Browse Software
List Your Product
Loading...
Okta logo

Okta

  Add to Compare

88% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Veriff logo
Visit Website

90% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Idaptive Next-Gen Access logo
Visit Website

Overview

Description Veriff is the innovator in character check and KYC computerization and personality extortion counteraction, permitting your business to follow guidelines without forfeiting new clients or clients. Veriff's personality confirmation stage accompanies a 98% check computerization rate, 6 second normal choice time, more than 9,500 character reports are covered, and 95% of clients are checked on the main attempt.To figure out if individuals are who they say they are. Veriff is the framework for personality check, KYC, and trust on the web. With driving AI-driven innovation, locally available clients or clients in practically no time, while halting personality misrepresentation and agitators with Veriff's character check and KYC stage.Veriff is an astounding fit for organizations that need to confirm the character of their clients through biometric arrangements. It impressively decreases manual audit time and misrepresentation risk. Veriff group is committed and has magnificent client assistance. Quick Conversion rates and complete cycle robotization. Additionally, veriff 's dashboard/entryway is exceptionally instinctive. Read more Idaptive provides Next-Gen Access solutions to enterprises to protect them from unauthorized data access, cyber-attacks, and data breaches. It follows a Zero Trust and Security First approach to regulate access of each of the users by verifying them and validating their devices. The Multi-Factor Authentication creates an additional layer of security before any access is granted to applications. The software can monitor the network, device, and learn user behavior context to assign risk levels to each accessed event. By securely authenticating every access with a wide range of supported factors that also includes FIDO2 keys, virtual and hardware tokens, etc, Idaptive eliminates the need of using passwords. Admins can route application access requests, create application accounts, revoke access whenever necessary, etc easily. Enterprises can frame centralized policy management and secure endpoints that are used to access enterprise resources. With device security management, institutions can also extend enterprise authentication services to the cloud without duplicating identities. One can even select trusted devices to limit access to certain information and applications. If needed, data sets can be locked and deleted within minutes in the case of cyberattacks. Besides, there are several other security features as well that can be implemented to build robust cybersecurity within an organization. Read more
Pricing Options
  • Free Trial Available
  • Starts at $229.00. Offers Custom plan.
  • Free Trial Available
SW Score & Breakdown

88% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    95%
  • Reviews
    74%
  • Momentum
    66%
  • Popularity
    86%

90% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    100%
  • Reviews
    85%
  • Momentum
    63%
  • Popularity
    76%
SaaSworthy Awards
Not Available
# 4 Highly Rated # 4 Most Popular

Features

Total Features
9 Features
11 Features
Common Features for All
    API Access Management Ensures that calls with authenticated access can enter APIs
    Access Request Management Helps to view and manage access requests submitted by the personnel
    Account Management Helps to manage user accounts within organisations
    Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed
    Multi-factor Authentication Uses more than one method to verify a user's identity for a login
    Password Management Enables the administrator to manage, authenticate and reset passwords
    Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys
    Role Management Helps regulate access to systems, based on individual roles
    Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
    Social Sign On Allows users to sign on using credentials of social networking services
    User Activity Monitoring Monitors and records user activities in the enterprise
  • + 6 More - Show Less
    • API Access Management Ensures that calls with authenticated access can enter APIs
      Access Request Management Helps to view and manage access requests submitted by the personnel
      Account Management Helps to manage user accounts within organisations
      Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed
      Multi-factor Authentication Uses more than one method to verify a user's identity for a login
      Password Management Enables the administrator to manage, authenticate and reset passwords
      Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys
      Role Management Helps regulate access to systems, based on individual roles
      Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
      Social Sign On Allows users to sign on using credentials of social networking services
      User Activity Monitoring Monitors and records user activities in the enterprise
  • + 8 More - Show Less
  • Technical Details

    Organization Types Supported
    • Large Enterprises
    • Medium Business
    • Small Business
    • Large Enterprises
    • Medium Business
    • Small Business
    Platforms Supported
    • SaaS/Web/Cloud
    • Mobile - Android
    • Mobile - iOS
    • SaaS/Web/Cloud
    • Mobile - Android
    • Mobile - iOS
    Modes of Support
    • 24/7 (Live rep)
    • Business Hours
    • Online
    • 24/7 (Live rep)
    • Business Hours
    • Online
    API Support
    • Available
    • NA

    Reviews & Ratings

    User Rating
    2.1/5 16 user ratings
    4.5/5 11 user ratings
    Ratings Distribution
    • Excellent

      18.8%
    • Very Good

      0%
    • Average

      12.5%
    • Poor

      6.3%
    • Terrible

      62.5%
    • Excellent

      59.1%
    • Very Good

      33.9%
    • Average

      6.3%
    • Poor

      0.8%
    • Terrible

      0%
    Review Summary
    Not Available

    Reviewers praise Idaptive's user-friendliness, highlighting its intuitive interface and straightforward setup process. They also commend its robust security features, including multi-factor authentication and single sign-on, which enhance overall security posture. Additionally, reviewers appreciate Idaptive's seamless integration with existing IT infrastructure, enabling smooth deployment and centralized management. However, some users have expressed concerns regarding occasional performance issues and limited customization options.

      Read All User Reviews Read All User Reviews

    AI-Generated from the text of User Reviews

    Pricing

    Pricing Options
    • Free Trial Available
    • Starts at $229.00. Offers Custom plan.
    • Free Trial Available
    Pricing Plans
    Monthly Plans Annual Plans

    Seed $229.00 $229.00 per month

    Startup $559.00 $559.00 per month

    Growth $1,299.00 $1,299.00 per month

    Enterprise Custom

    Single Sign-on Others

    Multi-factor Authentication Others

    Lifecycle Management Others

    Mobile Devices Others

    Endpoint Management Others

     
    View Detailed Pricing
    View Detailed Pricing

    Screenshots & Videos

    Screenshots Veriff screenshot
    + 2 More
    Not Available
    Videos Video Thumbnail
    + 3 More
    Video Thumbnail
    + 2 More

    Vendor information

    Company Details Located in: Tallinn, Estonia Founded in: 2015 Located in: Santa Clara, California Founded in: 2018
    Contact Details

    +372 607 5050

    https://www.veriff.com/

    Not available

    https://www.idaptive.com/

    Social Media Handles

    We understand SaaS better

    SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

    icon

    Buyers

    Looking for the right SaaS

    We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

    icon

    Makers

    Want more customers?

    Our experts will research about your product and list it on SaaSworthy for FREE.

    Get Listed