to find indications that cyber criminals are targeting your company or that you’ve been hacked and don’t know it yet. Vulnerability Monitor scans your external infrastructure to look for weaknesses that hackers can exploit. Cyber security doesn't have to be complicated! Protect your business today with Breach Defence.Starting Price: $99 -
29
Prove
Prove
With 1 billion+ consumer and small business identity tokens under continuous management, Prove’s Phone-Centric Identity™ platform helps companies mitigate fraud while accelerating revenue and reducing OPEX online. Authenticate identities to mitigate fraud and pre-fill forms with verified data to increase signups in any channel. Access a trusted registry of 1 billion+ phone number-based identity tokens to mitigate fraud and support multiple identity needs. Prove is the modern way of proving identity with just a phone number. But you've seen the news - digital trust is under daily assault. Hackers, nation-state attacks, international fraud rings, deep fakes, and automated bots all undermine the ability of companies and consumers to trust one another online. -
30
Microsoft Defender Antivirus
Microsoft
Microsoft Defender is an all-in-one security app designed to safeguard your identity, data, and devices from online threats. Available with Microsoft 365, it provides real-time protection against phishing, malware, and identity theft across Windows, macOS, iOS, and Android. Defender continuously monitors the dark web for potential identity breaches and sends alerts when your personal data is at risk. Families can protect up to 60 types of personal information with identity monitoring and get 24/7 restoration support in case of theft. Users also benefit from credit monitoring, monthly credit reports, and up to $1 million in identity theft insurance. Easy to use and deeply integrated into Microsoft 365, Defender keeps you and your loved ones secure wherever you connect. -
31
Cymmetri
Cymmetri
From employees and partners to customers and privileged users, Cymmetri seamlessly manages and protects your entire identity ecosystem. Streamlined control over user access, ensuring secure and efficient operations in the digital landscape. Empowers seamless identity protection, safeguarding individuals and organizations with security everywhere, anytime. Streamline onboarding for all new employees. Experience the power of Cymmetri firsthand or discuss your specific IAM needs with our experts. Measurable outcomes, demonstrating the tangible and positive effects of our solutions on security, efficiency, and overall performance. Implementing robust cybersecurity enhances data protection, minimizing the risk of breaches and unauthorized access. Boost productivity with our solutions, empowering employees to thrive in a secure and efficient work environment. Enhance efficiency, streamline operations, and achieve cost savings through our innovative solutions and optimized processes.Starting Price: $2 per month -
32
PicKey
PicKey
PicKey.ai is an AI-powered visual password manager that eliminates the need to remember complex text passwords by letting you log in using a unique visual Master Key composed of a personal image (like a favorite place, object, or face) combined with a 3D collectible, and then generates and manages strong site credentials on the fly without ever storing the actual passwords, using advanced neural image recognition and patented MagicPass cryptography to re-create credentials securely when needed. Instead of memorizing password strings, users simply authenticate with their chosen Vision Secret photo plus a 3D Keymoji selection, and PicKey’s AI recognizes the image even under variations in lighting or angle, mirroring human photographic memory and making login intuitive and memorable while enhancing resistance to brute-force, phishing, and keylogging attacks.Starting Price: $4 per month -
33
Razberi
Razberi
Razberi makes it simple to deploy, manage and cyber secure video surveillance systems and IoT devices. We provide video server appliances, combined with cybersecurity and health management software to enterprise customers. We save customers' install and maintenance costs and reduce the likelihood of a costly cyber breach. Razberi products are installed alongside 3rd party IP cameras and compatible Video Management Software (VMS) products in a simple plug-and-play format, making it easier for anyone to install a video surveillance solution. All-in-one Windows appliances, server, switching, storage. Connect to 3rd party IP cameras and IoT devices. Appliances for a wide range of deployment options. Monitor™ for on-premise visibility or via the cloud. CameraDefense™ to defend IP cameras against cyber attacks. ApplianceDefense™ to defend against attacks on appliances. Get started with a free demo of our simple, secure video surveillance and IoT solutions. -
34
Silent Armor
Silent Breach
Silent Armor is an AI-powered perimeter defense platform designed to predict and prevent cyber breaches before they occur. It continuously analyzes hundreds of security metrics across an organization’s attack surface to deliver real-time, intelligent protection. The platform combines predictive analytics, dark web monitoring, and threat correlation to uncover emerging risks. Agentless attack surface monitoring allows organizations to discover exposed assets without deploying endpoint software. Automated mitigation playbooks help neutralize threats directly from a unified dashboard. AI-generated daily security briefs provide executive-level insights and prioritized remediation steps. Built for CISOs, SOC teams, and MSSPs, Silent Armor transforms fragmented security data into proactive, actionable defense.Starting Price: $49/asset/month -
35
NSFOCUS NGFW
NSFOCUS
As the digital attack surface grows, both the volume and sophistication of cyberattacks increase. The resulting data theft and network disruptions can both threaten your reputation and business, a comprehensive security solution is an absolute necessity in every IT infrastructure. NSFOCUS delivers a fully integrated Next Generation Firewall (NGFW) to meet the changing needs of your cloud-enabled enterprise network. It provides NGFW capabilities and collaborates with other security devices to proactively defend against cyber threats, and improve user and application experience while lowering the total cost of ownership. A dedicated AI-based content moderation module effectively recognizes content in texts, images, and videos. Use honeypots and AI algorithms to trap attacks. AI algorithms recognize attacks and apps in encrypted traffic. Scalable AI-based AV engine increases virus detection rate. -
36
Microsoft Defender XDR
Microsoft
Microsoft Defender XDR is an industry-leading extended detection and response (XDR) platform that provides unified investigation and response capabilities across various assets, including endpoints, IoT devices, hybrid identities, email, collaboration tools, and cloud applications. It offers centralized visibility, powerful analytics, and automatic cyberattack disruption to help organizations detect and respond to threats more effectively. By integrating multiple security services, such as Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Identity, and Microsoft Defender for Cloud Apps, it enables security teams to correlate signals across these services, providing a comprehensive view of threats and facilitating coordinated responses. This integration allows for automatic actions to prevent or stop attacks and self-heal affected assets, enhancing overall security posture. -
37
Lumen Web Application Firewall
Lumen Technologies
Lumen℠ Web Application Firewall protects your data, employees and customers with seamless security that deters hackers and cyber-criminals. LumenSM Web Application Firewall delivers crucial web and application protection that helps prevent attacks and reduce costly data breaches and downtime by combining multiple defenses that accurately pinpoint and prevent attacks without blocking your customers. Provides a critical additional layer of protection to your perimeter firewall infrastructure with 24x7 monitoring so you can react quickly and efficiently to threats as they emerge. Identifies leaks of sensitive data—such as credit cardholder information and social security numbers—by inspecting encrypted traffic and detecting and blocking malicious web requests. Analyze current web applications to determine vulnerabilities with an application security review and analysis to identify possible flaws that could harm your website security, resulting in costly downtime for your business. -
38
REVE Secure
REVE Secure
Dual authentication check of login’s credibility via user’s registered credential (Password) and security token generated at authorized user end only. Passwords are incompetent in securing your logins. Adding 2nd-factor authentication will not only deliver dual authentication security but also ensure safe & secure login & protected account access. With Two Factor Authentication, secure your remote logins and access to Linux/UNIX servers from security breaches and malicious attacks. Integrate a second layer of authentication to existing Windows password-based security to ensure the all-round protection of your enterprise data. Secure & protect logins and access to each different web application and service to avoid unauthorized access and cyber-attacks. Blocks unauthorized login attempts made using passwords. Supports a multitude of platforms and devices. -
39
XignIn
XignSys
The XignIn technology enables the user-friendly implementation of projects focusing on authentication, payment and digital signatures - without passwords and additional hardware. The XignIn technology can be easily integrated into all systems. It is suitable for almost all imaginable applications. The growing number of digital offerings increasingly effects businesses and municipalities to be targeted by cybercriminals. Hacking attacks cause significant financial damages as well as a major loss of reputation. Even if users lose their passwords, companies and municipalities incur immense costs for password resets and hardware tokens. Due to the ongoing digitalization and the increasing number of cyber-attacks, secure authentication procedures for companies and municipalities are required. The authentication process can be carried out either directly via smartphone or in combination with a second device (e.g. laptop/PC). -
40
MONITORAPP AIWAF
MONITORAPP
Web Application Firewall(WAF) AIWAF. Most security breaches happen on the web, to defend against web attacks, a dedicated web firewall system is required. AIWAF strongly defends various web attacks. Web security is no longer optional. It's essential. The web is vulnerable. Because the HTTP/HTTPS ports must always be open to show the Web to clients, various attacks can be introduced through them. MONITORAPP's web application firewall, AIWAF is specialized for traffic-based detection of hacking attempts using vulnerabilities in the Web and for controlling access to servers. Web attacks are evolving every day, causing malicious traffic or falsifying request information. Only WAF that does not stop ongoing development to respond to new types of web attacks can do the right thing. The answer is AIWAF in MONITORAPP. Block web attacks effectively with patented adaptive profiling technology and threat intelligence system. -
41
ShieldApps Identity Theft Preventer
ShieldApps
Identity Theft Preventer searches your device to find where your privacy may be vulnerable. It scans through your computer for your webmail credentials, bank account details, health provider records, social networks profiles and more, to identify potential concerns that you should address. The most recent edition of the product can even block hacking attempts against your webcams and microphones. With the Identity Theft Preventer, your audio and visual ports are secure, enabling you to confidently enjoy your private life again. Fend off hacking attempts against your devices. Identity Theft Preventer blocks malicious threats and hacking attacks on your webcam and microphone.Keep others from tracking your online activity and targeting you with unwanted ads. Enjoy web surfing again without feeling like you are being watched.Starting Price: $49.99 one-time payment -
42
Entro
Entro Security
Non-Human Identity & Secrets Security Platform. A pioneer in non-human identity management, Entro enables organizations to securely utilize non-human identities and secrets, overseeing their usage and automating their lifecycle from inception to rotation. Secrets-based cyber attacks are devastating and growing as more and more secrets are created by R&D teams and spread across various vaults and repositories with no real secret management, monitoring, or security oversight. Streamline and secure your non-human identity lifecycle management. With Entro, security teams can now oversee and protect Non-human identities with automated lifecycle management and seamless integration, ensuring comprehensive security & compliance through a unified interface. -
43
SpyCloud
SpyCloud
After a data breach, criminals quickly monetize the data, often by using stolen credentials to gain easy access to consumer accounts and corporate systems. If your employees, consumers, or third-parties have credentials or PII exposed in a data breach, they are at high risk of account takeover fraud. SpyCloud can help you prevent account takeover and combat online fraud with proactive solutions that leverage the largest repository of recovered breach assets in the world. Reset stolen passwords before criminals can use them to defraud your users or access sensitive corporate data. Draw on decades-worth of digital breadcrumbs to unmask criminals attempting to defraud your business and your customers. Monitor your critical third party relationships for supply chain breach exposures that could endanger your enterprise. Leverage breach data to protect employees, citizens and your supply chain from credential-based cyber attacks. -
44
Acceptto eGuardian
Acceptto
Acceptto monitors user behavior, transactions, and application activity to create an enriched user profile within each application landscape and subsequently verify if access attempts are legitimate or a threat. No passwords or tokens are required. Acceptto’s risk engine calculates whether an access attempt is legitimate or not by tracking user and device posture pre-authentication, during authentication, and post-authorization. We deliver a continuous, step-up authentication process with real-time threat analytics in an age when identities are persistently under attack. Based on a risk score computed by our proprietary AI/ML algorithms, a dynamic level of assurance (LoA) is computed. Our approach automatically finds the optimal policy for each transaction to maximize security while minimizing friction for the user with machine learning and AI analytics. This provides a smoother user experience without sacrificing enterprise security. -
45
Vault One
VaultOne Software
Have total control and visibility over who accesses your data, systems, applications, infrastructure and any other assets, preventing cyber attacks and data breaches. With VaultOne, protect your company’s resources and achieve compliance. VaultOne is redesigning the concept of privileged access management (PAM). Manage user access, credentials and sessions in a fast, secure and automated way. In a single and powerful solution, we offer multiple features, such as digital vault, password generator, sessions recording, auditing and reporting, customizable policies, disaster recovery and multi-factor authentication. If you’re looking for a solution to protect shared accounts, certificates and user access to applications, websites, servers, databases, cloud services and infrastructure, you’ve just found it. By creating customized access policies and managing users and privileges, you fight cyber attacks and avoid data breaches.4Starting Price: $99 per month -
46
BlackRidge Transport Access Control
BlackRidge
Security is an arms race. Innovation happens simultaneously on the attack and protects sides of the environment. By authenticating identity and implementing security policy at the earliest possible time, on the first packet of a network session setup, BlackRidge provides deterministic, scalable, and cost-effective cyber defense. BlackRidge Transport Access Control (TAC), using our patented First Packet Authentication™, provides a new level of cyber defense for network and cloud resources. TAC operates pre-session, in real-time, before other security defenses engage. TAC is address and topology independent, supporting NAT and automatically adjusting to changing network topologies. Cyber-attacks are stopped dead in their tracks by preventing unauthorized users and attackers from performing reconnaissance of network and cloud resources, and by denying them the ability to communicate anonymously. -
47
Remote Safely
EPAM Systems
Remote Safely is an extra layer of Zero-Trust security for mitigating residual risks associated with nature of remote work. Remote Safely combines multiple security controls such as AI-based risks detection, VDI and SOC workforce capabilities to offer the effective protection from data breaches caused by no- or low-tech attacks, for example, visual hacking. Remote Safely surpasses the current understanding of the zero-trust approach by only allowing access to critical data with continuous identity confirmation using biometric screening of the remote work environment. The solution verifies the identity of the person located in the camera view area via facial biometrics and detects suspicious events in order to protect data from being accessed and viewed by the wrong people. Remote Safely enables businesses to offer greater flexibility to their workforce, allowing their teams to focus on what they do best and trust their data is secure. -
48
Centagate Cloud
Centagate Cloud
CENTAGATE CLOUD offers a centralized login option that protects all applications from security breaches by using FIDO2 passwordless authentication. Control, protect and secure your application access. One login credential for all applications. A system that has strong digital security which eliminates phishing, fraud and password theft. Since the authentication is centralized, only one login credential is needed for all applications. Highly cost-effective with zero CAPEX and minimal OPEX. Some of important features that makes your authentications with CENTAGATE CLOUD more secured and protected. An authentication that requires two or more factor like what you have (device), what you are (biometrics) and what you know (password). An authentication based on previous login’s risk and behavior. Evaluating these risk could stop any trials of security breach. Pre-integrated certified Securemetric FIDO2 server for registration and authentication.Starting Price: $2 per month -
49
Cisco Identity Intelligence is an AI-powered solution that bridges the gap between authentication and access, providing top-tier security insights without interruptions. By closing the gaps between authentication and access, Cisco Identity Intelligence solution protects your attack surface before attackers can make their move. Get a full picture of identity activity and clean up vulnerable accounts, eliminate risky privileges, and block high-risk access attempts. With seamless deployment, Cisco Identity Intelligence solution powers other Cisco security suites, resulting in deeper functionality that informs the right response to any threat. Attackers' methods are becoming increasingly more complex, which is why Cisco Identity Intelligence solution is built to protect your organization against identity threats, no matter how sophisticated they are.
-
50
Okta
Okta
One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity.