Reviews

Axiad Holdings

Axiad Holdings Review Axiad Cloud is an integrated and agile cloud identity management platform to manage the credentials you need to authenticate your users, machines, and interactions. Utilizing multi-factor authentication and PKI, Axiad Cloud goes beyond traditional MFA to protect your most sensitive data and help safeguard your network. You can achieve SMARTidentity security for […]

Axiad Holdings Read More »

Beyond Identity

Beyond Identity Review Beyond Identity HQ Invisible Multi-Factor Authentication Eliminate ransomware and account takeovers Invisible strong authentication. Security without friction. No passwords, no one-time codes, no user actions or second devices required. Just three unphishable factors. The most advanced MFA on the planet — only one device needed Beyond Identity verifies users by cryptographically binding

Beyond Identity Read More »

BlueFletch Enterprise Mobile Security (EMS)

BlueFletch Enterprise Mobile Security (EMS) Review Login and Authentication Authenticate users across all apps, integrate with your existing identity provider, and provide end-users with a frictionless login experience. User and Device Compliance Compliance tools for collecting data, reporting, and configuring alerts generated from key insights based on user, device and applications. Device Lockdown and Recovery

BlueFletch Enterprise Mobile Security (EMS) Read More »

Centagate Cloud

Centagate Cloud Review Meet Centagate Cloud Get to know CENTAGATE CLOUD. We are experienced and passionate about what we do. We ensure your credentials are highly protected from all cyber threats. Learn more about our story and how we began. CENTAGATE CLOUD offers a centralized login option that protects all applications from security breaches by

Centagate Cloud Read More »

cidaas

cidaas Review We are cidaas! We help companies into a seamless and digital future! cidaas standardizes what is important and simplifies what is complex. What we offer One identity across all channels. In a world in which digital transformation is becoming increasingly important, we are making our contribution with cidaas Identity Management by connecting the

cidaas Read More »

Crayonic

Crayonic Review Crayonic develops worlds most sophisticated embedded crypto-biometric technology used in the most sensitive markets to protect core digital identity of people and assets.  We specialize in combining machine learning algorithms, secure embedded microprocessors and strong cryptography to develop technology that powers next generation solutions  PASSWORDLESS BIOMETRIC MFA Use your existing MS Windows infrastructure

Crayonic Read More »

CryptoPhoto

CryptoPhoto Review CryptoPhoto HQ Block phishing and neutralize malware with CryptoPhoto. The world’s fastest, easiest, and most secure next-generation multifactor authentication solution. CryptoPhoto is a Soft-Token (a two-factor-authenticator, or 2FA) that gives you a fast and safe way to log into your favorite participating web sites while enjoying leading-edge protection against phishing, malware attacks, and

CryptoPhoto Read More »

Cotter

Cotter Review Cotter is a passwordless authentication service that, in less than 15 minutes, enables customers to add a one-tap login to both their website and their mobile applications. The easiest way to add passwordless login to websites built using No-Code website builders like Webflow, Wix, or WordPress is by utilizing Cotter. Back in 2021

Cotter Read More »

Duo Access

Duo Access Review Duo passwordless authentication leverages the Web Authentication (WebAuthn) standard, based in asymmetric cryptography, enabling biometrics to be securely stored on and validated by the device, locally, as opposed to a centralized database. Duo helped drive WebAuthn’s ratification as an official web standard and adoption across platforms as a member of the World

Duo Access Read More »

Fortr3ss

Fortr3ss Review Fortr3ss provides secure voice biometric solutions for identification and transactional approval in fintech, healthcare, and enterprise markets as well as oravle serice to blockchain databases including Corda, Ethereum, and soon IBM Hyperledger. Voice biometrics is a simple, intuitive way to authenticate your users during a customer support call; a mobile login or transactional

Fortr3ss Read More »