Page 3 - Top Cerby Alternatives

Daito Authenticator

Daito Authenticator

daito.io

Daito is a specialized 2FA authentication service that manages 2FA / MFA TOTP tokens for you and thus offers a fully isolated system, separate from your password manager. Some of the features are: - Full separation of concerns (Keep your 2FA token management separate from your password management) and thus no more single points of failure in your authentication strategy. - Access from other devices & platforms (The authenticator is web-first and web-only). - No second company-sponsored device is needed (Save money and the accompanying hassle of managing company phones).

SSOJet

SSOJet

ssojet.com

SSOJet is an all-in-one solution for user management for your B2B SaaS that reduces onboarding time, makes it easy for new team members to get up and running. Simple integration, less code, and no headaches.

Ory

Ory

ory.sh

Ory Network is a global, high availability and low latency user identity & access management network that protects identities and other first party data. It offers cloud-native, end-to-end services dedicated to securing and managing user authentication, authorisation and API protection for humans, robots, devices, and software across various internet services. State-of-the-art solutions for access security include passkeys, passwordless login, social login, second factor authentication, multi factor authentication and hardware tokens. Ory Network helps its customers use zero-trust security across their stack including data protection, compliance and risk management. It delivers information security using advanced AI analytics for any data created by system access including authentication, authorisation and API traffic. Ory is an open source organization welcoming collaboration and contributions to its leading products from an active global community. With more than 30,000 community members and over 250 GitHub repositories, Ory maintains the world’s leading open-source identity management, authentication and authorization ecosystem and community. Ory Network builds on this knowledge and experience.

Cryptr

Cryptr

cryptr.co

Cryptr is a plug-and-play B2B authentication platform that allows SaaS to manage and deploy all their authentication strategies like Single Sign On, automated user provisioning with Directory Sync, TOTP, magic link and much more with just a few lines of code. - Universal SSO Connector: to connect in 5 minutes SaaS to the SSO systems (SAML, Azure AD, Okta, Ping Identity ...) of their enterprise customers, - Directory Sync: to enable synchronization of user directories between SaaS and their customers with automated provisioning and de-provisioning - Universal Login which includes login/password with stolen password detection, passwordless login with magic-link, social login, TOTP.

Corbado

Corbado

corbado.com

Corbado provides the most secure and convenient passwordless authentication with passkeys to onboard, authenticate and engage users. We take care of your cross-platform and cross-device aspects. You boost conversion rates and improve the user experience.

Descope

Descope

descope.com

Reduce user friction, prevent account takeover, and get a 360° view of your customer identities with the Descope CIAM platform. Use visual workflows, SDKs, and APIs to create and customize the entire user journey for your external applications.

Adaptive

Adaptive

adaptive.live

Adaptive is a data security platform that allows organizations to manage and govern access to data sources, monitor database activity, classify and protect sensitive data. * Share Access, not Credentials Share privileged access to all data sources without sharing the actual credentials. Improve the security posture of your organization. * Non-Human Data Access Connect third-party tools or ETL pipelines through a central interface without exposing your datasource credentials. * Data Masking and Tokenization Mask and tokenize all sensitive data for non-privileged users without changing any access workflows, minimizing data exposure in case of a leak. * Comprehensive Auditability Enable identity-based audit trails across all resources. Monitor all commands, queries, and access attempts in real-time for compliance and forensics. * Data Classification Discover sensitive data automatically and classify them under different default and customizable labels. * Anomaly Detection Identify and alert unauthorized or malicious data activities on structured data sources using predefined policies. * Terraform Provider Use Terraform to provision and manage access and authorizations * Authorization Privileges Efficiently manage authorization with dynamic role-based access control * Automated Data Classification Identify sensitive data and apply appropriate protection measures * Request-Approval Workflows Request and approve resource access seamlessly via Slack, Teams, or email * SSO and Directory Sync Sync users directly from all SSO providers like Google, Okta, etc. * Compliance-enabled Policies Enable policies to stay compliant with standards like GDPR, HIPAA, etc. Adaptive’s integrated approach to data access and protection addresses blind spots in data security, making it well-suited for modern organizations where data is continually moving. Thanks to Adaptive’s agentless architecture, end users enjoy faster, auditable access and data protection across the infrastructure without altering existing workflows and tools.

YeshID

YeshID

yeshid.com

The all-in-one identity management tool for growing organizations YeshID is the all-in-one identity management tool for growing organizations. It provides a streamlined, repeatable, efficient, and compliant way to manage identities and applications. - A streamlined, repeatable, efficient, and compliant way for Super Admins to manage identities and applications — then get back to their other job(s). - Templatize and schedule onboarding and offboarding tasks to set up a repeatable process for ease and speed. - Assign application administrator(s) then automatically route requests for provisioning to the proper product admins. - Passkey-powered two-factor authentication means no more passwords, and puts access at your fingertips — literally. - Track provisioning/deprovisioning in a single dashboard to offboard a user with confidence while maintaining compliance and reducing license costs. - Empower employees to initiate requests for new application access that are automatically routed to the proper application administrator. - Get access to an exclusive Slack community of small business hustlers and heroes just like you so we can share, support, and celebrate together. - The magic price tag of “free” means you can get started today, no budget approval process, no credit card required.

Nametag

Nametag

getnametag.com

Nametag stops AI-powered attackers while saving 30% of your helpdesk costs. Nametag is the first identity verification platform for secure account recovery. Complete your IAM and MFA configuration with plug-and-play solutions that protect critical moments like MFA resets, password changes, and employee onboarding, while unlocking new automations and cost savings through self-service and agent-assisted workflows. Nametag solutions are built on Deepfake Defense™, the next-generation identity verification (IDV) engine that combines Cryptographic Attestation™, Adaptive Document Verification™, Spatial Selfie™ and other features to prevent AI-powered impersonation. It’s the only IDV that delivers the identity assurance needed in the age of generative AI and deepfakes. Global enterprises across social media, software, healthcare, insurance, finance, higher education and other industries trust Nametag to deliver secure, integrated account protection and cost savings at scale. Nametag customers eliminate over 50% of their IT tickets, reduce helpdesk costs by 30%, boost helpdesk agent efficiency by 5x, improve user experiences, and prevent account takeovers that lead to data breaches and ransomware attacks.

Josys

Josys

josys.com

Josys is the SaaS & Device Management Platform that simplifies how IT works. Our holistic approach equips IT managers with 360° control over their software and hardware portfolio by making it easier to visualize assets, analyze utilization trends, and automate provisioning processes that will make IT operations run more efficiently. By integrating with hundreds of applications and providing an open API, Josys empowers IT with a single portal for assigning licenses and devices to employees, monitoring user access, and tracking adoption. IT teams can save time by eliminating dependencies on multiple spreadsheets and disparate tools, easily optimize IT costs, and securely govern access to company data.

Lumos

Lumos

lumos.com

You have grown and so have your risks: Software cost explosion. Excessive admin access. A flood of JIRA tickets. Don’t let managing hundreds of apps and permissions slow down your business. Lumos is the first app governance platform that automates access requests, enforces least privilege, speeds up user access reviews, and eliminates extra SaaS app spending. Gone are the technology silos that left IT, Security, Compliance, and Finance in the dark. With Lumos, you have visibility into app usage, entitlements, and spending - and the power to take action on that data. The impact? Disappearing IT support costs, Just-in-Time Access (JIT) with no audit spreadsheets and VLookups. All this equals guaranteed software savings.

Zluri

Zluri

zluri.com

Zluri is a nex-gen Identity Governance and Administration platform that enables IT and security teams to discover identities and applications, streamline access management, and automate access reviews—all from a single, intuitive interface. With Zluri, organizations automate compliance readiness for SOX, HIPAA, SOC 2, and more—ensuring the right people have the right access to the right applications at the right time, with minimal time and manual effort.

SecureAuth

SecureAuth

secureauth.com

With leading Identity and Access Management solutions from SecureAuth, organizations worldwide find it easier than ever to create digital experiences that are as welcoming as they are secure. Our AI-driven Risk Engine helps deliver dynamic – and often invisible – authentication and authorization for users, combined with a data privacy framework that protects their information and ensures their consent. It all adds up to a virtual handshake at the digital door to your company. Making you more effective than ever at eliminating bad actors or incorrect authorizations. Keeping your employees engaged and productive. And delighting your customers so you can fuel your digital growth.

SSOReady

SSOReady

ssoready.com

SSOReady is just an authentication middleware layer. SSOReady doesn’t “own” your users, and it doesn’t require you to use any particular tech stack. That’s on purpose it makes onboarding easier for you, and it forces us to keep earning your business in the long run, because churning is easier. Large contracts with large companies usually require software companies to offer SAML SSO. Implementing SAML SSO yourself is pretty hard and not a good use of your time. We make it really easy to implement SAML SSO in your product.

Zygon

Zygon

zygon.tech

Automate the control of all the SaaS applications used by your team. From app inventory to upgrading your authentication methods, our automations give you a much needed relief in controlling SaaS sprawl. - Minimize SaaS Surface Attack - Pragmatic Security Awareness - Upgrading Authentication Security (SSO rollout) - Collaborator Onboarding and Offboarding - SOC 2 and ISO Compliance

Torq

Torq

torq.io

Torq is transforming cybersecurity with its AI-first enterprise-grade hyperautomation platform. By connecting the entire security infrastructure stack, Torq empowers organizations to instantly and precisely remediate security events and orchestrate complex security processes at scale. Fortune 500 enterprises, including the world’s biggest financial, technology, consumer packaged goods, fashion, hospitality, and sports apparel companies, are experiencing extraordinary outcomes with Torq.

Corma

Corma

corma.io

Access and Identity Management made simple. Corma is the access management platform to centralize all your apps, automate access reviews and provisioning while cutting software spend

CloudEagle.ai

CloudEagle.ai

cloudeagle.ai

CloudEagle.ai helps IT, finance and procurement teams at Ringcentral, Shiji, Recroom save 10-30% on their software spend and hundreds of hours managing and renewing their SaaS apps. It provides 100% visibility into all applications, spend and vendors. With no code slack-enabled workflows customers automate procurement, renewals, employee onboarding/offboarding, and license harvesting. With detailed usage and benchmarking data, customers negotiate better with vendors & optimize tech stack.

AccessOwl

AccessOwl

accessowl.io

Orchestrate your employees' access to SaaS tools. Automate access requests, approvals and provisioning workflows. Automate on- & offboarding workflows Covering the entire employee lifecycle: AccessOwl ensures that new employees have access to all relevant tools on their starting date. Offboarding an user is as simple as a click of a button and no access is ever forgotten. Aligning HR, IT and line manager — eliminating the need for back-and-forth communication. Simplify approval workflows Your team can easily request new accesses on-demand via self-service — without leaving Slack. Give IT teams and tool owners full control over costs and access rights in an easy and seamless way. Make your auditors happy Get a crystal clear audit trail of who has been given access to which resource, when and why — available at the push of a button. Ensure that everyone has only the most necessary permissions .

© 2025 WebCatalog, Inc.