Ubiq
ubiqsecurity.com
The Ubiq platform is an API-based developer platform that enables developers to quickly build customer-side data encryption (your data stays with you) into any application, across multiple programming languages, without requiring prior encryption knowledge or expertise. And as new cryptography and encryption innovations emerge, we adopt them into our platform, so you don't have to. CLIENT LIBRARIES We offer fully interoperable client libraries for all major programming languages, enabling interaction with our API layer. API LAYER Our extensible API layer interfaces with our client libraries and enables interaction with our SaaS-based encryption platform. ENCRYPTION PLATFORM We eliminate the guesswork, jargon, and complexity of cryptography and encryption, through an elegant and simple developer dashboard, powered by scalable cloud-based infrastructure that provides key management and tamper-proof, FIPS 140-2 Level 3-compliant hardware security modules (HSM) for secure key storage.
Heimdal
heimdalsecurity.com
Heimdal® is a fast-growing cybersecurity company focused on continuous technological innovation. Since its establishment in 2014 in Copenhagen, based on the winning idea of CTF World Champions, Heimdal has experienced spectacular growth by proactively building products that anticipate threatscape trends. The company offers a multi-layered security suite that combines threat prevention, patch and asset management, endpoint rights management, and antivirus and mail security which together secure customers against cyberattacks and keep critical information and intellectual property safe. Heimdal has been recognized as a thought leader in the industry and has won multiple international awards both for its solutions and for its educational content creation. The Heimdal line of products currently consists of 10 products and 2 services. The former category encompasses Threat Prevention Endpoint, Threat Prevention Network, Patch & Asset Management, Privileged Access Management, Application Control, Next-Gen Endpoint Antivirus, Ransomware Encryption Protection, Email Security, Email Fraud Prevention, and Remote Desktop. The latter is represented by Endpoint Detection & Response, as well as eXtended Detection & Response, or EDR and XDR for short. Currently, Heimdal’s cybersecurity solutions are deployed in more than 45 countries and supported regionally from offices in 15+ countries, by 175+ highly qualified specialists. Heimdal is ISAE 3000 certified and secures more than 2 million endpoints for over 10,000 companies. The company supports its partners without concessions on the basis of predictability and scalability. The common goal is to create a sustainable ecosystem and a strategic partnership.
FusionAuth
fusionauth.io
FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome. You'll get all the features your app needs plus a customizable, scalable solution you can run on any computer, anywhere in the world.
Socure
socure.com
Socure’s patented machine learning platform powers an elevated standard for seamless CIP/KYC compliance, fraud detection, ID document verification, and bank account ownership validation through a purpose-built, end-to-end solutions suite that results in robust, industry-leading accuracy to unlock identity trust for digital interactions and engagement at onboarding and throughout the customer journey.
Smile ID
usesmileid.com
Smile ID provides the best Africa-focused solutions for real-time Digital KYC, Identity Verification, User Onboarding, Document Verification, Liveness Checks, Face Verification, Anti-fraud, Know your Business (KYB), and Identity Data Deduplication across Africa. We are building the tools and software that make it easier for millions of Africans to prove and verify their identity online. Our platform includes SDKs and APIs for User Onboarding, Digital KYC, Identity Verification, Document Verification, Face Verification, Anti-fraud, and ID validation in mobile applications and on the web. Our identity verification and artificial intelligence tools have been specially designed for African faces and identities. Our mission is to make the benefits of a modern digital lifestyle universally accessible by expanding trust in underserved markets. We are backed by Costanoa Ventures, Future Africa, PTB Ventures, Khosla Impact, 500 Startups, CRE Venture Capital etc Subscribe to Identity Illustrated - A newsletter by Smile ID enabling African business leaders to understand the continent's complex ID, regulatory and fraud landscape one illustration at a time - https://identityillustrated.com/
SSOJet
ssojet.com
SSOJet is an all-in-one solution for user management for your B2B SaaS that reduces onboarding time, makes it easy for new team members to get up and running. Simple integration, less code, and no headaches.
Ory
ory.sh
Ory Network is a global, high availability and low latency user identity & access management network that protects identities and other first party data. It offers cloud-native, end-to-end services dedicated to securing and managing user authentication, authorisation and API protection for humans, robots, devices, and software across various internet services. State-of-the-art solutions for access security include passkeys, passwordless login, social login, second factor authentication, multi factor authentication and hardware tokens. Ory Network helps its customers use zero-trust security across their stack including data protection, compliance and risk management. It delivers information security using advanced AI analytics for any data created by system access including authentication, authorisation and API traffic. Ory is an open source organization welcoming collaboration and contributions to its leading products from an active global community. With more than 30,000 community members and over 250 GitHub repositories, Ory maintains the world’s leading open-source identity management, authentication and authorization ecosystem and community. Ory Network builds on this knowledge and experience.
Cryptr
cryptr.co
Cryptr is a plug-and-play B2B authentication platform that allows SaaS to manage and deploy all their authentication strategies like Single Sign On, automated user provisioning with Directory Sync, TOTP, magic link and much more with just a few lines of code. - Universal SSO Connector: to connect in 5 minutes SaaS to the SSO systems (SAML, Azure AD, Okta, Ping Identity ...) of their enterprise customers, - Directory Sync: to enable synchronization of user directories between SaaS and their customers with automated provisioning and de-provisioning - Universal Login which includes login/password with stolen password detection, passwordless login with magic-link, social login, TOTP.
Corbado
corbado.com
Corbado provides the most secure and convenient passwordless authentication with passkeys to onboard, authenticate and engage users. We take care of your cross-platform and cross-device aspects. You boost conversion rates and improve the user experience.
Cerby
cerby.com
Cerby provides identity teams with the only comprehensive access management platform for non-federated applications. Harnessing the power of identity providers, Cerby makes passwordless authentication an immediate reality for any application by extending single sign-on and lifecycle management capabilities. With Cerby, identity teams can extend access, minimize risk, and lower costs.
Descope
descope.com
Reduce user friction, prevent account takeover, and get a 360° view of your customer identities with the Descope CIAM platform. Use visual workflows, SDKs, and APIs to create and customize the entire user journey for your external applications.
SlashID
slashid.dev
SlashID is the composable identity platform to improve identity security without user friction. SlashID Gate adds authentication, authorization,rate limiting and CAPTCHA-less bot detections to your APIs and workloads in minutes. Gate can also enforce passkeys and SSO on any internal application without any code modification. SlashID Access is the most reliable and secure user identity management module thanks to our HSM-backed, globally-replicated, serverless architecture. With Access, you can implement passwordless authentication flows, multi-tenancy, one-click user invitations, RBAC, SAML and MFA in hours, not weeks. Access minimizes latency for your users, seamlessly handles traffic spikes and avoids downtime and customer data breaches.
Prove
prove.com
Prove is the modern way for businesses to enable their customers to prove their identities with just a phone. Prove offers phone-centric solutions that enable its clients to acquire new consumers and engage with their existing consumers by removing friction while bolstering security and enhancing consumer privacy & consumer choice. Prove's solutions are used by more than 1,000 businesses across diversified industries, including banks, financial services, healthcare, insurance, and e-commerce. Prove has two main solutions + MFA: • Prove Pre-Fill™ for Onboarding & Digital Acquisition, which helps companies increase signups and mitigate account opening fraud by authenticating consumer identities, and auto-filling verified data in any channel. • Fonebook™ for Digital Servicing, which helps companies: - Access a single identity authentication platform that reduces complexity and total cost of ownership to create a holistic view of your customer across their entire channels - Manage, add, and update customer phone numbers to ensure you always have the right number for your customer Multi-factor Authentication: - Standard SMS & Voice OTPs - Instant Link™ (authenticate through SMS link without needing OTP) - Mobile Auth™ (authentication via cellular networks; passive method for passwordless login) - Voice Biometrics – Match against a consumer’s voice for authentication - Push Authentication – App-based method to prove Possession, can also pull in behavioral biometrics, device (PKI), and environmental (Wi-Fi, Bluetooth, network) signals - Secure transactions across multiple digital servicing use cases, including login, high-risk transactions, call center, and passwordless login
SuperTokens
supertokens.com
SuperTokens is an open source user authentication solution backed by Y-Combinator. We're an alternative to Auth0, Firebase Auth and AWS Cognito. Using our SDKs developers can add secure, hassle free authentication to their mobile application or website in less than a day. We enable startups to launch quicker and focus on their core product offering. We're a remote company with offices in San Francisco, California, USA and Mumbai, Maharashtra, India. We provide the following features: 1. Different types of login: - Email / password - Passwordless (OTP or Magic link based) - Social / OAuth 2.0 - Multi-factor authentication - Microservice authentication 2. Access control (RBAC) 3. Session management 4. User management 5. Self hosted / managed cloud For more information, please visit: https://github.com/supertokens
Signicat
signicat.com
Signicat is a pioneering, pan-European digital identity company with an unrivaled track record in the world’s most advanced digital identity markets. Its Digital Identity Platform incorporates the most extensive suite of identity-proofing and authentication systems in the world, all accessible through a single integration point. The platform supports the full identity journey, from recognition and onboarding, through login and consent, to making business agreements which stand the test of time. Signicat was founded in 2006 and acquired by leading European private equity investor Nordic Capital in 2019. It is headquartered in Trondheim, Norway. For further information about Signicat, please visit www.signicat.com
PropelAuth
propelauth.com
PropelAuth is the best solution for B2B authentication and user management. Whether you're selling to small startups, SMBs or large enterprises, you'll always be ready with PropelAuth.
Nametag
getnametag.com
Nametag stops AI-powered attackers while saving 30% of your helpdesk costs. Nametag is the first identity verification platform for secure account recovery. Complete your IAM and MFA configuration with plug-and-play solutions that protect critical moments like MFA resets, password changes, and employee onboarding, while unlocking new automations and cost savings through self-service and agent-assisted workflows. Nametag solutions are built on Deepfake Defense™, the next-generation identity verification (IDV) engine that combines Cryptographic Attestation™, Adaptive Document Verification™, Spatial Selfie™ and other features to prevent AI-powered impersonation. It’s the only IDV that delivers the identity assurance needed in the age of generative AI and deepfakes. Global enterprises across social media, software, healthcare, insurance, finance, higher education and other industries trust Nametag to deliver secure, integrated account protection and cost savings at scale. Nametag customers eliminate over 50% of their IT tickets, reduce helpdesk costs by 30%, boost helpdesk agent efficiency by 5x, improve user experiences, and prevent account takeovers that lead to data breaches and ransomware attacks.
SecureAuth
secureauth.com
With leading Identity and Access Management solutions from SecureAuth, organizations worldwide find it easier than ever to create digital experiences that are as welcoming as they are secure. Our AI-driven Risk Engine helps deliver dynamic – and often invisible – authentication and authorization for users, combined with a data privacy framework that protects their information and ensures their consent. It all adds up to a virtual handshake at the digital door to your company. Making you more effective than ever at eliminating bad actors or incorrect authorizations. Keeping your employees engaged and productive. And delighting your customers so you can fuel your digital growth.
Actifile
actifile.com
Actifile helps organizations automate their Data Discovery, Monitoring and Protection needs, addressing external data threats (like ransomware), insider threats (like shadow IT) and assist in complying with Data Privacy regulations. Actifile’s approach to protecting data focuses on two main aspects: * Identify and quantify the risk: Identify, discover and track sensitive data, both in storage and in motion to/from applications (both company sanctioned and shadow IT). * Limit the liability associated with data theft: Protect data from theft using automatic encryption, reducing the liability and regulatory implications associated with a data theft incident (such as ransomware). Such an approach works seamlessly in today’s multi-cloud, multi SaaS application and fits those that are seeking to empower their employees while securing and protecting their most important assets - DATA! Actifile supports multiple use cases and frameworks and is successfully deployed worldwide, supporting a growing range of privacy regulations including HIPAA , GDPR and NIFRA, to CMMC and CCPA.
ShareSecret
sharesecret.co
Safely share passwords, tokens, credit cards, and anything else in ShareSecret's short-term, auto-expiring encrypted vault.
Protegrity
protegrity.com
Protegrity’s data protection solutions and products can improve your business capabilities through protected and dynamic data sharing. Our comprehensive range of methods enable you to unlock your data and bring it to life. The Protegrity Data Protection Software provides the most comprehensive range of protection no matter where your data rests, moves, or is used including on-prem, in the cloud, and everywhere in between.
© 2025 WebCatalog, Inc.