Alternatives to Privakey
Compare Privakey alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Privakey in 2026. Compare features, ratings, user reviews, pricing, and more from Privakey competitors and alternatives in order to make an informed decision for your business.
-
1
Auth0
Okta
Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO. -
2
FusionAuth
FusionAuth
FusionAuth is a modern, developer-focused identity and access management platform built to give you full control over your authentication stack. Whether you’re building a startup app or managing enterprise-scale infrastructure, FusionAuth delivers all the must-have features — from login and SSO to advanced protocols like OAuth2, OIDC, SAML, and WebAuthn — in a self-hostable or cloud-native package. Designed with developers in mind, FusionAuth integrates seamlessly with any language, framework, or architecture. Every capability is API-first and built for extensibility, so you can tailor authentication workflows without getting locked into rigid, inflexible systems. FusionAuth supports all the key use cases — user registration, multi-factor authentication (MFA), passwordless login, role-based access control, and more — while helping you stay compliant with GDPR, HIPAA, PCI, and other regulatory standards. -
3
Cisco Duo
Cisco
Cisco Duo is a cloud-based identity security solution that protects organizations from identity-based threats and boosts workforce productivity. Trusted by over 40,000 organizations worldwide, Duo delivers an exceptional access management experience across all users, devices, and applications, making access to resources secure, seamless, and easy. Duo with Cisco Identity Intelligence provides deep visibility across your identity ecosystem, adding a powerful security layer to any identity infrastructure. Offer users a world-class access experience through Duo Passport to eliminate MFA friction and fatigue without sacrificing security. To stop threats, Duo verifies user identities with strong authenticators including Duo passwordless, Verified Duo Push with number matching, and phishing-resistant factors like biometrics and FIDO2 security keys. Paired with deep insights into users’ devices, Duo gives you the control to adaptively limit access based on device health or user risk.Starting Price: $3 per user per month -
4
Udentify
Fraud.com
Know the real identity of your customer, user, or employee with the Udentify Identity Verification and Biometric Authentication solution. Challenges we solve: - Identify verification - Onboarding - New account opening - Age verification - Fraud prevention - Biometric authentication - Passwordless authentication - Strong customer authentication - KBA replacement - KYC and AML compliance Behind the scenes, Udentify embeds cutting-edge technologies into our identity verification and biometric authentication solution via a lightweight and flexible SDK. We are constantly investing in our technologies to stay at the forefront of fraud detection, compliance, and user experiences.Starting Price: $0.17 -
5
The OptimalCloud
Optimal IdM
The OptimalCloud platform is a full featured, award winning, SSO Federation & IAM solution that provides a single point of authentication, policy management and auditing for a seamless end user experience. The OptimalCloud is deployed in workforce and consumer scenarios, used by some of the most recognizable companies on the globe, and used in some of the most secure environments in the world. Each feature-rich pricing tier comes with multi-factor authentication (MFA), because proper security shouldn't cost extra. The OptimalCloud is integrated with more than eleven thousand applications, simplifying set up and configuration and also has 24 x 7 x 365 support with a guaranteed uptime of 99.99%.Starting Price: $2/user/month -
6
Ping Identity
Ping Identity
Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.Starting Price: $5 per user per month -
7
It'sMe
Acceptto
Employees hate using passwords as much as you hate managing password vulnerabilities. More passwords and tokens lead to greater security risk, fatigue, and cost. It’s time to get rid of them for good. 89% of security professionals claim that a more advanced multi-factor authentication tool that provides continuous, behavioral authentication would improve their company’s security posture. Acceptto provides users with Intelligent MFA that intuitively authorizes access to applications and continues authenticating post-authorization. We prevent account takeovers, even if hackers have already acquired passwords. ItsMe™ Intelligent Multi Factor Authentication (MFA) increases your security by authorizing access attempts to a registered device in real-time, be it through a push notification or verification code (SMS, TOTP, email, and etc.). With our timed based one-time password (TOTP), security key, or biometric options, you can authenticate access even when offline. -
8
LiveEnsure
LiveEnsure
LiveEnsure® security authenticates users in real time via their smart device. It goes beyond tokens, certs, PINs, OTPs, push or passwords. LiveEnsure® is strong, seamless multi-factor verification of devices, location, knowledge, time, biometrics and behavior in context with an elegant user experience and individual privacy. Instead of crafting home-grown solutions or relying on vendors who infiltrate your identity stack, LiveEnsure® is simple trust API that gives you the power to verify your users across multiple factors with a single call. Developers can offer their users strong but private authentication by simply mashing up a few lines of code with their site or embed our mobile libraries for iOS and Android in your own app. Get rid of traditional passwords, 2FA and captcha altogether with a single API. There are no confusing tokens, certs or push messages. Just a simple call, present and poll API to our cloud authentication service. -
9
PortalGuard
BIO-key International
BIO-key PortalGuard IDaaS is a single, flexible cloud-based IAM platform that offers the widest range of options for multi-factor authentication, biometrics, single sign-on, and self-service password reset to support a customer’s security initiatives and deliver an optimized user experience – all at an affordable price point. For over 20 years, industries such as education, including over 200 institutions, healthcare, finance, and government have chosen PortalGuard as their preferred solution.Whether you’re looking for passwordless workflows, support for your Zero Trust architecture, or just implementing MFA for the first time, PortalGuard can easily secure access for both the workforce and customers whether they are remote or on-premises. PortalGuard’s MFA stands out above others as it is the only solution to offer Identity-Bound Biometrics that offer the highest levels of integrity, security, accuracy, availability and are easier to use than traditional authentication methods. -
10
Okta
Okta
One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity. -
11
Unbound CORE Identity Security
Unbound Security
Authenticate users and machines and protect PKI – seamlessly across all locations and devices. Create virtual enclaves for mobile and for desktop with maximum security and without sacrificing the user experience. Authenticate user access and identify simply and securely with CORE virtual secure enclave SDK. Mobile, desktop, or server-side enabled – CORE keeps credentials safe even if the user’s personal device is compromised. Build virtual smartcards, protect mobile apps, and more with pure software agility. Integrate strong two-factor and multi-factor authentication into a mobile app – no hardware, no one-time password, no software token required. Replace traditional smartcards with virtual ones to authenticate employees and reduce operational strain and total cost of ownership. Protect machine and human electronic identities and the root certificate authority which oversees them. Protecting PII with maximum security, best user experience. -
12
HYPR
HYPR | The Passwordless Company
HYPR fixes the way the world logs in. Organizations are faced with the challenge of achieving secured and seamless authentication coupled with a flawless user experience at a time when it’s more critical than ever. HYPR’s passwordless multi-factor authentication (PMFA) platform decouples authentication from the organization’s current and future identity providers and eliminates the traditional trade-off between security and user experience by providing uncompromising assurance and consumer-grade experience with true passwordless and phishing-resistant MFA. The solution is trusted by more than 60M users worldwide. With deployments taking hours rather than weeks or months, organizations decrease the risk of attack, increase positive user experience, and lower operational costs.Starting Price: $4.00 per user/month -
13
Centagate Cloud
Centagate Cloud
CENTAGATE CLOUD offers a centralized login option that protects all applications from security breaches by using FIDO2 passwordless authentication. Control, protect and secure your application access. One login credential for all applications. A system that has strong digital security which eliminates phishing, fraud and password theft. Since the authentication is centralized, only one login credential is needed for all applications. Highly cost-effective with zero CAPEX and minimal OPEX. Some of important features that makes your authentications with CENTAGATE CLOUD more secured and protected. An authentication that requires two or more factor like what you have (device), what you are (biometrics) and what you know (password). An authentication based on previous login’s risk and behavior. Evaluating these risk could stop any trials of security breach. Pre-integrated certified Securemetric FIDO2 server for registration and authentication.Starting Price: $2 per month -
14
Entrust Identity Enterprise
Entrust
The world's most proven on-prem identity & access management (IAM) solution for strong digital security. Identity Enterprise is an integrated IAM platform that supports a full suite of workforce, consumer, and citizen use cases. Ideally suited for high-assurance applications that require a Zero Trust approach for thousands or millions of users, Identity Enterprise can be deployed on-premises or as a virtual appliance. Never trust, always verify. Protect your organization and user communities both inside and outside the perimeter. Secure workforce, consumer, and citizen identities with high assurance use case coverage including credential-based access, smart card issuance, and best-in-class MFA. Limit user friction with adaptive risk-based authentication, passwordless login, and cloud app federation. Option to use digital certificates (PKI) for a higher level of security when and where warranted, either with a physical smart card or a virtual smart card. -
15
SecureAuth
SecureAuth
With SecureAuth, every digital journey is simple, seamless, and secure to support your Zero Trust initiatives. Protect employees, partners, and contractors with frictionless user experience while reducing business risk and increasing productivity. Enable your evolving digital business initiatives with simple, secure, unified customer experience. SecureAuth leverages adaptive risk analytics, using hundreds of variables like human patterns, device and browser fingerprinting, and geolocation to create each user’s unique digital DNA. This enables real-time continuous authentication, providing the highest level of security throughout the digital journey. Enable employees, contractors and partners with a powerful approach to identity security that simplifies adoption of new applications, accelerates efficiency, increases security and helps drive your digital initiatives. Use insights and analytics to drive digital initiatives and speed up the decision making process.Starting Price: $1 per month -
16
cidaas
WidasConcepts
cidaas is the optimal solution for fast and secure identity management. Thanks to cidaas you create one identity per user across all your channels. cidaas is based on OAuth2.0 and OpenID Connect standards, provides strong API security and with integrated Bot Net Detection and Fraud Detection a secure journey across all your business channels. Modern Identity and Access Management goes like this. Comprehensive feature set for quick and easy integration and implementation of all use cases and systems. We take care of it so you can focus on your core business. No more worrying about maintenance or operation. Countless passwords and pins make life difficult for users and are an unsightly barrier to access on digital channels. With passwordless authentication you secure your digital applications and offer your users a unique customer experience – because the login is the first thing your users see. -
17
Entrust Identity as a Service
Entrust
Cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). Secure access to apps, networks, and devices for all of your users — with cloud-based multi-factor authentication. Proximity-based login, adaptive authentication and other advanced features contribute to an optimal user experience. Happy users don’t try to circumvent security measures. Everyone wins. This is easier than anything else you’ve tried. Work-saving touches — like built-in provisioning tools and on-premises and cloud integrations — reduce the workload for IT, from deployment through everyday management. Get strong IAM to move faster into the future. Cloud-based Identity as a Service scales quickly to accommodate new users, expanding use cases, and evolving security threats. -
18
Trusona
Trusona
Trusona, the pioneering leader of passwordless authentication for digital businesses, provides a phishing-resistant alternative to passwords and SMS OTPs. Trusona Authentication Cloud is a passkey-as-a-service platform, offering the simplest, quickest and least expensive way to add passkeys to your website. It improves business growth and profitability with sign-ins that delight your customers, mitigating top threats like phishing and account takeovers (ATOs) while providing a UX designed for the way people live. Organizations in iGaming, travel, financial services, healthcare and more, trust Trusona for their passwordless authentication initiatives. -
19
The OneWelcome Cloud Identity Platform is a flexible platform that manages all your use cases for B2C, B2B and gig workers. This core platform can be expanded with a range of identity apps that combine to meet your organization’s specific needs. OneWelcome manages the European complexity of different eID’s, privacy laws, GDPR regulations, and languages for you. Our purpose is to lower the threshold for any European citizen or company that wants to connect. Create frictionless, secure and privacy protected access for your customers. Connect and protect your business-to-business ecosystem. Delegate and manage access to business partners, suppliers and your extended workforce. Get in touch to find out what the OneWelcome Cloud Identity Platform can do for your business and benefit from business enablement, operational efficiency, enhanced customer experience, improved security and facilitated compliance.
-
20
LogMeOnce
LogMeOnce
A formidable cyber security defense should be mindful to thwart internal and external threats. External and internal threats have one common denominator. The end user’s adherence to security, policy, and best practices. External elements exploit an unsuspecting internal user’s adherence to sound security policies to find their way in. Granted, external threats can be addressed with various mechanisms such as firewalls, but, inherently it has its roots and seeds in weak internal shortcomings. However, you can easily curb internal threats by simply establishing “automatic & enforceable” security policies, advising end-users to adhere to secure access protocols with trusted credentials. Thankfully, LogMeOnce Patented Technology offers plenty of ways to protect your team members, credentials, and agency with advanced automated authentication. LogmeOnce dashboard creates powerful and unified access to a user’s entire disparate/numerous set of applications.Starting Price: $3 per user per month -
21
MonoCloud
MonoCloud
MonoCloud is a developer-focused platform designed to streamline authentication, authorization, and user management for applications across multiple environments, including web, mobile, IoT devices, and more. It enables developers to easily integrate secure and customizable login processes, supporting a range of authentication methods such as passwords, magic links, one-time passcodes, and social logins like Google, Facebook, and Apple. Built with a strong emphasis on reducing user friction, MonoCloud offers a branded and smooth authentication experience. The platform includes advanced features such as mutual TLS, brute-force protection, and global session management, making it a comprehensive solution for handling user access across various applications and devices. In addition, MonoCloud is designed with developers in mind, providing extensive documentation, integration guides, and support for various front-end and back-end frameworks.Starting Price: $0 -
22
LastPass
LastPass
LastPass is a cloud-based password manager available on any system or device, ensuring credentials are protected, private, and always within reach. Simple to set up and effortless to use, LastPass delivers the world's most convenient password management experience for consumers and businesses of all sizes and technical requirements. Say goodbye to password fatigue by generating, sharing, accessing, and managing credentials at the click of a button, while preventing bad actors from accessing precious data and account logins. Businesses also utilize LastPass to consolidate their tech stacks or to fill access management gaps with native integrations for MS Entra, Okta, and other IdPs and IAMs. With over 100 customizable policies, flexible privileges, detailed reporting, MFA and passwordless authentication options, LastPass makes it easy for organizations with numerous logins and increasing security risks to standardize password management company wide.Starting Price: $4 per user per month -
23
Strivacity
Strivacity
Strivacity adds secure customer identity and access management (CIAM) capabilities to your online properties fast so you can grow your revenue, stay compliant with fast-changing privacy regulations and personalize your service with the insights you’ll get into how your customers interact with you. We can plug into your existing app, let your customers self-service their accounts and scale as fast as your business can grow. It's OK if you've outgrown your CIAM solution. We use clicks (not code) to reduce your TCO and get your customers where they’re going. Our Isolation by Design™ architecture secures regulated data and satisfies privacy standards like GDPR and CCPA. When you add in requirements from security and legal teams, the focus on the “C” (aka your customers) often gets lost. Strivacity keeps the focus on your customer with one solution that meets everyone’s needs, goes live faster and doesn’t require an army of developers and consultants to feed and water it.Starting Price: $500 per month -
24
Sepior
Sepior
Multiparty Computation (MPC) generates and uses keys in the form of distributed key shares – eliminating the existence of a complete key on any single device to eliminate single points of failure. Sepior provides next-generation key management technology that allows businesses to transact online with institutional-grade cryptocurrency wallets, private blockchains, and SaaS applications. Sepior is pioneering the industry transition to threshold cryptography, using multiparty computation (MPC) to address the need for data confidentiality, integrity, and availability of new and emerging online services. For cryptocurrency exchange providers and other institutional traders, Sepior solves the problem of securing the private keys associated with cryptocurrency stored in wallets, facilitating institutional-grade of wallet security for service providers and their customers. Sepior’s approach also dramatically reduces mining workloads and the complexity of on-chain operations. -
25
Use keys to protect the secrets, personal data, and sensitive information you store in the cloud. Create and delete keys, set up access policies, and perform rotation via the management console, CLI, or API. Yandex KMS implements symmetric and asymmetric cryptography. Use the REST or RPC API to encrypt and decrypt small amounts of data, such as secrets and local encryption keys, as well as to sign data using e-signature schemes. You manage access to encrypted data, and Yandex KMS ensures the reliability and physical security of keys. Hardware Security Modules (HSMs) are available. Encrypt small amounts of data using the SDK in Java or Go. To encrypt larger amounts of data, the service is integrated with popular encryption libraries, including the AWS Encryption SDK and Google Tink. Integration with Yandex Lockbox makes it possible to encrypt secrets with your own keys. Secrets and data can also be protected using encryption keys in Managed Service for Kubernetes.Starting Price: $0.0230 per month
-
26
IBM Verify
IBM
Infuse cloud IAM with deep context for risk-based authentication to enable frictionless, secure access for your consumers and workforce. As organizations modernize hybrid multi cloud environments using a zero-trust strategy, identity and access management can no longer remain siloed. In a cloud environment, you need to develop cloud IAM strategies that use deep context to automate risk protection and continuously authenticate any user to any resource. Your journey should match your business requirements. Maintain existing investments and protect on-premises applications as you design and customize the right cloud IAM architecture to either replace or complement your infrastructure. Your users want one-click access from any device to any application. Onboard new federated applications to single sign-on (SSO), embed modern multi-factor authentication (MFA) methods, simplify logistics and give developers consumable APIs. -
27
Procyon
Procyon
Get frictionless, secure access to cloud infrastructure. Get passwordless access to major cloud platforms and thousands of cloud resources. We work seamlessly with AWS, GCP, Azure, and other cloud-native tools. Stop overprivileged access with just-in-time access for developers. DevOps users can request access to cloud resources with ‘just enough privileges’ to get timebound access to resources. Eliminate productivity bottlenecks of a centralized administrator. Configure approval policies based on a variety of factors. View a catalog of granted and unaccessed resources. Stop credential sprawl and worrying about credential theft. Developers can get passwordless access to cloud resources using Trusted Platform Module (TPM) based technology. Discover potential vulnerabilities now with our free assessment tool and understand how Procyon can help solve the problem in a matter of hours. Leverage TPM to strongly identify users and devices. -
28
Secfense
Secfense
Protect your company, employees, and customers with simpler and stronger authentication. Deploy 2FA in minutes, not weeks. 2FA (and other user access security policies) built into the fabric of the infrastructure, not rigidly fixed to the applications. Enabling the use of any 2FA methods available on the market now and in the future without changing the core. Protection is available across the entire organization, spanning from on-premise, public and private cloud. Secfense is deployed in between your users and the applications they access. It learns the traffic patterns related to authentication. It can then enforce multi-factor authentication login and other sensitive actions without interfering with the applications existing code or database. Up-to-date 2FA methods are always available on the platform. Application changes don’t affect Secfense and applied methods. Take control over session expiration rules across all apps. Don’t rely on VPNs, base trust on users and their devices. -
29
iCrypto
iCrypto
Designed to be used with our entire suite of iCrypto cloud-based services, the iCrypto SDK can integrate into existing Enterprise Apps or when deployed as iCrypto App be used as a standalone one-step password-less verification solution. By employing the latest cryptography technologies in combination with device-level security and management, the iCrypto SDK is the ultimate software token that can be used as a biometric ID on the go in a wide variety of industries. iCrypto SDK provides authenticator PKI signatures, a range of cryptographic protocols such as TOTP/HOTP/OCRA/MTP, push-based authentication, on-device as well as network-based biometrics such as fingerprint, iris scan, face/voice/eyeball recognition, third-party authorization, secure storage, context collection and host of security features.Starting Price: Free -
30
Mitek
Mitek Systems
Mitek Systems is a leading provider of AI-driven identity verification and fraud prevention solutions designed to secure digital interactions across industries. Their platform offers seamless integration of biometric authentication, identity verification, geolocation, and fraud detection tools to protect customers at every touchpoint. Key products include biometric liveness detection for face, voice, and documents, check fraud detection, and passwordless authentication. Mitek’s solutions help businesses reduce financial losses by preventing account takeover and synthetic identity fraud while ensuring compliance with regulatory mandates such as KYC and AML. The company’s user-friendly no-code platform accelerates deployment and boosts customer confidence with simple, secure user experiences. Trusted by over 7,900 organizations worldwide, Mitek continues to innovate in identity verification and fraud defense. -
31
uqudo
uqudo
uqudo is MEA's leading digital identity platform, delivering end-to-end verification that safeguards every customer touchpoint. Our award-winning suite seamlessly integrates white-label KYC, KYB, AML Screening, Transaction Monitoring, and Biometric Authentication to embed trust into digital interactions. We empower enterprises and scaleups to accelerate digital transformation, slash operational costs, deliver frictionless user experiences, ensure regulatory compliance, and eliminate fraud. With proven expertise spanning Banking, Telecommunications, Fintech, Trading, and national identity programs, uqudo processes millions of verifications annually across the region. -
32
Nomidio
Nomidio
The world's most advanced unified Identity and Authentication Service. At Nomidio we specialise in protecting identities. Using our federated identity cloud, we liberate companies from holding unnecessary PII and enable secure customer identification for loan applications, verification of customers to access account information and much more. It all starts with the Nomidio Identity Cloud, which is an incredibly secure, quantum-ready, identity vault. The ID cloud delivers multiple identity services to multiple organizations, removing the need and expensive risk to companies of propagating identity data as is the standard today. The identity data is secured using our parent company’s patented Quorum multiparty split key cryptography, meaning that anyone wanting to decrypt any one record will require the compliance of other holders of the key fragments. Nomidio IDC is a light touch, highly effective biometric identity and authorization tool, 100% SaaS and can be deployed in minutes.Starting Price: $3.88 per user per month -
33
authID.ai
authID.ai
Launch the power of mobile facial biometrics to deliver seamless identity fraud protection across the digital identity lifecycle. Onboard customers with ease. Weed out the bad guys early. Ensure user accounts and transactions cannot be compromised by account takeover or identity fraud. Gain increased assurance with cloud-based biometric authentication of high-risk transactions. Eliminate passwords with FIDO2 strong authentication tied to a trusted identity. Confirm the identity of new users remotely- know they are who they say they are. Our mobile biometric solutions help you onboard customers and verify their presence with ease while ensuring their accounts cannot be compromised by account takeover or identity fraud. Learn how authID can help you transform identity management. -
34
UserLock
IS Decisions
Secure Active Directory user logins with Multi-Factor Authentication, Single Sign-On, contextual access controls, and real-time monitoring and reporting. UserLock helps administrators to manage and secure access for every user, without obstructing employees or frustrating IT.Starting Price: $2.00/month/user -
35
Akeyless Identity Security Platform
Akeyless
Akeyless delivers identity security for an era shaped by automation and AI. The cloud-native platform secures machines, AI agents, and human access across hybrid, multi-cloud, and on-prem environments. It provides a practical path to secretless, identity-based access through secrets management, certificate lifecycle management and PKI, PAM, and unified governance. Akeyless is built on a cryptography foundation that combines encryption, key management, and Distributed Fragments Cryptography to keep sensitive material under customer control and protected from post-quantum threats. With integrations for cloud IAM, Kubernetes, CI/CD, and MCP-based AI agent workflows, teams can adopt and scale AI agents securely without expanding risk. Akeyless Jarvis™ delivers identity intelligence to surface risky access and strengthen oversight. -
36
Google Cloud Key Management
Google
Scale your security globally. Scale your application to Google’s global footprint while letting Google worry about the challenges of key management, including managing redundancy and latency. Help achieve your compliance requirements: Easily encrypt your data in the cloud using software-backed encryption keys, certified FIPS 140-2 Level 3 validated HSMs, customer-provided keys or an External Key Manager. Leverage from integration with Google Cloud products. Use customer-managed encryption keys (CMEK) to control the encryption of data across Google Cloud products while benefiting from additional security features such as Google Cloud IAM and audit logs. A cloud-hosted key management service that lets you manage symmetric and asymmetric cryptographic keys for your cloud services the same way you do on-premises. You can generate, use, rotate, and destroy AES256, RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 cryptographic keys. -
37
Vaultody
Vaultody
Vaultody is a B2B SaaS platform delivering institutional-grade, non-custodial digital asset infrastructure for businesses operating across crypto and blockchain markets. Built on Vaultody’s in-house developed MPC (Multi-Party Computation) technology, the platform enables secure, resilient, and policy-driven digital asset operations while eliminating single points of failure and meeting the highest security standards on the market. Vaultody supports Treasury Management, Direct Custody, and Wallet-as-a-Service (WaaS) solutions through a unified, multi-chain environment designed for enterprise-scale operations. Organizations manage digital assets using role-based access controls, approval workflows, transaction policies, and audit-ready governance to ensure operational integrity and compliance. Vaultody serves financial institutions, fintechs, exchanges, payment platforms, hedge funds, venture capital firms, asset managers, and digital asset businesses.Starting Price: $166 -
38
BlackBerry Cyber Suite
BlackBerry
Secure and protect your users and devices, even BYOD laptops and smartphones, with a solution that’s focused on earning trust across any endpoint and continuously validating that trust at every event or transaction. Is your organization equipped with the tools to empower your employees, no matter where they’re working? In a situation where employees may be unable to report to the office, it’s essential that they still have secure access to the data and apps they need, whether they use corporate or personal owned devices. The BlackBerry® Cyber Suite provides complete security, effectively preventing breaches and safeguarding against sophisticated threats with advanced AI. It provides a total Zero Trust solution with coverage across the full spectrum of devices, ownership models, network, apps and people. It continuously authenticates users and dynamically adapts security policies to deliver a Zero Touch experience that improves security with no user interruption. -
39
BehavioSec
BehavioSec
Welcome to the next generation of behavioral authentication. Deployed across global 2000 companies, the BehavioSec platform uses deep authentication to continuously verify user identity with zero friction and over 99% accuracy across millions of users and billions of transactions. While organizations invest significant resources to insulate from attacks, Account takeovers remain a menace. To make matters worse, many costly business challenges – like manual fraud analysis and customer attrition from friction – stem from these failed investments meant to protect. BehavioSec stops account takeover with deep authentication, a new method of verification powered by behavioral biometrics. Deep authentication automatically verifies the human behind the digital identity without adding friction – allowing you to keep fraudsters at bay while drastically reducing costs. BehavioSec addresses new account fraud with population profiling powered by Behavioral Biometrics. -
40
DigitalPersona
HID Global
Go Beyond Multi-factor Authentication with DigitalPersona® software. Expand to risk-based factors, secure every application, offer frictionless access and deploy quickly. Enhance security with industry leading biometric solutions. Simplify processes, speed queues and confirm identities for a range of critical citizen, criminal justice and military applications. Select from an array of U.are.U® readers, modules and sensors. Leading fingerprint technologies to meet your specific OEM, retail, hospitality and commercial identity management requirements. -
41
IPification
IPification
Designed to facilitate instant user access combined with bank-grade security, IPification delivers authentication possibilities outside traditional SMS, Header Enrichment and USSD. IPification’s smooth and secure mobile identity verification lets consumers experience the best of your product, without threatening their online safety. Zero-Click login & registration flows will streamline onboarding and usage. Trusted protocols for user’s ID confirmation based on mobile network data only. By not taking any sensitive app/device information, IPification prevents data leaks. Zero-click compatible login and registration with bank-grade security and the best UX. Streamline onboarding, payment and app usage with an easy authentication process without need for any user action. Irrespective of device, browser or browsing mode, every user log in and registration can be performed seamlessly. -
42
Cryptomathic CKMS
Cryptomathic
Managing an increasing number of cryptographic keys across business applications is becoming evermore challenging, whereas manual, decentralized processes are costly and error prone, and demonstrating compliance is time consuming. Cryptomathic's CKMS is a centralized key management system that delivers automated key updates and distribution to a broad range of applications. CKMS manages the entire lifecycle of all keys (symmetric and asymmetric), supports robust business processes and allows you to confidently comply with and pass internal & external audits. The top three challenges of key management are frequently cited as: lack of clear ownership of processes; lack of skilled personnel and the existence of isolated and fragmented systems. CKMS directly addresses all of these. It enforces specific roles and clear responsibilities for sets of keys; it frees staff from manual, repetitive tasks and allows them to concentrate on policy decisions. -
43
FortressBA
Fortress Identity
Strengthen security and eliminate passwords with a mobile and web biometric user authentication solution. Fortress Identity is simplifying everything about secure authentication by introducing a biometric API into the equation. Implement voice authentication directly in the browser and expand to include the user’s smart phone for true multi-factor authentication. Secure account access and transaction authentication. Secure account access and transaction authentication. Strengthen security to corporate intranets and extranets. Reduce IT overhead cost for password reset. Create an omni-channel unified authentication platform. Protect access to medical records and patient data. Control door access to restricted areas and venues. Use a single API call for authentication and a single API call for enrollment. Use RESTful API to request user authentication (Voice, face, fingerprint). -
44
Windows Hello
Microsoft
Windows Hello is a more personal, more secure way to get instant access to your Windows 10 devices using fingerprint, facial recognition, or a secure PIN. Most PC's with fingerprint readers already work with Windows Hello, making it easier and safer to sign into your PC. Windows Hello lets you sign in to your devices, apps, online services, and networks using your face, iris, fingerprint, or a PIN. Even if your Windows 10 device can use Windows Hello biometrics, you don’t have to. If it’s the right choice for you, you can rest assured that the info that identifies your face, iris, or fingerprint never leaves your device. Windows does not stores pictures of your face, iris, or fingerprint on your device or anywhere else. When you set up Windows Hello biometrics, it takes the data from the face camera, iris sensor, or fingerprint reader and creates a data representation—or graph—that is then encrypted before it’s stored on your device. -
45
Veridium
Veridium
Veridium is the most comprehensive Integrated Identity Platform powered by AI-based Behavioral Biometrics, enabling Multi-Factor Authentication (MFA), digital ID verification, and a true enterprise-grade passwordless experience for employees and customers. Low code, agile, and flexible. Eliminating the password for customers removes the friction often associated with passwords and delivers increased security for online connections with our single step multi-factor authentication solution, while providing higher levels of identity assertion for organizations. Veridium provide an end-to-end authentication platform for all your WFH needs and any VPN solution, delivering strong, multi-factor, passwordless workforce authentication. -
46
Modirum 3-D Secure
Modirum
Modirum is a global leader in 3-D Secure authentication and payment security solutions, helping issuers, acquirers, and merchants prevent online payment fraud. Its suite of products—including Modirum DS, ACS, MPI, SDK, and VPOS Payment Gateway—supports EMV® 3-D Secure standards for seamless and secure card-not-present transactions. The company’s technology enables risk-based and biometric authentication, ensuring a frictionless checkout experience while maintaining robust compliance with EMVCo and payment network requirements. With both hosted and self-deployed options, Modirum offers flexible integration for financial institutions and service providers. Beyond software, Modirum delivers consulting, auditing, and managed services that help clients maintain operational excellence and security readiness. Founded in Finland, Modirum has become a trusted partner for leading banks and processors worldwide. -
47
EncryptRIGHT
Prime Factors
EncryptRIGHT simplifies application-level data protection, delivering robust encryption, tokenization, dynamic data masking, and key management functionality, along with role-based data access controls and a data-centric security architecture, to secure sensitive data and enforce data privacy. EncryptRIGHT is architected to deploy quickly with very little integration effort and scale from a single application to thousands of applications and servers on premises or in the cloud. Our unique Data-Centric Security Architecture allows information security teams to comprehensively define an EncryptRIGHT Data Protection Policy (DPP) and to bind the policy to data itself, protecting it regardless of where the data is used, moved or stored. Programmers do not need to have cryptography expertise to protect data at the application layer – they simply configure authorized applications to call EncryptRIGHT and ask for data to be appropriately secured or unsecured in accordance with its policy.Starting Price: $0 -
48
Locurity
Locurity
Locurity provides patent pending 360 degree security platform using 'zero trust' security model that continuously defends this new enterprise ‘identity perimeter’. Identity is the new enterprise perimeter, protect it now. Defend against 81% of all cyber attacks. Security breaches often start with compromised identity (Verizon DBIR). Detect cyber attacks proactively. Protect before attacks turn to breaches. Secure your enterprise assets. Prevents numerous identity/credential borne attacks such as - phishing, whaling, hacking, guessing, brute forcing, scraping, social engineering, keylogging, ATO, credential stuffing etc. Decentralized architecture - no honeypot of identity crown jewels. Increase productivity while minimizing cost of login/password/access related helpdesk tickets. Email, VPN, SaaS (Office365, GSuite, Salesforce, BOX, Slack...), Healthcare/Finance apps and many more. Biometric (TouchID/FaceID), Pin/Pattern and elliptic curve cryptography based multi factor authentication. -
49
J-KMS
JISA Softech
JISA Softech's J-KMS is a centralized key management system designed to streamline the management of cryptographic keys across various business applications. It automates key updates and distribution, handling the entire lifecycle of both symmetric and asymmetric keys. J-KMS enforces specific roles and responsibilities for key sets, reducing manual tasks and allowing staff to focus on policy decisions. It supports standard key formats and ensures compliance with standards like PCI-DSS and GDPR. Key functions include key generation, backup, restoration, distribution, import/export, audit logging, encryption using Key Encryption Keys (KEKs) or Zone Master Keys (ZMKs), and certification with X.509 or EMV certificates. Benefits of J-KMS encompass reduced human error through user and admin permissions, streamlined processes, cost reduction via automation, dual control with asynchronous workflows, tamper-evident records for compliance, and system-wide key control for any key type and format. -
50
TransUnion TruValidate
TransUnion
TruValidate™ delivers an accurate and comprehensive view of each consumer by linking proprietary data, personal data, device identifiers and online behaviors. Our advanced insights and global network of fraud reporting helps businesses discover anomalies, assess risk and confidently identify good consumers. This allows you to protect your business and focus on offering effective, personalized and friction-right experiences. Confirm user identities against robust, global datasets to expose fraud risks. Secure each point of the consumer journey with customized solutions appropriate for the risk level of each transaction. Proactively identify risky transactions and fraudulent devices in real time while reducing operational expenses.