Alternatives to System Locker
Compare System Locker alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to System Locker in 2026. Compare features, ratings, user reviews, pricing, and more from System Locker competitors and alternatives in order to make an informed decision for your business.
-
1
Cisco Duo
Cisco
Cisco Duo is a cloud-based identity security solution that protects organizations from identity-based threats and boosts workforce productivity. Trusted by over 40,000 organizations worldwide, Duo delivers an exceptional access management experience across all users, devices, and applications, making access to resources secure, seamless, and easy. Duo with Cisco Identity Intelligence provides deep visibility across your identity ecosystem, adding a powerful security layer to any identity infrastructure. Offer users a world-class access experience through Duo Passport to eliminate MFA friction and fatigue without sacrificing security. To stop threats, Duo verifies user identities with strong authenticators including Duo passwordless, Verified Duo Push with number matching, and phishing-resistant factors like biometrics and FIDO2 security keys. Paired with deep insights into users’ devices, Duo gives you the control to adaptively limit access based on device health or user risk.Starting Price: $3 per user per month -
2
Udentify
Fraud.com
Know the real identity of your customer, user, or employee with the Udentify Identity Verification and Biometric Authentication solution. Challenges we solve: - Identify verification - Onboarding - New account opening - Age verification - Fraud prevention - Biometric authentication - Passwordless authentication - Strong customer authentication - KBA replacement - KYC and AML compliance Behind the scenes, Udentify embeds cutting-edge technologies into our identity verification and biometric authentication solution via a lightweight and flexible SDK. We are constantly investing in our technologies to stay at the forefront of fraud detection, compliance, and user experiences.Starting Price: $0.17 -
3
MetaMap
MetaMap
Regional data infrastructures, powering global identity verification. MetaMap is the first all-in-one identity verification platform built on regional data sources, consolidated on a global scale. Get to know your users in-depth, from local government checks to Global AML watchlists. A suite of identity verification tools to know your users in-depth. Verify your users without hurting your conversions rates. Quickly verify your users with our default SDK or build your own verification flow via our API. Our customers welcome up to 95% of users who successfully complete our verification flows at the first attempt. Automatically access our regional identity infrastructures, and get clean data from dozens of local databases consolidated in comprehensive user' profiles, no matter where you operate. Use MetaMap dashboard to reduce the time spent on manual verification through smart automation and workflows. You need advice? Our international Customer Success Team is here to help. -
4
Authentication Cloud faster, easier, and more user-friendly. Let customers access your online services without passwords and costly SMS fees. With the Nevis Authentication Cloud, you can offer your customers maximum security and a smooth user experience in no time at all. Authentication as a service – faster, easier and more user-friendly. Enable customers to access your online services without passwords and costly SMS fees. With the Nevis Authentication Cloud you can offer your customers maximum security and a smooth user experience in no time at all. With the Authentication Cloud from Nevis, you can offer your customers maximum security and a smooth user experience in no time at all. Remembering a long, complex password for each individual account no longer fits into today’s fast, mobile world. New solutions with password-free authentication such as fingerprint or face ID are not only faster and more convenient but also significantly more secure for all parties involved.Starting Price: $500 per month
-
5
Onfido
Entrust
Onfido, an Entrust company, is a technology provider specializing in AI-powered digital identity verification to help businesses securely and efficiently onboard customers. Its Real Identity Platform verifies users by analyzing government-issued IDs and matching them with facial biometrics, ensuring accurate authentication. Supporting various document types, including passports and driver’s licenses, Onfido integrates seamlessly with business systems to create a frictionless user experience. Its solutions help organizations reduce fraud, comply with global regulations, and streamline customer acquisition. With a focus on trust and security, Onfido enables businesses to verify identities with confidence in an increasingly digital world. -
6
AppSmart Identity
AppSmart
Securely connect everyone to everything. Connecting with people, applications and devices is a key requirement of digital transformation. AppSmart Identity provides identity and access management for every user across all applications to all interconnected systems to securely access and manage your cloud migration services and all other services from a single place. Users don’t want to remember multiple passwords. With single sign-on, uses can access business systems with one account ensuring a seamless user experience for all their cloud migration services and cloud managed services. With multi-factor and strong authentication users can make sure that the identities that access business systems are fully verified. Policy-based MFA prevents unauthorized users from accessing corporate data with passwords alone. One place for all your cloud managed services eg. manage all your users, groups and devices. -
7
BehavioSec
BehavioSec
Welcome to the next generation of behavioral authentication. Deployed across global 2000 companies, the BehavioSec platform uses deep authentication to continuously verify user identity with zero friction and over 99% accuracy across millions of users and billions of transactions. While organizations invest significant resources to insulate from attacks, Account takeovers remain a menace. To make matters worse, many costly business challenges – like manual fraud analysis and customer attrition from friction – stem from these failed investments meant to protect. BehavioSec stops account takeover with deep authentication, a new method of verification powered by behavioral biometrics. Deep authentication automatically verifies the human behind the digital identity without adding friction – allowing you to keep fraudsters at bay while drastically reducing costs. BehavioSec addresses new account fraud with population profiling powered by Behavioral Biometrics. -
8
FacePhi
FacePhi Biometria
The most complete solution for digital onboarding, authentication and security formed by different biometrics and antifraud systems of FacePhi, offered with the best user experience in the market. A combination of biometric and other security systems that creates a complete digital onboarding and identity authentication solution that allows to access, verify and operate different services and products in mobile and web applications. A framework with an easy integration that allows our client to choose which components to activate providing a better and seamless experience for the end user. Face recognition allows us to determine the identity of a person by analyzing the face. Unlike other types of biometry like iris or fingerprint, face recognition is non-intrusive; it does not require cooperation from the user. It just needs to capture the face of the person with a web cam. -
9
REVE Secure
REVE Secure
Dual authentication check of login’s credibility via user’s registered credential (Password) and security token generated at authorized user end only. Passwords are incompetent in securing your logins. Adding 2nd-factor authentication will not only deliver dual authentication security but also ensure safe & secure login & protected account access. With Two Factor Authentication, secure your remote logins and access to Linux/UNIX servers from security breaches and malicious attacks. Integrate a second layer of authentication to existing Windows password-based security to ensure the all-round protection of your enterprise data. Secure & protect logins and access to each different web application and service to avoid unauthorized access and cyber-attacks. Blocks unauthorized login attempts made using passwords. Supports a multitude of platforms and devices. -
10
VerifyKit
VerifyKit
VerifyKit is a verification solution which allows your users to sign up for your app seamlessly, without the need for a phone number and one-time password for verification. Besides being reliable and customizable, it lets your users choose their preferred platform - i.e. WhatsApp, Telegram or SMS - for verification.Starting Price: $7.90 per month -
11
Acceptto eGuardian
Acceptto
Acceptto monitors user behavior, transactions, and application activity to create an enriched user profile within each application landscape and subsequently verify if access attempts are legitimate or a threat. No passwords or tokens are required. Acceptto’s risk engine calculates whether an access attempt is legitimate or not by tracking user and device posture pre-authentication, during authentication, and post-authorization. We deliver a continuous, step-up authentication process with real-time threat analytics in an age when identities are persistently under attack. Based on a risk score computed by our proprietary AI/ML algorithms, a dynamic level of assurance (LoA) is computed. Our approach automatically finds the optimal policy for each transaction to maximize security while minimizing friction for the user with machine learning and AI analytics. This provides a smoother user experience without sacrificing enterprise security. -
12
Proton Authenticator
Proton
Proton Authenticator is a privacy-first two-factor authentication app that generates time-based one-time passwords to add an extra layer of login security for online accounts beyond just a password, so users can secure accounts across all their devices. It is open source and uses end-to-end encryption, meaning all cryptographic operations and secret keys are generated and stored locally, and even Proton cannot see your unencrypted 2FA data, offering transparency and strong privacy by design. Users can sync 2FA codes across devices with encrypted backups (including via iCloud or a Proton Account), import existing codes from other authenticator apps, and export them if needed, giving flexibility and control over 2FA secrets without vendor lock-in. Proton Authenticator is free to use, has no ads or tracking, and supports secure practices like biometric locks and offline access, so users can generate login codes.Starting Price: Free -
13
Ente Auth
Ente
Ente Auth is a free, open-source two-factor authentication app that helps users generate and manage time-based one-time passwords to secure logins for online accounts with an extra layer of verification beyond just a password, offering end-to-end encrypted backups so you never lose your codes and they remain private even to the service itself. It syncs codes across mobile, desktop, and web clients using fully encrypted channels, lets users import existing 2FA tokens by scanning QR codes or manual entry, and provides features like offline code generation, tagging and searching of codes, pinning favorites, icon identification, and quick “next code” display for faster logins. Backups are encrypted with audited cryptography, giving users peace of mind that only they can decrypt and access their 2FA secrets, and codes can be shared securely with teammates via encrypted links with optional expirations.Starting Price: Free -
14
2FAS Auth
2FAS
2FAS is a two-factor authentication and password management platform centered on its open source 2FAS Authenticator app, which helps users add a strong second layer of login security to online accounts by generating time-based and event-based one-time codes that refresh frequently to defend against unauthorized access, making it easier to secure email, social, financial, and other services that support 2FA. It is designed to be simple, private, and secure, it works offline, does not store passwords or usage metadata, and doesn’t require users to create an account, offering anonymous use while still syncing codes across multiple mobile devices with encrypted backup options, biometric or PIN protection, and support for importing and exporting authentication seeds so you retain control of your data and can migrate between devices or apps.Starting Price: Free -
15
FortiAuthenticator
Fortinet
FortiAuthenticator provides Identity Access Management and Single Sign-On. FortiAuthenticator provides identity and access management (IAM) services to prevent breaches resulting from unauthorized users gaining access to a network or inappropriate levels of access granted to valid users. FortiAuthenticator ensures only the right person can access your sensitive resources and data at the right time. User identity information from FortiAuthenticator combined with authentication information from FortiToken and/or FIDO2 authentication ensures that only authorized individuals are granted access to your sensitive information. This additional layer of security greatly reduces the possibility of data leaks while helping companies meet audit requirements associated with government and business privacy regulations. -
16
Super Gluu
Gluu
Super Gluu is a push-notification two-factor authentication (2FA) mobile app built to work with the Gluu Server. Super Gluu uses public-key encryption as specified in the FIDO U2F authentication standard. Upon device enrollment, Super Gluu registers its public key against the Gluu Server's FIDO U2F endpoint. When authentication happens, there is a challenge response to ensure that the device has the corresponding private key. Better identity access management for customers, citizens, and remote workforce. Super Gluu is supported by the Gluu Server out-of-the-box -- simply turn it on! Make strong access security as easy as approving a push notification. Make strong access security as easy as approving a push notification. The Gluu Server and Super Gluu can work in the same network, without a DNS server hostname and with a self-signed certificate. There is only one limitation: both components should belong to the same network. -
17
ThumbSignIn
ThumbSignIn
Any channel, any device – we’ve got you covered. Choose from our suite of user-friendly authentication solutions, from 2FA to passwordless biometrics, to find the right authentication for your business and users. Start with 2FA and progress to more advanced technology like biometrics-based authentication to continue improving user experience and security over time. Our SaaS-based authentication service, REST APIs , mobile SDKs and UI widgets deliver a powerful combination of software components that can be used to build omni-channel authentication experiences that span mobile, web, phone, IoT, chatbots, kiosks, physical access and more. It’s time to take the security burden off of users! Our mission is to democratize access to strong authentication technology and make the digital world safer for everyone. ThumbSignIn provides cost-effective, scalable SaaS-based solutions to help companies select the best way to strengthen their existing systems with two-factor authentication (2FA).Starting Price: $3 per user per month -
18
ActivID
HID Global
A versatile, flexible and highly scalable platform for securing access to government and corporate systems and online consumer services. Multi-factor authentication for securing employee remote access to corporate VPNs and other enterprise resources. Multi-factor authentication for securing employee remote access to corporate VPNs and other enterprise resources. Rapidly build and deliver authentication solutions for trusted identity and compliance. Smart card solution for strong authentication to protect workstations, mobile devices and networks. Solution for issuing and managing PIV and PIV-I cards, enterprise access cards and mobile credentials. HID PIV IDMS performs identity proofing, while securely issuing credentials - even to remote users. Leverage service bureau card issuance efficiently and securely. -
19
IPification
IPification
Designed to facilitate instant user access combined with bank-grade security, IPification delivers authentication possibilities outside traditional SMS, Header Enrichment and USSD. IPification’s smooth and secure mobile identity verification lets consumers experience the best of your product, without threatening their online safety. Zero-Click login & registration flows will streamline onboarding and usage. Trusted protocols for user’s ID confirmation based on mobile network data only. By not taking any sensitive app/device information, IPification prevents data leaks. Zero-click compatible login and registration with bank-grade security and the best UX. Streamline onboarding, payment and app usage with an easy authentication process without need for any user action. Irrespective of device, browser or browsing mode, every user log in and registration can be performed seamlessly. -
20
3D Secure
3D Secure
Apart from meeting the Strong Customer Authentication (SCA) compliance under PSD2, there are numerous benefits to the new 3DS 2.0 protocol, especially from a mobile payments standpoint. The improved design dramatically increases the user experience on mobile devices by being fully compatible with mobile wallet applications and in-app transactions. Dramatically increases the user experience on mobile devices, including non-browser based platforms and mobile integration. The merchant’s platform will only require additional authentication if the risk is high – that will happen in only a small percentage of the transactions. Biometric authentication whilst still in the merchant’s app it will likely just feel like a valid security measure. -
21
ESET Secure Authentication (ESA) adds Two Factor Authentication (2FA) to Microsoft Active Directory domains or local area network, meaning a one-time password (OTP) is generated and provided along with the generally required username and password. Or a push notification is generated and has to be approved on the user's cell phone running Android OS, iOS, or Windows once the user has successfully authenticated using their general access credentials. The mobile application of ESET Secure Authentication makes it easy to generate OTPs or approve push authentication requests to access computers, services protected by 2FA. The mobile application version 2.40+ supports authentication of multiple users, meaning, if you use several user accounts in a domain/network protected with 2FA, the authentication tokens of all your user accounts may be stored in your one mobile application.
-
22
Trust Swiftly
Trust Swiftly
Only ask what you need to with 10 identity verification methods. Trusted by businesses that block more than 1% of transactions or spend more than 1-hour reviewing customers. Approve more real customers while blocking fraudulent users and risky transactions. Automate identity proofing and populate fraud solutions with more user data. Accept or reject based on user data and leverage it to fight chargebacks. Building a system for reviews or enhanced user authentication takes a lot of time. With Trust Swiftly, we provide multiple methods for your customers to verify themselves and automatically populate it in Sift, allowing for robust workflows. Whether you are an eCommerce store, app, or marketplace, we have the verification levels for you. Require verification adaptively depending on Sift scores or business rules by applying friction smartly.Starting Price: $0.01 per verification -
23
Google Cloud Identity
Google
A unified identity, access, app, and endpoint management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace. Defend your organization with the BeyondCorp security model and Google’s threat intelligence signals. Control access to SaaS apps, enforce strong multi-factor authentication (MFA) to protect user accounts, manage endpoints, and investigate threats with Security Center. Maximize efficiency by enabling intuitive user experiences on endpoint devices, and unify user, access, app, and endpoint management with a single console. Enable users to access thousands of apps with single sign-on (SSO) and manage their company accounts using the same process as their personal Google accounts. Transition to digital by integrating your existing systems on a reliable, trusted platform. Extend your on-premises directory to the cloud with Directory Sync.Starting Price: $6 per user per month -
24
Sima
Active Witness
Sima does more than just keep the bad guys out. Sima is a highly secure yet frictionless cloud-based Access Control reader. Sima has the ability to read both mobile credentials (QR codes) and facial biometrics. This allows the integrated cloud-based software to issue both single (QR only) and multi-factor (facial verification) for highly secure and customized facility access. We take your privacy very seriously. We use facial recognition technology to perform facial authentication. This allows us to verify identity and grant access to a location. Facial data will be stored on our servers only for the purpose of identification. Your personal data, including your face picture, will not be shared with third parties.Starting Price: Free -
25
BioSig-ID
Biometric Signature ID
BSI's BioSig-ID offers a seamless biometric authentication solution accessible on any device—be it a computer, tablet, or mobile phone—using a finger, stylus, or mouse for input. This patented technology enables secure file and information access through multi-factor authentication (MFA) within a single product, fully compatible with HTML5. It eliminates the need for hardware or software downloads and verifies users with a simple four-character password. Unlike traditional biometrics, this solution prioritizes privacy, adhering to privacy laws and sidestepping common concerns. Additionally, it provides real-time alerts for potential data crimes, ensuring proactive security. -
26
Yubico YubiKey
Yubico
Protect your digital world with YubiKey. Stop account takeovers, go passwordless and modernize your multifactor authentication. Get the world’s leading security key for superior security, user experience and return on investment. Designed for personal and business use, the YubiKey comes in a variety of shapes and with different features to fit your needs. Take our quick Product Finder Quiz to find the right key for you. The YubiKey works with hundreds of services and software applications. We’re here to guide you getting started whether for personal or business use. The industry's #1 security key, enabling strong two-factor, multi-factor and passwordless authentication. With a simple touch, the multi-protocol YubiKey protects access to computers, networks, and online services. No more reaching for your smartphone, or re-typing passcodes. Just plug in your YubiKey, tap, and it does the rest for you. -
27
Protectimus
Protectimus Limited
Protectimus SAAS two-factor authentication service is already set up in the cloud and available 24/7, just register and begin the integration via API or using a ready-made integration plugin. The Protectimus On-Premise MFA platform can be deployed on the premises of your organization or in a private cloud. Radius, Citrix NetScaler and XenApp VMWare, Active Directory, LDAP, Windows Logon, and RDP, OWA, ADFS, RoundCube, Dynamic Passwords, API, SDK, customized individual development. Dynamic Strong Password Authentication integrates directly with Microsoft Active Directory (or any other user directory) to add a six-digit password onto users’ static passwords. Today, data violation happens regularly. If you want to assure your data is thoroughly protected, strong authentication methods are vital. We are likely to display personal info without any outside intervention. But when it comes to business, we would not limit user authentication and identification to a single password.Starting Price: $33 per month -
28
Stytch
Stytch
The authentication platform for developers. Onboard, authenticate, and engage your users with Stytch’s APIs. Improve security and user experience with flexible, passwordless authentication solutions. Let us build the infrastructure, so you can focus on your product. Our SDKs offer flexible templates that can be tailored to your colors, fonts, and logo, so you can easily create seamless onboarding and authentication experiences that delight users and complement your brand—without the trouble of building UI from the ground up. For even more control over your user experience, choose our direct API integration, which considers both developer and user experience to ensure fast, safe, and easy passwordless authentication flows. We make the integration quick and painless, with clear and comprehensive documentation. -
29
Veriff
Veriff
Veriff is the preferred identity verification and authentication platform partner for the world's most innovative growth-driven organizations, including online marketplaces, financial services, gaming and mobility companies, and other sectors. By combining AI and human verification teams, Veriff ensures bad actors are kept at bay, and genuine users experience minimal friction in their customer journey. Veriff enables organizations to build customer trust through seamless, AI-powered identity verification and authentication. The Veriff IDV platform offers secure, scalable solutions trusted by organizations across industries. Veriff’s identity verification platform comes with a 98% check automation rate, a six-second average decision time, more than 12,000 identity documents in our document database, and a first-class UX that allows 95% of users to be verified on the first try.Starting Price: $49/month -
30
Authsmith
Authsmith
Authsmith is a cloud-based authentication platform that simplifies securing and managing user access for applications. The system supports multiple authentication methods including email/password, social logins, and single sign-on, creating a streamlined login experience. The platform includes analytics capabilities that provide insights into user activity and authentication metrics, allowing administrators to monitor system health and identify potential security concerns. Authsmith features multi-factor authentication and automated security alerts that help prevent unauthorized access and maintain compliance with industry standards. User management tools within Authsmith enable control over roles and permissions from a centralized dashboard. The platform offers API access for developers to integrate authentication features into their applications. Authsmith delivers a comprehensive solution for managing user access while maintaining strong security measures.Starting Price: $30 -
31
Konfirmi
Konfirmi
Konfirmi gives your website or app easy-to-setup verification (which you can combine or use standalone). Verification methods include: - 2 Factor Authentication / Multi Factor Authentication (2FA/MFA) - SMS/Email verification - True age verification (KBA Checks) - True customer name/address/info verification (KBA Checks) - Biometric Authentication - Single Sign On (SSO). Check age, addresses, photo IDs, more. Quickly add to any website or application. Comply with various USA and other laws. Small Business and Enterprise options. Konfirmi‘s patent-pending system allows you to automatically verify your customer’s information, including age, physical address, email address, phone number, and photo ID in any app, user sign up or registration page, e-commerce store, contact form or survey, or other web-facing system. Quickly start using Konfirmi in your website or application.Starting Price: $19 -
32
AgentAuth
Composio
AgentAuth is a specialized authentication platform designed to facilitate secure and seamless access for AI agents to over 250 third-party applications and services. It offers comprehensive support for various authentication protocols, ensuring reliable connections with automatic token refresh. The platform integrates seamlessly with leading agentic frameworks such as LangChain, CrewAI, and LlamaIndex, enhancing the capabilities of AI agents. AgentAuth provides a unified dashboard for complete visibility into user-connected accounts, enabling efficient monitoring and issue resolution. It also offers white-labeling options, allowing customization of the authentication process to align with product branding and OAuth developer applications. Committed to high-security standards, AgentAuth complies with SOC 2 Type II and GDPR, employing strong encryption for data protection.Starting Price: $99 per month -
33
EnSecure
Enqura
Strong multi-factor customer authentication designed for secure first time log-in, transaction signing, document verification protecting digital channels against fraud. Digital Identity, created by using multi-factor authentication is crucial for enhancing user experience, guaranteeing the protection of your customers’ assets, and adhering to regulatory requirements. EnSecure offers the ideal solution for end users’ authentication needs across many industries, with two versions based on Soft OTP and Electronic Certificate. -
34
Entrust Identity as a Service
Entrust
Cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). Secure access to apps, networks, and devices for all of your users — with cloud-based multi-factor authentication. Proximity-based login, adaptive authentication and other advanced features contribute to an optimal user experience. Happy users don’t try to circumvent security measures. Everyone wins. This is easier than anything else you’ve tried. Work-saving touches — like built-in provisioning tools and on-premises and cloud integrations — reduce the workload for IT, from deployment through everyday management. Get strong IAM to move faster into the future. Cloud-based Identity as a Service scales quickly to accommodate new users, expanding use cases, and evolving security threats. -
35
OneSpan Authentication Servers
OneSpan
Secure access and transactions by deploying multi factor authentication and transaction signing capabilities at mass scale. Leverage proven authentication server and API technologies to secure access and transactions and streamline identity management. Use strong authentication to secure access to corporate resources and banking applications. Enable highly secure transaction signing with user friendly Cronto® technology. Simplify authentication lifecycle management via a single integrated system. Easily support new standards in application and network access security for most major operating systems and platforms. Ensure business continuity – eliminate server downtime and service disruptions. Deploy server solutions regardless of operating system or architecture. OneSpan server solutions validate authentication requests to offer secure and seamless access to a variety of corporate resources and applications. -
36
OpenIAM
OpenIAM
Identity Governance and Web Access Management. As new employees join your organization, you face the conundrum of ensuring that they are given rights to all the systems and resources they need to do their work on the day they join the firm. Similarly, when a person changes positions within the firm, access that is no longer relevant must be revoked and access that is needed for their new position must be granted. For the situation of users leaving the firm or being terminated, it is even more imperative that permissions be addressed. Access to sensitive applications and data must be disabled/removed in a timely manner with traceability to avoid the consequences of a disgruntled user. -
37
LicenseDNS
LicenseDNS
With LicenseDNS, the process of verifying licenses within your software product becomes significantly streamlined, eliminating the need for complex cryptographic methods that can often be cumbersome and difficult to implement. Rather than relying on intricate cryptography embedded within your application, you can leverage the capabilities of DNS servers to handle all necessary cryptographic verification seamlessly and efficiently. Simply by sending a DNS query to any recursive DNS server, you can obtain verified license information with a high degree of confidence. LicenseDNS enables software vendors to implement licensing using DNSSEC. To validate a license, send a DNS query to any DNS server and receive cryptographically verified license data. All platforms and langauges are supported. LicenseDNS offers a user-friendly web-based License Manager application and hosts specialized DNS servers for activating, and deactivating licenses.Starting Price: €9/month/user -
38
BotDelive
BotDelive
BotDelive is a 2FA and push notification service via IM bots for developers. Create an account on BotDelive and get your API credentials. Read our API documentation and start integrating! You will need only 2 API endpoints to integrate 2FA. BotDelive is a cloud communication platform for developers. It allows developers to send and receive 2FA and push notifications over the chat apps by using its APIs. Normally, you have to force your user to install an app to send notifications. But, the chat apps are already installed on millions of devices. Why not use them? BotDelive offers a quick way of 2FA. With only answering the yes/no questions your users can authorize their own accounts. Authenticate users via BotDelive instead of e-mail and password. You can require only once the password and then BotDelive will handle all requests for you. Send important push notifications via chat apps. BotDelive ID is reliable.Starting Price: Free -
39
Jumio
Jumio
With identity theft and account takeover on the rise, it’s increasingly difficult for businesses to trust that someone is who they claim to be online. Jumio’s identity proofing and eKYC solutions are powered by the Jumio KYX Platform and leverage biometrics, AI and the latest technologies to quickly and automatically verify the digital identities of new customers and existing users. Jumio provides an automated and intuitive user experience that takes less than a minute to complete. Jumio supports more countries, languages, and document types than any other solution. Jumio seamlessly integrates into websites, iOS or Android applications via APIs, SDKs and webcams. Quickly integrates into your website or mobile app and lets your users shift from a desktop to mobile experience as desired. All data is transmitted and stored with strong AES 256-bit encryption. Jumio is PCI DSS Level 1 compliant which speaks to the seriousness that we take data security and privacy. -
40
WinMagic MagicEndpoint
WinMagic Corp.
As a leading developer of cybersecurity solutions for over 25 years, WinMagic has entered the passwordless secure authentication market in 2022 by releasing MagicEndpoint. Leveraging our pedigree and experience in protecting endpoints and data-at-rest, MagicEndpoint is referred to as the most secure authentication solution with the best possible user experience – no user action required! MagicEndpoint ensures that CISOs and cyber security professionals can easily implement passwordless authentication, addressing their cyber security needs, while eliminating password friction and reducing password management costs. MagicEndpoint addresses a growing industry need for precise, strong user authentication while still protecting the data security within devices, servers, and networks. -
41
Aegis Authenticator
Beem Development
Aegis Authenticator is a free, secure, open source Android app for managing two-factor authentication tokens, helping users add an extra layer of security to their online accounts by generating time-based or HMAC-based one-time codes (HOTP/TOTP) that work with thousands of services that support industry-standard 2FA, making it a privacy-respecting alternative to apps like Google Authenticator or Authy. Tokens are stored in a locally encrypted vault that can be unlocked with a strong password and optionally with device biometrics, and the app includes features such as encrypted backups, QR-code scanning, manual entry, and import/export from other authenticator apps so users can migrate their existing 2FA credentials easily and securely. Aegis provides extensive organization tools including custom icons, grouping, alphabetical and custom sorting, and search to help manage many accounts effectively, and its design emphasizes security and privacy.Starting Price: Free -
42
Aerobase
Aerobase
Aerobase is an open-source Identity and access management (IAM) platform that specializes in identity federation, SSO, strong & adaptive authentication, access control, account management & identity provisioning, API & microservices security and privacy regulation. This guide helps you get started with Aerobase. It covers server configuration and use of the default database. Advanced deployment options are not covered. For a deeper description of features or configuration options, consult the other reference guides.Starting Price: $690 per month -
43
Active Directory
Microsoft
Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.Starting Price: $1 per user per month -
44
elm
evoleap
Comprehensive licensing control, analytics, user feedback, and software release management so you can focus on improving customer experience and scaling your product. With Elm, your team can commission and update licenses for thousands of users in just a few clicks. Leverage powerful software utilization analysis dashboard to empower data driven decision making. elm empowers your Product Management team to make data driven decisions, enables Customer Success teams to drive value generation, and supports Sales with key analytics. Integration with support desk, CRM, and other 3rd party apps drives additional process automation and streamlines access to valuable insights. Your customers, resellers and other partners can have their own service portal. Each can see analytics about their downstream users and manage relevant licenses. -
45
Nametag
Nametag
Nametag is the fast, safe, everywhere ID. Our mission is to bring authenticity to the internet and enable people to build trustful relationships. By putting privacy first, Nametag gives you control of sharing your personal information and the power to choose when it’s shared, where it’s shared, and for how long. We empower individuals to share validated details about who they are with other people or companies. We enable businesses to identify their customers in real-time and request the necessary details for a faster and more trusted transaction. Never get locked out. If you lose your phone, lose access to your email, or even get a new driver’s license, you'll still be able to sign in with Nametag. Don’t overshare. With Nametag's Privacy Mask, share only the necessary information and conceal the rest. Companies benefit too by not holding unnecessary personal information (PII). -
46
Pirean Access: One
Pirean Software
We provide robust authentication and authorization services across web and mobile. Our Access: One platform protects high-value data, equity and IP across critical industries. We partner with some of the world’s largest organizations to protect their services globally. Delivered through our private cloud identity platform, we enable our customers to quickly realize identity services that: Provide a central point of control for managing identities and entitlements. Provide flexible access management, supporting single sign-on and strong user authentication. Deliver an agile and robust IAM API for extending the reach of your identity infrastructure. We are recognized for our innovation, our versatility and our focus on the end user. -
47
LoginID
LoginID
With just a few lines of code, LoginID enables websites and apps to integrate FIDO/FIDO2 certified multi-factor authentication via our easy to use SDKs and APIs. Our platform leverages the biometrics on the end user's device to create a private key, public key pair that allows for seamless strong customer authentication. No app installation is required and the private key is stored securely on the end user's device, never leaving. Additionally, LoginID offers Transaction Confirmation, where a transaction can be cryptographically signed providing proof of the user’s confirmation of that specific transaction, which is perfect for merchants who want payment authentication services. LoginID is aligned with PSD2, GDPR, CCPA, and HIPAA. We have SDKs for iOS, Android, React-Native, Web, Python, Java, and Node as well as a WordPress Plugin.Starting Price: Free -
48
iProov
iProov
We authenticate remote users online for onboarding and verification using Genuine Presence Assurance. Organizations using iProov’s biometric authentication for onboarding or authenticating are realizing significant benefits. Clean bill of health from US Government Penetration Review. Unique active threat management system for certified resilience. Independent of platform, format or device. iProov is the world leader in Genuine Presence Assurance. Banks, governments, travel and healthcare providers around the world are using our unique patented technology to verify the online identity of customers and citizens more securely and more effortlessly than ever before. GDPR compliant & eIDAS certified. Credentials not stored on devices. Deployed by the world’s most security conscious organizations. Deployed on five continents. Delivering millions of authentications worldwide. -
49
LoginRadius
LoginRadius
LoginRadius empowers businesses to deliver a delightful customer experience without compromising security. Using our customer identity platform, companies can offer a streamlined login process while protecting digital accounts and complying with data privacy regulations. LoginRadius serves over 3,000 businesses with a monthly reach of 700 million users worldwide. Key platform features include registration services, adaptive security, integration with third-party applications, and customer insights. The company has been named an industry leader in customer identity and access management (CIAM) by Gartner, KuppingerCole, and Computer Weekly. Microsoft is a major technology partner and investor. LoginRadius is headquartered in Vancouver, Canada, with additional offices in Toronto, USA, United Kingdom, Australia, and India. LoginRadius Services: API Authentication OAuth Data Management Secure Login Single Sign On SAML SSO Social Sign On Two Factor Authentication -
50
AU10TIX
AU10TIX
AU10TIX, an identity management company headquartered in Israel, is on a mission to obliterate fraud and further a more secure and inclusive world. The company provides critical, modular solutions to verify and link physical and digital identities so businesses and their customers can confidently connect. Over the past decade, AU10TIX has become the preferred partner of major global brands for customer onboarding and customer verification automation. AU10TIX takes verification and authentication to a whole new level of scalability. The power of deep learning lies within the input – the more you feed it, the smarter it becomes. This enables you to scale consumer onboarding and exponentially scale your business. With over 5% of the world identities already scanned and verified, fortune 500 companies are powered by AU10TIX, wiping out fraud while confidently focusing on growth. Our identity has changed over the years. Our principles & pioneering vision haven’t.