Browse Software
List Your Product
Loading...
Refine Results Clear All
Starting Price
  • (3)
  • (1)
  • (2)
  • (4)
Deployment
  • (1)
  • (1)
  • (24)
  • (4)
  • (4)
Customer Types
  • (2)
  • (5)
  • (23)
  • (24)
  • (24)
Pricing Model
  • (7)
  • (8)
  • (12)
  • (20)
Integrated With
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Showing 1 - 20 of 23 Products
Akamai Identity Cloud logo
Improve customer experiences without compromising on security 4 Based on 10 Ratings
Visit Website + Add to Compare

What is Akamai Identity Cloud and how does it work?

Akamai Identity Cloud is a customer identity and access management solution that enables businesses to create a personalised customer experience inclusive of proper security features. It is built to provide companies with a scalable infrastructure that they need to engage, convert and manage millions of customers. Also, inbuilt features like customisable registration, consent and preference management, authentication and SSO, enables powerful data analytics and business process monitoring. Moreover, the software helps to improve conversion rates in a seamless way by collecting customer profile related data with dynamic fields. Akamai Identity Cloud can be integrated with marketing platforms to facilitate bidirectional access management as well as personalisation facilities. It also comes with a centralised cloud directory feature and a flexible schema that supports a great amount of customer data. Further, a single sign-in feature within the same promises seamless functionalities. Businesses can also use the particular to gain proper insights for operational intelligence, marketing and security.

Read More

Akamai Identity Cloud Pricing

  • Free Trial Available
  • Akamai Identity Cloud Offers Custom plan.
Sentry Login logo
Turn any site into a members only website 4.8 Based on 14 Ratings
Visit Website + Add to Compare

What is Sentry Login and how does it work?

Sentry Login works with: Weebly, Squarespace, Yola, WordPress, Blogger, Yahoo Sitebuilder, GoDaddy, Webflow, Adobe Muse, and any other system that does not employ iFrames. A nd it works on ALL servers, including Windows, Linux and Unix Servers.

Read More

Sentry Login Pricing

  • Free Trial Available
  • Starts at $4.95.
Amazon Cognito logo
Simрle аnd Seсure User Аuthentiсаtiоn 4.4 Based on 71 Ratings
Visit Website + Add to Compare

What is Amazon Cognito and how does it work?

Аmаzоn Соgnitо is an Amazon Web Services product thаt соntrоls user аuthentiсаtiоn аnd ассess fоr mоbile аррliсаtiоns оn internet-connected devices. It allows simple and seсure user аuthentiсаtiоn, authorization and user management fоr web аnd mоbile аррs. The serviсe sаves аnd synсhrоnizes end-user dаtа, allowing аn аррlication developer to соnсentrаte on writing code rather than соnstruсting аnd mаintаining bасk-end infrаstruсture. It helps in spreading the development process оf mоbile аррs. With Соgnitо, а user or visitor саn sign in with а usernаme аnd раsswоrd thrоugh Аmаzоn, or through a third раrty app like Fасebооk, Gооgle оr Аррle. Thus, with Соgnitо, а developer can easily аdd user sign-uр, sign-in аnd ассess соntrоl tо their аррs with its built-in user interfасe аnd eаsy соnfigurаtiоn. Соgnitо is раrt оf the Аmаzоn Web Serviсes(АWS) eсоsystem. The Соgnitо соnsоle itself is раrt оf аn organization's АWS where they can see аll infоrmаtiоn аbоut their Соgnitо ассоunt аnd billing. Аmаzоn Соgnitо рriсing stаrts аt $0.01. There is а free versiоn аs well.

Read More

Amazon Cognito Pricing

  • Free Trial Not Available
  • Starts at $0.01.
FusionAuth logo
All-in-One User Management Software 4.7 Based on 52 Ratings
Visit Website + Add to Compare

What is FusionAuth and how does it work?

FusionAuth is a comprehensive user management tool for that extends its capabilities beyond just that. Getting started and setting up the tool happens in minutes as it is compatible with the most common client libraries including Java, Node.js, Typescript, PHP, JS, Ruby, and C# among many others. This ensures that no matter what development environment you use, FusionAuth can be easily integrated into it. Websites can handle their complete user management, be it individuals or groups of users. Additionally, securing customer identity and authorisation management is made easy owing to SSO and secure email verification. All the features and functionalities of FusionAuth can be accessed via its powerful JSON REST API. It only allows single-tenant data architecture which makes it one of the safest options around as this protects against unauthorised data use by other businesses or hackers. FusionAuth supports multi-platform deployment so developers can use it with Linux, Mac, or Windows without any hassles.

Read More

FusionAuth Pricing

  • Free Trial Available
  • Starts at $75.00. Offers Free-forever plan.
Kinde logo
Development infrastructure for software teams Write a Review
Visit Website + Add to Compare

What is Kinde and how does it work?

Introducing Kinde the best of all worlds when it comes to getting work done. It’s the ultimate solution for those who need tools and performance in one place. With Kinde, scaling is no longer a hassle; they get the highest performance infrastructure that can grow with them as their needs evolve. Plus, getting started is simple and straightforward with built-in SDKs and APIs that make integrating with their product time and stress-free. Having Kinde at your fingertips means no more jumping back and forth between apps, platforms, and infrastructure; forget the hassle and get the results you want faster. Maximize their performance with Kinde the powerhouse of productivity.

Read More

Kinde Pricing

  • Free Trial Not Available
  • Starts at $25.00. Offers Free-forever and Custom plan.
Auth0 logo
Never compromise on Identity, choose Auth0 4.1 Based on 314 Ratings
Visit Website + Add to Compare

What is Auth0 and how does it work?

Auth0 is a software that lays down a platform for organisations to authenticate and authorize management policies that function and can be accessed through the web, IoT, mobile handsets and other legacy apps. This software grants robust and improved security checks which is both adaptive and multi-layered. Developers benefit the most from this software as it permits them to authenticate APIs and apps on varied platforms with different identity providers. Using advanced technologies and fine practices, this software extends great help to clients in coping up with the strictest industry standards and regulations. While keeping complete control and ensuring strict security, Auth0 permits business organisations to let their employees, partners and customers avail the freedom of Single-Sign-on (SSO) for multiple apps which they have been authorised to use. With easy-to-use tools and good support, Auth0 is a premium solution in its field. Hence, developers do not need to build up their own authentication system any more, this software meets all their needs most beautifully.

Read More

Auth0 Pricing

  • Free Trial Available
  • Starts at $23.00. Offers Free-forever and Custom plan.
LoginRadius logo
A simplified customer identity management platform 4.4 Based on 30 Ratings
Visit Website + Add to Compare

What is LoginRadius and how does it work?

LoginRadius is an enterprise-grade cloud-based customer identity and access management platform that empowers and upgrades businesses in providing a wonderful customer experience without having to compromise on security. This software enables companies to streamline login processes by using their customer identity platform, keeping the digital accounts and data privacy regulations intact. It proves to be an ideal CIAM solution for industries dealing in Travel and Hospitality, Media and Publications, Telecommunications, Financial services, Public sector and so on. It provides complete customer registration and authentication solutions, consolidates identity across your digital ecosystems, manages customer data with GDPR regulations, provides out-of-the-box managed service including infrastructure, security, scale and availability and easily integrates customer identity into your enterprise stack. All these features and advantages make it a highly recommended identity and access management software.

Read More

LoginRadius Pricing

  • Free Trial Not Available
  • Starts at $14.00. Offers Free-forever and Custom plan.
Persona logo
Advanced Identity Verification Tool 3.4 Based on 39 Ratings
Visit Website + Add to Compare

What is Persona and how does it work?

Persona software is an identity platform that collects and analyses information about consumers' identities to make informed decisions. The software has features that allow you to develop a holistic profile for each of your consumers and compare it to existing data.Create workflows for your organisation to manage customer due diligence and KYC/AML to automate decision-making. Designed for small and medium businesses.It has a vast list of features such as - Collect any personal information from your users in a secure manner, including IDs, documents, and more, and pick which data to validate Collect and extract personally identifiable information (PII), such as Social Security numbers and addresses, and cross-check it against global issuing and other authoritative databases.One of its most beneficial features is that its flexible and can be customized easily as per need - you can Create a level of customisation in your collection flow that makes it feel like it belongs to your product. Configure any component on any screen to meet your brand's UI/UX guidelines.You get to have tailor identity verification for each customer and use case.

Read More

Persona Pricing

  • Free Trial Not Available
  • Persona Offers Free-forever and Custom plan.
ReachFive logo
Deliver a superior customer experience in a modern way Write a Review
Visit Website + Add to Compare

What is ReachFive and how does it work?

ReachFive is a Customer Identity and Access Management (CIAM) platform that helps companies to create unique customer experiences. The platform helps users to authenticate their customers anytime and anywhere. It gives customers control over their permission for using their information and safely identification with third-party systems. ReachFive is designed to create a frictionless experience via its advanced authentication methods such as Social Login, Biometric, OTP, SSO, MFA and more. It empowers customers to take control of their profile data through a self-serving preference centre so that they can manage consent and match with regulatory requirements. The platform works as an identity system of records through which it links and unifies profiles of customers. Users get access to customers’ identities through third-party systems with API, webhooks, SDK and pre-built integrations. Furthermore, it also offers cutting-edge security measures, 99.99% SLA and an API-first architecture so that users can deploy it safely and securely.

Read More

ReachFive Pricing

  • Free Trial Not Available
  • ReachFive Offers Custom plan.
Alice Biometrics logo
A quick, easy, and secure method of confirming your customer's genuine identity Write a Review
Visit Website + Add to Compare

What is Alice Biometrics and how does it work?

Alice Biometrics is a biometrics platform that enables you to create a registration flow that satisfies AML and KYC identity verification criteria while maintaining a high level of user experience and security. It enables biometric authentication to provide additional protection to high-risk transactions. With Alice Biometrics, you can protect your fleet by speeding up the driver identification verification procedure. As a disincentive to undesirable conduct such as car theft or damage, you can enable biometric authentication to unlock automobiles. You can offer an omnichannel check-in solution to improve your guests' experience. Customers' onboarding and activation should be entirely digitalized, from in-store to online, by scanning credit cards automatically, validating their identification remotely, and signing contracts digitally. You can verify your community's identity to improve your service's trust and safety while also preventing unlawful behavior. To combat spoofing attempts, you can allow automatic selfie collection and comparison with the customer's ID picture. Using Alice’s real-time reading technology, you can automate the acquisition and analysis of the client's ID documents to extract all important information.

Read More

Alice Biometrics Pricing

  • Free Trial Available
  • Alice Biometrics Offers Free-forever and Custom plan.
Meeco logo
Organizing tools to access, control and create mutual value Write a Review
Visit Website + Add to Compare

What is Meeco and how does it work?

The infrastructure for trusted personal data ecosystems. Meeco unlocks the power of permissioned personal data. It organize the tools to empower their customers to access, control and create mutual value from their personal data.

Read More

Meeco Pricing

  • Free Trial Not Available
  • Meeco Offers Custom plan.
Ubisecure CIAM logo
Customer management made seamless without compromising on the security part 4 Based on 1 Ratings
Visit Website + Add to Compare

What is Ubisecure CIAM and how does it work?

Ubisecure CIAM is a customer identity and access management software that can be used to offer registration as a Service to individual users. Thus facilitating a standard login experience across multiple devices. Customer identification cuts down imminent fraudulent practices and automates management workflows for respective customer-centric helpdesks. Also, this software looks after customers and their credentials, reducing a significant amount of workload allowing developers to put their entire focus on the core business. Further, clients can allow existing databases to be used for outbound SSO. This enables them to gain new KYC investments and thereafter, extend the use of every digital identity associated with the brand in concern. The software also enables clients to build rich and progressive profiles facilitating power-packed experiences. Customers get to manage their identity credentials themselves and thus, this results in a sense of security and real-time satisfaction. WS-Federation, OAuth 2 and SAML are some of the identity standards on which the software is based on.

Read More

Ubisecure CIAM Pricing

  • Free Trial Not Available
  • Ubisecure CIAM Offers Custom plan.
ClearDil logo
Ideal for operational use Write a Review
Visit Website + Add to Compare

What is ClearDil and how does it work?

ClearDil is the industry leader in identity verification and authentication. As the only platform designed specifically to make identity verification simple and reliable, ClearDil offers superior security for businesses all over the world. With scans of customers’ IDs down to the last pixel and regular global AML watchlist checks, this risk-based and up-to-date approach enables their business to remain secure and compliant with cyber regulations no matter where they operate. Not only can businesses reduce friction while providing a seamless customer experience, they can also rest assured knowing that their customers’ identities are safe and secure thanks to ClearDil. Its advanced technology will quickly scan through billions of records from countries across the globe with accuracy and efficiency. Companies can always ensure complete accuracy in meeting national standards and regional regulations when verifying customer information with ClearDil. Businesses everywhere can put trust in our cutting-edge know-your-customer (KYC) solutions to keep their customers’ information security safe beyond reproach. Streamline the identity verifications today with ClearDil!

Read More

ClearDil Pricing

  • Free Trial Not Available
Simeio logo
Identity management made easier Write a Review
Visit Website + Add to Compare

What is Simeio and how does it work?

Simeio is a comprehensive IAM (Identity and Access Management) solution, with an unrivaled "service first" mindset that interacts securely with everyone, anywhere, at any time. It enables you to manage the identities of consumers, partners, or workers with ease and securely. With Simeio, your access becomes simple, reliable, and secure wherever you are. The platform protects your brand reputation by protecting your client’s identities. It provides you the freedom to work from anywhere, on any device, without fear of internal or external threats. By handling end-to-end customer, partner, and employee identity lifecycles, it removes employee access risks. Simeio's 'Connect and Protect' focus provides you with a comprehensive set of customized solutions that have been proven to work for over 100 million identities. Even as your business grows, Simeio’s solutions grow with it. Furthermore, since your corporate IDs are safe and private, your organization remains compliant. With access governance solutions, the platform automates compliance and safeguard against insider (and outsider) risks. Additionally, you can manage privileged user credentials and SSH keys securely, and automate compliance reporting using current infrastructure integration.

Read More

Simeio Pricing

  • Free Trial Not Available
  • Simeio Offers Custom plan.
Stytch logo
Proving authentication solutions 4.3 Based on 3 Ratings
Visit Website + Add to Compare

What is Stytch and how does it work?

Stytch is a customer identification and access management (CIAM) programme that provides customizable, passwordless authentication solutions to improve security and user experience. It provides you with innovative and out-of-the-box solutions while allowing you to concentrate on your product. You can simply develop seamless signup and authentication processes that satisfy users and compliment your brand with Stytch's SDK's configurable templates, without having to go through the bother of building UI from the bottom up. You can also customize the templates to your liking by changing the colours, fonts, and logos. You have the option of using their direct API integration, which takes into account both developer and user experience, allowing you more control over the user experience. With simple and responsive documentation, integrations are simple and painless. You only pay for what you use, with no hidden fees or surprises. It has built-in redundancy because vendor downtime has a direct influence on your capacity to engage users, hence why they incorporated failover logic for SMS and email across several providers. urthermore, the platform is accredited to the highest of standards and ensures complete security and privacy.

Read More

Stytch Pricing

  • Free Trial Not Available
  • Starts at $0.10. Offers Custom plan.
Incode Omni logo
Push the Boundaries Write a Review
Visit Website + Add to Compare

What is Incode Omni and how does it work?

Introducing Incode Omni - a revolutionary AI-driven Integrated Identity Platform designed to create seamless digital experiences. Omni is the result of years of research and development, creating a unique privacy-preserving platform that can be tailored to meet their unique needs. Incode Omni leverages automation to provide dependable, reliable, and secure identity verification, age verification, and authentication processes, all while ensuring users’ safety and privacy are preserved. Incode Omni offers flexible customization, allowing you to create the right setup for their business and target audience. Through These innovative proprietary AI technologies, This platform undergoes continual optimization and improvement to provide improved user experiences. The proprietary AI technology helps to detect more complex patterns in fraud prevention, identity verification, age verification, and authentication processes, in addition to the standard processes. And with always-improving automation, Incode Omni makes the online process more efficient and secure than ever before. In addition, Incode Omni provides an extra level of security with our two-factor authentication technology, allowing you to control access to secure accounts and systems. By scanning and verifying digital identities through a combination of traditional document verification, facial recognition, and database checks, Incode Omni helps to ensure the right people gain access to their data. Trust their identity verification, age verification, and authentication process to Incode Omni. This revolutionary AI-driven Integrated Identity Platform is designed to create seamless digital experiences while preserving the safety and privacy of users. Try Incode Omni today to see how it can help you create the best online experience for their business.

Read More

Incode Omni Pricing

  • Free Trial Not Available
  • Incode Omni Offers Custom plan.
miniOrange CIAM logo
Redefine Your Customer Identity Write a Review
Visit Website + Add to Compare

What is miniOrange CIAM and how does it work?

miniOrange CIAM is a powerful and comprehensive solution designed to enhance the customer experience and help businesses build meaningful relationships with their customers. With miniOrange CIAM, businesses can provide smooth and personalized user experiences while ensuring high-end security, privacy, and compliance. This customer identity and access management solution allows organizations to authenticate, authorize, and manage users’ identities across multiple channels (e.g., websites, mobile apps, connected devices). miniOrange is committed to providing end-to-end security solutions that are reliable, scalable, cost-effective, and easy to deploy. Through this cloud-based infrastructure, your organization will benefit from enhanced performance along with features such as highavailability/disaster recovery options. By using miniOrange CIAM solutions they can rest assured that customer data is secure and privacy is respected which leads to an enriched user journey that improves their customer’s loyalty & trust!

Read More

miniOrange CIAM Pricing

  • Free Trial Not Available
  • Starts at $49.00. Offers Free-forever and Custom plan.
OneWelcome logo
The best cloud Identity platform Write a Review
Visit Website + Add to Compare

What is OneWelcome and how does it work?

OneWelcome is the result of a collaboration between two Dutch SaaS businesses, iWelcome, and Onegini, to make access to online services for European organizations simple and secure. It's a CIAM (customer identification and access management) program. You can create scalable, secure digital consumer engagements by bringing your clients online. You can thrill your consumers with intuitive omnichannel user experiences by using OneWelcome to deliver a frictionless user experience. You can quickly comply with rules and ensure that your company complies with local, national, and European legislation. You can also use validated identification data from bank, industry-specific, and governmental identity wallets to integrate identity wallets. You can use the internet to verify and prove your customers' identities. While your shop is open, modernize your IT infrastructure, migrate to the cloud, and embrace SaaS technology. Secure consumer logins can help you avoid account takeover and fraud. Furthermore, you can quit doing it yourself and switch to an off-the-shelf solution, relying on a security vendor's competence for your critical infrastructure.

Read More

OneWelcome Pricing

  • Free Trial Not Available
  • OneWelcome Offers Custom plan.
FTx Identity logo
Reduce Business Risks and Protect Customers’ Identities Write a Review
Visit Website + Add to Compare

What is FTx Identity and how does it work?

Introducing FTx Identity, the premier age verification and identity management system. FTx Identity offers a unified authentication and authorization platform that eliminates fraud in all applications - desktop, mobile, and web. This advanced AVT solution makes it easier than ever to manage age-restricted items and prevent the sale of such products to minors. FTx Identity is designed to ensure convenient access for all users. With this innovative system, users only need one login to access all accounts across multiple platforms. Giving the peace of mind that the data is perfectly secure and in the right hands. This fast, seamless solution offers the highest level of security for the customers by utilizing MFT (Multi-Factor Technology). All data is encrypted in storage for extra protection against unauthorized access. User activity logs are always kept up to date providing real-time monitoring for data privacy compliance. What sets us apart from other systems is our approach: They take a proactive approach to protecting the assets while maintaining a user experience that meets both users and the customers' expectations. With FTx Identity, they get comprehensive identity management and authentication services combined with powerful analytics tools so they can view the results of each process quickly and easily. We understand the importance of providing trust in today’s digital world. That's why they've designed FTx Identity as an ideal choice for streamlining age verification processes for online marketplaces or stores dealing with age restricted items like alcohol or cigarettes or any other product or service requiring rigorous authentication measures to ensure trustworthiness among all users. Put FTx Identity to work today and see how easy it can be!

Read More

FTx Identity Pricing

  • Free Trial Not Available
  • FTx Identity Offers Custom plan.
Userfront logo
Advanced Task and Role Management Write a Review
Visit Website + Add to Compare

What is Userfront and how does it work?

Userfront is a customer identity and access management software that provides secure, standards-based and authorization services.They have a simple setup and provide automatic updates, along with key features such as Single Sign On, Access Control, Metrics, Session Management, Refresh Token and much more.Their vast list of features includes – an intuitive admin dashboard where you can manage all your users in a unified platform, coordinate with your team and perform tasks quickly and efficiently. After updating details, you can manage what users are allowed to do and control their access based on their job position in the hierarchy. You can also divide the application into tenants so that users can have their own projects, groups and organizations with roles you select. One of their most beneficial features is that of import and export of user data. You can add users in bulk by uploading your CSV, including custom fields and can create and manage user records in real-time through their Userfront API. In order to provide the highest level of protection Userfront employs the most up-to-date Commercial National Security Algorithm (CNSA) requirements.

Read More

Userfront Pricing

  • Free Trial Not Available
  • Starts at $160.00. Offers Free-forever and Custom plan.

List of Customer Identity and Access Management (CIAM) Software

PRODUCT NAME AGGREGATED RATINGS
Akamai Identity Cloud Akamai Identity Cloud 4
Sentry Login Sentry Login 4.8
Amazon Cognito Amazon Cognito 4.4
FusionAuth FusionAuth 4.7
Kinde Kinde 0
Auth0 Auth0 4.1
LoginRadius LoginRadius 4.4
Persona Persona 3.4
ReachFive ReachFive 0
Alice Biometrics Alice Biometrics 0

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed