LastPass
lastpass.com
LastPass is a freemium password manager that stores encrypted passwords online. The standard version of LastPass comes with a web interface, but also includes plugins for various web browsers and apps for many smartphones. It also includes support for bookmarklets. LogMeIn, Inc. acquired LastPass in October 2015.
1Password
1password.com
1Password is a password manager developed by AgileBits Inc. It provides a place for users to store various passwords, software licenses, and other sensitive information in a virtual vault that is locked with a PBKDF2-guarded master password. By default, this encrypted vault is stored on the company's servers for a monthly fee.
Dashlane
dashlane.com
Dashlane is the universally loved credential manager that secures every credential, every user, and every employee device to proactively protect against breaches. Over 23,000 brands worldwide trust Dashlane for industry-leading innovations that keep them ahead of evolving threats. We pair patented, enterprise-grade security with consumer-grade design in a top-rated platform, empowering everyone to be part of the credential security solution. What are the features of Dashlane Password Manager? - Passkeys, passwords, and payment storage - Admin Console - Granular sharing controls and security policies - Proactive Credential Risk Detection - Integration with communication tools, such as Slack - Real-time phishing alerts - SIEM integration - SCIM integration - Password Health score - Activity Logs - Dark Web Monitoring & Insights - VPN for WiFi protection - Enterprise-grade security.
NordPass
nordpass.com
NordPass is a proprietary password manager launched in 2019. It is meant to help its users to organise their passwords and secure notes, keeping them in a single place — an encrypted password vault. This service comes in both free and premium versions, though the free version lacks much of the paid functionality like multi-device login. NordPass is a cross-platform application available on Windows, macOS, Linux, Android, and iOS. It also offers browser extensions on Google Chrome, Mozilla Firefox, Microsoft Edge, Brave, Opera, and Safari.
Rippling
rippling.com
Rippling gives businesses one place to run HR, IT, and Finance—globally. It brings together all of the workforce systems that are normally scattered across a company, like payroll, expenses, benefits, and computers. For the first time ever, you can manage and automate every part of the employee lifecycle in a single system. Take onboarding, for example. With Rippling, you can hire a new employee anywhere in the world and set up their payroll, corporate card, computer, benefits, and even third-party apps like Slack and Microsoft 365—all within 90 seconds.
Supabase
supabase.com
The Open Source Alternative to Firebase. Create a backend in less than 2 minutes. Start your project with a Postgres Database, Authentication, instant APIs, realtime subscriptions and Storage.
Duo Admin
duosecurity.com
Cisco Duo is a cloud-based access management platform that secures access to all applications, for any user and device, from anywhere. It’s designed to be easy to use and deploy while providing identity protection and endpoint visibility. Duo verifies users' identities with strong passwordless authentication and industry-leading Multi-Factor Authentication (MFA). Paired with deep insights into your users’ devices, Duo gives you the policies and control to limit access based on endpoint or user risk.
Keeper
keepersecurity.com
Millions of people and thousands of businesses depend on Keeper's password security and management platform to manage, secure and enforce strong passwords across all employee logins, applications and sites. Employees can access Keeper natively on all mobile operating systems, desktops and browsers. With Keeper, your business can auto-generate high-strength passwords, protect sensitive files in an encrypted digital vault, securely share records with teams and seamlessly integrate with SSO, LDAP and 2FA. Start a 14-Day Free Trial now.
Ping Identity
pingidentity.com
Ping Identity Corporation is an American software company established in 2002 by Andre Durand and Bryan Field-Elliot. It is headquartered in Denver, Colorado, United States with development offices in Vancouver, British Columbia, Tel Aviv, Israel, Austin, Texas, Denver, Colorado, and Boston, Massachusetts. Ping also has European operations with offices in London, Paris, and Switzerland as well as offices in Bangalore, Melbourne, and Tokyo, serving Asia-pacific. The company's software provides federated identity management and self-hosted identity access management to web identities via attribute based access controls, similar to identity management system tools developed by Microsoft and Okta. This Single sign-on (SSO) gives users a single set of credentials to access applications (web applications, apps on mobile devices, VPN, etc) that have company data. This is primarily done with identity providers such as Ping, Okta, and Microsoft Azure by leveraging open standards such as SAML and OAuth. Ping Identity products include PingID, PingFederate, PingOne, PingAccess, PingDirectory, PingDataGovernance, and PingIntelligence. Along with Okta, Microsoft, Salesforce, Google these comprise the "identity meta system" as defined in "Design Rationale behind the Identity Metasystem Architecture".
OneLogin
onelogin.com
OneLogin, Inc. is a cloud-based identity and access management (IAM) provider that designs, develops, and sells a unified access management system (UAM) platform to enterprise-level businesses and organizations. Founded in 2009 by brothers Thomas Pedersen and Christian Pedersen, OneLogin is a late stage venture, privately held company.OneLogin was named a visionary in the Gartner Magic Quadrant for Access Management. The OneLogin UAM platform is an access management system that uses single sign-on (SSO) and a cloud directory to enable organizations to manage user access to on-premises and cloud applications. The platform also includes user provisioning, lifecycle management, and multi-factor authentication (MFA). OneLogin is based in San Francisco with a developer office in Redmond, Washington, as well as London and Guadalajara. The company hosts an annual Connect user conference.
JumpCloud
jumpcloud.com
JumpCloud is a U.S.-based enterprise software company headquartered in Denver, Colorado. The company was formally launched in 2013 at TechCrunch Disrupt Battlefield as an automated server management tool. JumpCloud’s cloud based directory platform is used to securely manage users identity, devices, and access.
Clerk
clerk.dev
More than authentication. Complete User Management. Clerk is more than a “sign-in box”. Integrate complete user management UIs and APIs, purpose-built for React, Next.js, and the Modern Web.
WorkOS
workos.com
Your app, Enterprise Ready. Start selling to enterprise customers with just a few lines of code. Add Single Sign-On (and more) in minutes instead of months. WorkOS Dashboard - WorkOS provides an API for Single Sign-On (SSO), Directory Sync (SCIM), Audit Trail (SIEM), and more. Easily integrate Okta SAML, Google OAuth, and more.
Citrix Cloud
citrix.com
Citrix is a leading provider of secure, scalable IT solutions that empower organizations to optimize their digital workspaces. The Citrix platform offers a range of services, including app and desktop virtualization, endpoint management, and secure access solutions, designed to enhance productivity and streamline IT management. With a focus on supporting hybrid workforces, Citrix enables businesses to deliver critical applications and data securely on any device, while simplifying device management and enhancing user experience. The platform also emphasizes security through zero trust access and observability, helping organizations protect sensitive information and ensure compliance. Citrix serves various industries, including healthcare, financial services, government, and education, providing tailored solutions to meet specific business needs. Through innovation and collaboration, Citrix continues to drive advancements in cloud-based and on-premises IT environments.
Passage by 1Password
passage.1password.com
Are you tired of passwords? So are your customers. Give them the passwordless future they deserve – without building it yourself. Passage is a modern authentication service that enables you to implement passkey sign-in flows to your app or website with just a few lines of code. Choose the approach that works best for your project: Passkey Flex -- Add passkey logins alongside your existing auth solution. Avoid the hassle of migrating systems and allow users to sign in with passkeys or their traditional username and password. Passkey Complete -- Completely replace your existing authentication flow or build from scratch with a robust passwordless authentication and user management solution. Realize the full security, business, and user experience benefits of eliminating passwords. Passage is backed by 1Password’s 17+ years of industry-leading security expertise. As FIDO board members, the team works with other leading tech companies to advance passwordless standards and best practices.
Zscaler
zscaler.com
Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud first world. Its flagship services, Zscaler Internet Access and Zscaler Private Access, create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100% cloud-delivered and offer the simplicity, enhanced security, and improved user experience that traditional appliances or hybrid solutions are unable to match. Used in more than 185 countries, Zscaler operates the world’s largest cloud security platform, protecting thousands of enterprises and government agencies from cyberattacks and data loss.
StrongDM
strongdm.com
StrongDM is the leader in Zero Trust PAM. We are a policy-based platform that enables precise control over privileged actions and grants secure, compliant, frustration-free access to all critical infrastructure. End users enjoy fast, intuitive, and auditable access to the resources they need, and administrators leverage simplified workflows to enhance security and compliance postures.
Auth0
auth0.com
Auth0 by Okta takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while also enabling SSO.
Teleport
goteleport.com
Teleport is the easiest, most secure way to access all your infrastructure. Faster. More Secure. Identity-Native Infrastructure Access. Teleport replaces the #1 source of data breaches — secrets — with true identity to deliver phishing-proof zero trust access for every engineer and service connected to your global infrastructure.
CyberArk
cyberark.com
CyberArk is a leader in identity security and access management, dedicated to protecting organizations against cyber threats by securing identities, both human and machine. Key Features: * Identity Security Platform: Offers a comprehensive suite of tools to manage and secure user identities, including single sign-on (SSO), multi-factor authentication (MFA), and identity governance. * Privileged Access Management (PAM): Safeguards privileged accounts and sensitive credentials across various environments, ensuring secure access to critical systems. * CyberArk CORA AI: An advanced AI hub designed to enhance identity security by providing intelligent insights and automation capabilities. * Endpoint Privilege Security: Reduces attack surfaces by managing and controlling privileges on endpoints.
Kinde
kinde.com
Powerful authentication and user management for modern applications. Created by founders and engineers to help your business generate more revenue, reduce costs, and make lifelong loyal customers – in one place. Every aspect of Kinde is designed to help your business grow and scale. We went to great lengths to make sure that you don’t have to worry about anything. From startup to IPO in a single platform. Authentication Authentication happens at some of the most important, and highly impactful, places in your customers' journey. Our powerful builder allows you to make sure that your pages are on brand and as beautiful as the rest of your website and product experience. Up-level your security with multi-factor authentication (MFA). Give your users access to advanced authentication options, protecting them from reused or breached passwords. Take control of user authorization and access with enterprise SSO and custom SAML so that you can support your biggest customers as quickly as possible. Manage users from one beautiful dashboard. Add and invite users, manage roles and permissions, and get a complete picture of your user activity. We’ll keep you and your users safe. Kinde is built from the ground up using best-in-class security protocols. Access Control and Multi-tenancy Complex businesses need software that reflects their structure and restricts data access to only the people who should see it. That’s why we’ve included outrageously powerful controls to help you manage your businesses, teams, and users in the most frictionless way possible. Controlling who can access which individual pieces of data and interface is critical to protecting your business and your customers. Hierarchical role-based access control (RBAC) is the best way to manage this. Allowing strict control and flexible assignment – aligning everything from your business view of the world right down to the code you ship to customers. Feature flags Deliver new experiences and increase the speed that your team deploys, learns and releases with feature-based continuous deployment. Shipping to production introduces a degree of risk. Continuous deployment helps to reduce risk and accelerate learning by empowering the team to deploy when ready and separating releasing from shipping. Feature flags are the heart of what makes this work. Mistakes happen. Rollouts are no exception. The important thing is how your team deals with problems, and what tools they have at their disposal to manage problems. Feature flags are a powerful tool for preventing and managing failed change. Billing Coming in Q3, 2024.
Scalefusion
scalefusion.com
Scalefusion is a leading Mobile Device Management and Unified Endpoint Management vendor enabling ambitious companies around the world to secure and manage endpoints including smartphones, tablets, laptops, rugged devices, POS, and digital signages.
Memberstack
memberstack.io
Add secure user authentication and accept payments on any website. Build a custom SaaS application, sell an online digital service, offer a premium member community, an exclusive blog, and more.
Stytch
stytch.com
Stytch is the most powerful identity platform built for developers. With advanced features like device fingerprinting and account takeover-resistant authentication, Stytch provides the infrastructure to make your company’s identity and access management secure, reliable, and scalable. Stytch offers CIAM solutions for B2C and B2B, including breach-resistant passwords, passwordless auth flows, MFA, SSO with SAML and OIDC, and fraud and risk protection.
Pomerium
pomerium.com
Pomerium is a zero-trust reverse proxy that helps enterprises manage secure application access. --- Authenticate, authorize, monitor, and secure user access to any application without a VPN. Access driven by identity and context. ---- Use your existing identity provider, such as Okta, Active Directory, Google, Gsuite, or OneLogin to add single-sign-on authentication to any application with Pomerium. Add access control to any app. --- Pomerium provides a standardized interface to add access control whether an application itself has authorization or authentication baked-in. Let developers focus on their apps, not reinventing access control.
Ezto Auth
eztoauth.com
Ezto auth is a cloud-based Workforce identity and access management (IAM) platform that provides secure access to various applications and services for employees, contractors, partners, and customers. The platform offers a range of features to manage user identities, including authentication, authorization, and user administration, across a wide variety of devices and applications. ezto auth enables organizations to secure access to their resources with a single sign-on (SSO) experience. Users can log in to the ezto auth portal once, and then access all of their authorized applications and services without having to enter their credentials again. ezto auth supports SSO for thousands of cloud-based and on-premises applications, including Salesforce, Office 365, and Google Workspace. ezto auth also provides multi-factor authentication (MFA) capabilities to further enhance the security of user identities. This feature requires users to provide additional authentication factors, such as a biometric identifier, a mobile app, or a hardware token, in addition to their password. In addition to identity management and authentication, ezto auth also offers features for user provisioning, group management, and access control. This enables organizations to centrally manage user access to applications and services and enforce security policies. Overall, ezto auth is a comprehensive IAM solution that helps organizations to secure their digital environments and streamline access management for their workforce, partners, and customers.
Solvo
solvo.cloud
Solvo is a multi-dimensional cloud security platform that breaks down application, identity and data silos to proactively detect and mitigate cloud misconfigurations and vulnerabilities. Solvo’s adaptive security approach is based on a continuous cycle of threat discovery, analysis and prioritization, followed by least privilege policy optimization, validation and monitoring. Book a free demo: https://www.solvo.cloud/request-a-demo/ Try Solvo free for 14-days: https://www.solvo.cloud/freetrial/
SecureAuth
secureauth.com
With leading Identity and Access Management solutions from SecureAuth, organizations worldwide find it easier than ever to create digital experiences that are as welcoming as they are secure. Our AI-driven Risk Engine helps deliver dynamic – and often invisible – authentication and authorization for users, combined with a data privacy framework that protects their information and ensures their consent. It all adds up to a virtual handshake at the digital door to your company. Making you more effective than ever at eliminating bad actors or incorrect authorizations. Keeping your employees engaged and productive. And delighting your customers so you can fuel your digital growth.
FusionAuth
fusionauth.io
FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome. You'll get all the features your app needs plus a customizable, scalable solution you can run on any computer, anywhere in the world.
Descope
descope.com
Reduce user friction, prevent account takeover, and get a 360° view of your customer identities with the Descope CIAM platform. Use visual workflows, SDKs, and APIs to create and customize the entire user journey for your external applications.
© 2025 WebCatalog, Inc.