App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Authentication Software - Page 3

158 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

AWS Amplify logo

AWS Amplify

4.7
(7)

App-building and cloud storage solutio

learn more
AWS Amplify is an app-building and cloud storage solution that helps businesses add user authentication protocols, build application user interfaces, manage users, and more on a centralized platform. Administrators can manage user directories and configure sign-up, forgot password, multi-factor authentication, and sign-in workflows.

Read more about AWS Amplify

Users also considered
Truora logo

Truora

4.8
(6)

Background Check/Authentication Solution

learn more
Truora provides advanced technology solutions for businesses to ensure security and integrity in their operations. Main products include background checks, identity vlidation, electronic signatures and WhatsApp engagement platfomrs.

Read more about Truora

Users also considered
Portnox CLEAR logo

Portnox CLEAR

4.1
(11)

Network security and access control software

learn more
Portnox’s cloud-native network & endpoint security essentials enable resource-constrained IT teams to address today’s most pressing security challenges.

Read more about Portnox CLEAR

Users also considered
MetaMap logo

MetaMap

4.4
(8)

Anti-money laundering & identity verification software

learn more
Mati is a cloud-based anti-money laundering software designed to help businesses verify and authenticate the identity of customers through document analysis and biometric capabilities. Managers can identify fraud attempts and conduct additional verification checks via emails or mobile devices.

Read more about MetaMap

Users also considered
Entrust Identity as a Service logo

Entrust Identity as a Service

5.0
(4)

Identity & access management solution

learn more
Entrust IDaaS is a cloud-based IAM solution designed to help organizations of all sizes deploy multi-factor authentication for accessing networks, devices, and applications. Key features include single sign-on, IAM, virtual smart cards, workflow automation, user group and identity management.

Read more about Entrust Identity as a Service

Users also considered
HyperVerge logo

HyperVerge

4.5
(6)

Identity verification solution

learn more
HyperVerge is a cloud-based identity verification solution specifically created for fraud prevention. It offers a proprietary AI that works in real time to verify and identify identities.

Read more about HyperVerge

Users also considered
Persona logo

Persona

4.8
(4)

Identity Verification Management

learn more
Persona helps businesses of all sizes easily and securely manage fully compliant KYC, AML, and identity verification programs.

Read more about Persona

Users also considered
LifeLock logo

LifeLock

5.0
(3)

Identity Theft Protection

learn more
LifeLock is an identity theft protection platform that can monitor credit reports and scores to identify identity threats. LifeLock helps protect Social Security numbers as well as other personal information and will actively assist users with reimbursing any funds stolen.

Read more about LifeLock

Users also considered
VaultCore logo

VaultCore

5.0
(3)

Encryption key management and cybersecurity software

learn more
VaultCore is an encryption key management software designed to help corporate businesses, government administrations, and military organizations secure data by deploying key encryption across cloud, virtual, and on-premise environments

Read more about VaultCore

Users also considered
Appgate SDP logo

Appgate SDP

5.0
(3)

Zero Trust Security Access Platform

learn more
Appgate is secure access provider that delivers solutions that prevents complex threats and reduce operational costs, securing the lives of the people that rely on them.

Read more about Appgate SDP

Users also considered
heylogin logo

heylogin

5.0
(4)

Password manager without a master password for business

learn more
The easiest password manager you've ever used. Using a smartphone instead of a master password makes heylogin 2-factor secure by design. Just one swipe and you're logged in to any website.

Read more about heylogin

Users also considered
Amazon Cognito logo

Amazon Cognito

4.5
(4)

User authentication and access management software

learn more
Amazon Cognito is an authentication management software designed to help businesses manage user sign-up, sign-in, and access to mobile and web applications via a unified portal. The platform enables users to sign in using enterprise identity providers like OpenID Connect, and SAML 2.0 and various social identity providers such as Amazon, Apple, Google, and Facebook.

Read more about Amazon Cognito

Users also considered
GPayments logo

GPayments

4.2
(5)

Fraud Prevention Solutions for financial institutions.

learn more
GPayments is a Fraud Prevention solution provider, securing web based transactions. We protect our clients against fraud and chargebacks and offers frictionless payment experience.

Read more about GPayments

Users also considered
Hitachi ID Bravura Identity logo

Hitachi ID Bravura Identity

4.3
(4)

Identity administration & access governance with automation

learn more
Bravura Identity is an integrated solution for managing identities, groups and security entitlements across systems and applications. It ensures that users are granted access quickly, that entitlements are appropriate to business need and that access is revoked once no longer needed.

Read more about Hitachi ID Bravura Identity

Users also considered
Authsignal logo

Authsignal

5.0
(2)

Authsignal, build trusted user authentication journeys.

learn more
Authsignal is a fraud ops and authentication platform that enables the orchestration of customer journeys leveraging Passwordless Authentication flows. Drop in Authsignal to your existing Identity stack and leverage our no-code rules engine. Deploy passkeys, and secure customer journeys today!

Read more about Authsignal

Users also considered
AU10TIX logo

AU10TIX

5.0
(2)

Identity and document verification management software

learn more
AU10TIX helps businesses in financial services, telecommunication, marketplaces, and other verticals streamline identity authentication operations. The platform lets users automate customer data verification processes, ensure compliance with statutory regulation, and avoid fraudulent activities.

Read more about AU10TIX

Users also considered
OwnID logo

OwnID

5.0
(2)

Authentication Platform

learn more
OwnID is a passwordless authentication add-on for websites and apps. It takes the password hassle out of registration and login for your customers AND makes authentication more secure. OwnID can be easily added to existing registration and login forms.

Read more about OwnID

Users also considered
ValidEntry logo

ValidEntry

5.0
(2)

Free Web3.0 Identity Verification

learn more
ValidEntry enables businesses creating in Web3.0 to transform their customer identification process with AI-driven automated identity solutions.

Read more about ValidEntry

Users also considered
Oz Liveness logo

Oz Liveness

5.0
(2)

Facial recognition tool for mitigating biometric fraud

learn more
Oz Liveness is a facial recognition tool, which helps organizations mitigate the risk of biometric fraud by preventing deepfake and spoofing attacks using advanced algorithms

Read more about Oz Liveness

Users also considered
Entersekt logo

Entersekt

4.3
(3)

Authentication platform for securely processing transactions

learn more
Entersekt is an authentication platform designed to help businesses securely process transactions across multiple digital channels and devices. It offers various fintech solutions that enhance the digital transformation across various sectors including financial services, payments, insurance, and healthcare.

Read more about Entersekt

Users also considered
MIRACL Trust logo

MIRACL Trust

4.5
(2)

2 second deviceless MFA on any platform or browser.

learn more
MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) that has been shown to increase customer traffic by up to 15%. Log into any mobile, desktop or even a smart TV, in 2 seconds with a success rate of up to 99.96%.

Read more about MIRACL Trust

Users also considered
Specops Secure Service Desk logo

Specops Secure Service Desk

5.0
(1)

Authentication solution for advance IT security

learn more
Specops Secure Service Desk hels businesses enforce and track user authentication at the service desk to guarantee that information, password resets and other sensitive credentials are not offered to unauthorized users. An additional layer of security with the Secure Service Desk is the ability to verify callers using authentication methods that remove opportunity for impersonation, as these can be completed remotely without access to biometrics.

Read more about Specops Secure Service Desk

Users also considered
Sima logo

Sima

5.0
(1)

Multi-Factor, Cloud-Based Access Control Solution

learn more
Active Witness is a cloud-based Access Control solution that simplifies your facility security.

Its integrated hardware and Access Control software leverages mobile credentials and facial biometrics for highly secure and affordable facility access, made simple with easy-to-use cloud-based software.

Read more about Sima

Users also considered
Atlassian Access logo

Atlassian Access

5.0
(1)

Atlassian cloud data security & governance

learn more
Atlassian Access is an enterprise-grade security solution providing centralized administration across all Atlassian cloud products, designed to help protect company data and ensure compliance.

Read more about Atlassian Access

Users also considered
Hirsch Velocity Software logo

Hirsch Velocity Software

5.0
(1)

An integrated security management system.

learn more
Hirsch Velocity Software is a security management system designed to help businesses across a variety of industries including education, healthcare, and government organizations manage access and implement security parameters.

Read more about Hirsch Velocity Software

Users also considered