Top 15 TransAuth Alternative and Similar Softwares | Dec 2024

75% of network intrusions in 2013 involved a weak, lost or stolen credential.
TransAuth wants to make it easier to prevent the damage and cost associated with data breaches due to compromised passwords .
Automatic Multifactor Authentication is faster, easier and more comprehensive than competing solutions.

1. LemonLDAP::NG

LemonLDAP::NG LemonlLDAP::NG is a modular Web-SSO based on Apache::Session modules. It simplifies the build of a protected area with a few changes in the application. It manages both authentication and authorization and provides headers for accounting. So you can have a full AAA protection for your web space as described below.......

2. Openam

Openam OpenAM provides open source Authentication, Authorization, Entitlement and Federation software. Through OpenAM, the community actively continues development of OpenSSO.OpenAM provides core identity services to simplify the implementation of transparent single sign-on (SSO) as a security component in a network infrastructure. OpenAM provides the foundation for integrating diverse web applications that......

3. Persona

Persona Persona (formerly BrowserID) allows you to sign in to sites using an email address you choose. So, instead of having to manage multiple usernames and passwords across your favorite sites and devices, you’ll have more time to do the important stuff. Persona lets you get started with just your email......

4. Exabeam

Exabeam Threats are going unnoticed. SIEM technologies today aren’t capable of detecting subtle anomalies and tracking entire attack chains — missing threats and flooding you with false positives.Introducing User Behavior Intelligence. By combining session tracking, behavior analysis and risk scoring, we help you automatically detect cyber attacks and improve operational security......

5. Fortscale

Fortscale Fortscale is an innovative cyber security company, comprised of an enthusiastic team of cyber security, big data analytics and intelligence experts.While you are reading these lines, we are working hard on developing a new analytics platform to help you protect your organization better than ever. Chances are, your organization is......

6. Qualys Cloud Platform

Qualys Cloud Platform Qualys, Inc., is the most widely-deployed information security and compliance cloud solution in the world with over 7,700 customers including a majority of the Forbes Global 100 and a majority of the Fortune 100. The Qualys Cloud Platform and integrated suite of solutions helps organizations simplify security operations and lower......

7. CNTLM

CNTLM Cntlm - Fast NTLM authentication proxy accelerator with tunneling, written in pure C......

8. Facebook Connect

Facebook Connect Facebook Connect is a set of APIs from Facebook that enable Facebook members to log onto third-party websites, applications, mobile devices and gaming systems with their Facebook identity. While logged in, users can connect with friends via these media and post information and updates to their Facebook profile. Developers can......

9. CAS

CAS CAS provides enterprise single sign-on service:An open and well-documented protocolAn open-source Java server componentA library of clients for Java, .Net, PHP, Perl, Apache, uPortal, and othersIntegrates with uPortal, Blackboard, Bannner, PeopleSoft, Drupal, Canvas, Liferay, Moodle and othersCommunity documentation and implementation supportAn extensive community of adopters......

10. Onion ID

Onion ID Onion ID is a privilege-management solution that uses machine learning and active behavior analysis to detect suspicious account activity and prevent unauthorized access in real time. Our customers never have to worry if an employee's account is misused, or compromised by a hacker trying to access proprietary information. Access Management......

11. FireEye Threat Analytics Platform

FireEye Threat Analytics Platform Information technology systems and applications produce a continuous stream of event and log details that can reveal suspicious behavior. Threat analytics offers the ability to proactively filter through huge amounts of data and identify real threats. The Threat Analytics Platform (TAP) applies threat intelligence, expert rules, and advanced security data......

12. VBLock

VBLock VBLock is a secure, customization alternative to the built-in Windows lock screen. Its exclusive highlights not found in other programs include securely signing in with two-step authentication, a beautiful Aero Glass background, and a simple, clean interface.......

13. OAuth

OAuth OAuth is an open standard for authorization. It allows users to share their private resources (e.g. photos, videos, contact lists) stored on one site with another site without having to hand out their credentials, typically supplying username and password tokens instead. Each token grants access to a specific site (e.g.,......

14. Palo Alto AutoFocus

Palo Alto AutoFocus ACTIONABLE INTELLIGENCE HAS ARRIVED.Introducing AutoFocus™. Available exclusively to Palo Alto Networks customers through a limited-time Community Access program.The challenge with too much dataSecurity practitioners have been inundated with an overwhelming volume of security data and alerts, making it virtually impossible to quickly identify and respond to advanced, targeted threats before......

15. Portadi

Portadi Portadi is a SaaS service that allows workplace teams to manage and control access to cloud apps (such as Zendesk, MailChimp, Salesforce or Twitter). Portadi provides visibility into how often users use apps and allows companies to monitor and control cloud spend. For users, Portadi replaces all passwords and usernames......