Alternatives to iCrypto

Compare iCrypto alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to iCrypto in 2025. Compare features, ratings, user reviews, pricing, and more from iCrypto competitors and alternatives in order to make an informed decision for your business.

  • 1
    Cisco Duo
    Cisco Duo is a cloud-based identity security solution that protects organizations from identity-based threats and boosts workforce productivity. Trusted by over 40,000 organizations worldwide, Duo delivers an exceptional access management experience across all users, devices, and applications, making access to resources secure, seamless, and easy. Duo with Cisco Identity Intelligence provides deep visibility across your identity ecosystem, adding a powerful security layer to any identity infrastructure. Offer users a world-class access experience through Duo Passport to eliminate MFA friction and fatigue without sacrificing security. To stop threats, Duo verifies user identities with strong authenticators including Duo passwordless, Verified Duo Push with number matching, and phishing-resistant factors like biometrics and FIDO2 security keys. Paired with deep insights into users’ devices, Duo gives you the control to adaptively limit access based on device health or user risk.
    Leader badge
    Starting Price: $3 per user per month
  • 2
    Udentify

    Udentify

    Fraud.com

    Know the real identity of your customer, user, or employee with the Udentify Identity Verification and Biometric Authentication solution. Challenges we solve: - Identify verification - Onboarding - New account opening - Age verification - Fraud prevention - Biometric authentication - Passwordless authentication - Strong customer authentication - KBA replacement - KYC and AML compliance Behind the scenes, Udentify embeds cutting-edge technologies into our identity verification and biometric authentication solution via a lightweight and flexible SDK. We are constantly investing in our technologies to stay at the forefront of fraud detection, compliance, and user experiences.
    Starting Price: $0.17
  • 3
    Oz Liveness

    Oz Liveness

    Oz Forensics

    Oz Liveness is a leading facial recognition and authentication software used by private and public organizations across the globe to lower the risk of biometric fraud by preventing deepfake and spoofing attacks with 100% accuracy. The technology has been validated by the industry’s most rigorous testing standard, ISO 30107-3 iBeta level 1 and 2 certifications. It helps organizations validate they are dealing with a real person within seconds, lowering compliance and fraud risks. Oz Liveness features advanced algorithms able to detect many forms of biometric spoofing, including 3D and 2D masks and photos along with photos or videos displayed on a mobile or a laptop screen. On-device Liveness detection and face biometry checks allow to use of a phone as a personal biometric device. No data is sent to the server from the device and stays in the customer's hands. On-device Liveness is perfect in any customer’s use case, improving the reachability and stability of the services .
    Leader badge
    Starting Price: $2,625/year/12,500 transaction
  • 4
    Auth Armor

    Auth Armor

    Auth Armor

    Harness the power of biometrics on smartphones to make authentication easy for any application or website, creating a new approach to logging and authenticating online. Passwordless and 2-factor authentication that lets you authenticate your users with the smartphones in their pockets. Auth Armor puts secure authentication in the hands of every user — no weak passwords or cumbersome codes. We have built powerful APIs, SDKs, libraries, and dashboards to allow you to build what you want to build, how you want to build it. Use our tools to build authentication into any app, using any flow you would like. We offer Consumer facing and workforce protection, giving you the power and flexibility to secure anything, the way you need it. Auth Armor is the fastest and easiest mobile authenticator available. We support instant push messaging directly to user's devices enabling the fastest login and authentication experience.
    Starting Price: FREE for 10,000 active users!
  • 5
    Say-Tec

    Say-Tec

    Finnovant

    Say-Tec is our flagship cybersecurity product, it combines state-of-the-art biometric technology with blockchain technology to ensure the safety of your data. Say-Tec eliminates the need for multiple passwords by using your unique face and voice biometrics to unlock a device, login to an account, and access your private data. Standard web interfaces could include invoking Say-Tec during account set-up, or during the log-in process, or resetting a password when it has been forgotten. Say-Tec can completely replace the user-id and password friction of logging into a website. Say-Tec has been tailored to support the world of decentralized apps, websites, and processing, which is commonly encountered with Blockchain access, cryptocurrency, and crypto wallets and exchanges.
    Starting Price: Free
  • 6
    Nexa|Voice
    Nexa|Voice is an SDK that offers biometric speaker recognition algorithms, software libraries, user interfaces, reference programs, and documentation to use voice biometrics to enable multifactor authentication on iOS and Android devices. Biometric template storage and matching can be performed either on a mobile device or on a server. Nexa|Voice APIs are reliable, configurable, and easy to use, complemented by a level of technical support that has helped make Aware a trusted provider of quality biometric software and solutions for over twenty-five years. High-performance biometric speaker recognition for convenient and secure multifactor authentication. The Knomi mobile biometric authentication framework is a collection of biometric SDKs running on mobile devices and a server that together enable strong, multi-factor, password-free authentication from a mobile device using biometrics. Knomi offers multiple biometric modality options, including facial recognition.
  • 7
    Phonexia Voice Verify
    Shorten the time necessary for clients to authenticate over the phone by 30+ seconds and reduce costs significantly. Secure access to your clients’ data conveniently with voice biometrics and detect fraud attempts natively. Verify clients in 3 seconds based on their voice and offer them an immersive, passwordless authentication experience. Offer your customers a seamless, secure, and passwordless authentication experience by identifying them based on voice biometrics instead of hard-to-remember passwords. Phonexia Voice Verify leverages Phonexia Deep Embeddings™ Speaker Identification technology powered by artificial intelligence to provide extremely fast and accurate speaker verification. Phonexia Voice Verify is a cutting-edge voice verification solution designed specifically for contact centers to enhance them with an intuitive security layer.
  • 8
    Voicekey

    Voicekey

    Voicekey

    Voicekey is a patented voice biometrics product using stateless Neural Network (NN) Technology/AI to help solve non-face-to-face identity authentication and identification security challenges. Voicekey is at’ heart’ a computational NN/AI engine that is consumed on-device or server based as part of an identity security application. Voicekey processes involved in enrolment and verification are consumed and accessed on-device or server based using an SDK depending on the platform (Java, iOS, Android, Windows mobile and Windows ) or RESTful API. Voicekey is a user configurable software ‘lock’ that can only be opened by the voice of a registered user.( The lock comes from the NN/AI technology).
  • 9
    Nexsign

    Nexsign

    SAMSUNG SDS

    Get stronger mobile security that’s uniquely yours. The next step in mobile security is Nexsign. Unlike a password, which can be easily forgotten or duplicated, Nexsign™ verifies your identity with biometric information using your fingerprint, face, and voice. The result? An authentication experience that’s simpler, faster, and even more secure. The days of remembering long, complicated passwords are officially over. Accessing data is as simple as recognizing your fingerprint, face or voice. Enjoy some peace of mind. Nexsign™ will not store your biometric information on the server. And with a strong authentication system using Public-Key Infrastructure (PKI), there is no risk of biometric information leaking. Biometric authentication is just the beginning. Nexsign™ can also work on a range of platforms and environments, such as Mobile OTP or PIN authentication. Now it’s simple and easy to deploy solutions, with standardized development toolkits, APIs, and a web-based admin portal.
  • 10
    It'sMe

    It'sMe

    Acceptto

    Employees hate using passwords as much as you hate managing password vulnerabilities. More passwords and tokens lead to greater security risk, fatigue, and cost. It’s time to get rid of them for good. 89% of security professionals claim that a more advanced multi-factor authentication tool that provides continuous, behavioral authentication would improve their company’s security posture. Acceptto provides users with Intelligent MFA that intuitively authorizes access to applications and continues authenticating post-authorization. We prevent account takeovers, even if hackers have already acquired passwords. ItsMe™ Intelligent Multi Factor Authentication (MFA) increases your security by authorizing access attempts to a registered device in real-time, be it through a push notification or verification code (SMS, TOTP, email, and etc.). With our timed based one-time password (TOTP), security key, or biometric options, you can authenticate access even when offline.
  • 11
    Loop8

    Loop8

    Loop8

    Loop8 is a passwordless digital security platform that replaces vulnerable passwords with biometric authentication, using your face or fingerprint to protect your accounts. It offers an all-in-one ecosystem that integrates authentication, dark web monitoring, cookie tracking protection, and secure document storage. The platform’s Authenticator (Auth) replaces traditional 2FA apps, while Privacy-M8 provides real-time alerts when personal data appears in breaches. Clean-SL8 automatically removes tracking cookies to protect browsing privacy, and MySafe stores sensitive files securely on your own devices. Loop8’s Tru8 Recovery system allows you to choose trusted contacts for account recovery instead of relying on companies. Designed for both individuals and families, it can protect up to eight users under a single subscription.
  • 12
    LexisNexis Voice Biometrics
    LexisNexis Voice Biometrics is an ideal authentication tool for companies or government agencies that process a significant volume of high risk transactions remotely or within a call center environment. As unique to an individual as a fingerprint, a voice biometric (or "voice print") uses the sound, pattern and rhythm of an individual's voice to determine his or her identity. LexisNexis® Voice Biometrics provides a higher degree of security for remote, high-risk transactions with little to no impact on the customer experience. LexisNexis® Voice Biometrics enhances operational security and the customer experience while significantly reducing the costs and risks associated with remote authentication. This advanced voice biometric-based authentication solution that, when coupled with our identity proofing solutions, provides businesses and government agencies a single source for authenticated enrollment and repeat user authenticated access to the contact center.
  • 13
    Verbio

    Verbio

    Verbio

    Increase security and user experience in daily interactions with the unique potential of voice. An innovative language agnostic, cost-effective and reliable alternative to seamlessly verify and identify users in real-time. Voice biometrics allows to automatically recognize any person through the characteristics of their voice and it can smartly substitute traditional authentication methods (cards, passwords, signature, fingerprint, etc) in security access control, user verification for digital transactions or for fraud prevention and detection. With an easy and cost-effective solution, authentication through voice biometrics brings an innovative and safe experience to users, with a risk-free and remote access. Biometric Authentication and Identification through voice has never been so secure and fast with different operational uttering models for each type of client and advanced anti-spoofing methodologies.
  • 14
    Accops HyID

    Accops HyID

    Accops Systems

    Accops HyID is a futuristic identity and access management solution that safeguards critical business applications and data from misuse by internal as well as external users, by managing user identities and monitoring user access. HyID provides enterprises with strong control over endpoints, enabling contextual access, device entry control and flexible policy framework. The out-of-the-box MFA is compatible with all modern and legacy apps, cloud and on-prem apps. It enables strong authentication based on OTP delivered via SMS, email and app, biometrics, and device hardware ID & PKI. Single sign-on (SSO) feature provides better security and convenience. Organizations can monitor security posture of the endpoints, including BYOD devices, and grant or deny access based on real-time risk assessment.
  • 15
    Veridium

    Veridium

    Veridium

    Veridium is the most comprehensive Integrated Identity Platform powered by AI-based Behavioral Biometrics, enabling Multi-Factor Authentication (MFA), digital ID verification, and a true enterprise-grade passwordless experience for employees and customers. Low code, agile, and flexible. Eliminating the password for customers removes the friction often associated with passwords and delivers increased security for online connections with our single step multi-factor authentication solution, while providing higher levels of identity assertion for organizations. Veridium provide an end-to-end authentication platform for all your WFH needs and any VPN solution, delivering strong, multi-factor, passwordless workforce authentication.
  • 16
    ThumbSignIn

    ThumbSignIn

    ThumbSignIn

    Any channel, any device – we’ve got you covered. Choose from our suite of user-friendly authentication solutions, from 2FA to passwordless biometrics, to find the right authentication for your business and users. Start with 2FA and progress to more advanced technology like biometrics-based authentication to continue improving user experience and security over time. Our SaaS-based authentication service, REST APIs , mobile SDKs and UI widgets deliver a powerful combination of software components that can be used to build omni-channel authentication experiences that span mobile, web, phone, IoT, chatbots, kiosks, physical access and more. It’s time to take the security burden off of users! Our mission is to democratize access to strong authentication technology and make the digital world safer for everyone. ThumbSignIn provides cost-effective, scalable SaaS-based solutions to help companies select the best way to strengthen their existing systems with two-factor authentication (2FA).
    Starting Price: $3 per user per month
  • 17
    PortalGuard

    PortalGuard

    BIO-key International

    BIO-key PortalGuard IDaaS is a single, flexible cloud-based IAM platform that offers the widest range of options for multi-factor authentication, biometrics, single sign-on, and self-service password reset to support a customer’s security initiatives and deliver an optimized user experience – all at an affordable price point. For over 20 years, industries such as education, including over 200 institutions, healthcare, finance, and government have chosen PortalGuard as their preferred solution.Whether you’re looking for passwordless workflows, support for your Zero Trust architecture, or just implementing MFA for the first time, PortalGuard can easily secure access for both the workforce and customers whether they are remote or on-premises. PortalGuard’s MFA stands out above others as it is the only solution to offer Identity-Bound Biometrics that offer the highest levels of integrity, security, accuracy, availability and are easier to use than traditional authentication methods.
  • 18
    Transmit Security

    Transmit Security

    Transmit Security

    The Future of Authentication Is Passwordless. Agile. Instant. Versatile. Eliminate passwords to deliver powerful identity experiences that delight you and all your users. Wherever, whenever. Strong and seamless customer authentication from any device or channel. Use the mobile as the authenticator. Powered by a network of trust to identify each and every user. This is instant technology and installation that gives the ultimate experience and impact. Turn complex authentication, authorization and risk policy decisions into simple journeys. Enjoy flexible policy orchestration engine for all applications and channels. Protect your workplace and workforce whether in the office or remote. No matter what location or device enjoy the benefits of risk based technology that provides impenetrable security. Go passwordless and keep your enterprise secure.
  • 19
    LastPass

    LastPass

    LastPass

    LastPass is a cloud-based password manager available on any system or device, ensuring credentials are protected, private, and always within reach. Simple to set up and effortless to use, LastPass delivers the world's most convenient password management experience for consumers and businesses of all sizes and technical requirements. Say goodbye to password fatigue by generating, sharing, accessing, and managing credentials at the click of a button, while preventing bad actors from accessing precious data and account logins. Businesses also utilize LastPass to consolidate their tech stacks or to fill access management gaps with native integrations for MS Entra, Okta, and other IdPs and IAMs. With over 100 customizable policies, flexible privileges, detailed reporting, MFA and passwordless authentication options, LastPass makes it easy for organizations with numerous logins and increasing security risks to standardize password management company wide.
    Leader badge
    Starting Price: $4 per user per month
  • 20
    Axiad Cloud

    Axiad Cloud

    Axiad Cloud

    Systematically authenticate across all users, machines, and interactions with a cloud-based, complete, and flexible authentication platform. Axiad helps organizations move to a passwordless future without the friction and risk of fragmented solutions and ultimately improve their cybersecurity posture and empower their end users. Establish best practices for user security, eliminate silos, and meet compliance requirements with enterprise-grade passwordless MFA. Establish best practices for user security, eliminate silos, and meet compliance requirements with government-grade phishing-resistant authentication. Go beyond an in-place IAM product, establish best practices for user security, and meet compliance requirements with passwordless and phishing-resistant MFA. Enhance machine identity authentication and improve overall security with a unified, highly customizable PKI solution.
  • 21
    LumenVox Voice Biometrics
    Using voice biometrics authentication, companies can provide a delightful customer experience without sacrificing security. LumenVox Voice Biometrics technology screens customers by comparing input voice audio to a collection of stored voice samples (“voiceprints”) that are known to be authentic or fraudulent. Just like a fingerprint, each voice is unique. This makes Voice Biometric Authentication an incredibly effective way to validate identity. LumenVox’s flexible voice biometrics technology can be deployed in the method of choice and gives organizations the ability to create a seamless and secure process to verify its customers. LumenVox Voice Biometrics not only creates a better user experience, but also reduces operational costs and strengthens security. Anti-fraud measures such as liveness detection provide an additional security layer.
  • 22
    ID R&D

    ID R&D

    ID R&D

    Frictionless biometric authentication and liveness detection. ID R&D uses the power of AI and the science of biometrics to transform the user experience. Surprisingly effortless. Significantly more secure. ID R&D combines extensive research in the science of biometrics with advances in AI to deliver award-winning voice, face, and behavioral biometric authentication software. We’re on a mission to make authentication simultaneously frictionless and significantly more secure. ID R&D technology works with digital and traditional interaction channels, IoT devices, embedded hardware and more. Text dependent and text independent voice verification software null. Accurately detect fraud attempts that use recording, synthesized or converted voice null. The world’s first entirely passive facial liveness detection software – iBeta tested, ISO 30107-3. Continuous verification of web and mobile users through keystroke detection and more.
  • 23
    TrulySecure
    The fusion of face & voice biometric authentication creates a highly secure, hassle free experience. Sensory’s proprietary speaker verification, face recognition, and biometric fusion algorithms leverage Sensory’s deep strength in speech processing, computer vision, and machine learning. The unique combination of face and voice recognition provides maximum security, yet remains fast, convenient and easy to use, while ensuring the highest verification rates for the user. Biometrics aren’t just beneficial for their security—they’re also more convenient than other methods. Not all biometric solutions are created equal, and some have been known to accept false positives (a phenomenon called “spoofing”). Sensory’s novel approach utilizing passive face liveness, active voice liveness, or a combination of the two leverages a deep learning model that nearly eliminates spoofs from fraudsters using 3D masks, photos, video recordings, and more.
  • 24
    Entrust Identity Enterprise
    The world's most proven on-prem identity & access management (IAM) solution for strong digital security. Identity Enterprise is an integrated IAM platform that supports a full suite of workforce, consumer, and citizen use cases. Ideally suited for high-assurance applications that require a Zero Trust approach for thousands or millions of users, Identity Enterprise can be deployed on-premises or as a virtual appliance. Never trust, always verify. Protect your organization and user communities both inside and outside the perimeter. Secure workforce, consumer, and citizen identities with high assurance use case coverage including credential-based access, smart card issuance, and best-in-class MFA. Limit user friction with adaptive risk-based authentication, passwordless login, and cloud app federation. Option to use digital certificates (PKI) for a higher level of security when and where warranted, either with a physical smart card or a virtual smart card.
  • 25
    VoiSentry
    Provided as a VM image that can be deployed on your platform of choice - hardware server, data center, or cloud. APIs facilitate core enrolment and verification tasks, leaving your application total scope to deal with overarching process operations. VoiSentry includes a cluster-based architecture that provides effective scalability, robustness, and future-proofing, along with the option of hosting on-premise or in a data center. Our voice biometric engine combines enterprise-grade security and ease of use, creating the optimal business and client experience. With identity theft on the rise, MFA is increasingly used to prevent unauthorized access to customer data or financial resources. Voice biometrics adds a secure authentication factor that is spoof-resistant. Voice biometrics can be leveraged to create voice signatures, a legally binding method of underwriting documents such as life assurance policies.
  • 26
    Omni Authentication
    Managing a contact center can be very challenging, and expensive, and it’s not always easy to maintain the highest customer satisfaction, not to mention having your customers answer challenging questions to verify themselves. What if you could provide a solution that will increase security, reduce operational costs and improve customers experience, thanks to Omni Authentication a voice biometrics solution you can. One of the key challenges within a contact center is improving the Customer Experience. Customers are frustrated having to recall their PIN numbers; passwords or account numbers while agents are spending time asking security questions. Omni Authentication overcomes these issues by using the customers voiceprint to verify their identity, simply and securely. This results in improved contact center efficiency and customer experience. No longer do callers need to remember their account numbers, PINs, or passwords!
  • 27
    ValidSoft

    ValidSoft

    ValidSoft

    Pretty much anything we do online now requires passwords and security questions. It’s a part of life, really. Keeping track of all this information is frustrating. All of it is meant to protect us, ensuring we are the only ones who can access our accounts and data. Granted we are always hearing news of breaches that circumvent our passwords, but we want fast, easy-to-use login authentication that delivers a better end-user experience and saves on operational costs. We believe voice is the leading authentication factor that will improve your lives. You deliver a simple, quick, secure, password-free login experience for your customers. You significantly reduce password management costs. You achieve compliance with biometric privacy laws. A real-time comparison of an individual’s voice to their unique voiceprint validates the claimed identity. Make sure people are who they say they are. Use one model across many channels for true omnichannel excellence.
  • 28
    Nok Nok S3 Authentication
    Authentication is the "front door" to digital services. The Nok Nok™ S3 Authentication Suite (S3 Suite) provides passwordless authentication that is more convenient and user friendly than legacy authentication, and is more secure than legacy 2FA, resulting in improved user engagement and greater security. From frictionless on-boarding and progressive profiling, through easy bootstrapping of new devices and account recovery, to suspension and deprovisioning of users. Passwordless authentication support for Desktop Web, Mobile Web, Mobile Apps, Smartwatch Apps and integration for authenticating to call centers. Authentication to cloud services and - in combination with the Nok Nok IoT SDK, to IoT devices. The Nok Nok passwordless customer authentication platform delivers omnichannel, frictionless authentication to any device. The platform’s extensible architecture allows you to support third party biometric products or new authenticators and biometric modalities.
  • 29
    FortressBA

    FortressBA

    Fortress Identity

    Strengthen security and eliminate passwords with a mobile and web biometric user authentication solution. Fortress Identity is simplifying everything about secure authentication by introducing a biometric API into the equation. Implement voice authentication directly in the browser and expand to include the user’s smart phone for true multi-factor authentication. Secure account access and transaction authentication. Secure account access and transaction authentication. Strengthen security to corporate intranets and extranets. Reduce IT overhead cost for password reset. Create an omni-channel unified authentication platform. Protect access to medical records and patient data. Control door access to restricted areas and venues. Use a single API call for authentication and a single API call for enrollment. Use RESTful API to request user authentication (Voice, face, fingerprint).
  • 30
    Keyless Authenticator

    Keyless Authenticator

    Keyless Technologies

    Nothing to remember. Nothing to steal. You are the key. Adopt zero-trust authentication to protect your remote workforce and enable strong customer authentication with just a look. Anywhere. Any time. Any device. Embrace passwordless, multi-factor authentication to eliminate fraud, phishing and credential reuse – all while enhancing customer and employee experiences and protecting their privacy. Unique capabilities powered by unique technology. Hardware Agnostic. Since we do not rely on the device hardware or sensors, Keyless can be deployed on a large set of devices and appliances. Drive better outcomes for your organization by eliminating passwords. Top-Notch Security. No central honeypot, no data on user devices. Data can never be stolen or lost because no private information is accessible to anyone but the user. Reduce password associated costs by going passwordless. Password Reset Costs. The average helpdesk labor cost is estimated at $70.
  • 31
    Entrust Identity as a Service
    Cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). Secure access to apps, networks, and devices for all of your users — with cloud-based multi-factor authentication. Proximity-based login, adaptive authentication and other advanced features contribute to an optimal user experience. Happy users don’t try to circumvent security measures. Everyone wins. This is easier than anything else you’ve tried. Work-saving touches — like built-in provisioning tools and on-premises and cloud integrations — reduce the workload for IT, from deployment through everyday management. Get strong IAM to move faster into the future. Cloud-based Identity as a Service scales quickly to accommodate new users, expanding use cases, and evolving security threats.
  • 32
    VeriSpeak

    VeriSpeak

    NEUROtechnology

    VeriSpeak voice identification technology is designed for biometric system developers and integrators. The text-dependent speaker recognition algorithm ensures system security by checking voice and phrase authenticity. Voiceprint templates can be matched in 1-to-1 (verification) and 1-to-many (identification) modes. Available as a software development kit that enables the development of stand-alone and network-based speaker recognition applications on Microsoft Windows, Linux, macOS, iOS, and Android platforms. Text-dependent algorithm prevents unauthorized access with a covertly-recorded user voice. Two-factor authentication by checking voice biometrics and pass-phrase authenticity. Regular microphones and smartphones are suitable for recording user voices. Available as a multiplatform SDK that supports multiple programming languages. Reasonable prices, flexible licensing, and free customer support.
    Starting Price: €339 one-time payment
  • 33
    cidaas

    cidaas

    WidasConcepts

    cidaas is the optimal solution for fast and secure identity management. Thanks to cidaas you create one identity per user across all your channels. cidaas is based on OAuth2.0 and OpenID Connect standards, provides strong API security and with integrated Bot Net Detection and Fraud Detection a secure journey across all your business channels. Modern Identity and Access Management goes like this. Comprehensive feature set for quick and easy integration and implementation of all use cases and systems. We take care of it so you can focus on your core business. No more worrying about maintenance or operation. Countless passwords and pins make life difficult for users and are an unsightly barrier to access on digital channels. With passwordless authentication you secure your digital applications and offer your users a unique customer experience – because the login is the first thing your users see.
  • 34
    V2verify

    V2verify

    V2verify

    V2verify provides next-generation authentication technology that replaces passwords with secure, user-friendly voice-based multi-factor authentication. Using patented voice biometric technology, V2verify verifies identity through a user’s unique vocal characteristics, along with additional behavioral, device, knowledge, and liveness factors — creating a seamless and AI-resilient 5-Factor Authentication (5FA) process. Built for enterprise, financial, and government environments, V2verify’s authentication platform delivers unmatched security without sacrificing user experience. The solution easily integrates with existing systems and applications to support everything from passwordless logins and remote access to high-value transaction approvals and secure facility entry.
  • 35
    Veridas

    Veridas

    Veridas

    Don’t fall behind and start offering agile, comfortable, and secure digital onboarding processes. Nobody wants to have to remember passwords, carry keys or ID cards. Start operating with the confidence of a company that has performed more than 50 million onboardings and counting! Our facial biometrics technology allows you to operate securely in the digital world by simply being you. Our voice biometric technology is at the forefront for small, big details that are hard to beat. With Veridas you can incorporate global document verification into your digital onboarding processes. Our fraud prevention technology is better than any manual process you can imagine. We verify that people are who they say they are to deliver a digital transformation that is secure and reliable.
  • 36
    1Kosmos

    1Kosmos

    1Kosmos

    1Kosmos enables passwordless access for workers, customers and citizens to securely transact with digital services. By unifying identity proofing and strong authentication, the BlockID platform creates a distributed digital identity that prevents identity impersonation, account takeover and fraud while delivering frictionless user experiences. BlockID is the only NIST, FIDO2, and iBeta biometrics certified platform that performs millions of authentications daily for some of the largest banks, telecommunications and healthcare organizations in the world.
  • 37
    Mitek

    Mitek

    Mitek Systems

    Mitek Systems is a leading provider of AI-driven identity verification and fraud prevention solutions designed to secure digital interactions across industries. Their platform offers seamless integration of biometric authentication, identity verification, geolocation, and fraud detection tools to protect customers at every touchpoint. Key products include biometric liveness detection for face, voice, and documents, check fraud detection, and passwordless authentication. Mitek’s solutions help businesses reduce financial losses by preventing account takeover and synthetic identity fraud while ensuring compliance with regulatory mandates such as KYC and AML. The company’s user-friendly no-code platform accelerates deployment and boosts customer confidence with simple, secure user experiences. Trusted by over 7,900 organizations worldwide, Mitek continues to innovate in identity verification and fraud defense.
  • 38
    authID.ai

    authID.ai

    authID.ai

    Launch the power of mobile facial biometrics to deliver seamless identity fraud protection across the digital identity lifecycle. Onboard customers with ease. Weed out the bad guys early. Ensure user accounts and transactions cannot be compromised by account takeover or identity fraud. Gain increased assurance with cloud-based biometric authentication of high-risk transactions. Eliminate passwords with FIDO2 strong authentication tied to a trusted identity. Confirm the identity of new users remotely- know they are who they say they are. Our mobile biometric solutions help you onboard customers and verify their presence with ease while ensuring their accounts cannot be compromised by account takeover or identity fraud. Learn how authID can help you transform identity management.
  • 39
    SentryFusion
    SentryFusion allows a more secure, multi-factor analysis for access control to critical resources and areas. SentryFusion includes a cluster-based architecture that provides effective scalability, robustness, and future-proofing, along with the option of hosting on-premise or in a data center. Identify a user's voice and face during a video call so that they may later be recognized during a voice conversation, video call, or image. With identity theft on the rise, MFA is increasingly used to prevent unauthorized access to customer data or financial resources. This opens up the possibility of better-than-real-time operation, even in large-scale authentication scenarios. SentryFusion provides near-instantaneous results, streamlining the authentication process and removing the unnecessary hassle for end users.
  • 40
    Nomidio

    Nomidio

    Nomidio

    The world's most advanced unified Identity and Authentication Service. At Nomidio we specialise in protecting identities. Using our federated identity cloud, we liberate companies from holding unnecessary PII and enable secure customer identification for loan applications, verification of customers to access account information and much more. It all starts with the Nomidio Identity Cloud, which is an incredibly secure, quantum-ready, identity vault. The ID cloud delivers multiple identity services to multiple organizations, removing the need and expensive risk to companies of propagating identity data as is the standard today. The identity data is secured using our parent company’s patented Quorum multiparty split key cryptography, meaning that anyone wanting to decrypt any one record will require the compliance of other holders of the key fragments. Nomidio IDC is a light touch, highly effective biometric identity and authorization tool, 100% SaaS and can be deployed in minutes.
    Starting Price: $3.88 per user per month
  • 41
    Unikname

    Unikname

    Unikname

    Prevent phishing hack attempts of your web accounts in integrating the next-gen strong authentication that secures all your web access. Protect your admin account of all your websites that you manage. Offer your clients a password-less experience of registration. Add the next-gen social authentication that respects the privacy life. Easily manage the web access rights of your employees and partners. Install the Unikname solution for all web environments you need in minutes! Easily manage your trust certificates and web access from the dashboard dedicated. Manage the access rights of admins and website users. Enable Unikname as the default authentication system. Disable standard authentication. Fine-tune the style options of the Unikname login button. Unikname relies on the latest OAuth and OpenID Connect authentication protocol standards and allows to generate a trust certificate attached to your web domain name.
    Starting Price: €150 per year
  • 42
    OARO Identity
    We connect people to their identities using advanced facial recognition, simplifying processes for leading enterprise-sized businesses across all verticals. OARO IDENTITY is an end-to-end solution enabling user authentication and authorization across devices, business lines, and organizational boundaries – reducing cost and complexity while improving overall user experience and security. Identity management and the safeguarding of data are critical functions of all organizations. Traditional solutions are increasingly incapable of providing both the user experience and level of security required by today’s business environment. This trend is evidenced by the growing frequency of massive data breaches among industry leaders and the public sector. OARO IDENTITY is an end-to-end solution enabling our clients to authenticate and authorize users across devices, business lines and organizational boundaries, while reducing complexity, cost and improving user experience and security.
  • 43
    Secfense

    Secfense

    Secfense

    Protect your company, employees, and customers with simpler and stronger authentication. Deploy 2FA in minutes, not weeks. 2FA (and other user access security policies) built into the fabric of the infrastructure, not rigidly fixed to the applications. Enabling the use of any 2FA methods available on the market now and in the future without changing the core. Protection is available across the entire organization, spanning from on-premise, public and private cloud. Secfense is deployed in between your users and the applications they access. It learns the traffic patterns related to authentication. It can then enforce multi-factor authentication login and other sensitive actions without interfering with the applications existing code or database. Up-to-date 2FA methods are always available on the platform. Application changes don’t affect Secfense and applied methods. Take control over session expiration rules across all apps. Don’t rely on VPNs, base trust on users and their devices.
  • 44
    Dapple Security

    Dapple Security

    Dapple Security

    Dapple is committed to creating cutting-edge technology utilizing responsible biometrics and privacy by design principles to protect human digital identity and defend against phishing attacks, all while simplifying the user experience. We believe that people should never have to sacrifice privacy for security and will never charge a premium for security or privacy features in our products. Dapple security is creating cutting-edge technology utilizing responsible biometrics that protects people and privacy through a first-of-its-kind passwordless platform. We’re creating a brand and culture using privacy by design, where we give power back to people and the planet through our shared values.
  • 45
    Phonexia Speech Platform
    Phonexia offers a comprehensive portfolio of cutting-edge speech recognition and voice biometrics technologies ready to meet any commercial and governmental scenarios. Powered by the latest advancements in artificial intelligence, acoustics, phonetics, and voice biometrics science, Phonexia products are extremely accurate, fast, and scalable. Phonexia’s AI-powered solutions let you build voicebots, verify a speaker’s identity based on voice biometrics, transcribe speech to text, and search for speakers and context in large amounts of audio. Secure access to your clients’ data conveniently with voice biometric authentication and detect fraud attempts natively. Phonexia offers a comprehensive portfolio of cutting-edge speech recognition and voice biometrics technologies ready to meet any commercial and governmental scenarios. Powered by the latest advancements in artificial intelligence, acoustics, phonetics, and voice biometrics science.
  • 46
    OneVault

    OneVault

    OneVault

    Voice biometrics uses someone’s unique vocal characteristics, like pitch, tone, and rhythm of speech, to identify them in the same way other biometric technologies use digital fingerprints or retina scans. The real business and operational benefits of voice biometrics are that a speaker can be authenticated over a range of remote channels facilitating convenience, efficiency, and security. Unlike many other biometric modalities, it is not dependent on using a sophisticated device, a feature phone, an IVR system, or even a traditional landline to do the job. Fraud is rising in the form of account impersonations (the act of obtaining a legitimate user’s details to take over their online, credit cards, store cards, and bank accounts for money or credit card theft purposes). Globally, Kaspersky Fraud Prevention reported that every second fraudulent transaction in the finance industry was an account impersonation in 2020. In South Africa, SAFPS has reported an increase of 337%.
  • 47
    OnzAuth

    OnzAuth

    OnzAuth

    Implement Authentication in 5 mins or less, straightforward support for magic link or WebAuthN, no passwords to manage, no callbacks to implement. Our SDK is a vanilla javascript Framework meant to work with any frontend languages. Framework-specific support and documentation are coming soon. We believe developers should not spend time reinventing authentication over and over again. We solve both Authentication (Passwordless) and Authorization for you. Integrate with our simple-to-use SDK in minutes, or use any other standard OAuth or JWT libraries available in a variety of languages when required.
    Starting Price: $50 per month
  • 48
    HYPR

    HYPR

    HYPR | The Passwordless Company

    HYPR fixes the way the world logs in. Organizations are faced with the challenge of achieving secured and seamless authentication coupled with a flawless user experience at a time when it’s more critical than ever. HYPR’s passwordless multi-factor authentication (PMFA) platform decouples authentication from the organization’s current and future identity providers and eliminates the traditional trade-off between security and user experience by providing uncompromising assurance and consumer-grade experience with true passwordless and phishing-resistant MFA. The solution is trusted by more than 60M users worldwide. With deployments taking hours rather than weeks or months, organizations decrease the risk of attack, increase positive user experience, and lower operational costs.
    Starting Price: $4.00 per user/month
  • 49
    ArmorVox

    ArmorVox

    Auraya

    ArmorVox is the next generation voice biometric engine developed by Auraya that provides a full suite of voice biometric capabilities in telephony and digital channels. ArmorVox helps streamline and improve customer experience and information security. It can be securely deployed via the cloud or through an on-premise deployment. It uses machine learning algorithms to create speaker-specific background models for each individual voice print to deliver the best performance. Our algorithms set thresholds for each voice print that are empirically derived to meet your desired security performance requirements. Additionally, with automated tuning features, our ArmorVox engine works irrespective of language, accents or dialects. ArmorVox is built with industry leading patented features that helps resellers provide a more secure and robust solution in improving customer experience and security.
  • 50
    AuthX

    AuthX

    AuthX

    The most advanced authentication platform in the world. Log in online anytime, anywhere with your face, finger, palm, push or any other modality we support. It’s secure authentication that is simple, smart and occasionally magical. Use Authx to on any system and into any application from anywhere. Use any capability to log in and change preferred methodology anytime you like. Authx is secure, scalable and extremely easy to use. Register once and use everywhere. Enjoy Authx with all the time-saving solutions you need to securely authenticate. Authx is always secure and reliable and our experts are here to support you 24/7. Use Authx Mobile for iOS and Android and push an authentication right to your phone. Log in with your Face, Finger or Palm. Authx Mobile enables you to authenticate with Push as well as biometrics on your phone. You can log into your applications with a simple touch of your access card or in range with BLE.
    Starting Price: $2.99 per month