Alternatives to Peer Mountain

Compare Peer Mountain alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Peer Mountain in 2026. Compare features, ratings, user reviews, pricing, and more from Peer Mountain competitors and alternatives in order to make an informed decision for your business.

  • 1
    Ping Identity

    Ping Identity

    Ping Identity

    Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.
    Starting Price: $5 per user per month
  • 2
    Gataca

    Gataca

    Gataca

    Gataca provides simple, compliant, and secure decentralized identity management technology, also known as self-sovereign identity (SSI) technology. Create and digitally sign identity credentials in a standardized format. Design customizable verification templates for on boarding and sign-in processes to offer frictionless access to digital services. Let your users authenticate seamlessly in digital services and control their data with the Gataca Wallet. User data and ID credentials are issued by trusted authorities and protected with biometrics and post-quantum cryptography to ensure they are tamper-proof, allowing instant identity verification without relying on centralized systems.
    Starting Price: €12 per month
  • 3
    Nuggets

    Nuggets

    Nuggets

    Whether you’re a bank, subscription service, telco or logistics company, Nuggets self-sovereign decentralized identity helps you deliver on your regulatory expectations while building competitive advantage. While your consumers enjoy more convenience, confidence and choice. With Nuggets, consumers get back control of their data and you become a champion of trust. Nuggets ties every transaction to a verified self-sovereign decentralized identity. This means the customer is verified as legitimate before they even connect to the service. This is a gold standard in digital identity, through private, secure proof of transactions. Nuggets ties every payment to a verified digital identity, preventing fraudsters from compromising identities online. Payment providers and merchants save money from reduced fraud, as well as delivering all the payment options customers want.
  • 4
    Ontology

    Ontology

    Ontology

    Ontology supports identity authentication and data collaboration between users, vehicles, and third parties. Data can only be accessed, used and stored with the consent of the owner. Through the Ontology Trust Framework and Self-Sovereign Data Storage, a number of cryptographic algorithms are implemented to protect user identity and data privacy security. Each data exchange operation requires authorization and selective exchange can be achieved through authorization protocols and cryptographic algorithms. Traceability, authorization and authentication of personal data is possible through blockchain. In some cases, we integrate TEE technology to support data analysis and processing without privacy disclosure. It's time to reclaim control of your digital identity. ONT ID enables autonomous control of your private data. You decide if and when your data is accessible by others.
  • 5
    GlobaliD

    GlobaliD

    GlobaliD

    Portable, private, and secure identity. Claim your GlobaliD, get verified, create and join groups, communicate, pay and get paid online. At GlobaliD, we’re building a universal identity solution that is easy to use, ties users to unique names and transcends borders and institutions. We build a self-sovereign identity platform that enables everyday action for people and businesses. GlobaliD's privacy and security solutions help you protect your customers and win their trust, without compromising experience. Our platform delivers a convenient onboarding and single sign-on experience, while empowering users to build digital reputations and to maintain consent-based control over their personal data. Our solutions free our partners from the burden of data storage and security, while providing data integrity and maintaining compliance. From identity management to data security to messaging, GlobaliD’s full-fledged platform does it all.
  • 6
    ONTO

    ONTO

    Ontology

    One-step management of decentralized identity and data. Self-sovereign Verifiable Credentials powered by Ontology Network. It is a statement to confirm a claim made by one entity about another. The claim is accompanied by a digital signature that can be used by other entities for authentication. ONT Score is a decentralized review system for ONT ID user trust and can assess ONT ID users from multiple dimensions, including identity information, verification information, digital assets, and behavioral features. ONTO helps users create a decentralized digital identity built on Ontology blockchain which fully protect their privacy data through an encryption algorithm, aiming to provide a safe and convenient one-stop service for users worldwide.
  • 7
    Sovrin

    Sovrin

    Sovrin

    Personally manage your digital IDs online with the Sovrin Network, an open source project creating a global public utility for self-sovereign identity. It’s time to evolve the current system of siloed identities, endless passwords, and insecure databases. The time is here for the frictionless, secure identity verification of self-sovereign identity. The Sovrin Network is the new standard for digital identity, designed to bring the trust, personal control, and ease-of-use of analog IDs, like driver’s licenses and ID cards, to the Internet. We’ve designed Sovrin as a metasystem for any application to use, giving people, organizations, and things the freedom to prove things about themselves using trustworthy, verifiable digital credentials. “Self-sovereign” means the individual identity holder controls their credentials, using them whenever and however they please, without being forced to request permission of an intermediary.
  • 8
    VIDchain

    VIDchain

    Validated ID

    Digital identity is not a new challenge. Since the beginning of the online revolution, validating with complete confidence the real identity of people in a digital environment has been a problem both for users, who have had their privacy and control over their personal data removed and for companies that have suffered the cost of inefficient and constant identification security failures. With VIDchain, we offer a decentralized self-rule identity (SSI) service based on Blockchain to provide people control over their identity and facilitate secure user access to online services. It improves processes and reduces identity verification costs. It implements secure identification processes and improves anti-fraud measures in compliance with eIDAS and GDPR. Based on standards that eliminate the need for hundreds of credentials. You can easily validate your digital identity with anyone you want.
  • 9
    IdRamp

    IdRamp

    idRamp

    Turn your digital identity strategy into a business asset, not a liability. Stop spending time, money, and headcount replatforming insecure identity technology. Simplify authentication complexities with decentralized zero trust Identity from Idramp. Bring order to your identity management chaos. Accelerate delivery of services to meet the speed of business. Eliminate expensive platform upgrade projects with rapid modular deployment. Relieve the pain of bespoke integration with rapid integration that automatically interoperates with existing infrastructure. Tailor your customer experience with a modular architecture that eliminates vendor stack lock-in. Add zero trust identity with automated security policies and adaptive access controls. Control extensible ecosystems with state of the art data protection. Never trust but always verify that your applications and people are safe.
  • 10
    Microsoft Entra Verified ID
    Start your decentralized identity journey with Microsoft Entra Verified ID—included free with any Azure Active Directory (Azure AD) subscription. Microsoft Entra Verified ID is a managed verifiable credentials service based on open standards. Digitally validate identity information to ensure trustworthy self-service enrollment and faster onboarding. Quickly verify an individual’s credentials and status to grant least-privilege access with confidence. Replace support calls and security questions with a streamlined self-service process to verify identities. Ensure that credentials are interoperable and reusable with a solution that supports open standards. Confidently issue and verify workplace credentials, citizenship, education status, certifications, or any unique identity attributes in a global ecosystem designed for more secure interaction between people, organizations, and things.
  • 11
    Hushmesh

    Hushmesh

    Hushmesh

    ​Identity theft is a consequence of the disjointed, domain-centric architecture of the Web. Without a global unified namespace, the Web requires each domain to manage identity independently. This “every domain for itself” model makes global identity security impossible. In contrast, the cryptographic namespace of the Mesh enables the creation of individual keychains for each person and non-person entity. Domains can then lock their users’ accounts with unique keys on their users’ keychains. ​Data breaches are symptoms of the domain-centric data security model of the Web. Without built-in cryptographic security at the person or non-person entity level, the Web requires each domain to secure data on its own. This approach increases the global attack surface and puts “domain insiders in the middle”, creating vulnerabilities and liability along with it.
  • 12
    Hyperledger Indy

    Hyperledger Indy

    Hyperledger

    Hyperledger Indy provides tools, libraries, and reusable components for providing digital identities rooted on blockchains or other distributed ledgers so that they are interoperable across administrative domains, applications, and any other silo. Indy is interoperable with other blockchains or can be used standalone powering the decentralization of identity. Distributed ledger purpose-built for decentralized identity, correlation-resistant by design. DIDs (Decentralized Identifiers) that are globally unique and resolvable (via a ledger) without requiring any centralized resolution authority. Pairwise Identifiers create secure, 1:1 relationships between any two entities. Verifiable claims are interoperable format for exchange of digital identity attributes and relationships currently in the standardization pipeline at the W3C. Zero Knowledge Proofs which prove that some or all of the data in a set of Claims is true without revealing any additional information.
  • 13
    Finema

    Finema

    Finema

    We provide a holistic solution to all your credential ownership and management. Not only applicable to a wide range of scenarios, it is secure, convenient and fully owned by you. You can check whether the information presented is a real human, real transcript, authentic brand-name bag, or malevolent fraudster from barely revealing any data, thanks to our cryptographic technique. Our platform provides secure, privacy-preserving and cost-effective — the way to help people manage their identity on the internet.
  • 14
    Hyland Credentials
    Hyland Credentials is a digital credentialing platform that leverages blockchain technology to issue and verify tamper-proof digital records in sectors like higher education and government. Using the open standard set by Blockcerts, it allows users to maintain control over their credentials while ensuring maximum security and privacy. Hyland Credentials ensures that records are secure, vendor-independent, and fraud-resistant by employing cryptographic signatures for validation. The platform’s API integrations allow seamless interaction with third-party applications, enabling users to timestamp, sign, and anchor records in the blockchain. This system promotes transparency and trust, making it easier for institutions and individuals to manage and verify credentials.
  • 15
    BlocTrust

    BlocTrust

    BlocWatch

    BlocTrust provides independent, third-party verification, and assurance along with continuous awareness of the health of your blockchain for private blockchains and DLTs. BlocTrust runs as an endorsement node within a private blockchain network: verifying and endorsing blockchain transactions, providing assurance to all blockchain participants, and demonstrating the accuracy and legitimacy of endorsed transactions. BlocTrust maintains an independent, validated ledger of blockchain transactions. This authoritative record proves vital for following compliance mandates and meeting audit requirements. Designed to be both comprehensive and impartial, you can turn to BlocTrust for addressing disputes among Blockchain participants. BlocTrust generates monthly attestations that summarize the health and activity of the blockchain and display the blockchain operation metrics.
    Starting Price: $2,500 per month
  • 16
    Caf

    Caf

    Caf

    Caf.io is a comprehensive digital identity verification platform designed to streamline user onboarding, enhance fraud prevention, and ensure compliance across various industries. Its flagship offering, the "Know Your Everything" platform, integrates multiple technologies to validate user identities, including facial biometrics, document verification, and data source validation. It supports customizable workflows through a no-code interface, allowing businesses to tailor onboarding processes to their specific needs. Caf.io's solutions encompass Know Your Customer (KYC), Know Your Business (KYB), Account Takeover (ATO) prevention, and Anti-Money Laundering (AML) compliance, providing a holistic approach to identity management. Additionally, Caf features an identity intelligence center for real-time monitoring and decision-making, and leverages a decentralized identity network, ALL.ID, to enhance data accuracy and security.
  • 17
    SelfKey

    SelfKey

    SelfKey

    Self sovereign identity means your data belongs to you. The SelfKey wallet is non-custodial, you are in full control of your data, documents and digital assets. SelfKey can never steal or lose your identity data or digital assets. Securely store and manage your identity documents and digital assets. Access multiple marketplaces to compare and sign up for. Start a new business, open a new bank account, or get documents notarized through the SelfKey Marketplace. Powered by the KEY token and priced against USD, the SelfKey Marketplace provides access to a variety of services with full transparency on documentation requirements, cost, and total processing time. Explore global options for banking, corporate, individual and wealth management. Apply for an international bank account directly from your SelfKey wallet. Send your identification documents and data (KYC) with a single click.
  • 18
    SOURCE.ID

    SOURCE.ID

    Desmo Labs

    Offering secure, private, flexible, and auditable identity verification solutions. Empowering individuals to curate their profiles, control data sharing, and offer issuers the ability to swiftly verify credentials, thereby fostering a trusted platform for all participants. Built-in AML and KYC solutions with standardized interfaces, allowing for open ledger identification verification. Digital signatures for universal authentication and provide tamper-proof with verifiable credentials. Decentralized Identity (DID) technologies streamline the verification process, reducing the time from weeks to mere seconds for tasks ranging from accessing public services to opening a bank account. Simultaneously, they provide easily verifiable credentials, significantly minimizing the manual labor required from front-desk employees. Digital signatures and tamper-proof can be operated with no seed phrases and gas fees.
  • 19
    Blue Mountain RAM

    Blue Mountain RAM

    Blue Mountain Quality Resources

    Blue Mountain Regulatory Asset Manager® (Blue Mountain RAM) integrates functionality for the full cycle of maintenance operations with world-class calibration management. Purpose-built for the Life Sciences industry, the software features built-in best practices designed to ensure GMP compliance and maximized productivity and profitability. Globally manage your calibration and maintenance processes and improve your compliance position with the industry-leading Enterprise Asset Management system, Blue Mountain Regulatory Asset Manager (Blue Mountain RAM). Blue Mountain RAM is the first EAM to integrate functionality for the full cycle of maintenance operations with world-class calibration management, featuring built-in best practices designed to ensure GMP compliance and maximized productivity and profitability. Our software combines traditional CMMS elements with Workflow Automation and Electronic Signatures to streamline maintenance operations and increase equipment reliability.
  • 20
    Mac OS X Mountain Lion
    OS X Mountain Lion is the ninth version of OS X, Apple's operating system for its desktops, laptops, and servers. Mountain Lion was announced on February 16, 2012 and was released on July 25, 2012 through the Mac App Store. Mac OS X 10.8 Mountain Lion is available for older systems that are not compatible with the latest version of macOS and requires the following: OS X Snow Leopard 10.6.8, Lion 10.7, or Mountain Lion 10.8 already installed, some features require a compatible Internet service provider; fees may apply, some features require an Apple ID; terms apply.
  • 21
    Verified.Me

    Verified.Me

    Verified.Me

    Verified.Me, by SecureKey Technologies Inc., is the new and secure way to help you verify your digital identity, so you can quickly get access to the services and products you want online, in person and on the phone. Verified.Me offers a secure and convenient way to help Canadians verify their digital identities. Verified.Me is a digital identity verification network offered by SecureKey Technologies Inc. The Verified.Me service was developed in cooperation with seven of Canada’s major financial institutions – BMO, CIBC, Desjardins, National Bank of Canada, RBC, Scotiabank and TD. The Verified.Me network continues to evolve, with plans of adding new digital identity providers and service providers to make your life easier. SecureKey’s Verified. Me digital identity verification service is now available in an easy-to-use, browser-based version.
  • 22
    Curity

    Curity

    Curity

    The Curity identity server is a standards-based identity and API security platform designed to provide robust authentication and authorization for digital services. It combines identity and API security, enabling scalable customer identity and access management to accelerate digital transformation, growth, and customer loyalty. It offers a range of features, including multi-factor authentication, user journey orchestration, decentralized identity, and secure access management. It supports various identity-related standards such as OAuth, OpenID Connect, and SCIM, ensuring interoperability and compliance with industry protocols. Curity's architecture is built on the principle of separation of concerns, enhancing security, flexibility, and scalability. It provides advanced configuration management with transaction-based changes, rollbacks, and backups, accessible through a web UI, CLI, RESTCONF API, and XML config files.
  • 23
    Blockchains

    Blockchains

    Blockchains

    In the physical world, your identity is generally made up of your name and a government-issued ID card that provides the necessary credentials to prove you are who you say you are. A digital identity works the same way – providing the digital world with credentials that prove you are who you say you are – but goes far beyond your name and possible picture. Our digital identity management system allows users to build digital representations of themselves to prove their identity, the things associated with them – important digital documents, property, devices – and access rights to certain services and information. An attestation framework enables a chain of trust in interacting with other users and business or government entities anchored on the blockchain. Our digital identity solutions give control of personal data back to users while delivering the benefits of trusted, distributed identity to consumers and organizations.
  • 24
    DL3ARN

    DL3ARN

    DL3ARN

    Discover data ownership, privacy, personalized insights, and more in one user-focused solution. Decentralizing database storage bolsters data security, protecting information from centralized vulnerabilities. Ensure your information is secured with verification, robust security features, and a traceable data system, protecting it from unauthorized access or alterations. Our platform's interoperability connects data from multiple sectors, offering a comprehensive view and empowering informed decisions. Securely monetize your data by sharing it with researchers, organizations, and marketers while retaining ownership. Take control of your data ownership, deciding who has access and how it's used, ensuring privacy and autonomy.
  • 25
    Trust Stamp

    Trust Stamp

    Trust Stamp

    Mitigate fraud, retain customers, and reach a broader base of users worldwide with AI-powered identity solutions at the intersection of biometrics, privacy, and cybersecurity. Trust Stamp delivers trusted identity systems at the heart of how organisations and individuals transact in the connected world and beyond. Trust Stamp's radical innovations in biometrics and data protection empower people to access more with identity that can be safely shared and stored. When our identity technology is used to open a bank account or access a public service, both the individual and organisation achieve higher levels of protection and confidence in the security of their data and the integrity of their systems. Trust Stamp's solutions elevate all sides of an identity system.
  • 26
    BMS Utility Billing Software

    BMS Utility Billing Software

    Black Mountain Software

    Local governments and special utility districts that bill customers for water, sewer, garbage, etc., know how important it is to provide accurate, timely service. The continuous cycle of billing for these utilities is a great fit for the automation that Black Mountain’s Utility Billing Software provides. As with most Black Mountain products, integration is a key component. Used together, our Utility Billing and Cash Receipting products automate and simplify your utility department’s workflow. Adding modules like automatic bank drafting or online payments further increases your efficiency and ability to provide great customer service. Cash Receipting also centralizes collections and automatically integrates them with the General Ledger and applications such as Utility Billing, Business Licensing and Accounts Receivable. Streamlined processing with increased automation.
    Starting Price: $5000 one-time payment
  • 27
    Web5

    Web5

    TBD

    Building an extra decentralized web that puts you in control of your data and identity. The web democratized the exchange of information, but it's missing a key layer: identity. We struggle to secure personal data with hundreds of accounts and passwords we can’t remember. On the web today, identity and personal data have become the property of third parties. Web5 brings decentralized identity and data storage to your applications. It lets devs focus on creating delightful user experiences, while returning ownership of data and identity to individuals.
  • 28
    trinsic

    trinsic

    trinsic

    trinsic connect is a reusable identity verification solution powered by verifiable credentials, digital wallets, and passkeys. Applications can now instantly verify and onboard new users through Trinsic’s reusable identity network. Simplify the user experience with password-less authentication for maximum security with minimum friction. Using zero-knowledge proofs, users can prove things about themselves without oversharing their data. Unlock interoperability for your product without any additional effort on your end. Pre-verified users speed through onboarding helping you acquire more customers at a lower cost.
  • 29
    Talao

    Talao

    Talao

    Thanks to the Talao Self-Sovereign Identity Platform, European companies and citizens can build a new future where their data and digital identities stay safe and owned by themselves. Talao provides protocols, wallets and innovative tools to allow businesses to offer customers services based on their identity, their data and their digital assets. Companies proposing loyalty cards, coupons, vouchers and other membership cards need way to identify their customers in Web3 Apps. Talao's SSI solution allows brands to have access to customers’ information without compromising on users’ data security and sovereignty. The introduction of self-sovereign identity (SSI) for e-government systems can strengthen the privacy of the citizens while enabling identification also for the weakest. ID Cards, Resident Cards, Diploma, Travel credentials, health insurance card. Many use cases to ease citizen's life are possible with Talao's SSI solutions.
  • 30
    Identiq

    Identiq

    Identiq

    When you see a user for the first time, you have no way of knowing if they're a real person or a fraudster using a stolen or fake identity. To lower the risk of identity fraud, Identiq has created a Peer-to-Peer network that validates new users based on the experience and trust of other network members. This way, the first encounter with a new user is never really the first encounter. The trust is already there, provided by the direct, providerless consensus of other network members who already know the user well. Introducing Fully Anonymous Identity Resolution. A proven cryptographic technology that allows network members to ensure the data they hold matches that of the other members, without ever sharing any data between them, or with us. No company learns anything about the user. No company learns who is asking the question.
  • 31
    HYPR

    HYPR

    HYPR | The Passwordless Company

    HYPR fixes the way the world logs in. Organizations are faced with the challenge of achieving secured and seamless authentication coupled with a flawless user experience at a time when it’s more critical than ever. HYPR’s passwordless multi-factor authentication (PMFA) platform decouples authentication from the organization’s current and future identity providers and eliminates the traditional trade-off between security and user experience by providing uncompromising assurance and consumer-grade experience with true passwordless and phishing-resistant MFA. The solution is trusted by more than 60M users worldwide. With deployments taking hours rather than weeks or months, organizations decrease the risk of attack, increase positive user experience, and lower operational costs.
    Starting Price: $4.00 per user/month
  • 32
    MATCHAIN

    MATCHAIN

    MATCHAIN

    Matchain is a decentralized AI blockchain focused on data and identity sovereignty, utilizing advanced AI for data aggregation, analytics, and user profiling to enhance decentralized identity solutions and data management. Its MatchID system offers a secure decentralized identity solution, streamlining access across platforms and providing opportunities to monetize personal data while ensuring privacy with advanced security technologies. MatchID is interoperable, allowing single sign-in across any decentralized application and chain, and supports binding multiple multi-chain wallets as well as Web2 social logins such as email, Twitter, Telegram, and Discord. The platform indexes public data without collecting non-public information, with personal data protected to ensure privacy. MatchHub, a unified front-end platform, utilizes sophisticated analytics to enhance user engagement and provide tailored experiences using MatchID.
  • 33
    3ntity

    3ntity

    Hypermine

    3ntity is a decentralized identity layer for the internet, giving users control of their personal data and identity whilst digital enabling trust for businesses.
  • 34
    Accredify

    Accredify

    Accredify

    Simplify the exchange of digital identity and data whilst augmenting trust in your organization with Accredify’s globally recognized and award-winning technology, TrustTech. Our society is powered by data shared through digital channels, but not all information can be relied on. With the rise of AI-driven deepfake data and documents, establishing digital trust in their services has become essential to every organization. The world is experiencing a crisis of trust where individuals, businesses, and governments globally are experiencing the consequences of a rise in unreliable information. However, legacy systems of information sharing face a trade-off between accessibility and security. Enhanced accessibility means relaxing security protocols, opening more avenues for malicious actors to obtain and tamper with sensitive data.
  • 35
    Optable

    Optable

    Optable

    End-to-end data clean room platform, integrated for activation. Publishers and advertisers use Optable data clean room technology to securely plan, activate and measure advertising campaigns. A new generation of privacy-preserving data collaboration software. Optable customers can collaborate with their customers and partners, including those who aren't Optable customers themselves. This can be done using the platform's Flash Nodes, allowing to invite other parties into a secure environment. Optable offers a decentralized identity infrastructure, allowing to build of private identity graphs. The infrastructure provides means for creating purpose-limited, permission data clean rooms that minimize data movement. Interoperability with data warehouses and other data clean rooms is key. The use of our open-source software allows third-party platforms to match data with Optable customers, as well as implement secure clean room functions for their own use.
  • 36
    Handshake

    Handshake

    Handshake

    An experimental peer-to-peer root naming system. Handshake is a decentralized, permissionless naming protocol where every peer is validating and in charge of managing the root DNS naming zone with the goal of creating an alternative to existing certificate authorities and naming systems. Names on the internet (top-level domains, social networking handles, etc.) ultimately rely upon centralized actors with full control over a system which is relied upon to be honest, as they are vulnerable to hacking, censorship, and corruption. Handshake aims to experiment with new ways the internet can be more secure, resilient, and socially useful with a peer-to-peer system validated by the network's participants. Handshake is an experiment that seeks to explore those new ways in which the necessary tools to build a more decentralized internet. Services on the internet have become more centralized beginning in the 1990s, but do not fulfill the original decentralized vision of the internet.
  • 37
    Microsoft Entra
    Confidently enable smarter, real-time access decisions for all identities across hybrid, multicloud, and beyond. Safeguard your organization by protecting access to every app and every resource for every user. Effectively secure every identity including employees, customers, partners, apps, devices, and workloads across every environment. Discover and right-size permissions, manage access lifecycles, and ensure least privilege access for any identity. Keep your users productive with simple sign-in experiences, intelligent security, and unified administration. Safeguard your organization with the identity and access management solution that connects people to their apps, devices, and data. Discover, remediate, and monitor permission risks across your multicloud infrastructure with a cloud infrastructure entitlement management (CIEM) solution. Create, issue, and verify privacy-respecting decentralized identity credentials with an identity verification solution.
  • 38
    Quadrata

    Quadrata

    Quadrata

    Start building trusted DApps and create a true bot-free experience with Quadrata Identity Passport. Sybil resistant decentralized identities, proof of humanity. Expanded institutional capital with KYC/AML. Increased capital efficiency. Prevent unfair advantage with unique identification. All-in-one Web3 KYC/AML plugin with ongoing monitoring. Swift passport creation with just a few lines of code. Quadrata Passport automatically syncs identity, compliance, and reputation-based data across multiple blockchain networks. Our ecosystem is ever expanding. Join our industry partners today and help create a trusted Web3 experience for all. Quantstamp is a trusted leader in blockchain security and delivers end-to-end blockchain solutions for the world's largest enterprises. CertiK has conducted over 1,800 audits across all major protocols and is trusted as the recommended blockchain and smart contract audit provider by top exchanges like Binance, OKEx, and Huobi.
  • 39
    everID

    everID

    Datarella

    Decentralized public key infrastructure is a fundamental technology that allows users to authenticate themselves, without relying on a trusted centralized authority. Private keys grant the users access and control over their accounts, their assets, and even to their digital identity (SSI). Within everID, everKEY is our decentralized key recovery solution for wallets and other products that require highly secure key management.
  • 40
    WWPass

    WWPass

    WWPass

    No need to remember, manage, reset, protect or exchange. Consolidation of all logins in one protected authentication token. Easy self-management of the authentication token. Log in with a universal, international digital identity, trusted if required and anonymous if allowed. All data is encrypted by the user with WWPass Key. No need for OTP, SMS, or other extra costly adaptive authentication and login support. User identity is protected by WWPass Key. WWPass MFA is a strong customer authentication compliant with GDPR and NIST. Each user gets a unique key, which helps to log in to an unlimited number of accounts and services without usernames and passwords. Log in to a growing number of online services with your WWPass Key as a universal key to the digital world. Enable next-generation strong multi-factor authentication without usernames and passwords. Simplify and streamline secure access to any business application without a username and password.
  • 41
    walt.id

    walt.id

    walt.id

    We offer holistic digital identity and wallet infrastructure used by thousands of developers, governments and businesses across industries. The products are open source, based on open standards, compliant with digital identity regulations and available for self-management (on-premise) or as a managed service (SaaS). Our Digital Identity Infrastructure include the following products and functionality: Issuer SDKs, APIs & APPs: Issue credentials or mint tokens with our infrastructure and white label applications. Wallet SDKs, APIs & APPs: Launch a wallet for your organization, employees or customers to manage access, credentials and tokens. Verifier SDKs, APIs & APPs: Verify credentials or tokens, use powerful verification policies and white label apps. Identity Provider: Enable wallet-, credential- and token-based authentication and identification for your apps.
  • 42
    Meeco

    Meeco

    Meeco

    Increase trust, reduce friction through transparent personal data enabled services. As individuals gain the legal rights to manage and control their data, businesses need to re-think how they collect, store and exchange their customers information. Data breaches, identity theft and data malpractice have taken trust to an all-time low.​ Individuals are calling for a new social contract with businesses. As individuals gain the legal rights to manage and control their data, businesses need to re-think how they collect, store and exchange their customers information. The Meeco Labs program provides organisations an opportunity to test hypotheses and prove business value prior to making substantial investments. It is a custom designed process and pathway to new products, services, experiences and business models. Utilising the Meeco Platform and API suite, consent exchanged customer or citizen data is mapped directly to internal CRM, ERP or enterprise systems.
  • 43
    Intel Trust Authority
    Intel Trust Authority is a zero-trust attestation service that ensures the integrity and security of applications and data across various environments, including multiple clouds, sovereign clouds, edge, and on-premises infrastructures. It independently verifies the trustworthiness of compute assets such as infrastructure, data, applications, endpoints, AI/ML workloads, and identities, attesting to the validity of Intel Confidential Computing environments, including Trusted Execution Environments (TEEs), Graphical Processing Units (GPUs), and Trusted Platform Modules (TPMs). ​ Provides assurance of the environment's authenticity, irrespective of data center management, addressing the need for separation between cloud infrastructure providers and verifiers. Enables workload expansion across on-premises, edge, multiple cloud, or hybrid deployments with a consistent attestation service rooted in silicon.
  • 44
    Affinidi

    Affinidi

    Affinidi

    At Affinidi, our vision is to revolutionize the current paradigm of digital identity, empowering individuals to reclaim ownership of data, regain control over digital identities, and actively engage in safeguarding privacy. Our concept of "holistic identity" encompasses the complete spectrum of discovering, collecting, sharing, storing, and even monetizing personal data in the digital realm. We enable individuals to possess a comprehensive integrated self-view in the digital world, exercise authority over their data, and make informed usage decisions. In the digital realm, our digital selves, constructed from attributes like names, ages, and locations, become fragmented as each site captures only partial aspects, leaving us exposed and vulnerable.
    Starting Price: $199 per month
  • 45
    InSight Digital Experience Platform
    Iron Mountain InSight Digital Experience Platform (DXP) is a secure, scalable SaaS solution designed to automate and enhance the management of both digital and physical information throughout its lifecycle. It integrates intelligent document processing (IDP), content management, workflow automation, and information governance into a unified environment, facilitating digital transformation initiatives. InSight DXP employs advanced AI technologies, including generative and agentic AI, to extract, classify, and enrich unstructured data, enabling rapid document understanding and intelligent decision-making. Users can create custom workflows and solutions using the platform's low-code Solution Designer, which offers pre-built templates and connectors for various business applications. Additionally, InSight DXP supports compliance by enforcing records retention and data privacy policies, integrating with the Iron Mountain Policy Center solution to ensure audit-ready governance.
  • 46
    Mintscan

    Mintscan

    Cosmostation

    Stake, earn, explore, and bridge between self-sovereign blockchains supported on interchain applications powered & secured by the Cosmostation Validator node. Cosmostation is an ecosystem leading, highly-secure validator node operator trusted on 35+ networks and chosen by users worldwide. Keep your Proof of Stake assets safe and sound with us while passively earning your staking rewards. Cosmostation is not just a validator, but a full-package gateway to the interchain ecosystem. Start your journey with our user-friendly infrastructures for the community. Industry leading non-custodial mobile wallet designed for PoS blockchains. Explore the interchain in the palm of your hand.
  • 47
    WMTC Utility Billing System

    WMTC Utility Billing System

    White Mountain Technology

    We specialize in custom written software and services designed specifically for your Utility Software needs - Utility Billing, Work Orders, Project Tracking and Electronic Filing Cabinet software built for your unique site and your unique specifications. White Mountain Technology & Consulting has been offering successful Financial Management Software and Business Consulting Services for the Government and Energy industries for over 30 years. White Mountain Technology and consulting is proud to be an 100% American company based in Longmont, Colorado. Our business model is one that is designed to keep our business out of the volume sales market. Too many customers always equates to too little service in the industries we serve, and service after the sale is our most important commodity. We pick our customers as carefully as they pick us.
  • 48
    Stirdie

    Stirdie

    Stirdie

    Secure, auditable, and verifiable communication tools for business. Creating environments designed for data and identity verification audited by a blockchain network. Transform and optimize the way your business communicates forever. Stirdie uses peer-to-peer identity verification and cryptography to achieve data integrity and provide businesses and users alike with a tamper-proof suite of communications tools. By underpinning our suite of communications tools with blockchain technology, we provide a safe environment for businesses and users to transact sensitive data without fear of interception. We're eliminating fraud, and scams and saving businesses and individuals millions. Transactions and actions are recorded on the blockchain via a hash and unique ID, providing auditability of data. All transactions and actions from when data is created, sent, opened, and read are validated against the blockchain to ensure the integrity of the message.
  • 49
    FYEO

    FYEO

    FYEO

    FYEO secures enterprises and individuals from cyber attacks with security audits, real-time threat monitoring and intelligence, anti-phishing solutions and decentralized identity management. End-to-end blockchain security services and auditing for Web3. Protect your organization and employees from cyberattacks with FYEO Domain Intelligence. Decentralized password management and identity monitoring services made simple. End user breach and phishing alert system. Uncover vulnerabilities and protect both your application and your users. Identify and address cyber risks across a company before you take on the liability. Protect your company from ransomware, malware, insider threats, and more. Our team works collaboratively with your development team to identify potentially critical vulnerabilities before they can be exploited by a malicious actor. FYEO Domain Intelligence delivers real-time cyber threat monitoring and intelligence to help secure your organization.
  • 50
    Identity.com

    Identity.com

    Identity.com

    We leverage industry-standard, open-source identifiers called Decentralized Identifiers (DIDs) to enable off-chain authentication. DIDs are a core component of building a native identity layer and can be viewed as a new type of global identifier. We have built and now maintain did:sol, the leading DID method on the Solana blockchain. Designed to both protect against cybercrime and satisfy regulators, the Gateway Protocol enables any business or application to meet identity requirements (such as KYC and AML) without developing their own identity verification system or data storage. Instead, identity verification is completed by gatekeepers in gatekeeper networks.