15 Integrations with OneSpan Authentication Servers
View a list of OneSpan Authentication Servers integrations and software that integrates with OneSpan Authentication Servers below. Compare the best OneSpan Authentication Servers integrations as well as features, ratings, user reviews, and pricing of software that integrates with OneSpan Authentication Servers. Here are the current OneSpan Authentication Servers integrations in 2026:
-
1
OrangeHRM Advanced
OrangeHRM
Unlock your team's full potential with OrangeHRM, a premier HRMS experience built for the "HR Hero." Our HR software gives you the tools to automate complex processes and master the entire employee lifecycle with confidence. Trusted by thousands of organizations globally, OrangeHRM is the partner you need to make your HR department shine. Whether you are scaling a fast-growing startup or leading a multinational enterprise, our software adapts to your needs with powerful, comprehensive features: -HR Administration -Employee Management -Reporting & Analytics -Mobile App -Recruitment -Onboarding -Request Desk -Leave Management -Time and Attendance -Roster -Performance Management -Career Development -Training -Surveys -Employee Voice -Discipline Offering both cloud-based and on-premise hosting, we ensure that automating your HR operations is always simple, secure, and incredibly efficient. Ready to see these features in action? Try out our free trial today!Starting Price: $0 -
2
Revv
Revv
Revv gives businesses the speed and brand consistency in their documents to stand out from competitors. It’s the ideal wingman, supporting entrepreneurs in their dream of running a business, one document at a time. The intuitive user interface and 1000+ vetted, pre-formatted templates, encourage users to be self powered, requiring no code or special skills to set up and manage. Documents are smartly organized, created, reviewed, shared & eSigned in one central place so that you can focus on your job. Use Revv’s machine learning abilities to competently navigate and analyze complex counter-party documents and reduce dependency on experts. Integrate with business systems such as CRM and payments via Zapier or simply connect to Google sheets to import data into documents. Key features 1000+ ready to use, pre-formatted templates Easy to use document editor Smart document repository with support for attachments Integrate apps via Zapier, native APIs Get documents filled & eSignedStarting Price: Free -
3
Entrust Certificate Hub
Entrust
Find, control, and automate the management of your certificates. Entrust Certificate Hub provides complete management of your digital certificates within one powerful portal. From discovery and audit to issuance and orchestration, Certificate Hub ensures that no certificate is left unmanaged. Certificate Hub makes certificate oversight and management simple and intuitive across your entire organization. By centralizing certificate lifecycle management across multiple CAs, Certificate Hub makes it possible to find and control all of the digital certificates within your infrastructure. Entrust Certificate Hub scans your networks or CA databases for details on certificates. Automated reports and notifications keep your team aware and accountable. Find, control, and manage the complete lifecycle of your certificates, across multiple CAs, with a browser-based user interface. Certificate Hub is container-based for on-premises or commercial cloud hosting. -
4
TrustBuilder
TrustBuilder
TrustBuilder is your reliable partner in cybersecurity. We go beyond the traditional software firm role, focusing on delivering robust and secure solutions that foster trust among enterprises. Through our Access Management Platform, TrustBuilder.io, our commitment is to ensure the secure digital journey of your employees, partners, and customers. With our advanced MFA and CIAM technology, we provide uninterrupted access while safeguarding identities. > TrustBuilder's SaaS MFA provides airtight, phishing-resistant security, passwordless experience, and seamless integration. > TrustBuilder's tailor made CIAM provides PBAC delivering fine grained authorization based on attributes with customisable workflows.Starting Price: € 10 per user / per year -
5
AuthPoint
WatchGuard
Our unique multi-factor authentication (MFA) solution not only helps to reduce the likelihood of network disruptions and data breaches arising from lost or stolen credentials, but we deliver this important capability entirely from the Cloud for easy set-up and management. AuthPoint goes beyond traditional 2-Factor Authentication (2FA) by considering innovative ways to positively identify users, and our large ecosystem of 3rd party integrations means that you can use MFA to protect access. Ultimately, WatchGuard AuthPoint is the right solution at the right time to make MFA a reality for the businesses who desperately need it to block attacks. AuthPoint uses a push message, QR code, or one-time password (OTP) as an additional factor proving your identity, and our mobile device DNA matches the authorized user’s phone when granting access to systems and applications. Therefore, any attacker who clones a user’s device in an attempt to access a protected system would be blocked. -
6
ARGO
ARGO
Are your fraud losses higher than expected? Is your fraud prevention effectiveness below 95%? Are you losing money at the teller line and through ATMs? Are your check verification thresholds above $500? Are you spending more than 0.01% of bank assets on systems and analysts to review suspects and prevent fraud? Are you reviewing more than 250 checks for each item worth returning? Stop wasting time and money, and let us reduce your false positives, false negatives, manual reviews, and labor resources. All-In-One Check, ACH, ATM, Wire, and Cash Fraud Security Solution. An all-in-one fraud solution with compliance reporting, case management options, and increased levels of fraud prevention for financial transactions. Connecting financial services and healthcare customers with innovative technology. -
7
BehavioSec
BehavioSec
Welcome to the next generation of behavioral authentication. Deployed across global 2000 companies, the BehavioSec platform uses deep authentication to continuously verify user identity with zero friction and over 99% accuracy across millions of users and billions of transactions. While organizations invest significant resources to insulate from attacks, Account takeovers remain a menace. To make matters worse, many costly business challenges – like manual fraud analysis and customer attrition from friction – stem from these failed investments meant to protect. BehavioSec stops account takeover with deep authentication, a new method of verification powered by behavioral biometrics. Deep authentication automatically verifies the human behind the digital identity without adding friction – allowing you to keep fraudsters at bay while drastically reducing costs. BehavioSec addresses new account fraud with population profiling powered by Behavioral Biometrics. -
8
Mitek
Mitek Systems
Mitek Systems is a leading provider of AI-driven identity verification and fraud prevention solutions designed to secure digital interactions across industries. Their platform offers seamless integration of biometric authentication, identity verification, geolocation, and fraud detection tools to protect customers at every touchpoint. Key products include biometric liveness detection for face, voice, and documents, check fraud detection, and passwordless authentication. Mitek’s solutions help businesses reduce financial losses by preventing account takeover and synthetic identity fraud while ensuring compliance with regulatory mandates such as KYC and AML. The company’s user-friendly no-code platform accelerates deployment and boosts customer confidence with simple, secure user experiences. Trusted by over 7,900 organizations worldwide, Mitek continues to innovate in identity verification and fraud defense. -
9
Nok Nok S3 Authentication
Nok Nok
Authentication is the "front door" to digital services. The Nok Nok™ S3 Authentication Suite (S3 Suite) provides passwordless authentication that is more convenient and user friendly than legacy authentication, and is more secure than legacy 2FA, resulting in improved user engagement and greater security. From frictionless on-boarding and progressive profiling, through easy bootstrapping of new devices and account recovery, to suspension and deprovisioning of users. Passwordless authentication support for Desktop Web, Mobile Web, Mobile Apps, Smartwatch Apps and integration for authenticating to call centers. Authentication to cloud services and - in combination with the Nok Nok IoT SDK, to IoT devices. The Nok Nok passwordless customer authentication platform delivers omnichannel, frictionless authentication to any device. The platform’s extensible architecture allows you to support third party biometric products or new authenticators and biometric modalities. -
10
Airlock
Airlock
Airlock's Secure Access Hub protects applications, APIs and data from identity theft and the most common attacks on Web applications. Security meets convenience, Airlock offers your customers a customer journey without media breaks with single sign-on, social registration, comprehensive user self-services and consent management. Acting in line with the market means reacting quickly. The Airlock Secure Access Hub therefore provides all important security functions such as registration, authentication and self services. So you can concentrate all your IT resources on your business processes. The Airlock Secure Access Hub helps to meet all international compliance standards - from GDPR over PSD2, PCI-DSS, OWASP to MAS. The upstream enforcement point for access policies onto applications and services allows compliance with regulations without having to make adjustments in each individual application. -
11
Check Point Infinity
Check Point
Organizations frequently implement multiple cyber security solutions in pursuit of better protections. As a result, they are frequently left with a patchwork security architecture that results in a high TCO. By adopting a consolidated security approach with Check Point Infinity architecture, businesses realize preemptive protection against advanced fifth-generation attacks, while achieving a 50% increase in operational efficiency and 20% reduction in security costs. The first consolidated security architecture across networks, cloud, mobile and IoT, providing the highest level of threat prevention against both known and unknown cyber-threats. 64 different threat prevention engines blocking against known and unknown threats, powered by threat intelligence. Infinity-Vision is the unified management platform for Check Point Infinity, the first modern, consolidated cyber security architecture built to prevent today’s most sophisticated attacks across networks, cloud, endpoints, etc. -
12
Check Point IPS
Check Point IPS
Intrusion Prevention Systems detect or prevent attempts to exploit weaknesses in vulnerable systems or applications, protecting you in the race to exploit the latest breaking threat. Check Point IPS protections in our Next Generation Firewall are updated automatically. Whether the vulnerability was released years ago, or a few minutes ago, your organization is protected. Check Point IPS delivers thousands of signature and behavioral preemptive protections. Our acceleration technologies let you safely enable IPS. A low false positive rate saves your staff valuable time. Enable IPS on any Check Point security gateway reducing total cost of ownership. On-demand hyperscale threat prevention performance providing enterprises cloud level expansion and resiliency on premises. Provide users with secure, seamless remote access to corporate networks and resources when traveling or working remotely. -
13
Appway Digital Banking
Appway
Build the bank of tomorrow, connecting people, data, and systems across boundaries. Appway Digital Banking Platform supports real digital transformation through intelligent process orchestration, enabling authentic human interactions across all touchpoints in the physical and digital worlds. Engage customers on their terms wherever they are in their financial journeys. Leverage advanced analytics and significant moments in customers’ lives to create tailored offerings that fit their goals. Use pre-built, reusable components for fast and risk-free deployments that are future-ready and easily adaptable. Connect beyond organizational limits, taking advantage of existing and emerging ecosystems to boost innovation and stay ahead of the competition. Combine global, standard implementations with local variations to meet specific regional needs. Empower customers and front office employees to browse, select, and configure products intuitively and conveniently. -
14
Fastfill
Jumio
Fast customer onboarding and near-instant population of customer data. Instead of requiring your users to manually entering personal information in mobile apps, Fastfill users simply take a picture of their passport, driver's license or other government-issued ID and Fastfill automatically extracts their personal data to populate online forms. Integrate seamlessly into your mobile app with about 1 hour of developer time. Available for iOS and Android apps and designed to work on any smartphone or tablet. Works with IDs (passports, driver licenses or government IDs) issued by 200 countries and territories. Speed your mobile customers through signup and checkout forms. Customers select their country and ID credential and hold up their ID to their mobile device camera. In an instant, the data is extracted and populated into your form. -
15
Datacard Secura
Entrust
Datacard® Secura™ identity and credential management software revolutionizes the issuance and post-issuance management of highly-secure passports, national IDs, PIV cards, and other secure government credentials. It streamlines every step of the process, including enrollment, identity verification, application approval, document issuance, and post issuance management. Offers from high-volume, desktop, and mobile issuance options. Allows for updates, revocation, and other post-issuance processes. Instead of custom development, leverage preconfigured workflows for faster deployment. Enables biometric and biographic capture, breeder document processing. Interfaces with external sources to verify and manage identities. Includes business rules, profiles, and data preparation capabilities. A greatly reduced need for customization miimizes the risk of cost and time overruns. A standards-based architecture streamlines integration with other elements of your credential ecosystem.
- Previous
- You're on page 1
- Next