---
description: Page 4 - Discover the best Authentication Software in New Zealand. Compare top Authentication Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 4 - Best Authentication Software in New Zealand - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Authentication Software](https://www.softwareadvice.co.nz/directory/4311/authentication/software) > [Page 4](https://www.softwareadvice.co.nz/directory/4311/authentication/software?page=4)

# Authentication Software

Canonical: https://www.softwareadvice.co.nz/directory/4311/authentication/software

Page: 4 / 6\
Prev: [Previous page](https://www.softwareadvice.co.nz/directory/4311/authentication/software?page=3)\
Next: [Next page](https://www.softwareadvice.co.nz/directory/4311/authentication/software?page=5)

-----

## Products

1. [Userfront](https://www.softwareadvice.co.nz/software/260196/userfront) — 5.0/5 (3 reviews) — Userfront gives secure, pre-configured authentication and authorization that stays up to date automatically. Teams fo...
2. [VaultCore](https://www.softwareadvice.co.nz/software/267971/vaultcore) — 5.0/5 (3 reviews) — VaultCore is an encryption key management software designed to help businesses and government administrations secure ...
3. [Veriff](https://www.softwareadvice.co.nz/software/317087/veriff) — 4.7/5 (3 reviews) — Veriff’s mission is to protect businesses and customers from online identity fraud. We do this by verifying that ever...
4. [Spintly](https://www.softwareadvice.co.nz/software/490812/SAAMS) — 5.0/5 (3 reviews) — Spintly is a cloud-based platform that helps businesses handle physical security via access and visitor management to...
5. [Scrive](https://www.softwareadvice.co.nz/software/472998/Scrive) — 5.0/5 (3 reviews) — Scrive is a cloud-based digital signature solution that helps businesses manage online contracts and documents digita...
6. [OpenOTP](https://www.softwareadvice.co.nz/software/460871/OpenOTP) — 5.0/5 (3 reviews) — OpenOTP is a security solution that offers identity and access management (IAM) capabilities. It is designed to simpl...
7. [Authsignal](https://www.softwareadvice.co.nz/software/412276/authsignal) — 5.0/5 (2 reviews) — Authsignal is a B2C consumer authentication and orchestration platform. Built to deliver enterprise and mid-market te...
8. [Teleport](https://www.softwareadvice.co.nz/software/361499/teleport) — 5.0/5 (2 reviews) — Teleport is a gateway for managing access to K8s clusters, Linux \&amp; Windows servers, databases, and applications. ...
9. [Yoti Authentication](https://www.softwareadvice.co.nz/software/386811/authentication) — 5.0/5 (2 reviews) — Yoti Authentication provides a secure way for users to access their accounts using authentication with high-level bio...
10. [MIRACL Trust](https://www.softwareadvice.co.nz/software/302858/miracl-trust) — 4.5/5 (2 reviews) — MIRACL Trust is an identity management solution that enables businesses and individuals to verify the identity of a u...
11. [ValidEntry](https://www.softwareadvice.co.nz/software/407851/validentry) — 5.0/5 (2 reviews) — ValidEntry has been designed to simplify compliance for Web3.0 developers, both individuals and agencies, as they cre...
12. [Oz Liveness](https://www.softwareadvice.co.nz/software/361213/oz-liveness) — 5.0/5 (2 reviews) — Oz Liveness is a facial recognition and authentication software designed to help private and public organizations acr...
13. [Unidy](https://www.softwareadvice.co.nz/software/521625/Unidy) — 4.5/5 (2 reviews) — Overview: UNIDY is a comprehensive identity management platform designed to meet the needs of organizations across va...
14. [Kinde](https://www.softwareadvice.co.nz/software/434014/kinde) — 5.0/5 (2 reviews) — The fully integrated developer platform. Modern auth, access management and billing for engineers. Authentication hap...
15. [SuperTokens](https://www.softwareadvice.co.nz/software/185869/supertokens) — 5.0/5 (1 reviews) — SuperTokens is an open source user authentication solution backed by Y-Combinator and one of the fastest growing OS s...
16. [Hirsch Velocity Software](https://www.softwareadvice.co.nz/software/111798/hirsch-velocity-software) — 5.0/5 (1 reviews) — Hirsch Velocity Software is a security management platform designed to help government institutions and businesses in...
17. [Facephi Identity Platform](https://www.softwareadvice.co.nz/software/253712/inphinite) — 4.0/5 (1 reviews) — Facephi Identity Platform is a multi-biometric platform, which allows the client to design any digital onboarding and...
18. [Atlassian Access](https://www.softwareadvice.co.nz/software/431253/atlassian-access) — 5.0/5 (1 reviews) — Atlassian Access is designed for large enterprises and helps streamline access throughout Atlassian cloud application...
19. [Soffid IAM](https://www.softwareadvice.co.nz/software/293928/soffid-iam) — 5.0/5 (1 reviews) — Soffid IAM is a converged IAM platform that brings together Access Management (AM), Identity Governance (IGA), Identi...
20. [Sima](https://www.softwareadvice.co.nz/software/360785/sima) — 5.0/5 (1 reviews) — Sima is a cloud-based authentication platform that provides highly secure, seamless access control for companies and ...
21. [Specops Secure Service Desk](https://www.softwareadvice.co.nz/software/355802/specops-secure-service-desk) — 5.0/5 (1 reviews) — Secure Service Desk provides multi-factor authentication for your service desk, allowing businesses to verify the acc...
22. [TeleSign Platform](https://www.softwareadvice.co.nz/software/368816/telesign-platform) — 5.0/5 (1 reviews) — TeleSign connects and protects online experiences with sophisticated customer identity and engagement solutions to en...
23. [CyLock MFA](https://www.softwareadvice.co.nz/software/316287/cylock-mfa) — 5.0/5 (1 reviews) — CyLock MFA is a cloud-based solution that provides mobile-centric authentication for all industries, protecting Appli...
24. [Wultra Mobile-First Authentication](https://www.softwareadvice.co.nz/software/411681/powerauth) — 5.0/5 (1 reviews) — Wultra Mobile-First Authentication is a passwordless authentication solution for banks and fintech that offers strong...
25. [The OptimalCloud](https://www.softwareadvice.co.nz/software/317728/the-optimalcloud) — 4.0/5 (1 reviews) — The OptimalCloud is an identity and access management solution designed to help enterprises handle access to various ...

-----

Page: 4 / 6\
Prev: [Previous page](https://www.softwareadvice.co.nz/directory/4311/authentication/software?page=3)\
Next: [Next page](https://www.softwareadvice.co.nz/directory/4311/authentication/software?page=5)

## Related Categories

- [Computer Security Software](https://www.softwareadvice.co.nz/directory/4528/security/software)
- [Privileged Access Management Software](https://www.softwareadvice.co.nz/directory/4241/privileged-access-management/software)
- [Customer Identity and Access Management (CIAM) Software](https://www.softwareadvice.co.nz/directory/4427/ciam/software)
- [Access Governance Software](https://www.softwareadvice.co.nz/directory/4665/access-governance/software)
- [Cybersecurity Software](https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.nz/directory/4311/authentication/software)
- [All Categories](https://www.softwareadvice.co.nz/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":null,"address":{"@type":"PostalAddress","addressLocality":null,"addressRegion":null,"postalCode":null,"streetAddress":null},"description":"Software Advice helps businesses in New Zealand find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.nz","url":"https://www.softwareadvice.co.nz/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.co.nz/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":null,"url":"https://www.softwareadvice.co.nz/","@id":"https://www.softwareadvice.co.nz/#website","@type":"WebSite","publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.nz/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Authentication Software","description":"Page 4 - Discover the best Authentication Software in New Zealand. Compare top Authentication Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.nz/directory/4311/authentication/software?page=4","about":{"@id":"https://www.softwareadvice.co.nz/directory/4311/authentication/software?page=4#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.nz/directory/4311/authentication/software?page=4#breadcrumblist"},"@id":"https://www.softwareadvice.co.nz/directory/4311/authentication/software?page=4#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.softwareadvice.co.nz/#website"},"inLanguage":"en-NZ","mainEntity":{"@id":"https://www.softwareadvice.co.nz/directory/4311/authentication/software?page=4#itemlist"},"publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"}},{"@id":"https://www.softwareadvice.co.nz/directory/4311/authentication/software?page=4#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Authentication Software","position":2,"item":"https://www.softwareadvice.co.nz/directory/4311/authentication/software","@type":"ListItem"},{"name":"Page 4","position":3,"item":"https://www.softwareadvice.co.nz/directory/4311/authentication/software?page=4","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 4 - Best Authentication Software in New Zealand - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@id":"https://www.softwareadvice.co.nz/directory/4311/authentication/software?page=4#itemlist","@type":"ItemList","itemListElement":[{"name":"Userfront","position":1,"description":"Userfront gives secure, pre-configured authentication and authorization that stays up to date automatically. Teams focus on direct setup and quality documentation to make the internet more secure. Rather than asking businesses to know and implement all the auth protocols and standards, Userfront has simple APIs and SDKs that work automatically. The solution gives security defaults that far exceed industry standards, configured automatically to remove the chance that something is misconfigured. \n\nIt is a developer-focused platform designed to make setup, administration, and maintenance easy for developers. Userfront has simple pricing and includes many enterprise-grade features like SSO and SAML in all of its tiers.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/19a37c48-d332-4304-9f75-1c876c41039c.png","url":"https://www.softwareadvice.co.nz/software/260196/userfront","@type":"ListItem"},{"name":"VaultCore","position":2,"description":"VaultCore is an encryption key management software designed to help businesses and government administrations secure data by deploying key encryption across virtual and on-premise environments. With VaultCore, administrators can automatically schedule and enforce cryptography across keys to ensure asset protection. Vaultcore can also automate the encryption of databases, backups, virtual machines, cloud services, IoT endpoints,  end-user hardware, certificates, SSH, and more. VaultCore includes process automation, integrated policy engine, access controls, and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e451f486-6ff9-4eaa-8432-43fc9f4d1ccb.png","url":"https://www.softwareadvice.co.nz/software/267971/vaultcore","@type":"ListItem"},{"name":"Veriff","position":3,"description":"Veriff’s mission is to protect businesses and customers from online identity fraud. We do this by verifying that every user on our platform is who they say they are, while ensuring an optimal customer experience at the same time. Veriff has developed a proprietary technology platform to verify people across 230+ countries in 48 languages, based on thousands of behavioral and technological variables. This includes photo, personal data and social media verification backed by proprietary machine learning algorithms, enabling efficient and reliable identity checks for online sign-ups with simple user experience in just a few seconds.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/89cd5249-815d-402b-b692-da007839a5ad.png","url":"https://www.softwareadvice.co.nz/software/317087/veriff","@type":"ListItem"},{"name":"Spintly","position":4,"description":"Spintly is a cloud-based platform that helps businesses handle physical security via access and visitor management tools. The platform enables users to manage and track daily visitors on a centralized dashboard. Its time and attendance module helps users streamline workforce management via leave tracking, two-factor authentication, biometric attendance and more. Spintly's solutions cater to a range of industries such as multifamily residential, co-working spaces, education, healthcare, hospitality, manufacturing, and fitness and wellness centers. Additionally, the platform also offers customer support via FAQs, email, phone and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7274d425-2b93-4f72-96a4-e136708461ca.png","url":"https://www.softwareadvice.co.nz/software/490812/SAAMS","@type":"ListItem"},{"name":"Scrive","position":5,"description":"Scrive is a cloud-based digital signature solution that helps businesses manage online contracts and documents digitally. The platform caters to businesses of all sizes across various industries such as banking, finance, insurance, automotive, telecom, real estate, legal and human resources (HR). It offers various electronic signature modules including eSign Online, eSign GO, and eSign API. These allow organizations to upload documents and get them signed instantly. Additionally, Scrive provides secure identity verification services through its eID Hub and ID Check. This enables secure login authentication, document signing and KYC checks through a single API.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c687ef10-b622-4348-ba54-a6c0c8167e3f.png","url":"https://www.softwareadvice.co.nz/software/472998/Scrive","@type":"ListItem"},{"name":"OpenOTP","position":6,"description":"OpenOTP is a security solution that offers identity and access management (IAM) capabilities. It is designed to simplify authentication, improve security, and reduce the risks associated with managing fragmented IAM systems. \n\nThe solution caters to organizations of all sizes. It can be deployed on-premise or as a SaaS. OpenOTP provides a comprehensive security stack, including IAM management, multi-factor authentication (MFA), network access control (NAC), and other services. The product is compatible with a range of authentication methods, such as push notifications, FIDO2/Passkeys, PKI, software/hardware tokens, and legacy methods like SMS and email.\n\nOne key feature is the integrated IAM and federation capabilities. The solution provides native integration with various identity providers and directories, including Active Directory, LDAP, Okta, and Ping Identity. It also offers advanced features like Pwned password detection, presence-based access control, electronic signatures, and compliance with regulations like NIS2.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/92bfbc26-0e1f-4be8-a972-a8448b11eab9.png","url":"https://www.softwareadvice.co.nz/software/460871/OpenOTP","@type":"ListItem"},{"name":"Authsignal","position":7,"description":"Authsignal is a B2C consumer authentication and orchestration platform. Built to deliver enterprise and mid-market teams' rapid capabilities to deploy omnichannel authentication and verification flows.\n\nEngineered to drop into existing architecture, Authsignal delivers the world's fastest path to uplifting and implementing passkeys and risk-based multi-factor authentication (MFA) flows without the need to overhaul your current identity stack, with seamless integrations for best-in-class identity platforms, such as AWS Cognito, KeyCloak, Azure AD B2C, and Identity Server, integration has never been this fast.\n\nDeploy with lightning speed utilizing pre-built authentication flows or create customized UI experiences, leveraging Authsignal's React Native UI components, headless APIs, and mobile SDKs for iOS and Android.\n\nOptimizing user experience and balancing security is a breeze with Authsignal. With our No-code rules engine, create and deploy strong customer authentication flows in minutes. A drag-and-drop interface enables product and risk teams to easily secure customer accounts and enable seamless login experiences.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/66b3fd44-57bd-455d-8c89-289481c6d180.jpeg","url":"https://www.softwareadvice.co.nz/software/412276/authsignal","@type":"ListItem"},{"name":"Teleport","position":8,"description":"Teleport is a gateway for managing access to K8s clusters, Linux & Windows servers, databases, and applications.\n\nTeleport provides access control for all your cloud resources in one place. It simplifies the management of SSH keys and passwords, as well as other credentials such as SSL/TLS certificates.\n\nTeleport works with Kubernetes clusters on AWS or GKE, but also lets you manage clusters on DigitalOcean or any other host you can connect to via SSH. It also supports the management of static web servers running NGINX or Apache2.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/adfb3088-111b-407a-9358-515210336eaf.png","url":"https://www.softwareadvice.co.nz/software/361499/teleport","@type":"ListItem"},{"name":"Yoti Authentication","position":9,"description":"Yoti Authentication provides a secure way for users to access their accounts using authentication with high-level biometric face matching. Authentication enables businesses to reduce fraud and increase customer confidence by providing a frictionless user experience, while increasing regulatory compliance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/487bc96c-0c09-497c-b84a-90105879d19c.jpeg","url":"https://www.softwareadvice.co.nz/software/386811/authentication","@type":"ListItem"},{"name":"MIRACL Trust","position":10,"description":"MIRACL Trust is an identity management solution that enables businesses and individuals to verify the identity of a user before granting access to sensitive information. MIRACL Trust eliminates the need for time-consuming, onerous multi-factor authentication by using a one-step process that is more secure and convenient than traditional methods. MIRACL Trust allows users to log in with a single click without the need for redirects or multiple devices. Additionally, the platform uses zero-knowledge-proof technology to authenticate users without revealing any sensitive information. Pricing is based on monthly subscriptions and support is extended via FAQs, email and phone.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7fd8a1be-82ef-4170-87f1-6cfb1e788796.png","url":"https://www.softwareadvice.co.nz/software/302858/miracl-trust","@type":"ListItem"},{"name":"ValidEntry","position":11,"description":"ValidEntry has been designed to simplify compliance for Web3.0 developers, both individuals and agencies, as they create new products and need to keep up with evolving compliance standards.\n\nWe pair users anonymous DeFi wallets with the users identify and then check for any criminal charges and risks associated with that identify. We securely protect that data, verifying that they are authentic and trustworthy, enabling you to allow them to utilize your applications, shifting the risks of both parties to us. \n\nValidEntry Verification creates security for developers, knowing their AML and other compliance needs are met. We offer user management options to better control who can access your products.\n\nValidEntry Verification also creates security for individual users, they are able to verify the wallet, without having to provide their identify information across the growing myriad of Web3.0 applications, this keeps their identity information secure and speeds up accessing new applications.\n\nOur integration is very simple, just a couple lines of code. We would love to show you how it works and help you determine if ValidEntry Verification is a fit for your needs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9020e24c-e7bc-4e9f-8edd-328cf2a256e0.png","url":"https://www.softwareadvice.co.nz/software/407851/validentry","@type":"ListItem"},{"name":"Oz Liveness","position":12,"description":"Oz Liveness is a facial recognition and authentication software designed to help private and public organizations across the globe lower biometric fraud risk by preventing deep fake and spoofing attacks. Organisations can successfully authenticate customers in the KYC process, and help complete onboarding and registration.\n\nOz Liveness features advanced algorithms that help users detect various common biometric spoofing forms, including the use of 3D and 2D masks and photos and photos or videos displayed on an iPad or a laptop. Its algorithms enable administrators to track dozens of parameters (presence of glare and reflections, micro-motions, pulses, and more) to discern between biometric fraud and legitimate activity. Oz Liveness can automatically detect shooting conditions, illuminate faces in the absence of light, or recommend better shooting conditions. \n\nThe technology also allows organizations to cross-check faces from photos with faces from photo IDs, detect and highlight the best-quality shots from videos, and confirm the person's identity.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d5a7af47-5907-4db0-82b6-c3829f1d6dad.png","url":"https://www.softwareadvice.co.nz/software/361213/oz-liveness","@type":"ListItem"},{"name":"Unidy","position":13,"description":"Overview:\nUNIDY is a comprehensive identity management platform designed to meet the needs of organizations across various industries, including professional sports, digital publishing, e-commerce, non-profits, and municipal services. It centralizes user data, enhances security, and ensures compliance with global data protection regulations like GDPR. With UNIDY, businesses can streamline digital interactions, protect sensitive information, and offer a seamless user experience.\n\nIdeal Users:\nUNIDY is perfect for organizations that prioritize secure and efficient user management. Whether you’re a CRM manager at a large e-commerce site, an IT administrator at a sports club, or a digital marketing leader at a publishing company, UNIDY provides the tools you need to manage user identities effectively. It’s particularly suited for businesses facing challenges with fragmented user data, high operational costs, and the need for enhanced security.\n\nUnique Benefits:\n\nCentralized User Management: UNIDY offers a unified platform to manage user identities across multiple digital channels. This reduces the complexity of handling user data, making it easier to maintain accurate and up-to-date information.\n\nEnhanced Security: With Multi-Factor Authentication (MFA) and end-to-end encryption, UNIDY provides robust protection against unauthorized access, ensuring that user data is secure at all times.\n\nSeamless Single Sign-On (SSO): Users can access various applications with a single set of credentials, simplifying the login process and reducing the risk of password fatigue. This not only improves security but also enhances the overall user experience.\n\nCompliance with Data Protection Regulations: UNIDY is fully compliant with major data protection laws, including GDPR. The platform offers features like transparent consent management and detailed audit logs, helping businesses meet regulatory requirements with ease.\n\nCustomizable User Interfaces: Businesses can create a tailored user experience by customizing login pages and user dashboards to reflect their brand identity. This ensures a consistent and engaging experience for all users.\n\nScalability: As your business grows, UNIDY scales with you. The platform supports expanding user bases and more complex digital environments, ensuring that performance and security are never compromised.\n\nSeamless Integration: UNIDY integrates easily with existing systems, including CRM, CMS, and ticketing platforms. The platform’s compatibility with standards like OpenID Connect and OAuth2 ensures smooth interoperability across your tech stack.\n\nDetailed Analytics and Reporting: Gain valuable insights into user behavior, engagement, and security metrics with UNIDY’s advanced analytics and reporting tools. These insights help you make data-driven decisions to optimize your identity management strategies.\n\nHumanized Support:\n\nDedicated Customer Support: UNIDY offers dedicated support to ensure that your business can maximize the platform’s capabilities. From onboarding to ongoing management, our support team is here to help you every step of the way.\n\nComprehensive Training Resources: To help you get the most out of UNIDY, we provide a range of training resources, including webinars, tutorials, and detailed documentation. Our goal is to empower your team to use the platform effectively and efficiently.\n\nContinuous Updates and Innovation: UNIDY is committed to staying at the forefront of identity management technology. We regularly release updates that introduce new features and enhancements, ensuring that your business always has access to the latest tools and capabilities.\n\nWhy Choose UNIDY?\nUNIDY stands out for its ability to deliver a secure, seamless, and scalable identity management solution. It’s the ideal choice for organizations that need to centralize user data, enhance security, and comply with stringent data protection regulations, all while providing an excellent user experience.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4534f477-18ad-4438-9695-f8ec5e5c192f.jpeg","url":"https://www.softwareadvice.co.nz/software/521625/Unidy","@type":"ListItem"},{"name":"Kinde","position":14,"description":"The fully integrated developer platform. Modern auth, access management and billing for engineers.\n\nAuthentication happens at some of the most important, and highly impactful, places in your customers' journey. Take control of user authorization with a passwordless authentication, social integrations, and enterprise SSO. Support the branding of all your customers with custom domains and a fully customisable UI by bringing your own pages and designs. Integrate with complex requirements and run your own code during authentication using our powerful workflows. Organise all your business customers using organizations to easily segergate them and fine tune the authentication experience to their individual needs.\n\nMonetize your ideas quickly with Kinde's billing tools. Create subscription plans and collect revenue effortlessly. Kinde adapts to your business model, supporting B2C, B2B, and B2B2C with robust organization management and flexible billing logic that scales with your customers.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f925249f-50b2-4367-b34e-7a0d38c88f50.jpeg","url":"https://www.softwareadvice.co.nz/software/434014/kinde","@type":"ListItem"},{"name":"SuperTokens","position":15,"description":"SuperTokens is an open source user authentication solution backed by Y-Combinator and one of the fastest growing OS startups of 2022 (Q1). \n\nWe're an alternative to Auth0, Firebase Auth and AWS Cognito. Using our SDKs developers around the world can add secure, hassle free authentication to their website or mobile application in less than a day.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/48d48f77-4e40-4594-9e60-ea75bf4623aa.png","url":"https://www.softwareadvice.co.nz/software/185869/supertokens","@type":"ListItem"},{"name":"Hirsch Velocity Software","position":16,"description":"Hirsch Velocity Software is a security management platform designed to help government institutions and businesses in the aviation, education and healthcare industries enforce and streamline access control across multi-location facilities. Administrators can maintain audit trails and handle security operations in compliance with industry regulations. \n\n\nSupervisors can use Hirsch Velocity Software to monitor the activities of personnel across control doors, gates, turnstiles, elevators and other building equipment. It provides a web console, which enables managers to view new enrollments, control the issuance of credentials and set up system alarms for forcible entry, door open too long (DOTL) or other scenarios. Additionally, users can schedule various system tasks and export generated reports in multiple formats.\n\n\nHirsch Velocity Software can be operated on-premise or hosted in the cloud. Pricing is available on request and support is extended via documentation, phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9027e7bb-4f18-4fe1-a171-a8e515db98ea.png","url":"https://www.softwareadvice.co.nz/software/111798/hirsch-velocity-software","@type":"ListItem"},{"name":"Facephi Identity Platform","position":17,"description":"Facephi Identity Platform is a multi-biometric platform, which allows the client to design any digital onboarding and authentication process, which is changeable according to their needs. \nDigital identity verification on a tailor-made platform, which provides the tools to be able to adapt technology into each one of your particular needs. A consumer-focused platform that provides both customers and end users with the most secure verification processes. All our biometric solutions in one to make it more accessible and more efficient.  \nFacephi Identity Platform is made up of several modules – Design studio, Operations, Anti-fraud, User Experience, Compliance and Artificial Intelligence – fulfilling all these needs. \n\n•\tPersonalise identity flows on-line and in real time \n•\tSelect among multiple biometrics \n•\tChoose architecture deployment options \n•\tAccess the dashboard with all the transaction logs \n•\tOffer video onboarding and on-line video assistance to end users \n•\tVerify documents automatically \n•\tObfuscate user data to ensure privacy \n•\tCustomise security parameters \n•\tImprove the document database \n•\tOptimise the user experience thanks to statistics","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3d8168d5-99f1-4b3a-be2b-530ffa9e2d3a.png","url":"https://www.softwareadvice.co.nz/software/253712/inphinite","@type":"ListItem"},{"name":"Atlassian Access","position":18,"description":"Atlassian Access is designed for large enterprises and helps streamline access throughout Atlassian cloud applications. With single sign-on (SSO), admins can set up one-click access to company apps and enable employees to deploy software. It allows users to enforce two-step verification (2FA) and revoke unauthorized tokens. Admins can also monitor usage and customize multiple authentication policies using a single dashboard, while reviewing audit logs and product reports. Integrations with other CASBs, 24/7 support, and customizable billing are some of the other key features offered by Atlassian Access.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/96f403cb-590e-4582-9c16-e390449d2daa.png","url":"https://www.softwareadvice.co.nz/software/431253/atlassian-access","@type":"ListItem"},{"name":"Soffid IAM","position":19,"description":"Soffid IAM is a converged IAM platform that brings together Access Management (AM), Identity Governance (IGA), Identity Risk & Compliance (IRC) and Privileged Account Management (PAM) into one comprehensive solution - aimed at bringing your security and IT teams together. Soffid is fully scalable, allowing you to start small and grow as needed.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/333f80f6-7a9d-4828-924d-71638a2bd3af.png","url":"https://www.softwareadvice.co.nz/software/293928/soffid-iam","@type":"ListItem"},{"name":"Sima","position":20,"description":"Sima is a cloud-based authentication platform that provides highly secure, seamless access control for companies and organizations. Sima helps users establish schedules for visitors' access to their sites, allowing them to grant permission during specific hours and refuse it at others. \n\nThe system's database query feature makes it easy to see when people arrived at or left a facility—allowing users to track the whereabouts of everyone who was present. Additionally, it offers customer support via phone, email, FAQs, chat and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e35dfe01-2023-4619-bc7f-5a0eda8d705c.png","url":"https://www.softwareadvice.co.nz/software/360785/sima","@type":"ListItem"},{"name":"Specops Secure Service Desk","position":21,"description":"Secure Service Desk provides multi-factor authentication for your service desk, allowing businesses to verify the accounts of users with existing data in an active Directory.  Users can send a one-time code to the mobile number associated with the user’s account or even use existing authentication services like Duo Security, Okta and PingID to verify callers.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/aa11ebfd-e303-4162-8484-d5dbba1caff2.jpeg","url":"https://www.softwareadvice.co.nz/software/355802/specops-secure-service-desk","@type":"ListItem"},{"name":"TeleSign Platform","position":22,"description":"TeleSign connects and protects online experiences with sophisticated customer identity and engagement solutions to enables businesses to register accounts, verify phone numbers, identify users, prevent fraud, streamline customer engagement and more.\n\nThrough APIs that deliver user verification, data insights, and communications TeleSign solves today’s unique customer challenges by bridging your business to the complex world of global telecommunications.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/56567ea9-01d7-4dae-b629-eb582aed613c.png","url":"https://www.softwareadvice.co.nz/software/368816/telesign-platform","@type":"ListItem"},{"name":"CyLock MFA","position":23,"description":"CyLock MFA is a cloud-based solution that provides mobile-centric authentication for all industries, protecting Applications, Network Devices, VPNs, and Desktop Login against modern cyber threats.\n\nCyLock MFA provides a strong OOB authentication mechanism using Public Key Cryptography. Users can set up authentication modes - Push, Push+PIN, Push+Fingerprint. The platform is secure as the PIN is neither stored in the mobile app nor in the server. It provides secured CR-OTP authentication for business continuity and account lock to prevent further malicious attacks and account takeover.\n\nWith CyLock MFA, users get real-time fraud alerts using Web-hooks for risk assessment and mitigation. It also provides geo-fencing and location-based authentication for restricted asset access.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6a59cb25-e8bd-4906-9b3d-d40f07cfd7e1.png","url":"https://www.softwareadvice.co.nz/software/316287/cylock-mfa","@type":"ListItem"},{"name":"Wultra Mobile-First Authentication","position":24,"description":"Wultra Mobile-First Authentication is a passwordless authentication solution for banks and fintech that offers strong customer authentication (SCA) compliance with the PSD2 (Revised Payment Services Directive) regulations, ensuring a secured payment environment.\n\nWultra Mobile-First Authentication enables access to digital channels through biometric authentication, such as Face ID or Touch ID. The solution also supports multi-factor signatures with dynamic linking,","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/46dea9b6-38a6-4212-98bf-f728b009f8e3.jpeg","url":"https://www.softwareadvice.co.nz/software/411681/powerauth","@type":"ListItem"},{"name":"The OptimalCloud","position":25,"description":"The OptimalCloud is an identity and access management solution designed to help enterprises handle access to various applications using single sign-on (SSO) authentication technology. The platform includes audit trails, which enable organizations to view and monitor user activities across applications, groups and devices on a unified portal.\n\n\nThe OptimalCloud enables users to assign tasks to teams, reset passwords, submit registration requests, and approve workflows. It offers a variety of features such as a self-service portal, mobile device push authentication, multiple users, activity tracking, custom configuration and more. Additionally, the built-in multi-factor authentication functionality lets administrators manage access to applications on internal or external networks through one-time passwords and text-based verifications.\n\n\nThe OptimalCloud facilitates integration with various third-party applications including Dropbox, Zoho, Amazon Web Services, Confluence, CenturyLink and more. Pricing details are available on request and support is provided via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/76e2f4f9-c80f-4f81-9e17-03bb8768ad26.png","url":"https://www.softwareadvice.co.nz/software/317728/the-optimalcloud","@type":"ListItem"}],"numberOfItems":25}
</script>
