8 Integrations with Sovrin
View a list of Sovrin integrations and software that integrates with Sovrin below. Compare the best Sovrin integrations as well as features, ratings, user reviews, and pricing of software that integrates with Sovrin. Here are the current Sovrin integrations in 2026:
-
1
Keyless Authenticator
Keyless Technologies
Nothing to remember. Nothing to steal. You are the key. Adopt zero-trust authentication to protect your remote workforce and enable strong customer authentication with just a look. Anywhere. Any time. Any device. Embrace passwordless, multi-factor authentication to eliminate fraud, phishing and credential reuse – all while enhancing customer and employee experiences and protecting their privacy. Unique capabilities powered by unique technology. Hardware Agnostic. Since we do not rely on the device hardware or sensors, Keyless can be deployed on a large set of devices and appliances. Drive better outcomes for your organization by eliminating passwords. Top-Notch Security. No central honeypot, no data on user devices. Data can never be stolen or lost because no private information is accessible to anyone but the user. Reduce password associated costs by going passwordless. Password Reset Costs. The average helpdesk labor cost is estimated at $70. -
2
Evernym Verity
Evernym
Meet the first enterprise-grade verifiable credential platform designed around ease of use and interoperability. Our decentralized protocol platform for issuing and verifying digital credentials. Our consumer mobile wallet app for holding and sharing credentials. Embedded SSI wallet functionality for your organization’s existing apps. Issue digital verifiable credentials directly to SSI-based wallets. Verify credentials held in SSI-based wallets simply and easily. Easily integrate with back-end systems, using REST APIs and SDKs in three popular languages. Build for scale, with enterprise-grade architecture designed to support millions of users. Future-proof your credential architecture, through built-in compliance with emerging open standards, including Hyperledger Aries, W3C DIDs, and W3C Verifiable Credentials. Enable customers and end users to manage all of their digital credentials from the safety of their own phone.Starting Price: $1,000 per month -
3
IdRamp
idRamp
Turn your digital identity strategy into a business asset, not a liability. Stop spending time, money, and headcount replatforming insecure identity technology. Simplify authentication complexities with decentralized zero trust Identity from Idramp. Bring order to your identity management chaos. Accelerate delivery of services to meet the speed of business. Eliminate expensive platform upgrade projects with rapid modular deployment. Relieve the pain of bespoke integration with rapid integration that automatically interoperates with existing infrastructure. Tailor your customer experience with a modular architecture that eliminates vendor stack lock-in. Add zero trust identity with automated security policies and adaptive access controls. Control extensible ecosystems with state of the art data protection. Never trust but always verify that your applications and people are safe. -
4
Covalent
Covalent
Our vision is to empower the pioneers of tomorrow by providing the richest and most robust data infrastructure for the entire blockchain ecosystem. Explore and contribute to the absolute richest blockchain data on the internet. Aggregate historical balances, positions and PnL across dozens of DeFi protocols to build rich and compelling interfaces for your users. Build analytical dashboards showing price trends, liquidity and ROI of assets. Explore our quick start tutorials, how-to guides, example code, and more to easily integrate blockchain data in your project using the Covalent API. Covalent provides a unified API to bring full transparency and visibility to assets across all blockchain networks. Simply put, we have a single API which allows you to pull detailed, granular blockchain transaction data from multiple blockchains with no code. -
5
Fetch.ai
Fetch.ai
At Fetch.ai we build tools and infrastructure to enable a decentralized digital economy. Fetch.ai’s network is based around an open-source technology that any user can run to connect to the network, giving access to the power of AI on a world-scale secure dataset, to carry out complex coordination tasks in the modern economy. On this network a series of software agents represent and act on behalf of their owners. These autonomous agents work to provide an optimised service across a variety of ecosystems, to the benefit of both suppliers and consumers. This system has wide potential in many areas. Financial services users can optimize trading, public transport networks could be reconfigured, cities could intelligently adapt to usage by their citizens, the gig economy could be restructured, and energy networks can be connected in a smart grid. -
6
DigiCert CertCentral
DigiCert
CertCentral simplifies the entire lifecycle by consolidating tasks for issuing, installing, inspecting, remediating, and renewing certificates. Every part of the cycle on one pane of glass. With ACME + CertCentral, you can automate deployment using virtually any client and any server type, any way you prefer. That means less time spent completing tedious manual tasks—or worse, putting out fires. With DigiCert, you use ACME protocol to automate deployment of OV and EV certificates with custom validity periods. The benefits just keep adding up. To enable ACME in CertCentral, simply contact your sales rep. You used to run into two bottlenecks with certificates: approval and renewal. Now, automating these tasks—and more—is as easy as a few clicks. If this were a race, you’d be winning. Receive alerts about potential vulnerabilities and know when each cert is about to expire. Because guessing is just gambling. -
7
Risk Radar
MITRE
Risk Matrix (as well as more information on RiskNav and Risk Radar) is available in the Systems Engineering Practice Office (SEPO) Risk Management Toolkit. Although Risk Matrix is available for public release, support is limited to downloadable online documentation. Government programs sometimes implement a combined government/contractor risk management process that uses tools provided by the contractor. Multiple major government contractors have developed in-house risk management applications. Many applications are comparable to available MITRE and commercial tools and effectively support program risk management. Many smaller programs use Microsoft Excel or Access customized risk management tools. Some customized solutions meet the tool selection criteria outlined earlier. This is important when considering a customized solution that meets the needs of the program being supported. -
8
Veridium
Veridium
Veridium is the most comprehensive Integrated Identity Platform powered by AI-based Behavioral Biometrics, enabling Multi-Factor Authentication (MFA), digital ID verification, and a true enterprise-grade passwordless experience for employees and customers. Low code, agile, and flexible. Eliminating the password for customers removes the friction often associated with passwords and delivers increased security for online connections with our single step multi-factor authentication solution, while providing higher levels of identity assertion for organizations. Veridium provide an end-to-end authentication platform for all your WFH needs and any VPN solution, delivering strong, multi-factor, passwordless workforce authentication.
- Previous
- You're on page 1
- Next