---
description: Page 5 - Discover the best Authentication Software in Ireland. Compare top Authentication Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 5 - Best Authentication Software in Ireland - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Authentication Software](https://www.softwareadvice.ie/directory/4311/authentication/software) > [Page 5](https://www.softwareadvice.ie/directory/4311/authentication/software?page=5)

# Authentication Software

Canonical: https://www.softwareadvice.ie/directory/4311/authentication/software

Page: 5 / 6\
Prev: [Previous page](https://www.softwareadvice.ie/directory/4311/authentication/software?page=4)\
Next: [Next page](https://www.softwareadvice.ie/directory/4311/authentication/software?page=6)

-----

## Products

1. [IDnow](https://www.softwareadvice.ie/software/483444/IDnow) — 5.0/5 (1 reviews) — IDnow is a web-based identity verification platform which is compliant with regulations such as AML and eIDAS. IDnow'...
2. [ThreatMark](https://www.softwareadvice.ie/software/184495/threatmark) (0 reviews) — ThreatMark is the future of trust in the digital world. The company was founded with a vision of bringing trust to in...
3. [Appsian Security Platform](https://www.softwareadvice.ie/software/182143/appsian-security-platform) (0 reviews) — Appsian Security Platform is a cloud-based solution designed to help organizations manage data access, user authentic...
4. [Nonius Guest Wi-Fi](https://www.softwareadvice.ie/software/241400/nonius-guest-wi-fi) (0 reviews) — Nonius Guest Wi-Fi is a portal solution that helps hospitality businesses streamline operations related to WiFi distr...
5. [swIDch Auth SDK](https://www.softwareadvice.ie/software/320674/otac) (0 reviews) — swIDch Auth SDK provides multiple robust authentication features such as FIDO-certified biometric authentication, mOT...
6. [Prove ID](https://www.softwareadvice.ie/software/322148/prove-id) (0 reviews) — Prove ID is an end-to-end ID verification \&amp; management tool for online businesses. It enables remote parties to a...
7. [TypingDNA Verify 2FA](https://www.softwareadvice.ie/software/351939/verify-2fa) (0 reviews) — Need a quick way to add two-factor authentication (2FA) to your website, and reduce friction \&amp; fraud from account...
8. [Daito](https://www.softwareadvice.ie/software/366113/daito) (0 reviews) — Daito is a web-based 2FA authenticator that simplifies protecting shared accounts with 2FA while enabling you to secu...
9. [Keystash](https://www.softwareadvice.ie/software/366883/keystash) (0 reviews) — Keystash is a Linux user access and SSH key management solution. Creating and managing Linux user accounts, privilege...
10. [Peig Passwordless Access Platform](https://www.softwareadvice.ie/software/355793/peig-access-platform) (0 reviews) — Peig: Passwordless access platform automates identity access management workflows for middle-size organizations and e...
11. [SafeNet Trusted Access](https://www.softwareadvice.ie/software/446053/safenet-trusted-access) (0 reviews) — SafeNet Trusted Access: Provide simple, secure access to all your apps with authentication everywhere. Cloud-based ap...
12. [Cloud Identity](https://www.softwareadvice.ie/software/369911/cloud-identity) (0 reviews) — Cloud Identity is the most reliable cloud multi-biometric platform in the world, to validate the identity of people; ...
13. [walt.id Identity Infrastructure](https://www.softwareadvice.ie/software/322610/ssi-kit) (0 reviews) — We offer holistic digital identity and wallet infrastructure used by thousands of developers, governments and busines...
14. [OLOID](https://www.softwareadvice.ie/software/377837/oloid) (0 reviews) — OLOID is an authentication platform that provides secure access for frontline workers. It offers a range of multi-fac...
15. [Kycaid](https://www.softwareadvice.ie/software/357929/kycaid) (0 reviews) — Kycaid is a one-stop-shop compliance platform that is aimed to help businesses of all sizes and industries reduce ris...
16. [Berbix](https://www.softwareadvice.ie/software/324284/berbix) (0 reviews) — Berbix is a document identity verification software that provides users with tools such as biometric scans of custome...
17. [EmpowerID](https://www.softwareadvice.ie/software/366337/empowerid) (0 reviews) — EmpowerID is an identity management suite of solutions, which enable businesses in banking, healthcare, manufacturing...
18. [DIRO](https://www.softwareadvice.ie/software/233179/diro) (0 reviews) — DIRO's document verification technology is built to mitigate risks of financial fraud, reduce manual team costs and r...
19. [Haventec Authenticate](https://www.softwareadvice.ie/software/400273/haventec-authenticate) (0 reviews) — Introducing Haventec Authenticate, the next-generation authentication engine that offers easy accessibility, cost-eff...
20. [Mainframe Security Suite](https://www.softwareadvice.ie/software/411018/mainframe-security-suite) (0 reviews) — Mainframe Security Suite helps enterprises access real-time compliance events and privileged users, allowing them to ...
21. [TrustLogin](https://www.softwareadvice.ie/software/393969/trustlogin) (0 reviews) — TrustLogin is a cloud-based solution that allows users to sign in to multiple cloud services using a single set of lo...
22. [eCertApp](https://www.softwareadvice.ie/software/350272/ecertapp) (0 reviews) — eCertApp helps users leverage blockchain and AI for tamper-proof certificates, ensuring authenticity and minimizing t...
23. [Authenti](https://www.softwareadvice.ie/software/417234/authenti) (0 reviews) — Authenti is a voice biometrics solution that verifies callers' identities using their unique voiceprints. It caters t...
24. [Build38](https://www.softwareadvice.ie/software/349471/build38) (0 reviews) — Build38 is a cloud-based identity verification solution that helps organizations in the healthcare, financial service...
25. [Jira Oauth](https://www.softwareadvice.ie/software/371327/jira-oauth) (0 reviews) — Jira OAuth is a cloud-based platform that enables OAuth/OpenID Single Sign On (SSO) for Jira Software and Jira Servic...

-----

Page: 5 / 6\
Prev: [Previous page](https://www.softwareadvice.ie/directory/4311/authentication/software?page=4)\
Next: [Next page](https://www.softwareadvice.ie/directory/4311/authentication/software?page=6)

## Related Categories

- [Computer Security Software](https://www.softwareadvice.ie/directory/4528/security/software)
- [Privileged Access Management Software](https://www.softwareadvice.ie/directory/4241/privileged-access-management/software)
- [Customer Identity and Access Management (CIAM) Software](https://www.softwareadvice.ie/directory/4427/ciam/software)
- [Access Governance Software](https://www.softwareadvice.ie/directory/4665/access-governance/software)
- [Cybersecurity Software](https://www.softwareadvice.ie/directory/4643/cybersecurity/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.ie/directory/4311/authentication/software)
- [All Categories](https://www.softwareadvice.ie/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice Ireland","address":{"@type":"PostalAddress","addressLocality":"Dublin","addressRegion":"D","postalCode":"D02 NP94","streetAddress":"2 Park Place, 3rd Floor, Hatch St Dublin, D02 NP94 Ireland"},"description":"We've helped more than 500000 buyers to find the right software.","email":"info@softwareadvice.ie","url":"https://www.softwareadvice.ie/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.ie/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice Ireland","url":"https://www.softwareadvice.ie/","@type":"WebSite","@id":"https://www.softwareadvice.ie/#website","publisher":{"@id":"https://www.softwareadvice.ie/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.ie/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Authentication Software","description":"Page 5 - Discover the best Authentication Software in Ireland. Compare top Authentication Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.ie/directory/4311/authentication/software?page=5","about":{"@id":"https://www.softwareadvice.ie/directory/4311/authentication/software?page=5#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.ie/directory/4311/authentication/software?page=5#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.softwareadvice.ie/directory/4311/authentication/software?page=5#webpage","mainEntity":{"@id":"https://www.softwareadvice.ie/directory/4311/authentication/software?page=5#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.ie/#website"},"inLanguage":"en-IE","publisher":{"@id":"https://www.softwareadvice.ie/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Authentication Software","position":2,"item":"https://www.softwareadvice.ie/directory/4311/authentication/software","@type":"ListItem"},{"name":"Page 5","position":3,"item":"https://www.softwareadvice.ie/directory/4311/authentication/software?page=5","@type":"ListItem"}],"@id":"https://www.softwareadvice.ie/directory/4311/authentication/software?page=5#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 5 - Best Authentication Software in Ireland - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"IDnow","position":1,"description":"IDnow is a web-based identity verification platform which is compliant with regulations such as AML and eIDAS. IDnow's fraud prevention technology and monitoring services help protect businesses against fake IDs, synthetic identities, deepfakes and other suspicious activities.\n\nIDnow helps businesses enhance their customer onboarding experience without compromising security or privacy. It offers features such as automated identity verification, video verification, in-person verification and digital signature.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5489d7c6-edae-4535-b828-4af8bfcd26cc.png","url":"https://www.softwareadvice.ie/software/483444/IDnow","@type":"ListItem"},{"name":"ThreatMark","position":2,"description":"ThreatMark is the future of trust in the digital world. The company was founded with a vision of bringing trust to interactions across all digital channels through profound cybersecurity know-how and the latest advancements in AI & Data Analytics. \n\nThreatMark processes a comprehensive set of data inputs to continuously validate user’s identity & their intentions while protecting the user’s most valuable assets.\n\nAt ThreatMark, we make sure that the entire digital journey (onboarding, authentication, account management, transactions…) is trusted and safe for both end-users and businesses.  \n\nMajor banks use ThreatMark’s deep behavioral profiling engine to analyze vast numbers of user-specific data & behavioral traits to precisely identify legitimate users and block fraudsters in real-time. For banks and their users, ThreatMark enables a seamless digital experience that does not require additional authentication nor rely on simple transaction monitoring. ThreatMark goes beyond the industry standards to validate more than 25 million users and over 1 billion logins and transactions yearly.\n\nThreatMark is shifting the paradigm in the digital world with advanced solutions complemented by a dedicated team of fraud specialists & cybersecurity experts working in our Security Operations Center (SOC), who vigilantly watch for new malicious activities throughout the digital landscape.  \n\nAmong various honors and industry recognition, ThreatMark has been recognized by Gartner as a Representative Vendor for the Online Fraud Detection area in its 2020 Market guide, Forrester’s Now Tech – Enterprise Fraud Management 2021, KuppingerCole’s 2021 Fraud Reduction Intelligence Platforms Leadership Compass, named Deloitte’s Top Technology Fast 50 for CE; won 2019 AI Award – Company of the Year; and was awarded EY Entrepreneur of The Year for 2019. \n\nTo learn more about ThreatMark visit www.threatmark.com","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/df37372a-737c-4ba3-9ae5-7e15fd674ff6.png","url":"https://www.softwareadvice.ie/software/184495/threatmark","@type":"ListItem"},{"name":"Appsian Security Platform","position":3,"description":"Appsian Security Platform is a cloud-based solution designed to help organizations manage data access, user authentication, network security, and other operations for PeopleSoft and SAP applications. The platform includes a transaction logging functionality, which lets administrators record user activities and session time.\n\n\nAppsian Security Platform allows IT teams to provide role-based permissions and hide data across search results, fields, queries and browsers via a unified portal. It offers a host of features such as remote access, configurable rule engine, location-based security, threat detection and prevention, risk assessment and more. Additionally, managers can generate reports to analyse usage trends, data access, privileged accounts usage, security alerts and other metrics using Appsian 360 application.\n\n\nAppsian Security Platform supports integration with various third-party systems including Oracle, Duo, Okta, Twilio and more. Pricing details are available on request and support is provided via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cd3ac52e-d138-450d-90b6-18161508aeb3.png","url":"https://www.softwareadvice.ie/software/182143/appsian-security-platform","@type":"ListItem"},{"name":"Nonius Guest Wi-Fi","position":4,"description":"Nonius Guest Wi-Fi is a portal solution that helps hospitality businesses streamline operations related to WiFi distribution, user authentication, usage monitoring, and more from within a centralized platform. Administrators can set bandwidth limitations, configure SSID, and distribute personalized WiFi vouchers.\n\nNonius Guest Wi-Fi enables team members to create white-labeled captive portals with custom images and text in multiple languages. The WiFi landing pages allow employees to communicate with guests, promote hotel services, and manage loyalty programs. Additionally, business leaders can gain insights into user information, such as registrations, device usage, and browsers accessed, whilst maintaining compliance with PCI-DSS, GDPR, and LGPD guidelines.\n\nNonius Guest Wi-Fi comes with an application programming interface (API), which lets businesses integrate the platform with several third-party CRM, PMS, and CRS applications, including Amadeus, Protel, Maestro, and Salesforce. Pricing is available on request and support is extended via email, live chat, phone, and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/552cc4ed-6744-4ea9-8abb-06800f21071b.png","url":"https://www.softwareadvice.ie/software/241400/nonius-guest-wi-fi","@type":"ListItem"},{"name":"swIDch Auth SDK","position":5,"description":"swIDch Auth SDK provides multiple robust authentication features such as FIDO-certified biometric authentication, mOTP authentication for easy mobile application, and the world’s first one-way dynamic code OTAC login. \n\nswIDch Auth SDK's various functions are verified by FIDO alliance providing super secure passwordless authentication. The SDK also provides mobile OTP function that runs on a mobile application including the use of PIN inputs or fingerprint recognition, alongside mobile OTP which generates a one-time OTP number providing the same level of solid security as standard OTPs.\n\nFor an extra level of added security, swIDch Auth SDK provides login functions based on swIDch’s unparalleled  authentication technology, OTAC (One-Time Authentication Code). Even in a networkless environment, OTAC can identify users and devices by generating a one-time random code, providing an impenetrable authentication environment in cyber security.\n\nswIDch Auth SDK unprecedented pricing policy aims to empower organisations to develop innovative products and services, especially regarding authentication, identity and access management. The Pioneer membership, which consists of a one-pack license, is $5,000 whilst its Enterprise membership charges $45,000 allowing Unlimited Licensing for internal systems and 20 licenses for reselling. Both these memberships come with technical support services to help with any queries and technical requirements.\n\nswIDch Auth SDK is designed to empower System Integration companies, security solution vendors, organisations and enterprises, who want to deploy their developers and security teams to provide reliable all-in-one authentication based on proven international standard authentication security technology. Save time and increase efficiency with swIDch Auth SDK.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ca86be52-cbd8-41d4-b08e-4c46e5926ad1.jpeg","url":"https://www.softwareadvice.ie/software/320674/otac","@type":"ListItem"},{"name":"Prove ID","position":6,"description":"Prove ID is an end-to-end ID verification & management tool for online businesses. It enables remote parties to authenticate each other with a customizable verification process. The platform brings a performance-based approach to customer verification & online client acquisition.\n\nProve ID covers the following modules:\n\n- 70+ country ID card verification (NFC & OCR)\n- Custom document verification\n- Biometric matching\n- Liveness detection\n- Secure consent collection\n- AML check\n- P2P secure agent call\n- Automatic reminders\n- Verification fail analysis","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cb7961e2-9665-4d03-b8ae-89ceb257de28.png","url":"https://www.softwareadvice.ie/software/322148/prove-id","@type":"ListItem"},{"name":"TypingDNA Verify 2FA","position":7,"description":"Need a quick way to add two-factor authentication (2FA) to your website, and reduce friction & fraud from account log-ins? With Verify 2FA, users prove their identity in just 5 seconds simply by the way they type four short words that appear on-screen. Typing biometrics technology is secure and convenient — replacing frustrating one-time passcodes with faster user-friendly two-factor authentication. And even better? It can be implemented in under 10 minutes with a simple integration — freeing up your dev resources. Schedule your free demo today: www.typingdna.com","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/47cd3d8f-e519-4710-b278-2d40d8674c6c.jpeg","url":"https://www.softwareadvice.ie/software/351939/verify-2fa","@type":"ListItem"},{"name":"Daito","position":8,"description":"Daito is a web-based 2FA authenticator that simplifies protecting shared accounts with 2FA while enabling you to securely share access to those 2FA tokens with others.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d34fd1de-eae0-4be2-b55c-2508684c021e.png","url":"https://www.softwareadvice.ie/software/366113/daito","@type":"ListItem"},{"name":"Keystash","position":9,"description":"Keystash is a Linux user access and SSH key management solution.\nCreating and managing Linux user accounts, privileges and SSH keys is typically a manual task, however Keystash provides a centralized management system that can connect across your Linux environments, ensuring that only the right people have access to the necessary servers with the correct privileges. \n\nKeystash significantly increases IT security and automation in Linux environments and enables good IT policy and governance with clear workflows for access with complete audit logs. Enforce high security policy on your SSH Servers, including disabling password access and enforcing SSH Two Factor Authentication.\n\nKeystash brings visibility to your Linux environments and stops the sprawl of ad-hoc SSH Key creation by centralizing and guiding users during the key creation process.\n\nAchieve alignment and compliance with the top IT Security frameworks such as ISO27001, SOC2, PCI-DSS and HIPAA by leveling up your Linux security posture.\n\nIt allows administrators to create and manage Linux user accounts and groups, create and manage user SSH Keys, control access and privileges across multiple Linux servers, enforce SSH Server security like SSH Two Factor Authentication, gain visibility of all actions across the platform with audit logs and history, keep a watchful eye on your Linux environment inventory with detailed information like location, IPs and OS details, and deploy the Keystash agent to your Linux servers quickly and easily using standard software repo's: YUM and APT-GET.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fd542df0-8b0e-48e1-804d-1d04b54a722d.png","url":"https://www.softwareadvice.ie/software/366883/keystash","@type":"ListItem"},{"name":"Peig Passwordless Access Platform","position":10,"description":"Peig: Passwordless access platform automates identity access management workflows for middle-size organizations and enterprises.\n\nWith Peig, enterprises can centrally manage their contractors, employees, and partners' access to any of their cloud-based or self-hosted collaboration tools with little to no admin friction.\n\nThe passwordless access platform is used by the organization’s admins or managers to oversee and manage access to their data without having to deal with password management, VPNs, or other forms of heavy-duty access security.\n\nThe passwordless access platform supports integration with many third-party apps such as Office 365, Slack, Salesforce, AWS, and more.\n\nPeig access services are offered on a monthly subscription basis.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3bdbc4dd-55ba-48ef-bfe7-6d21b0235955.jpeg","url":"https://www.softwareadvice.ie/software/355793/peig-access-platform","@type":"ListItem"},{"name":"SafeNet Trusted Access","position":11,"description":"SafeNet Trusted Access: Provide simple, secure access to all your apps with authentication everywhere.\n\nCloud-based applications play a vital role in improving productivity and meeting the business goals of digital-first enterprises. Along with protecting your employees’ digital identities in a multi-cloud environment, you must also ensure the security of your users accessing sensitive data from literally anywhere.\n\nSafeNet Trusted Access is an access management and authentication service that ensures no user is a target by allowing you to expand authentication to all users and apps with diverse authentication capabilities. Because it gives you the power to control access to all apps with the right policy, you can enforce the right authentication method for the right user.\n \nSafeNet Trusted Access is unique in its ability to meet the diverse needs of diverse users in your organization by proposing the right authentication method for the right user. Organizations, no matter their size or industry, can securely manage their digital transformations by protecting more apps and more users through better MFA coverage. In today’s threat environment, all users and applications are potential targets. To ensure secure access anywhere, MFA should be expanded to cover all possible use cases.\n\nOffering contextual and risk-based authentication capabilities through high-assurance FIDO2 devices, as well as Push and pattern-based authentication, SafeNet Trusted Access allows you to expand secure access to any app and all users by enabling users to authenticate anywhere, whatever their circumstances.\n\nEach time a user logs into a cloud application, SafeNet Trusted Access validates the user’s identity, assesses which access policy should be enforced, and applies the appropriate level of authentication with Smart Single Sign-On.\n\nSafeNet Trusted Access offers many benefits to organizations seeking to migrate to the cloud simply and securely.\n\nPrevents data breaches by applying different MFA methods, including phishing-resistant FIDO devices and access controls, based on the environment risk assessment while eliminating passwords.\n\nSmooth integration and support for existing IAM schemes ensures you can secure cloud transformation without having to rip and replace your existing authentication schemes. \n\nClose security gaps in your environment by applying the right type and method of authentication to all your users depending on their context.\n\nSimplify compliance with real-time auditing of who is accessing which app and how.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/12d60786-5a1b-40c9-8f3b-5634e62030b5.png","url":"https://www.softwareadvice.ie/software/446053/safenet-trusted-access","@type":"ListItem"},{"name":"Cloud Identity","position":12,"description":"Cloud Identity is the most reliable cloud multi-biometric platform in the world, to validate the identity of people; through an end-to-end, frictionless and omnichannel process. It works by capturing biographical and biometric data of the user, such as: IDs from more than 194 countries, voice, fingerprints and facial biometrics. The data is sent and validated by government institutions that issue the ID presented by the user, to testify the information, validate deduplication, this with the aim of being able to identify if an identity theft is attempted and guarantee that the person is who they say they are. Finally, if the solution determines that the biometrics are not duplicated, they are stored directly in the multi biometric engine in the cloud to make the user's digital identity available in the different channels where it must be authenticated. \n\nCloud Identity lives in Mexican territory in 2 datacenters that have the highest security and availability certifications on the market to ensure that the platform cannot be compromised and will be up and running. In addition, it has tools such as APIs and SDKs that allow integration with other systems. \n\nWith a multi biometric combination (eg fingerprint + face), the reliability of our platform performs with a false negative identification rate of 0.22% and a false positive identification rate of 0.3% in a Approximate dataset > 1M records. In this way, Cloud Identity is a modular platform that adapts to your business needs and reduces fraud due to theft and identity theft by up to 98%. Identity is the most important thing we have in the digital world, help us protect it with Cloud Identity.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6f75a555-62d9-48cd-b7a0-894ae8ecd8c7.png","url":"https://www.softwareadvice.ie/software/369911/cloud-identity","@type":"ListItem"},{"name":"walt.id Identity Infrastructure","position":13,"description":"We offer holistic digital identity and wallet infrastructure used by thousands of developers, governments and businesses across industries. \n\nThe products are open source, based on open standards, compliant with digital identity regulations and available for self-management (on-premise) or as a managed service (SaaS).","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4bf6ea7d-9b03-435a-ae45-2a389b477d5e.png","url":"https://www.softwareadvice.ie/software/322610/ssi-kit","@type":"ListItem"},{"name":"OLOID","position":14,"description":"OLOID is an authentication platform that provides secure access for frontline workers. It offers a range of multi-factor authentication options such as face recognition, NFC, badge, palm and QR code to eliminate the need for passwords. The platform caters to various industries including manufacturing, retail, healthcare, contact centers and pharmaceuticals.\n\nThe platform features a workflow automation engine that streamlines identity-related processes like user onboarding and account management. It utilizes pre-built connectors and customizable templates to enhance security and operational efficiency. OLOID also offers a tablet-based time tracking system that leverages facial recognition, QR codes, access cards, and NFC for secure and efficient employee authentication. Additionally, the system integrates with various third-party time and attendance systems.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/218d2c86-591b-4a64-8afd-01272fdabb35.jpeg","url":"https://www.softwareadvice.ie/software/377837/oloid","@type":"ListItem"},{"name":"Kycaid","position":15,"description":"Kycaid is a one-stop-shop compliance platform that is aimed to help businesses of all sizes and industries reduce risks, enhance customer interaction and simplify many business processes through holistic KYC&AML services.\nKycaid is on the market since 2018 and has developed into a global compliance services provider that operates in 248 territories, and works with more than 10 000 different documents worldwide. \n\nThe special feature of Kycaid solutions is that in addition to the automatic AI-based verifications, we also involve a large staff of compliance specialists. This provides improved interaction with your customers, as the number of verification failures and declines is reduced, leading to better conversions for you.\nSupport specialists and compliance managers are available 24/7 via chat.\n\nAnother convenient feature is the payment system. Kycaid has no prepaid tariff plans, you pay as you go only for the services you use. After replenishing your account, you can use them at least all year round!\n\nFor the integration, we offer 3 ways: API integration, pre-set verification forms and Mobile SDK. It usually takes from a few hours to a couple of days to integrate. Additionally, our specialists will brand all the verification processes for you free of charge, so your customers won't notice they left your website.\n\nThe price estimator and some industry information in the blog section on the Kycaid website are going to be a nice bonus for you if KYC&AML services are new for you or if you would want to educate yourself more on this matter.\n\nKycaid is in constant development of new services, and features and is ready to find individual solutions for businesses.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7794041e-838e-4146-8ad9-888c4387d292.jpeg","url":"https://www.softwareadvice.ie/software/357929/kycaid","@type":"ListItem"},{"name":"Berbix","position":16,"description":"Berbix is a document identity verification software that provides users with tools such as biometric scans of customer faces, automated AI, custom configuration and more. Berbix’s automated document identity verification (IDV) solution can confirm a user’s identity in 2 seconds. The software helps users mitigate fraud and maximize conversion at the same time. Berbix’s fully automated technology is powered by machine learning and doesn’t require human review.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ac061e2e-517b-4406-bf4d-3e5f9d5455cd.jpeg","url":"https://www.softwareadvice.ie/software/324284/berbix","@type":"ListItem"},{"name":"EmpowerID","position":17,"description":"EmpowerID is an identity management suite of solutions, which enable businesses in banking, healthcare, manufacturing and other sectors to securely access cloud and on-premise applications. Professionals can automatically create, manage or delete user groups and configure Policy-Based Access Controls (PBAC) for staff members.\n\nKey features of EmpowerID include single sign-on (SSO), multi-factor authentication (MFA), role mining and lifecycle management. Its cloud directory supports Remote Authentication Dial-In User Service (RADIUS) and Lightweight Directory Access Protocol (LDAP) among other authentication options. Additionally, it helps users reset their passwords using a self-service platform.\n\nEmpowerID offers mobile applications for iOS and Android devices, enabling professionals to approve login requests, view, edit, rename or delete accounts, scan third-party QR codes and more. The product is available on monthly or annual subscriptions and support is extended via phone, email, video tutorials and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6c076002-a8d6-48e4-af81-4e502b7db592.png","url":"https://www.softwareadvice.ie/software/366337/empowerid","@type":"ListItem"},{"name":"DIRO","position":18,"description":"DIRO's document verification technology is built to mitigate risks of financial fraud, reduce manual team costs and reduce friction on KYC and AML compliance. Using DIRO’s technology, Banks, and FinTechs can use the technology for these features.\n\nEmploying the technology, organizations of all kinds can make the customer onboarding process smoother, and improve the overall customer experience. Organizations of all scales can use DIRO’s document verification technology for several benefits.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7ef9d269-cdd1-4fc2-b29f-ea8b5ab931b3.jpeg","url":"https://www.softwareadvice.ie/software/233179/diro","@type":"ListItem"},{"name":"Haventec Authenticate","position":19,"description":"Introducing Haventec Authenticate, the next-generation authentication engine that offers easy accessibility, cost-effectiveness, standards-based integration, and superior security.\n\nHaventec Authenticate enables authentication solutions that include:\n\n1- Silent Multi-Factor Authentication (Silent MFA): Add an extra layer of security without changing how your customers sign-in. Silent MFA leverages cryptography and patented rolling (dynamic) keys as a second authentication factor.\n\n2- Passwordless Authentication: Haventec Authenticate eliminates the need for passwords, reducing the risk of security breaches due to weak or stolen passwords. With passwordless authentication, customers can access your system using a secure and convenient method, such as PIN or Biometric factors.\n\n3- Haventec Authenticate powers a CIAM as a Service solution that is passwordless and secure and includes identity and access management, customer data management, and more. With Haventec Authenticate CIAM, you can streamline your authentication processes and improve your security posture and customer experience.\n\nHaventec Authenticate offers a range of benefits, including:\n\nEasy implementation: Haventec Authenticate is easy to implement and our team of experts will work with you to ensure a smooth implementation process.\n\nCost-effectiveness: Haventec Authenticate is a cost-effective solution based on active users, saving your business money and effort during the build and run stages.\n\nStandards-based integration: Haventec Authenticate integrates seamlessly with your existing systems, ensuring that you can continue to use your current infrastructure.\n\nGranular user management: Haventec Authenticate allows granular user management through an intuitive admin console.\n\nIf you're interested in learning more about Haventec Authenticate and how it can help your business, contact us today for a free consultation. Our experienced team will work with you to understand your needs and provide a customised solution that meets your specific requirements.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/883e7d12-d214-4f94-95ba-3034affff124.png","url":"https://www.softwareadvice.ie/software/400273/haventec-authenticate","@type":"ListItem"},{"name":"Mainframe Security Suite","position":20,"description":"Mainframe Security Suite helps enterprises access real-time compliance events and privileged users, allowing them to control their security environment. Teams can address compliance requirements and improve identity assurance for their users.\n\nOrganizations can monitor users, security settings, and system files to view changes or suspicious activities from within a unified platform. The system assists with alerting and reporting on authentication data across events.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/50b1ee77-e561-42cd-8d79-a90e8ee1293a.jpeg","url":"https://www.softwareadvice.ie/software/411018/mainframe-security-suite","@type":"ListItem"},{"name":"TrustLogin","position":21,"description":"TrustLogin is a cloud-based solution that allows users to sign in to multiple cloud services using a single set of login credentials, eliminating the need for multiple usernames and passwords. This makes it easier for users to access their applications and improves security by reducing the risk of password-related security breaches.\n\nTrustLogin provides a centralized console for managing user identities and passwords across multiple cloud services. This allows administrators to easily add or remove users, reset passwords, and monitor user activity from a single location.\n\nTrustLogin also offers multi-factor authentication (MFA) capabilities, which add an extra layer of security to the login process. Users can authenticate using a variety of methods, including SMS, email, and mobile apps.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3743eaf5-eeda-433a-a9fb-2e345e098750.png","url":"https://www.softwareadvice.ie/software/393969/trustlogin","@type":"ListItem"},{"name":"eCertApp","position":22,"description":"eCertApp helps users leverage blockchain and AI for tamper-proof certificates, ensuring authenticity and minimizing the risk of fraud. It is a credential management software that helps businesses control digital certification processes. The tool allows users to support various certificates, professional degrees, and more on a unified platform.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/576bc3f0-041e-4c22-83e9-aa94802a053a.png","url":"https://www.softwareadvice.ie/software/350272/ecertapp","@type":"ListItem"},{"name":"Authenti","position":23,"description":"Authenti is a voice biometrics solution that verifies callers' identities using their unique voiceprints. It caters to companies in the financial services, healthcare, and telecommunications industries that require stringent authentication and fraud prevention.\n\nAuthenti leverages voice biometric technology that compares live voice samples to stored voiceprints. It can detect spoofing attacks and integrates with anti-spoofing technology and automatic speech recognition to reduce fraud risk. \n\nAuthenti is deployed through an API and offers support and maintenance via phone email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/09f88ad6-cd8b-4b51-823d-96d26d66c309.jpeg","url":"https://www.softwareadvice.ie/software/417234/authenti","@type":"ListItem"},{"name":"Build38","position":24,"description":"Build38 is a cloud-based identity verification solution that helps organizations in the healthcare, financial services, mobile banking, digital, and mobility sectors onboard and authenticate new customers securely while complying with regulations like General Data Protection Regulation (GDPR), Anti-Money Laundering (AML), and Know-Your-customer (KYC).\n\nBuild38 provides authentication functionality through its app and web interfaces that help administrators verify customers' digital identities for legally valid identification. Users can also access databases from state-owned organizations.  \n\nBuild38 deploys through cloud-based software as a service. It provides support to help companies with onboarding, compliance, and technical questions. Build38 partners with an eIDAS-certified substantial service to offer verified identities.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1acf2913-38c2-49dc-b876-28dde53a4410.png","url":"https://www.softwareadvice.ie/software/349471/build38","@type":"ListItem"},{"name":"Jira Oauth","position":25,"description":"Jira OAuth is a cloud-based platform that enables OAuth/OpenID Single Sign On (SSO) for Jira Software and Jira Service Desk. It is compatible with all OAuth/OpenID providers such as Google, Facebook, and more, allowing users from those providers to log in and register to Jira. The app provides a step-by-step guide to configure SSO between Jira and the OAuth/OpenID provider. User profile attributes like first name, last name, and email can be mapped from the OAuth/OpenID provider to Jira.\n\nAdditionally, it also allows user groups to be mapped, adding users to the appropriate Jira groups based on their group membership in the OAuth/OpenID provider. The platform also facilitates integration with other miniOrange apps such as Two Factor Authentication, SCIM Provisioning and API Token Authentication to provide an enhanced and secure Jira experience. Pricing is based on annual subscriptions and support is extended via chat, email, FAQs, phone and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/43149dfb-590c-4cb2-b09c-546864c52553.jpeg","url":"https://www.softwareadvice.ie/software/371327/jira-oauth","@type":"ListItem"}],"@id":"https://www.softwareadvice.ie/directory/4311/authentication/software?page=5#itemlist","numberOfItems":25}
</script>
