129 résultats
Pourquoi Capterra est gratuit
Une plateforme de vérification d'identité qui utilise des algorithmes de deep learning pour détecter les anomalies.
Une plateforme de vérification d'identité qui utilise des algorithmes de deep learning pour détecter les anomalies.
Une plateforme de vérification d'identité qui utilise des algorithmes de deep learning pour détecter les anomalies.

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

Authentication Cloud is fast, user-friendly, and super secure. Customers access your online services passwordless and no SMS fees.
The application enables administrators to verify users, grant or block access to confidential data or applications and set up guidelines and role-based permissions. Businesses can offer face ID and fingerprint capabilities, enhancing customer experience and mitigating identity thefts. Authentication Cloud offers third-party integration with Microsoft Azure AD B2C and also allows security professionals to integrate the software into native IT environments and eCommerce platforms.
The application enables administrators to verify users, grant or block access to confidential data or applications and set up guidelines and role-based permissions. Businesses can offer face ID and...

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

Peoples multibiometric corroboration service, with the highest information coverage level, through liveness detection function
Compare the extracted information from the identification document of your users, accessing different sources of consultation, such as government databases and open sources, through highly reliable life detection functionalities, which will help to build your clients validated digital identity, mitigating the possibility of fraud and spoofing.
Compare the extracted information from the identification document of your users, accessing different sources of consultation, such as government databases and open sources, through highly reliable...

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

Top Secure Authentication
Top Secure Authentication
Top Secure Authentication

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

Allows users to verify their credentials & identity, register their phone as a token & create a secure and secret PIN.
Allows users to verify their credentials & identity, register their phone as a token & create a secure and secret PIN.
Allows users to verify their credentials & identity, register their phone as a token & create a secure and secret PIN.

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

Cryptix provides industry-standard AES-256 encryption, standards-based key management, secure key server, authentication modelling.
Cryptix provides industry-standard AES-256 encryption, standards-based key management, secure key server, authentication modelling.
Cryptix provides industry-standard AES-256 encryption, standards-based key management, secure key server, authentication modelling.

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

It allows companies to validate users identity against public and private databases in open networks guaranteeing security and trust.
It allows companies to validate users identity against public and private databases in open networks guaranteeing security and trust.
It allows companies to validate users identity against public and private databases in open networks guaranteeing security and trust.

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

AuthN is interoperable and can be deployed in addition to your existing SSO, hardware-token and password-management investments.
AuthN is interoperable and can be deployed in addition to your existing SSO, hardware-token and password-management investments.
AuthN is interoperable and can be deployed in addition to your existing SSO, hardware-token and password-management investments.

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

It enables the user-friendly implementation of projects relating to authentication, payment and digital signatures.
It enables the user-friendly implementation of projects relating to authentication, payment and digital signatures.
It enables the user-friendly implementation of projects relating to authentication, payment and digital signatures.

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

Authentication management solution to help organizations manage identity verification using phone's biometrics, fingerprint & face ID.
Authentication management solution to help organizations manage identity verification using phone's biometrics, fingerprint & face ID.
Authentication management solution to help organizations manage identity verification using phone's biometrics, fingerprint & face ID.

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

Unikname Connect

Unikname Connect

(0) Produit local Produit local
Avoid hacking your web accounts with the authentication that secures ALL your online accesses
Avoid hacking your web accounts with the authentication that secures ALL your online accesses
Avoid hacking your web accounts with the authentication that secures ALL your online accesses

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

It is software for facial recognition aimed at serving as a solution for validating user identity or employee admission at a distance.
Unico software uses facial recognition to offer scanning tools for HR departments, and it can also be used for validating client identification for retail, fintech, and financial companies. For HR, Unico allows for the electronic signing of documents, remote admission, and real-time hiring management. The platform provides instant responses and reduces the rate of fraud.
Unico software uses facial recognition to offer scanning tools for HR departments, and it can also be used for validating client identification for retail, fintech, and financial companies. For HR,...

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

Appgate SDP vérifie l'identité comme moyen d'authentification et applique les principes Zero Trust en limitant l'accès aux ressources autorisées.
Appgate SDP est une solution d'accès au réseau Zero Trust qui simplifie et renforce les contrôles d'accès. Les méthodes d'authentification multidimensionnelles ne permettent aux utilisateurs d'accéder qu'à mesure que l'identité (utilisateur + appareil + contexte) est vérifiée. Appgate SDP s'intègre à tous les fournisseurs MFA (Multi-Factor Authentication) pour une authentification supplémentaire basée sur des conditions définies. De plus, l'accès autorisé est limité et segmenté en fonction des droits, tandis que toutes les autres ressources sont rendues invisibles et inaccessibles.
Appgate SDP est une solution d'accès au réseau Zero Trust qui simplifie et renforce les contrôles d'accès. Les méthodes d'authentification multidimensionnelles ne permettent aux utilisateurs...

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

20face is a SaaS solution for facial recognition that uses blockchain technology and is fully AVG-compliant.
The 20face online platform converts facial images into vector datasets. The processing uses a quick and accurate algorithm. After conversion, the software deletes all photos. Datasets are encrypted and stored in a decentralized blockchain, ensuring unhackable data. The mobile app provides users (temporary) permission to use the data for access control or KYC procedures, as examples.
The 20face online platform converts facial images into vector datasets. The processing uses a quick and accurate algorithm. After conversion, the software deletes all photos. Datasets are encrypted...

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

Digital solution for business document management that centralizes registration processes promptly and securely.
goLiza is a corporate document management platform for companies to centralize registrations and maintain advanced control over them. The tool makes it possible to manage pending issues, define multiple levels of access and permissions for documents, share updated information with customers or suppliers, and monitor recent changes made by the company or any of its partners.
goLiza is a corporate document management platform for companies to centralize registrations and maintain advanced control over them. The tool makes it possible to manage pending issues, define...

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

Facial recognition solution for identification of individuals that flexibly and securely performs processes.
IVision is a facial biometric solution designed for identifying individuals through technology, which contributed to the development of several facial CPF applications. IVision is suited for various processes, including website or e-commerce profile authentication, confidential company information protection, location-controlled access management, and unlocking public and private lockers.
IVision is a facial biometric solution designed for identifying individuals through technology, which contributed to the development of several facial CPF applications. IVision is suited for various...

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

Gives you secure, standards-based authentication & authorization with a focus on simple setup, testing and administration.
Gives you secure, standards-based authentication & authorization with a focus on simple setup, testing and administration.
Gives you secure, standards-based authentication & authorization with a focus on simple setup, testing and administration.

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

Keyp software implements registration functions and authenticates user access for retailers and other businesses.
Keyp is a software solution for setting up registration and authentication functions. It is designed to integrate with existing systems and solutions with little effort to accelerate the registration process. For example, Keyp offers KeypB2B Sign Up program for corporate customers wanting to open new accounts, while Keyp Document Signature program allows users to digitally sign the required account documents.
Keyp is a software solution for setting up registration and authentication functions. It is designed to integrate with existing systems and solutions with little effort to accelerate the registration...

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

Payments service that helps you achieve maximum acceptance rates with best-in-class fraud protection
Payments service that helps you achieve maximum acceptance rates with best-in-class fraud protection
Payments service that helps you achieve maximum acceptance rates with best-in-class fraud protection

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

Secure and decentralized 2 Factor Authenticator (2FA) app for both iOS and MacOS based on Apple Keychain
Secure and decentralized 2 Factor Authenticator (2FA) app for both iOS and MacOS based on Apple Keychain
Secure and decentralized 2 Factor Authenticator (2FA) app for both iOS and MacOS based on Apple Keychain

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

It is an authentication solution that helps businesses set up passwordless and biometric authentication.
It is an authentication solution that helps businesses set up passwordless and biometric authentication.
It is an authentication solution that helps businesses set up passwordless and biometric authentication.

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

Authentication platform that provides businesses with tools to verify the identity of end-users and prevent potential threats.
SiaraShield is the most advanced front-end bot protection technology on the market. Currently, bots bypass other technology with ease, including reCaptcha, Shape, and Arkose Labs, no matter if it is image-based, game-based, or AI-based. SiaraShield reverse-engineers the biology of the human eye to create an algorithm which bots cannot penetrate. Designers can fully customize the widget to meet the demands of their vision while CISOs get a detailed dashboard. Installs in less than ten minutes.
SiaraShield is the most advanced front-end bot protection technology on the market. Currently, bots bypass other technology with ease, including reCaptcha, Shape, and Arkose Labs, no matter if it is...

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

Certif-ID is a blockchain-based credentialing platform, enabling institutions to securely issue, track and verify digital certificates.
Certif-ID is a blockchain-based credentialing platform, enabling institutions to securely issue, track and verify digital certificates. Using data analytics and visualization tools, the platform provides valuable insights into engagement metrics and learning outcomes. Certif-ID is increasingly becoming the chosen platform to facilitate blockchain-based digital credentialing as it optimises the overall certification process and makes the digital certificates issued fraud-proof or immutable.
Certif-ID is a blockchain-based credentialing platform, enabling institutions to securely issue, track and verify digital certificates. Using data analytics and visualization tools, the platform...

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

AD Bridge helps businesses manage authentication and access control for Unix and Linux environments.
BeyondTrust Active Directory Bridge centralizes authentication for UNIX, Linux and Mac environments by extending Microsoft Active Directory's Kerberos authentication and single sign-on capabilities to these platforms. By extending Group Policy to these non-Windows platforms BeyondTrust provides centralized configuration management, reducing the risk and complexity of managing a heterogeneous environment.
BeyondTrust Active Directory Bridge centralizes authentication for UNIX, Linux and Mac environments by extending Microsoft Active Directory's Kerberos authentication and single sign-on capabilities...

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

Faites passer des examens importants avec surveillance à distance grâce à cette solution conçue pour évaluer plus de 1 000 candidats par an.
La solution d'examen en ligne de Talview est idéale pour évaluer plus de 1 000 apprenants et candidats chaque année. Faites passer des examens sous divers formats tels que des QCM, des dissertations, des tests d'aptitude et des tests de codage. La solution est fournie avec un système de surveillance en ligne pour dissuader les candidats de tricher. Les examens surveillés à distance de Talview s'intègrent parfaitement aux principaux LMS (Learning Management System). De plus, ses examens surveillés par téléphone portable permettent aux candidats d'assister aux évaluations à distance, ce qui en fait un outil idéal pour les établissements tels que les universités, les écoles et les organismes de certification.
La solution d'examen en ligne de Talview est idéale pour évaluer plus de 1 000 apprenants et candidats chaque année. Faites passer des examens sous divers formats tels que des QCM, des dissertations,...

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

DIRO's bank account verification platform helps verify the authenticity of bank statements, ownership & other data.
DIRO's document verification technology is built to mitigate risks of financial fraud, reduce manual team costs and reduce friction on KYC and AML compliance. Using DIRO’s technology, Banks, and FinTechs can use the technology for these features. Employing the technology, organizations of all kinds can make the customer onboarding process smoother, and improve the overall customer experience. Organizations of all scales can use DIRO’s document verification technology for several benefits.
DIRO's document verification technology is built to mitigate risks of financial fraud, reduce manual team costs and reduce friction on KYC and AML compliance. Using DIRO’s technology, Banks, and...

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

Authentication application that enables organizations to provide secure access to desktops with QR codes using Android and iOS mobiles.
Authentication application that enables organizations to provide secure access to desktops with QR codes using Android and iOS mobiles.
Authentication application that enables organizations to provide secure access to desktops with QR codes using Android and iOS mobiles.

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

A digital wallet that provides proof of certifications for the workforce using verified digital credentials.
Creivera's Wallet provides proof of certifications for the workforce using verified digital credentials. How? The technology platform uses cloud technology to collect and verify digital credentials from the issuing source such as training companies and educators while using blockchain to maintain a real-time, auditable record for employers.
Creivera's Wallet provides proof of certifications for the workforce using verified digital credentials. How? The technology platform uses cloud technology to collect and verify digital credentials...

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification

Web and mobile-based identity verification application that helps users gain access and share personal information.
Web and mobile-based identity verification application that helps users gain access and share personal information.
Web and mobile-based identity verification application that helps users gain access and share personal information.

Fonctionnalités principales

  • Authentification multifacteur
  • Authentification unique
  • Authentification mobile
  • Portail libre-service
  • Authentification basée sur les connaissances (KBA)
  • Gestion des informations d'identification