Alternatives to Sima

Compare Sima alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Sima in 2026. Compare features, ratings, user reviews, pricing, and more from Sima competitors and alternatives in order to make an informed decision for your business.

  • 1
    SV3

    SV3

    Building Intelligence

    SV3 is a cloud-based, SAFETY-Act-certified software solution that enables secure access for visitors, vehicles and vendors. Whether it be at the lobby or loading dock of a building, warehouse or multi-tenanted environment, SV3's trusted access program ensures safe operations without gaps in your security system.
  • 2
    Knomi

    Knomi

    Aware

    Biometrics and multi-factor authentication have emerged as the gold standard when confirming identity. Aware identity verification and management solutions are Bringing Biometrics to Life™ in a variety of environments, from law enforcement and healthcare to financial services and on-site enterprise security. Aware biometrics solutions can capture a range of biometric factors—everything from fingerprints and retina scans to voice and full facial recognition. And the Aware modular architecture makes the system easy to configure for virtually any biometric identity management application. This is the present and the future of identity verification. The Knomi framework provides secure and convenient facial and speaker recognition for mobile, multifactor authentication. From small, customized solutions to large-scale enterprise implementations, Aware’s ABIS offerings are aligned to virtually any customer need.
  • 3
    Onfido

    Onfido

    Entrust

    Onfido, an Entrust company, is a technology provider specializing in AI-powered digital identity verification to help businesses securely and efficiently onboard customers. Its Real Identity Platform verifies users by analyzing government-issued IDs and matching them with facial biometrics, ensuring accurate authentication. Supporting various document types, including passports and driver’s licenses, Onfido integrates seamlessly with business systems to create a frictionless user experience. Its solutions help organizations reduce fraud, comply with global regulations, and streamline customer acquisition. With a focus on trust and security, Onfido enables businesses to verify identities with confidence in an increasingly digital world.
  • 4
    Oloid

    Oloid

    Oloid

    Retrofit your workplace with modern access control. Flexible options to choose from, face, Bluetooth, or QR code. Easy retrofit with existing badge readers and access control systems. Secure your assets with contactless biometrics & tailgating detection. Turn iPhones, iPads, Android Phones, or tablets into smart readers. Oloid prevents unauthorized access and reduces dependence on manual entry procedures. We support integration with your existing IT systems for a seamless experience. Employees can choose contactless biometrics or mobile credentials to gain physical access. Make the workplace frictionless and secure for Smartphone and non-smartphone users alike. Use computer vision to keep an accurate count of people entering & exiting doors and enforce occupancy limits at the points of entry with Oloid’s rule-based access control. Leverage existing security cameras or install off-the-shelf IP cameras.
  • 5
    Protecsys 2 Suite
    With Protecsys 2 Suite, Horoquartz delivers a global, connected electronic safety and security solution. By effectively deterring intrusions, theft, vandalism, aggression and minor infractions, you ensure the continuity of your operations and create a more positive climate in the company. Protecsys 2 Suite is a software suite that integrates access control, intrusion detection, video surveillance, visitor management and centralized supervision of your system. We also offer a complete range of pedestrian and vehicle barriers, professional IP cameras, and image storage solutions, along with all the related electronic equipment. Horoquartz has over 30 years of proven expertise in the field of electronic security. More than 1,200 customers now use our solution, in all sectors of activity. Manage and secure access to your premises. Prevent threats, identify perpetrators and facilitate alarm verification.
  • 6
    SimaPro

    SimaPro

    SimaPro

    SimaPro is a powerful solution for those looking to drive sustainable change. Built on robust science and life cycle thinking, the sustainability software is ideal for product designers, decision-makers and sustainability experts. Its fact-based LCA approach provides the insights you need to make better decisions, empower better choices and reduce the environmental footprints of products and services. SimaPro is a cost-effective, science-based tool that offers solutions for any user. SimaPro supports LCA and EPD and always includes a variety of LCI databases, such as ecoinvent v3 and the sector-specific Agri-footprint database. With a SimaPro subscription, you always have access to the latest SimaPro version, technical support, and database updates.
  • 7
    Spintly

    Spintly

    Spintly

    Truly wireless, cloud-based door access control system for a seamless, hassle-free, and contactless user experience. A modern access management system that combines the power of the cloud, smartphone, and wireless technology. Spintly is transforming the physical security industry with its fully wireless, cloud-based access control system. It removes the complexity of the process of deploying an access control solution in a building. With absolutely no wiring the installers can save more than 60% of their time and cost and be more productive. Our vision is to make the built world smarter and simpler by providing a frictionless access control experience to users and to make the building smarter with our fully wireless mesh platform for smart building devices. Spintly offers solutions to various industry segments with its fully wireless access control hardware along with cloud-based software.
  • 8
    FacialProof

    FacialProof

    FacialProof

    FacialProof is an advanced facial recognition API designed for secure, real time identity verification. It combines facial recognition, active and passive liveness detection, anti spoofing, and emotion analysis to ensure only real humans access sensitive actions. Supporting 1:1 verification and 1:N identification, it detects duplicates, banned users, and known identities. Developers can integrate via SDKs in Python, JavaScript, Java, and PHP across web and mobile apps. Cloud hosted for low latency and scalability, FacialProof emphasizes privacy and data security while enabling fraud prevention, step up authentication, and biometric re authentication. Ideal for startups, SMEs, and enterprises, it delivers fast, accurate, AI powered verification with multi face support and real time insights.
  • 9
    Incode

    Incode

    Incode Technologies

    Incode is a leader in identity verification, offering advanced solutions for KYC (Know Your Customer) and AML (Anti-Money Laundering) compliance. Their platform helps businesses safeguard against financial crime while ensuring compliance with global regulations. Using intelligent automation, Incode provides continuous AML monitoring throughout the customer lifecycle, adapting verification flows based on risk levels to balance security and user experience. The solution screens customers against extensive global sanctions, PEP, and adverse media lists to maintain thorough compliance. It also keeps auditable records for regulatory reporting and accountability. Incode’s technology includes facial recognition, document verification, and liveness detection to enable secure and efficient onboarding across various industries.
  • 10
    TEKWave Visitor Management
    Get real-time data, insights, and peace of mind from one central platform through TEKWave's automated cloud solutions for community, logistics, and commercial gate access management. What happens when advanced data and technology meets innovative human thinkers? TEKWave. Our solutions provide digital control and visibility for everything at your physical gates. Enhance security, improve visitor efficiency, and eliminate friction from your visitor experience. Employees, vendors, and guests come and go all day, every day. High traffic can easily create friction in your on-site experience, as well as security vulnerabilities you simply cannot risk. TEKWave’s Commercial Visitor Management system delivers visitor scheduling, processing, tracking, and verification with ease and simplicity - as well as a frictionless, safe way for employees to go to work each day. Monitor and control traffic flow in and out of your campus or facility from any internet connection.
  • 11
    CERTIFY Access Control
    Introducing CERTIFY Access Control, the Revolutionary solution for secure access, physical access control, identity management, and contactless authentication systems. Workplaces are adopting a new set of working guidelines for today's work environment, and the burden of following these guidelines grows. As a result, standard documentation and manual paperwork is required for entry into your office. With cutting-edge facial recognition technology, CERTIFY SnapXT scans the facial features and compares them with the images stored in the database. With 99.9% accuracy for detecting faces, thus winning the trust of your visitors and maintaining your organization’s reputation. CERTIFY SnapXT device has a thermal sensor that detects the body temperature of the user who enters your facility and transmits the data wirelessly to the server. The data then will be analyzed, and it denies access to the user if their temperature exceeds the set parameter.
    Starting Price: $9.95 per month
  • 12
    RightCrowd

    RightCrowd

    RightCrowd

    RightCrowd SmartAccess is an enterprise physical identity and access management (PIAM) platform designed to intelligently manage access across large organizations. It enables businesses to control employee, contractor, and visitor identities within a single integrated system. The platform offers modular solutions including visitor management, access audits, credential management, and evacuation tracking. SmartAccess integrates seamlessly with HR systems, PACS, directory services, background checks, and other enterprise technologies. Real-time monitoring, analytics, and built-in best practices help organizations maintain compliance and security. Deployment options include managed cloud hosting on Microsoft Azure or on-premises/private cloud installations. Trusted by global enterprises and Fortune 500 companies, RightCrowd supports millions of identities across thousands of sites worldwide.
  • 13
    FACEKI

    FACEKI

    FACEKI

    FACEKI is a Facial Recognition authentication platform. FACEKI creates safer, more accessible user experiences for all, powered by state-of-the-art facial recognition technology. It's a highly secure cloud-based cross-devices technology. Which can be integrated easily with any online platforms, websites, and apps to provide them with a powerful facial recognition login and onboarding capabilities. FACEKI aim is to make login to accounts seamless, simple and more secure than ever.
  • 14
    ID R&D

    ID R&D

    ID R&D

    Frictionless biometric authentication and liveness detection. ID R&D uses the power of AI and the science of biometrics to transform the user experience. Surprisingly effortless. Significantly more secure. ID R&D combines extensive research in the science of biometrics with advances in AI to deliver award-winning voice, face, and behavioral biometric authentication software. We’re on a mission to make authentication simultaneously frictionless and significantly more secure. ID R&D technology works with digital and traditional interaction channels, IoT devices, embedded hardware and more. Text dependent and text independent voice verification software null. Accurately detect fraud attempts that use recording, synthesized or converted voice null. The world’s first entirely passive facial liveness detection software – iBeta tested, ISO 30107-3. Continuous verification of web and mobile users through keystroke detection and more.
  • 15
    Vigilant FaceSearch

    Vigilant FaceSearch

    Motorola Solutions

    Analyze over 350 vectors of a suspect’s facial image and take a responsible, policy-based approach to facial recognition-based identification to generate immediate leads from matches to a highly controlled booking image gallery. Pinpoint persons of interest faster with facial cataloging and alerting. Transform license plate data into promising leads that close cases. Solve more crime by uncovering actionable insights within your data. Crowd-sourcing the identity of a wanted suspect is time-consuming. Vigilant FaceSearch analyzes over 350 facial vectors of a suspect’s face to generate immediate leads using a booking image gallery sourced from your department, partner agencies and our own exclusive database - providing a responsible, policy-based approach to facial recognition-based identification. When it comes to facial recognition, precision matters.
  • 16
    Anyvision

    Anyvision

    Anyvision

    An automated watchlist alerting system that identifies persons of interest and their contact history in real-time and historically while protecting the identity of bystanders. A touchless access control solution that uses facial recognition to open guarded points of entry for authorized people, which improves safety from the outside in. Provide frictionless access to people who are authorized to enter a space through privacy compliant and spoof-proof face recognition. Eliminate the need to touch any surface when entering a controlled space by using face recognition to verify authorization. Stop bottlenecks with recognition software that identifies a person instantly. Deploy quickly and seamlessly integrate with the current access control system. Create enforceable, digital barriers without erecting permanent structures and get instant alerts when unauthorized people are identified.
  • 17
    Sign-In Electronically

    Sign-In Electronically

    Sign-In Electronically

    Register as many visitors, vendors, and residents as your organization requires with unlimited documentation of all entrants. Quick and contactless sign-in, utilizing facial recognition. Capability for each user to pre-register with a QR code on his or her own device. Kiosks capture a photo of each new entrant. Cloud-based, highly accurate facial recognition software. Fully contactless temperature calibration of each entrant. Register each user in a customizable category, such as staff, visitor, vendor, doctor, resident, or other category of your choosing. Kiosk collects the personal information of users in each category, such as phone number, email address, home address, and more. Create sign-in questions unique to each user category. Prompt user to fill out consent and facility policy forms during sign-in. Fully contactless CDC health questionnaire, using a simple head gesture to respond. Kiosk denies entry following an answer indicating that a user is unsafe to enter.
  • 18
    Innovatrics ABIS

    Innovatrics ABIS

    Innovatrics

    Innovatrics ABIS is a biometric identity management system supporting fingerprint, iris and facial recognition. Fast and accurate performance is achieved with minimal hardware requirements. Thanks to its modular architecture, our ABIS is easy to customize. Open APIs allow smooth integration with other systems to avoid vendor lock-in. We have successfully deployed our ABIS to hundreds of large scale biometric projects, including some of the most complex biometric systems worldwide. Utilizing our fingerprint, facial and iris recognition technology, you can easily get a solution tailored to your business processes. Our high-performing algorithms are consistently ranked among the best based on independent NIST tests. With our ABIS modules, you can build an identity management solution tailored to your needs. Add additional modules and upgrade when necessary. Our licensing policies are flexible to suit the needs of each project.
  • 19
    SonicEnterprise
    The iT 100 is a contactless biometric time tracker that uses innovative, safe and secure iris and facial recognition technology, combined with thermal capability, to give you a smart time & attendance solution. iT100 sets new standards for biometric authentication in workforce management systems. Authentication is automatically confirmed quickly and easily, just by looking at the screen. No cards. No fobs. No mistakes. To minimize the chances of spreading viruses, the optional contactless thermal scanner alerts management if an employee exceeds a preset body temperature. The combination of iris and facial recognition offers the highest level of biometric security and practicality, including reliable authentication for visitors wearing masks, sunglasses, hats, facial hair, etc. Adding a user, for both facial and iris recognition, takes about two minutes, aided by features like automatic confirmation that the user is the right distance from the system.
    Starting Price: $5000 one-time payment
  • 20
    Oosto

    Oosto

    Oosto

    Identify persons of interest in real-time with live facial recognition enabling your security team to rapidly respond to threats, while protecting the privacy of bystanders. A frictionless access control solution that leverages the power of facial recognition to open guarded points of entry for authorized people and protect sensitive areas. We transform your passive cameras into proactive security surveillance systems for real-time recognition of security threats, authorized personnel, and bad actors. Through ethical machine learning and state-of-the-art privacy controls, Oosto helps identify persons of interest, while protecting the identity of bystanders. Customers of all sizes choose Oosto for our accurate, highly scalable, fast recognition, easy-to-use, affordable platform, powered by our facial recognition neural networks.
  • 21
    Entrust Identity as a Service
    Cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). Secure access to apps, networks, and devices for all of your users — with cloud-based multi-factor authentication. Proximity-based login, adaptive authentication and other advanced features contribute to an optimal user experience. Happy users don’t try to circumvent security measures. Everyone wins. This is easier than anything else you’ve tried. Work-saving touches — like built-in provisioning tools and on-premises and cloud integrations — reduce the workload for IT, from deployment through everyday management. Get strong IAM to move faster into the future. Cloud-based Identity as a Service scales quickly to accommodate new users, expanding use cases, and evolving security threats.
  • 22
    Azure Face API
    Embed facial recognition into your apps for a seamless and highly secured user experience. No machine learning expertise is required. Features include: face detection that perceives faces and attributes in an image; person identification that matches an individual in your private repository of up to 1 million people; perceived emotion recognition that detects a range of facial expressions like happiness, contempt, neutrality, and fear; and recognition and grouping of similar faces in images. Recognize faces according to diverse attributes. Add facial recognition to your apps, all through a single API call. Run Face in the cloud or on the edge in containers. Rely on enterprise-grade security and privacy applied to both your data and any trained models. Detect, identify, and analyze faces in images and videos. Build on top of this technology to support various scenarios. Detect one or more human faces along with attributes.
    Starting Price: $0.01 per month
  • 23
    Betaface

    Betaface

    Betaface

    We offer ready components, such as face recognition SDKs, as well as custom software development services and hosted web services with a focus on image and video analysis, faces and objects recognition. Our technology is used by video and images archives, web advertising and entertainment projects, media content producers, video surveillance and security software solutions, end user and b2b software developers and others. Betaface facial recognition suite embraces whole range of complex operations from fundamental face detection through face recognition (identification, verification or 1:1, 1:N matching) to biometric measurements, face analysis, face and facial features tracking on video, age, gender, ethnicity and emotion recognition, skin, hair and clothes color detection, hairstyle shape analysis and facial features shape description. Our technology is used by video and images archives, web advertising and entertainment projects.
  • 24
    eClear 360

    eClear 360

    eConnect

    Finding affordable, turnkey solutions that can quickly plug into existing systems to scale up operations. eConnect's Identity Management system, eClear 360, leverages multiple data integrations and ties them to our industry-leading facial recognition algorithm. This opens the door for new insights, opportunities, and revenue protection, all from one platform. Key capabilities include: Identifying anonymous high-value patrons, their gaming value, and frequency of visits, detecting excluded patrons, advantage players, and patrons who have committed crimes in the past, a great tool to help the operator with know your customer mandates. The Identity Management system employs patented technology to provide operators with accurate facial identification reinforced with data analytics to identify staff members for time-clock integrations, detect unwanted individuals or valued guests, and improve operational efficiency.
  • 25
    LetFaster

    LetFaster

    LetFaster

    LetFaster specialises in cloud-based, automated Biometric Identity Screening, Fraud Detection & Tenant Screening. Through our proprietary Facial Recognition, Liveness and Motion Detection algorithms we authenticate global identity documents, with advanced AI and OCR techniques. Few professionals possess the skills to detect fake IDs. If a fake ID passes, all standard background screening would be performed on the real person instead of the fake, leaving organisations at risk of fraud and AML violations. Key Benefits: * In-Depth Tenant Screening * In-House SaaS Portal: Not an Outsourced Solution * Detect Internal and External Fraud * Key-Based 2-Factor Authentication (more secure than SMS Verification) * Strengthen Internal Controls * Automate Workflows: Operational Efficiencies * Automated Set-Up: Offices/Properties/Buildings/Owners * Simple To Use: No Training Required * Audit Trail * Business Intelligence * No Forced Tie-Ups * No Significant Upfront Fees
  • 26
    Animetrics

    Animetrics

    Animetrics

    Advanced investigative facial recognition solution for law enforcement and forensic investigators. Convert 2D images into 3D avatars for facial feature superimposition. FaceR Identity Management Solution, a centralized storage and management system for advanced 3D facial recognition powered by Animetrics' FaceR technology. Law enforcement officials, forensic investigators and security personnel have a pressing need to resolve suspects' identities from any kind of photographic evidence that captures an image of a suspects face including video surveillance cameras. ForensicaGPS, the new biometric solution from Animetrics, allows officers to identify individuals from low-resolution photos or video. ForensicaGPS features advanced facial recognition technology designed to increase the speed and enhance the accuracy of criminal investigations. The key to ForensicaGPS' accuracy is the software's ability to convert two-dimensional facial images into three-dimensional avatars.
  • 27
    Veridium

    Veridium

    Veridium

    Veridium is the most comprehensive Integrated Identity Platform powered by AI-based Behavioral Biometrics, enabling Multi-Factor Authentication (MFA), digital ID verification, and a true enterprise-grade passwordless experience for employees and customers. Low code, agile, and flexible. Eliminating the password for customers removes the friction often associated with passwords and delivers increased security for online connections with our single step multi-factor authentication solution, while providing higher levels of identity assertion for organizations. Veridium provide an end-to-end authentication platform for all your WFH needs and any VPN solution, delivering strong, multi-factor, passwordless workforce authentication.
  • 28
    Xendity

    Xendity

    Xendity

    Match a live human face picture or video to a photo —bearing document automatically. That requires facial recognition in which, making manual document authentication a thing of the past. Xendity provides you the best digital customer experience for identification and digital signing which capable of operating with images obtained from a scanner, a mobile device camera as well as web camera (in real time). With Xendity, personal identification and contract conclusion have finally reached the digital world. We offer banks, companies and even institutions innovative a secure solution with legally-binding contract conclusion between customers and contract partners. We aspire to build products which too, can be upgraded to meet your necessities in the framework of solving specific complications of data recognition in an e-document and image processing.
  • 29
    1Password Extended Access Management (XAM)
    1Password Extended Access Management (XAM) is a security solution designed to safeguard every login across applications and devices, making it ideal for hybrid work environments. It combines user identity verification, device trust assessments, enterprise password management, and application insights to ensure that only authorized users on secure devices can access both approved and unapproved applications. By providing IT and security teams with visibility into app usage, including shadow IT, XAM enables organizations to enforce contextual access policies based on real-time risk signals like device compliance and credential integrity. With its zero-trust approach, XAM helps businesses move beyond traditional identity management, strengthening security in today’s SaaS-driven workplace.
  • 30
    HID SAFE

    HID SAFE

    HID Global

    Through a single, centralized platform, HID SAFE Enterprise advances the security functions of identity management, breaks down the siloed systems and processes within organizations, and enables collaboration across departments and teams. HID SAFE Visitor Manager automates the entire lifecycle of visitors of any organization. This completely web-based solution includes capabilities for visitor pre-registration, security and background checks, access authorization, check-in/check-out, badge printing and centralized reporting, and audit trail functions. HID SAFE Visitor Manager is an extremely flexible solution that can be easily configured for each customer’s unique visitor management requirements. This highly scalable solution allows for easy management of busy sites with high volumes of visitors. HID SAFE Risk Analytics enables organizations to take the power of their physical security data beyond traditional reporting and use it to predict physical security operations.
  • 31
    Luxand.cloud

    Luxand.cloud

    Luxand Cloud

    Luxand.Cloud stands at the forefront of facial recognition technology, crafting a future where security seamlessly intertwines with innovation. With precision and sophistication, our cutting-edge solutions redefine the landscape of identity verification. Elevate your digital security with seamless access control, unlocking a personalized and fortified experience. Trust in Luxand.Cloud to lead the way in safeguarding your digital frontier with unparalleled reliability. Join us on the journey to redefine the boundaries of security in the digital age. Luxand.cloud supports: - Face detection - Face recognition - Face verification - Emotion recognition - Facial landmark detection - Liveness detection - Face cropping
    Starting Price: $19/month/10,000 API requests
  • 32
    Alcatraz AI

    Alcatraz AI

    Alcatraz AI

    Connects seamlessly with fast and easy implementation. Our robust access control unit combines superior intelligence with a modern design. Powered by machine learning at the door, the Rock ensures real-time authentication, analytics, and access control. With 2D and 3D sensors onboard capturing data, the Rock’s analytical prowess outclasses other security options. Get ready for incredible accuracy and effortless user interaction. With 3D facial mapping and deep neural networks, the Rock can authenticate users in real time for the smoothest experience possible. Pair the access control system with any third-party badge reader for a 2F or 3F security solution in more restricted areas. A long scanning range and field of view allow the Rock to detect and prevent tailgating. Auto-tagging and alerts allow the admin to address concerns without the need for specialized guards or other hardware. AI assembles profiles based on a few device interactions.
  • 33
    Axiom Protect

    Axiom Protect

    Axiom Protect

    To empower your multiple IT systems( On-premise, cloud or hybrid) by embedding multifactor security to suit each individual system, service, workflow and user's preference. Central Control to meet your business needs and regulatory compliance comes from policies and settings. Default to Custom all with simple clicks. Inbuild Complex Password Source to external LDAP/Active Directory synchronized user and operator sources for consolidation. Bringing trust through user's devices makes authentication more flexible and stronger. Multiple users on a single device or multiple devices for a single user is a business need. It's not hard if you have a good platform. Everything is DATA. Data at rest & at transit security at mobile, web, iOT device, Server, files / DB. Customised security grades with varied key lengths & algorithms. No expensive VPN. SDK and APIs available. 99%+ accuracy to build your EKYC or remote access authentication comes by pure 100% AI/DL based facial biometrics.
  • 34
    Brivo

    Brivo

    Brivo

    Brivo supports your whole company to achieve your physical security, scalability, cybersecurity, data analytics and customization needs. Brivo is the global leader in cloud-based access control and security platforms for commercial and multifamily properties. Our mission is to provide Simply Better Security solutions that improve user experiences for property managers, tenants, employees, and visitors. With over 20 million users and 1,500 authorized dealers, our SaaS platform has been unifying the security experience across access control, mobile credentials, video surveillance, identity federation, visitor management, intercoms, and elevator control since 2001. Hundreds of software partners and end users use our APIs and SDKs to extend our solutions to unique vertical market offerings. Brivo’s Vacation Rental Property Management is a cloud-based system that combines guest bookings, messaging, home automation, and security to increase property value and appeal.
  • 35
    SafeNet Trusted Access
    SafeNet Trusted Access, Identity-as-a-Service. SafeNet Trusted Access is a cloud-based access management solution that makes it easy to manage access to both cloud services and enterprise applications with an integrated platform combining single sign-on, multi-factor authentication and scenario-based access policies. Businesses and organizations looking to accelerate the deployment of cloud services for end users encounter hurdles to efficiently managing online identities and access security, while ensuring user convenience and regulatory compliance. SafeNet Trusted Access simplifies user access to cloud services, streamlines cloud identity management, and helps eliminate password hassles for IT and users, while providing a single pane view of access events across your app estate to ensure that the right user has access to the right application at the right level of trust.
  • 36
    Nexa|Voice
    Nexa|Voice is an SDK that offers biometric speaker recognition algorithms, software libraries, user interfaces, reference programs, and documentation to use voice biometrics to enable multifactor authentication on iOS and Android devices. Biometric template storage and matching can be performed either on a mobile device or on a server. Nexa|Voice APIs are reliable, configurable, and easy to use, complemented by a level of technical support that has helped make Aware a trusted provider of quality biometric software and solutions for over twenty-five years. High-performance biometric speaker recognition for convenient and secure multifactor authentication. The Knomi mobile biometric authentication framework is a collection of biometric SDKs running on mobile devices and a server that together enable strong, multi-factor, password-free authentication from a mobile device using biometrics. Knomi offers multiple biometric modality options, including facial recognition.
  • 37
    Prisma AI

    Prisma AI

    Prisma AI

    Prisma’s facial recognition system is a technology capable of identifying or verifying a person from a digital image or a video frame from a video source. There are multiple methods in which facial recognition systems work, but in general, they work by comparing selected facial features from a given image with faces within a database. It is also described as a biometric artificial intelligence-based application that can uniquely identify a person by analyzing patterns based on the person's facial textures and shape. The print content would act as a marker for our engine and match with the corresponding reference image. Image recognition engines can also be used in marketing the brand by linking logos with ads, websites, and information. The process of capturing images from mobile devices and recognizing the same against a reference image. Prisma using its years of experience in the development of specialized algorithms for image recognition has now ported the same for applications.
  • 38
    Alloy Access

    Alloy Access

    SmartRent

    Alloy Access Cloud-based access control for multi-tenant and commercial buildings. Our cloud-based access control system provides hands-free access solutions to address communities current needs while ensuring scalability for the future. Alloy Access is a frictionless platform that can be utilized to protect communities and assets through the use of control panels, smart access locks and intercoms, with integrations to property management software and customer relationship platforms to keep data in one place. Combining Alloy Access with our other smart home products provides customers the ability to create a truly connected community. Flexible Options with Alloy Access. With Alloy Access, you have the flexibility to choose different access methods for each entry point. Customize how residents, employees and visitors access all perimeter doors, amenity spaces, garages and units. Bluetooth locks & mobile passes. Key fobs - use existing key fobs or cards. Smart locks & custom pin
  • 39
    IDenticard

    IDenticard

    IDenticard

    Design the perfect program for your facility and people. Our deep portfolio allows us to be your one-stop shop for everything from robust access control and visitor management solutions to branded ID cards and accessories. Design the perfect program for your facility and people. Our deep portfolio allows us to be your one-stop shop for everything from robust access control and visitor management solutions to branded ID cards and accessories. Empower your faculty and staff to get help quickly during an emergency by replacing outdated and ineffective communication methods with a modern panic button solution. Process guests with ease to ensure maximum safety at your site. IDenticard’s solutions specialists will work with you to assess your site’s Visitor Management needs before helping you implement the ideal solution for your campus.
  • 40
    Genea Access Control
    Genea’s cloud-based access control system is designed for the convenience and security of both tenants and building management teams. The most modern, open platform for complete building access control. Allow tenants to self-manage their employees access to the base building, parking garage and other access points. No more waiting days for a manually provisioned card! Empowering tenants to add and remove users saves property teams hundreds of hours per year, reducing the time and cost associated with access control. No longer wait months to remove your tenant’s former employees. Self-service and automated user controls ensures only the right people have access to your building. The first access control management software of its kind to be built on non-proprietary hardware. With Genea, you can manage keyholders, monitor all activity, and even assign mobile keys from any device, anywhere, at any time.
  • 41
    MRI MIRRA

    MRI MIRRA

    MRI Software

    A data integration solution that connects building and occupier level access control systems. One card for building and occupier access control with instant activations, updates, and de-activations. Meet stringent privacy, security, and compliance standards to protect people and organizations. Synchronize data between building and occupier systems to eliminate time-consuming, error-prone manual procedures. Are multiple access control systems getting in the way of a smooth welcome or infallible security in your building? Credentials management is error-prone and time-consuming without integrated building and occupier systems. Give occupiers the convenience of one credential and one card, synchronized across both systems. Your building is worth so much more when it’s hassle-free. Streamline credentials management and tighten security with MRI MIRRA. Data integration between disparate access control systems provides instant card activations, modifications, and de-activations.
  • 42
    Luchismart

    Luchismart

    Luchismart

    Luchismart is a cutting-edge technology company specializing in cloud-based access control systems with advanced features such as time and attendance management, video surveillance, and time tracking capabilities. With a focus on providing secure and efficient solutions, Luchismart aims to revolutionize the way businesses manage their access control and monitoring processes. One of the key features of Luchismart's system is its access control functionality. Using cloud-based technology, the system allows businesses to control and monitor access to their premises in real-time. It offers a comprehensive set of tools to manage and customize access permissions for employees, visitors, and contractors, ensuring that only authorized individuals can enter restricted areas. In addition to access control, Luchismart offers robust time and attendance management features. The system enables accurate tracking of employee attendance, including clock-in and clock-out times.
  • 43
    Nirovision Doorkeeper
    Doorkeeper by Nirovision safely welcomes people into the workplace by turning an iPad into a touchless check-in kiosk. Using Australian owned and developed facial recognition, Doorkeeper streamlines the process helping save workplace time and administration. With features such as visitor pre-registration, dynamic QR codes, surveys, and host notifications, plus integrations for temperature screening and badge printing, Doorkeeper ensures everyone is safe and authorised to enter.
  • 44
    Biometric Vision

    Biometric Vision

    Biometric Vision

    Developers, businesses and system integrators upgrade your facial recognition applications performance with a few lines of code whilst preserving your customer’s privacy. Integrate with Biometric Vision’s next generation AI-powered algorithm in minutes and increase the accuracy, speed and performance of your facial recognition apps. 99.99% accuracy in the most challenging of conditions. A 0.006% error rate tested against 1 million ethically sourced face images. AES-256+ end-to-end encryption and a proprietary method for storing face templates as anonymous alphanumeric code (binary), i.e. non-reversible. We do one thing really well and that’s facial recognition algorithms. Providing access to our 1:1 and 1:N algorithms.APIs are made for leveraging the power of connectivity. Our cloud hosted API is suitable for any environment, on any platform, physical or virtual. Our API promotes innovation, opportunities to scale and make monetization easier.
    Starting Price: $29 per month
  • 45
    Cloudvue

    Cloudvue

    Johnson Controls

    Johnson Controls is transforming how spaces and places are perceived and enjoyed. Applying data from both inside buildings and beyond, our customers can now manage operations and security systemically. Introducing the blueprint of the future, OpenBlue is a dynamic new space from Johnson Controls. This is how buildings come alive. Cloudvue is trusted all over the world to simplify surveillance, streamline access control, and provide powerful intelligence that improves security operations and helps with organizational efficiency. Command an entire security system in one interface, on one map, and click on any camera or door worldwide. Easily control cameras, grant access to doors, and set intelligent alerts with centrally managed software and cloud-connected hardware. An unlimited number of cameras and access control points can be added. Custom floor plan views, map views, and powerful dashboards keep data organized as operations scale.
  • 46
    ButterflyMX

    ButterflyMX

    ButterflyMX

    A top-rated smartphone app, integrations to other cloud-based systems, and a powerful property management dashboard are all designed to make property access into and throughout your building easy. Our products are relied upon by more than 7,500 multifamily, commercial, student housing, and gated communities around the world including those developed, owned and managed by the most trusted names in real estate. We make property access simple for owners, staff, residents, and visitors. We’ve designed our features with you in mind. Residents enjoy a seamless building entry experience. Property managers get added security and convenience. Developers & owners eliminate building wiring and in-unit hardware. Installing our video intercoms and keypads allows your residents to manage property access from their smartphones. They can receive video calls, unlock the door & gates remotely, and grant managed access to delivery people and service providers.
  • 47
    Genetec

    Genetec

    Genetec

    Genetec is a global leader in physical security and unified surveillance solutions, helping organizations protect people, property, and data. Its platform combines video management, access control, ALPR (automatic license plate recognition), and communications into one intelligent ecosystem. Built for flexibility and scalability, Genetec empowers security teams to monitor, analyze, and respond to threats in real time. The company’s Security Center SaaS delivers cloud-based, cyber-hardened protection that adapts to evolving security challenges. With over 25 years of innovation and more than 42,500 customers worldwide, Genetec continues to lead the industry in secure, unified security management. Trusted by enterprises, governments, and critical infrastructure providers, Genetec enables organizations to protect the everyday.
  • 48
    Proptia

    Proptia

    Proptia

    Proptia provides all-encompassing visitor management, access control, license plate recognition, and intercom solutions. A seamless experience that is as powerful as it is flexible. Whether you’re managing a single commercial building or a sprawling community, Proptia offers the tools you need to get the job done—with ease, accuracy, and speed. Our Security Smart Intercom Units and Software are the ultimate solutions for modern security needs in guard-gated communities, residential hi-rise buildings, and commercial buildings. Our state-of-the-art intercom units offer seamless communication and access control, with video and audio capabilities, digital keys and pass, and remote management features. Our cutting-edge license plate recognition software and vehicle identification system offer advanced monitoring capabilities for both entry and exit points.
  • 49
    VersionX EntryPoint

    VersionX EntryPoint

    VersionX Innovations

    A smart visitor management system for efficient and secure visitor operations. It's a QR code and Facial recognition-based touchless system to make your visitor lobby COVID safe and hygienic. A visitor self-service kiosk makes your reception operations hassle-free and independent. EntryPoint visitor management system easily integrates with access control hardware and parking systems. You get real-time visitor reports and analytics. Manage multiple entry points & locations from a centralized dashboard. Highly customizable, our visitor software is used across corporate, factory, schools, residential apartments, hospitals, hotels, events, business, office, and many more businesses. We've been talking quite a bit about Smart digital visitor management system for intelligent premises management. A Smart Visitor Management System for Premises Management.
  • 50
    Face SDK
    Facial and body recognition library for server, mobile and embedded solutions requiring image and streaming video processing: - Face Identification and Verification. Search for face matches, 1:N identification and 1:1 verification scenarios - Real Time Video Processing. SDK components enable face detection, tracking and matching from video stream in real time - Face Quality Control. Dozens of quality checks such as head rotation, blur, flare, face size, eyes and mouth openness, and more - Face Landmarks. Detect size, pitch, roll, yaw, and up to 468 facial landmarks - Gender, Age, Emotions Recognition. Detects 7 basic human emotions on photos or video stream - Passive and Active Liveness. Comprehensive Liveness Detection algorithms against face or video spoofing
    Starting Price: $24.90