Alternatives to MobileID.io

Compare MobileID.io alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to MobileID.io in 2026. Compare features, ratings, user reviews, pricing, and more from MobileID.io competitors and alternatives in order to make an informed decision for your business.

  • 1
    ARGOS Identity

    ARGOS Identity

    ARGOS Identity

    ARGOS is an AI-powered Identity Platform. We revolutionize how the world experiences identity. We create essential identity services for people and businesses to ensure a secure digital ecosystem worldwide. We provide services to help you identify Anyone Anywhere Anytime! ARGOS’s ID check enables seamless remote identity verification for blockchain, gaming, virtual assets, e-commerce, and fintech. With 99.996%+ accuracy, it delivers facial recognition within a day, minimizing verification errors. Supporting IDs from 200+ countries, it uses Liveness technology to detect forged faces and documents for secure authentication. As an all-in-one solution, ID check combines essential verification engines, eliminating the need for separate integrations. Businesses can also customize features as needed. From data extraction to fraud prevention, ARGOS helps businesses enhance security, streamline operations, and prevent fraud efficiently. Grow your business with our service!
    Starting Price: $0.11 per submission
  • 2
    ID.me

    ID.me

    ID.me

    ID.me simplifies how individuals prove and share their identity online. The ID.me secure digital identity network has over 98 million members, as well as partnerships with 30 states, 10 federal agencies, and over 500 name-brand retailers. The company provides identity proofing, authentication and community verification for organizations across sectors. The company's technology meets the federal standards for consumer authentication and is approved as a NIST 800-63-3 IAL2 / AAL2 conformant credential service provider by the Kantara Initiative. ID.me's Identity Gateway also has a Federal Risk and Authorization Management Program (FedRAMP) Moderate Authority to Operate (ATO). ID.me is the only provider with video chat and is committed to "No Identity Left Behind" to enable all people to have a secure digital identity.
  • 3
    Onfido

    Onfido

    Entrust

    Onfido, an Entrust company, is a technology provider specializing in AI-powered digital identity verification to help businesses securely and efficiently onboard customers. Its Real Identity Platform verifies users by analyzing government-issued IDs and matching them with facial biometrics, ensuring accurate authentication. Supporting various document types, including passports and driver’s licenses, Onfido integrates seamlessly with business systems to create a frictionless user experience. Its solutions help organizations reduce fraud, comply with global regulations, and streamline customer acquisition. With a focus on trust and security, Onfido enables businesses to verify identities with confidence in an increasingly digital world.
  • 4
    Ondato

    Ondato

    Ondato

    Ondato is a tech company that streamlines KYC and AML-related processes. We're providing advanced technological solutions for digital identity verification, business customer onboarding, data validation, fraud detection, and more. All of them meet the highest quality standards available for KYC online or offline onboarding for all business and customer types orchestrated from a single interface. We're turning compliance into a business benefit by creating a safer environment for organizations and individuals alike.
    Starting Price: €149.00/month
  • 5
    VIDchain

    VIDchain

    Validated ID

    Digital identity is not a new challenge. Since the beginning of the online revolution, validating with complete confidence the real identity of people in a digital environment has been a problem both for users, who have had their privacy and control over their personal data removed and for companies that have suffered the cost of inefficient and constant identification security failures. With VIDchain, we offer a decentralized self-rule identity (SSI) service based on Blockchain to provide people control over their identity and facilitate secure user access to online services. It improves processes and reduces identity verification costs. It implements secure identification processes and improves anti-fraud measures in compliance with eIDAS and GDPR. Based on standards that eliminate the need for hundreds of credentials. You can easily validate your digital identity with anyone you want.
  • 6
    Sovrin

    Sovrin

    Sovrin

    Personally manage your digital IDs online with the Sovrin Network, an open source project creating a global public utility for self-sovereign identity. It’s time to evolve the current system of siloed identities, endless passwords, and insecure databases. The time is here for the frictionless, secure identity verification of self-sovereign identity. The Sovrin Network is the new standard for digital identity, designed to bring the trust, personal control, and ease-of-use of analog IDs, like driver’s licenses and ID cards, to the Internet. We’ve designed Sovrin as a metasystem for any application to use, giving people, organizations, and things the freedom to prove things about themselves using trustworthy, verifiable digital credentials. “Self-sovereign” means the individual identity holder controls their credentials, using them whenever and however they please, without being forced to request permission of an intermediary.
  • 7
    Blockchains

    Blockchains

    Blockchains

    In the physical world, your identity is generally made up of your name and a government-issued ID card that provides the necessary credentials to prove you are who you say you are. A digital identity works the same way – providing the digital world with credentials that prove you are who you say you are – but goes far beyond your name and possible picture. Our digital identity management system allows users to build digital representations of themselves to prove their identity, the things associated with them – important digital documents, property, devices – and access rights to certain services and information. An attestation framework enables a chain of trust in interacting with other users and business or government entities anchored on the blockchain. Our digital identity solutions give control of personal data back to users while delivering the benefits of trusted, distributed identity to consumers and organizations.
  • 8
    Ubisecure

    Ubisecure

    Ubisecure

    The Ubisecure Identity Platform helps organisations manage the many Digital Identity risks and opportunities. Focused on European B2B and B2C scenarios, Ubisecure combines highly assured Organisation Identity and Individual Identity to reduce fraud and increase efficiency in global trade and supply chain. Ubisecure is now the #1 global issuer of Legal Entity Identifiers (LEI). The Identity platform enables organisations to de-risk homegrown user registration and login solutions, and enable Single Sign-On (SSO) across all platforms and devices. Simplified MFA, including TOTP and Bank ID / Reusuable eIDs, reduce fraud by verifying customer identities, and automated customer credential management workflows for your helpdesk. Advanced identity use cases like consolidation of identity data silos, and Identity Relationship Management & Delegation can increase operational effectiveness, manage data breaches, and reduce IT costs dramatically.
  • 9
    Apache Syncope

    Apache Syncope

    Apache Software Foundation

    Apache Syncope is an Open Source system for managing digital identities in enterprise environments, implemented in Java EE technology and released under Apache 2.0 license. Identity management (or IdM) means managing user data on systems and applications, using the combination of business processes and IT. Computers work with records of data about people. Such records contain technical information needed by the system for which the account is created and managed. Have you ever been hired by a company, entered an organization or just created a new Google account? Companies, organizations and cloud entities work with applications that need your data to function properly, username, password, e-mail, first name, surname, and more. In brief, Identity Management takes care of managing identity data throughout what is called the Identity Lifecycle.
  • 10
    IDMERIT

    IDMERIT

    IDMERIT

    IDMERIT is an identity verification platform that helps businesses verify customers, prevent fraud, and comply with global regulations. Our identity verification platform supports Identity and Age Verification, AML, KYC, PEP & OFAC screening, Business Verification, and Video KYC across multiple regions. IDMERIT is compliant with GDPR, HIPAA, and CCPA. IDMERIT provides services like ID Verification - To verify user identities using government-issued IDs and other personal documents. AML (Anti-Money Laundering) - To screen individuals or entities against watchlists, politically exposed persons (PEPs), and sanctions lists. KYC (Know Your Customer) - To help businesses meet regulatory requirements by verifying the identity of customers in order to prevent fraud. Age Verification – Ensuring the user meets age requirements, often used in scenarios like age-restricted content or services.
  • 11
    walt.id

    walt.id

    walt.id

    We offer holistic digital identity and wallet infrastructure used by thousands of developers, governments and businesses across industries. The products are open source, based on open standards, compliant with digital identity regulations and available for self-management (on-premise) or as a managed service (SaaS). Our Digital Identity Infrastructure include the following products and functionality: Issuer SDKs, APIs & APPs: Issue credentials or mint tokens with our infrastructure and white label applications. Wallet SDKs, APIs & APPs: Launch a wallet for your organization, employees or customers to manage access, credentials and tokens. Verifier SDKs, APIs & APPs: Verify credentials or tokens, use powerful verification policies and white label apps. Identity Provider: Enable wallet-, credential- and token-based authentication and identification for your apps.
  • 12
    OneID

    OneID

    OneID Global Technologies

    OnelD makes it easier for your customers to verify identity to the level you reqire. Easily integrated into your experience, OnelD helps you meet your compliance obligations, boost your conversion rates and build trust. Stay in control of the personal details you share when proving your identity online and in person. Verify once, then use your smartphone as ID. Fully automated on-boarding. Customers can have access to all financial services, make purchases and withdrawals without carrying cards. Automated, quick and seamless check-in process at airports. No need to have queues or wait for a member of the staff. Create digital identities for students and access course materials electronically. Tracking of class attendance, check-in for exams, etc.
  • 13
    Imprivata

    Imprivata

    Imprivata

    Imprivata: the digital identity company. At Imprivata, our understanding of unique and complex healthcare workflows and IT systems has made us the world leader in trusted digital identity management for health delivery organizations. At Imprivata, our understanding of unique and complex healthcare workflows and IT systems has made us the world leader in trusted digital identity management for health delivery organizations. Imprivata offers enterprise access, multifactor authentication, identity governance, and patient identification solutions that are developed with, and vetted by, clinicians, to ensure that clinical workflow security and efficiency are always considered. Imprivata solutions track to the Imprivata digital identity framework, which presents a unified, security- and efficiency-focused strategy for managing identities across a healthcare delivery organization.
  • 14
    Anomalix

    Anomalix

    Anomalix

    Engage with employees from Day 1 and remove barriers to collaboration. Real-time and historical data for access management will reduce compliance costs and empower employees. Passwordless enterprise identity and access management. A secure solution to handle the employee lifecycle events (Joiner, Mover and Leaver) to safeguard sensitive data while affording the least privilege access required for job performance. Identify anomalous and suspicious User and Entity behavior. Create efficient and accurate job roles that provide the right level of access and information. Implement an identity management solution for non-employee individuals and corporate assets. Enable cross-organizational collaboration to increase data quality and reduce problems. Create an authoritative source for all non-employee Identities. Perform the necessary identity related due diligence. Manage all identity lifecycle events for humans and assets (Engage, Change, Disengage, Reengage).
  • 15
    OpenText NetIQ Identity Manager
    Manage the complete identity lifecycle of entities across your diverse, hybrid infrastructure. Deliver efficient, consistent, and secure access to corporate assets within and beyond the firewall. Collect and curate identity information and relationships across complex, hybrid environments. Leverage a centralized framework to provision identities and access to applications and data. Save time and decrease risk by automating tasks required to make access decisions. Continuously adapt security controls based on real-time information and insights. Develop a consistent, overarching view of identities inside and outside your organization. Identity Manager collects and curates identity governance data so you know who has access, why it was granted, and whether it is still needed. With features such as attribute-level authority and continuous reconciliation, you have a single source of truth for identity and access.
  • 16
    IDCentral

    IDCentral

    IDcentral

    The need for Digital ID verification. 18 B dollars is the projected market worth of digital services by 2020. 50 % users manipulate data during onboarding. 20 +types of ID frauds currently plague the market. Your one-stop-shop for Digital Identity solutions! Our Digital ID solution enables businesses to verify customer identities using alternate sources of data in real-time. ID Cloud. A comprehensive identity repository enabling enterprises to convert attributes to digital identities. ID Verification. Identity verification and authentication solutions based on phone number and alternate ID. Identity Scoring. Data driven intelligence for a comprehensive behavioral score of your consumers. Huge data repository. Access to data from over 150 telcos across the globe resulting in a massive bank of information. Expansive network of businesses that have a critical business need to consume ID information.
  • 17
    AppSmart Identity
    Securely connect everyone to everything. Connecting with people, applications and devices is a key requirement of digital transformation. AppSmart Identity provides identity and access management for every user across all applications to all interconnected systems to securely access and manage your cloud migration services and all other services from a single place. Users don’t want to remember multiple passwords. With single sign-on, uses can access business systems with one account ensuring a seamless user experience for all their cloud migration services and cloud managed services. With multi-factor and strong authentication users can make sure that the identities that access business systems are fully verified. Policy-based MFA prevents unauthorized users from accessing corporate data with passwords alone. One place for all your cloud managed services eg. manage all your users, groups and devices.
  • 18
    DoubleClue

    DoubleClue

    DoubleClue

    DoubleClue is an Identity and Access Management platform from HWS Group in Bavaria to manage identities, rights and access. It secures company networks with modern multi factor authentication from cyberattacks targeted on digital identities / the "human factor". Plus, the platform offers an integrated password management and secure cloud storage for confidential data. Identity security, password management and secure cloud storage protected by adaptive multi-factor-authentication (MFA). On premises or in the cloud. DoubleClue protects the component of your business that is not covered by firewalls and virus scanners – the human factor, the most vulnerable part in any IT security. All digital accesses and applications, passwords and confidential data protected by a strong all-in-one platform. In the digital working world, employees demand maximum flexibility. Enable them to work from anywhere with any device without compromising their IT security.
  • 19
    Clutch

    Clutch

    Clutch

    Clutch is addressing the increasingly critical challenge of non-human identity security within modern enterprises. As digital infrastructures expand and become more complex, the management and security of non-human identities, ranging from API keys and secrets to tokens and service accounts, have emerged as a pivotal yet often neglected aspect of cybersecurity. Recognizing this gap, Clutch is developing an enterprise platform dedicated to the comprehensive protection and management of these identities. Our solution is designed to fortify the digital backbone of enterprises, ensuring a secure, resilient, and trustworthy environment for their operations. Ever expanding, outpacing human identities by a staggering ratio of 45 to 1. Holds critical privileges and extensive access, essential for mission-critical automated processes. Lacks inherent security controls such as MFA and conditional access policies.
  • 20
    LoginRadius

    LoginRadius

    LoginRadius

    LoginRadius empowers businesses to deliver a delightful customer experience without compromising security. Using our customer identity platform, companies can offer a streamlined login process while protecting digital accounts and complying with data privacy regulations. LoginRadius serves over 3,000 businesses with a monthly reach of 700 million users worldwide. Key platform features include registration services, adaptive security, integration with third-party applications, and customer insights. The company has been named an industry leader in customer identity and access management (CIAM) by Gartner, KuppingerCole, and Computer Weekly. Microsoft is a major technology partner and investor. LoginRadius is headquartered in Vancouver, Canada, with additional offices in Toronto, USA, United Kingdom, Australia, and India. LoginRadius Services: API Authentication OAuth Data Management Secure Login Single Sign On SAML SSO Social Sign On Two Factor Authentication
  • 21
    IdentityX
    Daon’s IdentityX is a multi-modal, vendor agnostic and future-proof identity services platform that addresses the full customer identity lifecycle. The key to trust in a digital identity is a unified, user-centric view of identity creation, use, and management. The IdentityX Platform provides the following core functions: Identity Establishment through account origination and digital onboarding, Omni-Channel Multi-Factor Authentication via mobile, web, and call center authentication, Identity Recovery and other device and account lifecycle management functions. Daon’s IdentityX Digital Onboarding product enables quick, accurate identity establishment for a range of purposes, including Anti-Money Laundering (AML) and Know Your Customer (KYC) checks.
  • 22
    Prove

    Prove

    Prove

    With 1 billion+ consumer and small business identity tokens under continuous management, Prove’s Phone-Centric Identity™ platform helps companies mitigate fraud while accelerating revenue and reducing OPEX online. Authenticate identities to mitigate fraud and pre-fill forms with verified data to increase signups in any channel. Access a trusted registry of 1 billion+ phone number-based identity tokens to mitigate fraud and support multiple identity needs. Prove is the modern way of proving identity with just a phone number. But you've seen the news - digital trust is under daily assault. Hackers, nation-state attacks, international fraud rings, deep fakes, and automated bots all undermine the ability of companies and consumers to trust one another online.
  • 23
    Activate

    Activate

    Activate

    Activate is an enterprise management and automation solution that manages a user's Identity, Access and Digital Workspace. It's fully integrated with Microsoft Suite offerings such as Active Directory, Office 365 and Azure AD. Activate enables users to request, approve and manage common IT systems like Active Directory, Exchange, Office 365 and Azure for themselves and other users in the organization. Activate's integration of Identity Management and Service Management into a single product enables stream-lined management of a User's Lifecycle from On-boarding to Off-boarding. Activate's virtual LDAP technology allows Azure AD to be managed in the same way as Active Directory. This means that services can be transitioned from on-premise to the cloud in a seamless manner without user service interruptions.
    Starting Price: $5.00/one-time/user
  • 24
    midPoint

    midPoint

    Evolveum

    Go with the best. Join hundreds of organizations that have tried and trust midPoint, the open-source leader in Identity Governance and Administration. Choose what fits you: run midPoint in the cloud, the hybrid cloud or on-premise. Accelerate your security and efficiency with enhanced visibility, policing, synchronization, and identity management. Meet the requirements of the regulations with midPoint’s excellent accountability, record-keeping abilities, and data protection scope. Put users in control of their personal data managed by organizations through the implementation of advanced data protection and privacy mechanisms. Enhance the digital experience of the users by empowering them to enable self-service access requests, password resets, and profile management. Enjoy the scalability and comfort midPoint in the cloud brings. Save valuable time and human resources by engaging third-party experts to take care of the seamless operation. Get the most out of the synergy.
  • 25
    Nomidio

    Nomidio

    Nomidio

    The world's most advanced unified Identity and Authentication Service. At Nomidio we specialise in protecting identities. Using our federated identity cloud, we liberate companies from holding unnecessary PII and enable secure customer identification for loan applications, verification of customers to access account information and much more. It all starts with the Nomidio Identity Cloud, which is an incredibly secure, quantum-ready, identity vault. The ID cloud delivers multiple identity services to multiple organizations, removing the need and expensive risk to companies of propagating identity data as is the standard today. The identity data is secured using our parent company’s patented Quorum multiparty split key cryptography, meaning that anyone wanting to decrypt any one record will require the compliance of other holders of the key fragments. Nomidio IDC is a light touch, highly effective biometric identity and authorization tool, 100% SaaS and can be deployed in minutes.
    Starting Price: $3.88 per user per month
  • 26
    Hyperledger Indy

    Hyperledger Indy

    Hyperledger

    Hyperledger Indy provides tools, libraries, and reusable components for providing digital identities rooted on blockchains or other distributed ledgers so that they are interoperable across administrative domains, applications, and any other silo. Indy is interoperable with other blockchains or can be used standalone powering the decentralization of identity. Distributed ledger purpose-built for decentralized identity, correlation-resistant by design. DIDs (Decentralized Identifiers) that are globally unique and resolvable (via a ledger) without requiring any centralized resolution authority. Pairwise Identifiers create secure, 1:1 relationships between any two entities. Verifiable claims are interoperable format for exchange of digital identity attributes and relationships currently in the standardization pipeline at the W3C. Zero Knowledge Proofs which prove that some or all of the data in a set of Claims is true without revealing any additional information.
  • 27
    Acxiom Real Identity
    Real Identity™ delivers sub second decisions to power relevant messages in real time. Real Identity enables the world’s biggest brands to accurately identify and ethically connect with people anytime, anywhere to create relevant experiences. Engage people with reach, scale and precision across every interaction. Manage and maintain identity across your enterprise by leveraging 50 years of data and identity expertise combined with the latest artificial intelligence and machine learning techniques. The adtech environment requires speed and access to identity and data to enable personalization and decisioning use cases. In a cookieless world, first-party data signals will drive these functions while the conversation continues to be between people, the brands, and the publishers. By delivering experiences that matter, across all channels, you can wow your customer and prospects while staying ahead of regulations and ahead of your competition.
  • 28
    Anytrust

    Anytrust

    Anytrust AB

    We are experts in identity management implementation and work with Microsoft Identity Manager (MIM) and OneIdentity. With our help, you can migrate to the cloud and get started with Azure AD & Intune. Do you want help with getting control over your company's identity and authorization management? An onboarding project from Smartsmiling gives you more control and insight into the company's assigned permissions and affiliations. With the help of our platform, you can then manage and manage your processes and regulations for identity management. In our projects and introductions of identity management, we work with Microsoft identity Manager and OneIdentity. Your need for platform support is put into focus for which platform we recommend.
  • 29
    OpenText IAM
    Digital transformation can deliver many efficiencies and new sources of value, but it also presents an enormous challenge: providing secure access to information within and outside the firewall. IT must manage user access to internal and cloud-based applications among employees, customers and trading partners. In the digital economy, every person, system and device needs a digital identity. The OpenText Identity and Access Management (IAM) Platform helps enterprises manage all the digital identities that request access to their systems and applications. With OpenText IAM in place, information access becomes manageable, governable and visible. Identity and access management creates and manages user accounts, roles and access rights for individual users, systems and devices. The best IAM solutions manage both employee identities within an organization and across an extended business ecosystem of customers and partners. IAM is also essential to manage the identities of IoT devices.
  • 30
    3ntity

    3ntity

    Hypermine

    3ntity is a decentralized identity layer for the internet, giving users control of their personal data and identity whilst digital enabling trust for businesses.
  • 31
    Avatier Identity Anywhere
    Introducing Identity Anywhere, the world’s first Identity Management solution based on Docker containers making it the most portable, scalable and secure solution on the market. Docker container technology allows Identity Anywhere to run anywhere: on any cloud, on premise or a private cloud instance hosted by Avatier. Avatier Identity Management products brings separately administered back office applications and assets together to manage them as one system. Now armed with a unified digital dashboard, C-level executives deliver measurable business growth and increased profits. Eliminate the #1 Help Desk request with military grade self-service password reset. Reduce Costs. Only pay for the cloud app licenses you need. Maximize company utilization with a phenomenal shopping cart experience. Avoid fines, lawsuits, negative publicity, and even jail time due to non-compliance.
    Starting Price: $5.00/one-time/user
  • 32
    cidaas

    cidaas

    WidasConcepts

    cidaas is the optimal solution for fast and secure identity management. Thanks to cidaas you create one identity per user across all your channels. cidaas is based on OAuth2.0 and OpenID Connect standards, provides strong API security and with integrated Bot Net Detection and Fraud Detection a secure journey across all your business channels. Modern Identity and Access Management goes like this. Comprehensive feature set for quick and easy integration and implementation of all use cases and systems. We take care of it so you can focus on your core business. No more worrying about maintenance or operation. Countless passwords and pins make life difficult for users and are an unsightly barrier to access on digital channels. With passwordless authentication you secure your digital applications and offer your users a unique customer experience – because the login is the first thing your users see.
  • 33
    eID-Me

    eID-Me

    Bluink

    Remote identity verification, mobile digital identity, and better access to your services. Get verified customers, reduce fraud, comply with regulations, and more. Instantly request verified ID info (ePassport, mDL, and more) from a secure digital wallet on customer smartphones. Increase login security, reduce friction, eliminate password resets, and more. Recent events have required government organizations to accelerate digital transformation and expand online services for citizens. The rapid adoption of telemedicine and electronic medical records systems has created new opportunities to improve the health care experience of patients and increase the efficiency of health care operations. Recent events have accelerated the adoption of online retail. Having a professionally designed and easy to use digital storefront is mandatory. Planning travel, booking, boarding, and checking in are becoming mobile-centric.
  • 34
    Signicat

    Signicat

    Signicat

    Signicat is a pioneering, pan-European digital identity company with an unrivalled track record in the world’s most advanced digital identity markets. Founded in 2006, Signicat's mission is to build technology for people to trust each other in a digital world. Its Digital Identity Platform incorporates the most extensive suite of identity-proofing and authentication systems in the world, all easily accessible through a single integration point. The platform supports and orchestrates seamlessly the full identity journey, from recognition and onboarding, through login and consent, to making legally binding business agreements which stand the test of time. In 2019, Signicat was acquired by leading European private equity investor Nordic Capital. Today, Signicat boasts a workforce of over 450 dedicated professionals across 17 European offices.
  • 35
    Veridium

    Veridium

    Veridium

    Veridium is the most comprehensive Integrated Identity Platform powered by AI-based Behavioral Biometrics, enabling Multi-Factor Authentication (MFA), digital ID verification, and a true enterprise-grade passwordless experience for employees and customers. Low code, agile, and flexible. Eliminating the password for customers removes the friction often associated with passwords and delivers increased security for online connections with our single step multi-factor authentication solution, while providing higher levels of identity assertion for organizations. Veridium provide an end-to-end authentication platform for all your WFH needs and any VPN solution, delivering strong, multi-factor, passwordless workforce authentication.
  • 36
    TrustID

    TrustID

    TrustID

    Identity document validation technology (IDVT) from a leading certified IDSP. Trusted identity checks with clear results for organizations of any size. TrustID is a UK-based company specializing in identity document validation solutions to facilitate compliance with regulations. Their services include online identity validation, digital checks, digital disclosure, and ID scanner checks. TrustID's technology combines automated document verification with human expertise, offering flexible, user-friendly services that provide clear results and support from expert document analysts available seven days a week. Their solutions are designed to protect organizations from identity fraud, ensure regulatory compliance, and streamline the identity verification process. Our expert document analysts find fraudulent identity documents every day, helping to protect customers from identity fraud.
  • 37
    Digital iD

    Digital iD

    Australia Post

    Australia Post Digital iD™ helps make identity verification simple and secure for everyone, online and in person. Prove who you are anywhere Digital iD™ is accepted, anytime. 
The Digital iD™ app puts you back in control of the personal details you share when proving your identity online and in person. Digital iD™ makes it easier for your customers to verify their identity to the level you require. Easily integrated into your experience, Digital iD™ helps you meet your compliance obligations, boost your conversion rates and build trust. Digital iD™ takes the hassle out of proving your identity over and over when signing up for products and services. Verify once, then use your smartphone as ID wherever Digital iD™ is accepted. You can use Digital iD™ to prove your identity at Australia Post when picking up a parcel and applying for a mail redirection or hold.
  • 38
    IDCheck.io

    IDCheck.io

    ARIADNEXT

    IDCheck.io is the solution to automatically and instantly verify a person’s identity remotely. With the explosion of the internet and online subscriptions, companies need to be increasingly vigilant in their customer onboarding processes. Fraud and identity theft are on the rise and present numerous risks for both companies and users. Our identity verification service verifies that the user who wishes to subscribe to a service is really who he/she claims to be. This provides you the necessary confidence to enter into a customer relationship, allows you to be in compliance with the various regulations related to your activity, all optimizing the customer experience of your users, who today are looking for seamless, instant and secure journeys. Achieve a high level of seurity by verifying ID documents and their holder. Fight documentary fraud and avoid identity theft. Meet the different regulatory requirements of your industry.
    Starting Price: €1.99 per document
  • 39
    AU10TIX

    AU10TIX

    AU10TIX

    AU10TIX, an identity management company headquartered in Israel, is on a mission to obliterate fraud and further a more secure and inclusive world. The company provides critical, modular solutions to verify and link physical and digital identities so businesses and their customers can confidently connect. Over the past decade, AU10TIX has become the preferred partner of major global brands for customer onboarding and customer verification automation. AU10TIX takes verification and authentication to a whole new level of scalability. The power of deep learning lies within the input – the more you feed it, the smarter it becomes. This enables you to scale consumer onboarding and exponentially scale your business. With over 5% of the world identities already scanned and verified, fortune 500 companies are powered by AU10TIX, wiping out fraud while confidently focusing on growth. Our identity has changed over the years. Our principles & pioneering vision haven’t.
  • 40
    Curity

    Curity

    Curity

    The Curity identity server is a standards-based identity and API security platform designed to provide robust authentication and authorization for digital services. It combines identity and API security, enabling scalable customer identity and access management to accelerate digital transformation, growth, and customer loyalty. It offers a range of features, including multi-factor authentication, user journey orchestration, decentralized identity, and secure access management. It supports various identity-related standards such as OAuth, OpenID Connect, and SCIM, ensuring interoperability and compliance with industry protocols. Curity's architecture is built on the principle of separation of concerns, enhancing security, flexibility, and scalability. It provides advanced configuration management with transaction-based changes, rollbacks, and backups, accessible through a web UI, CLI, RESTCONF API, and XML config files.
  • 41
    ONTO

    ONTO

    Ontology

    One-step management of decentralized identity and data. Self-sovereign Verifiable Credentials powered by Ontology Network. It is a statement to confirm a claim made by one entity about another. The claim is accompanied by a digital signature that can be used by other entities for authentication. ONT Score is a decentralized review system for ONT ID user trust and can assess ONT ID users from multiple dimensions, including identity information, verification information, digital assets, and behavioral features. ONTO helps users create a decentralized digital identity built on Ontology blockchain which fully protect their privacy data through an encryption algorithm, aiming to provide a safe and convenient one-stop service for users worldwide.
  • 42
    CoreOne Suite
    CoreOne Suite is an identity and access management software for medium and large enterprises. CoreOne Suite can be used in enterprise IAM and customer IAM environments. CoreOne Suite is a Swiss Identity and Access Management software for Enterprise IAM and Customer IAM solutions. Unique IT operations management functionalities extend the reach of identity and access management for greater efficiency, security and convenience. With CoreOne Suite, organizations can achieve sustainable compliance and reduce risk. The compliance requirements are becoming more and more extensive and demanding. The CoreOne Suite offers standardized procedures so that they comply with data protection regulations such as the GDPR or the requirements of the Payment Card Industries (PCI).
  • 43
    FortiAuthenticator
    FortiAuthenticator provides Identity Access Management and Single Sign-On. FortiAuthenticator provides identity and access management (IAM) services to prevent breaches resulting from unauthorized users gaining access to a network or inappropriate levels of access granted to valid users. FortiAuthenticator ensures only the right person can access your sensitive resources and data at the right time. User identity information from FortiAuthenticator combined with authentication information from FortiToken and/or FIDO2 authentication ensures that only authorized individuals are granted access to your sensitive information. This additional layer of security greatly reduces the possibility of data leaks while helping companies meet audit requirements associated with government and business privacy regulations.
  • 44
    CoffeeBean Identity and Access Management
    CoffeeBean Identity and Access Management is a comprehensive solution in the areas of IAM (Identity and Access Management) and CIAM (Customer Identity and Access Management). The different modules of this platform include Single Sign-On (SSO), Multi-Factor Authentication (MFA or 2FA), Adaptive Authentication, Directory Services, Lifecycle Management. Ask, capture and safely store information about the user’s consent during their registration process. Manage terms of the service lifecycle, prompting the user to accept new terms when necessary. Track all changes for consents, permissions and terms of service. This feature helps your business comply with regulations such as GDPR. Set up forms to gradually capture data from users in different moments of their journey (on first contact, after the nth login, coupon redeeming). With this technique, you avoid overwhelming customers with long forms during their registration process but still get the chance to progressively build their profile.
  • 45
    Fischer Identity

    Fischer Identity

    Fischer International Identity

    Fischer empowers organizations to build an effective, predictable and secure Global Identity® Architecture. Securing an Identity Program is the #1 priority now. Fischer Identity provides hardware and software solutions as well as Global Identity® Services to secure and control information technology resources. Leverage our plug & play automation to create predictable, secure provisioning to enable your identities with the access they need on day one as well as deprovision access on-demand. Eliminate the reliance on professional services by automating the Fischer way. Our governance model provides you the control you need to enforce compliance throughout your business. Always know who has access to what, how they obtained the access they have, and remediation when something is not right. Accelerate your digital transformation with Fischer Identity lifecycle management.
  • 46
    Intercede MyID
    MyID® credential management software enables governments and large enterprises to issue and manage digital identities using the most secure method of multi-factor authentication to citizens, large workforces and supply-chains. Today, MyID enables the strong authentication of millions of people to the data, systems and networks they need access to. For those responsible for information security, MyID provides easy integration and control over digital identity issuance and management. For end users, whether citizens or employees, MyID enables seamless, secure access to company systems, networks and resources using multi-factor authentication via a variety of devices. Faced with ever increasing threats of cyber terrorism, identity fraud and crime, MyID® provides a cyber secure credential management software solution. Where data really matters, you will find MyID. The security, reliability and interoperability of MyID software sets it apart.
  • 47
    Jamf Connect
    In an increasingly mobile workforce, with employees working from different locations on different devices, organizations need to be able to manage and secure those devices and their company information without the challenges of binding to on-premises Active Directory. With Jamf Connect, a user can unbox their Mac, power it on and access all of their corporate applications after signing on with a single set of cloud-identity credentials. See how cloud identity is changing Mac security and discover the vital role of Jamf Connect to facilitate the process. Download this overview to learn how Jamf Connect allows for simple provisioning of users from a cloud identity service during an Apple provisioning workflow, complete with multi-factor authentication. See the cost, time and resource savings of an identity management solution. As security and deployment needs evolve, businesses must adopt a new approach to identity as part of their enterprise strategy.
    Starting Price: $2 per user per month
  • 48
    DruID

    DruID

    DruID

    Intelligent relationships based on Identity. Managing the unique consumer identity is fundamental to establishing long-term relationships. DRUID helps you Integrate your digital ecosystem, Consolidate your users’ data and Personalize for them amazing experiences. What is DRUID? DRUID is a platform that manages the unique identity of the consumer and access control (CIAM). DRUID allows you to integrate complex digital ecosystems with enormous flexibility, manage all points of contact dynamically, ensure compliance with the law on data protection and enrich the information of your consumers through external sources, such as social networks. RELATIONAL STRATEGY DRUID is a key piece in your consumer-centric strategy. DRUID helps you to obtain a unique consumer identity and to know better the target audience (consumers, stakeholders, customers, influencers, employees…) DRUID is key to deploying a winning strategy in 3 steps: 1. Integrate. Align the entire digital ecosystem
  • 49
    Alibaba Cloud IDaaS

    Alibaba Cloud IDaaS

    Alibaba Cloud

    Alibaba Cloud Identity as a Service (IDaaS) is a cloud-based identity and access management service (IAM) covering comprehensive functions that enable user portal, user directory, flexible authentication, single sign-on, centralized authorization, and audit reporting. IDaaS plays a central role in enterprise identity management by removing ID silos and enabling one account-access-all function. IDaaS incorporates advanced security technologies that will facilitate identity management and enable enterprises to enhance their identity security to improve management efficiency. IDaaS supports all standard SSO protocols, which allows enterprises to connect to all mature enterprise services. Passwords are eliminated and security risks are reduced significantly. Users can painlessly and securely store dozens of passwords. IDaaS may serve as a bridge for other cloud platform identities to be connected to Alibaba Cloud.
  • 50
    Litentry

    Litentry

    Litentry

    The Litentry IdentityHub allows you to aggregate your personal data from blockchains and platforms to manage granular access to DApps. Our incorruptible hardware infrastructure allows you to stay anonymous when you need to and reveal yourself when you don't. Take back what is yours with tamper-proof digital data containers that only you own. Respect the privacy of your perfect user and learn how to effectively reach your target audience without violating their trust. Litentry's protocol and front-end products are used for any type of identity data generation, computation, and transfer where security and privacy are important. Our products allow you to manage your digital identity data scattered across Web2 and Web3 platforms, and generate and manage a verifiable identity with the help of privacy-preserving computation.