Compare the best Authentication software currently available using the table below.
AMD Telecom
Routee is an intelligent omnichannel communication platform (CPaaS) offering advanced Web and API automation for all industries worldwide. Powered by AMD Telecom’s robust infrastructure, Routee's services enable businesses to optimize their marketing & business processes. -SMS Marketing: tailor-made messages based on customers' individual preferences -Email Marketing: personalized newsletters & email campaigns based on an audience's behavioral data -Transactional Email: automated emails to customers on important data regarding their transactions -Marketing Automation: rich forms & customer data capture, automation of repetitive marketing tasks, and tracking of marketing campaigns -Two Factor Authentication: a second layer of security with fallback through SMS, Voice, Viber & Missed Call -Cloud IVR: multilingual capabilities, turning speech into text, & text to human-sounding speech -Push Notification: personalized web & mobile push notifications, based on segmentation and user
Google Authenticator generates 2-Step Verification codes on your phone. 2-Step Verification provides stronger security for your Google Account by requiring a second step of verification when you sign in. In addition to your password, you’ll also need a code generated by the Google Authenticator app on your phone.
LastPass
When it comes to secure and hassle-free password management for the enterprise, turn to LastPass. LastPass helps enterprises solve password security challenges without slowing down employees through its wide array of advanced and secure features. With LastPass, enterprises can ensure secure password storage, centralize admin oversight, control shared access, automate user management, and receive a dedicated service, among others.
Untethered Labs
Hands-free, wireless 2FA and password manager through active proximity-detection. IT admins can dynamically allow users to log in to their computers and websites with a physical key either automatically, by touch, by pressing Enter, or with a PIN. Seamlessly login, switch users, switch computers, and logout without passwords, touch, or trouble - just a key. Once a user walks away, the computer will lock, blocking access to the computer and web passwords. With continuous authentication, users are always being checked to ensure that they require access.
Twilio
Enable 2FA for your favorite sites. Go beyond the password and protect yourself from hackers and account takeovers. Simple to setup, secure cloud backup, multi device support. Defeat cyber criminals & avoid account takeovers with stronger security, for free! Watch the video below to learn more about why you should enable 2FA for your accounts. Relying on just usernames and passwords to secure your online accounts is no longer considered safe. Data breaches occur daily and hackers are always inventing new ways to take over your accounts. Protect yourself by enabling two-factor authentication (2FA). This blocks anyone using your stolen data by verifying your identity through your device. Enable 2FA now to protect your accounts online.
Silverfort
Silverfort delivers AI-driven adaptive authentication and zero trust security across entire corporate networks and cloud environments, without requiring enterprises to modify or rebuild their networks. Using patent-pending technology that does not rely on agents, proxies or code changes, Silverfort seamlessly enables secure authentication and access for all sensitive users, devices and services. This includes systems that were considered ‘unprotectable’ until today, such as homegrown/legacy applications, IT infrastructure, IoT devices, machine-to-machine access and more. By continuously analyzing risk and trust to apply adaptive policies throughout the network and cloud, Silverfort allows organizations to prevent identity-based attacks, close security gaps and achieve compliance even as our perimeters dissolve.
Microsoft
Microsoft Azure Active Directory is a comprehensive identity and access management cloud solution that combines core directory services, application access management, and advanced identity protection.
Microsoft
Go passwordless. Enter your username and confirm your sign-in with your phone. It’s that easy! Passwords can be forgotten, stolen, or compromised. With Authenticator, your phone provides an extra layer of security on top of your PIN or fingerprint. Use Authenticator to sign-in to Outlook, OneDrive, Office, and more. Protect all of your accounts with two-step verification. The app also helps you secure all of your online accounts by using the industry standard time-based OTP (one-time password) codes.
Ping Identity
Ping Identity (NYSE: PING) builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory and more. Ping helps enterprises balance security and user experience for workforce, customer and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software and more. Ping has solutions for both IT and developer teams. Visit www.pingidentity.com to learn more.
OneLogin
Secure critical company information and empower employees with OneLogin, a trusted identity and access management (IAM) solution for the modern enterprise. Designed to strengthen enterprise security while simplifying business logins, OneLogin is an excellent solution for companies looking to enforce security policies with ease. OneLogin includes top-rated features such as single sign-on (SS), unified directory, user provisioning, adaptive authentication, mobile identitiy, compliance reporting, and more.
Coviant Software
Coviant Diplomat MFT offers the best value for secure, reliable automation of file transfer from anywhere, to anywhere, with full visibility and alerting across any OS, in the cloud or on-premises. It supports transfers using FTP, FTPS, SFTP, HTTP, HTTPS, Local Network (including Network Shares) and AS2, as well as Cloud Storage providers: AWS S3, Azure Files, Oracle Cloud Storage, Google Cloud Storage, Citrix Sharefile, Dropbox, and Box.
WSO2
WSO2 Identity Server is API-driven, is based on open standards with the deployment options of on-premise, cloud or hybrid. It supports complex IAM requirements given its high extensibility. WSO2 Identity Server helps you do single sign-on and identity federation backed by strong and adaptive authentication, securely expose APIs, and manage identities by connecting to heterogeneous user stores. Leverage the power of open-source IAM in your enterprise to innovate fast and build secure Customer IAM (CIAM) solutions to provide an experience your users will love
JumpCloud
JumpCloud® Directory-as-a-Service® is Active Directory® and LDAP reimagined. JumpCloud securely manages and connects your users to their systems, applications, files, and networks. JumpCloud manages users and their systems – whether Mac, Linux, or Windows – and provides access to cloud and on-prem resources such as Office 365™, G Suite, AWS™ cloud servers, Salesforce™, and Jira® among thousands of others. The same login also connects users to networks and file shares via RADIUS and Samba, respectively, securing your organization’s WiFi and file server access. Leveraging cloud-based directory services, IT organizations can choose the best IT resources for the business enabling users to be as productive as possible.
Enzoic
Enzoic for Active Directory enables password policy enforcement and daily exposed password screening to secure passwords in Active Directory. With a fully automated compromised password detection, custom password dictionary, blocking of username derivatives, fuzzy matching with common character substitutions, and continuous ongoing monitoring; enterprises can easily adopt NIST password requirements and eliminate vulnerable passwords in Active Directory. Enzoic’s simple plug-in uses a standard password filter object to create a new password policy that works anywhere that defers to Active Directory, including Azure AD and third-party password reset tools. When a new password is being created, a partial hash is evaluated against Enzoic’s massive, continuously updated database. A list of candidate hashes is returned for a local comparison and no data is stored by Enzoic.
A unified identity, access, app, and endpoint management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace. Defend your organization with the BeyondCorp security model and Google’s threat intelligence signals. Control access to SaaS apps, enforce strong multi-factor authentication (MFA) to protect user accounts, manage endpoints, and investigate threats with Security Center. Maximize efficiency by enabling intuitive user experiences on endpoint devices, and unify user, access, app, and endpoint management with a single console. Enable users to access thousands of apps with single sign-on (SSO) and manage their company accounts using the same process as their personal Google accounts. Transition to digital by integrating your existing systems on a reliable, trusted platform. Extend your on-premises directory to the cloud with Directory Sync.
Auth0
Identity is Complex. Deal with it. Rapidly integrate authentication and authorization for web, mobile, and legacy applications so you can focus on your core business. People think that you can’t save money and reduce costs with something essential like identity. But those who use Auth0 experience a positive impact to their bottom line. Authenticate users across all of your applications with your own custom, secure, and standards-based unified login. With Universal login, users are redirected to a central authorization server. Because authentication is taking place on the same domain as the login, credentials are not sent across origins, increasing security and protecting against attacks such as phishing and man-in-the-middle. OAuth 2.0 recommends that only external user agents (such as the browser) should be used by native applications for authentication flows. Universal login provides this in a secure manner while also enabling SSO.
Gravitational
Gravitational Teleport is a gateway for managing access to clusters of Linux servers via SSH or the Kubernetes API. It is intended to be used instead of traditional OpenSSH for organizations that need to secure their infrastructure and comply with security best-practices and regulatory requirements. It helps in having complete visibility into activity happening across org infrastructure while reducing the operational overhead of privileged access management across both traditional and cloud-native infrastructure. Teleport aims to be a cloud-native SSH solution, i.e. it makes it natural to think of environments, not servers. Below is a list of the most popular Teleport features: -Single SSH/Kubernetes access gateway for an entire organization. -SSH certificate based authentication instead of static keys. -Avoid key distribution and trust on first use issues by using auto-expiring keys signed by a -cluster certificate authority (CA). -Enforce 2nd factor authentication.
Plurilock Security Solutions
Smooth access for the right users. No access for anyone else. DEFEND stops illicit use immediately—without bothering authorized users. Plurilock’s unique stack of invisible authentication factors identifies actual people as they work, not just their logins and passwords, all day long. When a stranger or a script appears—pre-session or mid-session—access is ended. Just like that. Continuous multi-factor authentication. DEFEND is strong, invisible, and always on. Protect corporate endpoints, HTML5 + JS applications, and Citrix VDI sessions transparently, as users work. Authentication doesn’t end after login. It’s continuous—and goes on until logout. The moment a user is no longer recognized, they’re gone.
inWebo
Founded in 2008, inWebo is a software organization based in the United States that offers a piece of software called inWebo. inWebo offers online, business hours, and 24/7 live support. inWebo features training via documentation, and live online. The inWebo software suite is SaaS, Mac, Windows, Android, iPhone, and iPad software. inWebo is authentication software, and includes features such as behavioral analytics, tokenization, and whitelisting / blacklisting. Software pricing starts at $2.00/month/user. inWebo offers a free version. Some competitor software products to inWebo include IntelliTrust, Ping Identity, and LastPass.
Rublon
Rublon enables your workforce to securely access your organization's networks, servers and applications. Protect your data via easy-to-use multi-factor authentication and comply with data protection regulations like GDPR. Deploy Rublon organization-wide, enabling MFA for all your cloud apps, VPNs, servers, workstations, internal as well as on-premise apps.
Ease.space
Founded in 2016, Ease.space is a software organization based in France that offers a piece of software called Ease.space. Ease.space offers online, and 24/7 live support. Ease.space features training via documentation, live online, and in person sessions. The Ease.space software suite is SaaS, Android, iPhone, and iPad software. Ease.space is privileged access management software, and includes features such as credential management, password generator, password reset, password synchronization, and user management. Software pricing starts at $59.00/month. Ease.space offers a free version, and free trial. Some competitor software products to Ease.space include OneLogin, Keeper, and Identity Manager.
Skrapp
Find B2B emails and build your most relevant leads directory. Relevant data and productivity are essential measures. Skrapp.io is an out-of-the-box tool that helps you find and save email addresses of your most prospective leads. Whether it's through LinkedIn, companies websites, or using our in-app features, we will help you build the email list for your next big idea. Our Chrome extension smartly integrates with your Linkedin or Sales Navigator and provides professional email addresses of your target leads. Forget about the struggle to search for an email on the internet, Skrapp does it for you and saves every potential lead's profile from LinkedIn and Sales Navigator. Reveal key leads, decision-makers, and company data when visiting any company's website. Our Domain Search feature helps you search email addresses of people working in any organization. For a more targeted search, optionally apply job title and location filters. Results are ordered by relevance.
Microsoft
Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
RCDevs
RCDevs provides enterprise-grade security solutions around two-factor authentication with OTP / U2F, federation, identity management, secure transactions and more… Our solutions combine mobile technologies with proven security standards in order to offer the best alternative for professionals and non-professionals requiring cost-effective solutions compatible with their user’s mobility
Entrust Datacard
Entrust Datacard is a software business in the United States that publishes a software suite called IntelliTrust. IntelliTrust includes training via documentation, webinars, live online, and in person sessions. The IntelliTrust product is SaaS software. IntelliTrust includes online, and business hours support. IntelliTrust is privileged access management software, and includes features such as AI / machine learning, and whitelisting / blacklisting. Product pricing starts at $2.00/month/user. Alternative competitor software options to IntelliTrust include Ping Identity, OneLogin, and JumpCloud DaaS.