Biomio bridges the identity verification techniques and standards to provide authentication and access control platform to be used by the enterprise to solve challenges around logins and information rights management as required for compliance and good practices.
Biomio provides password-optional authentication that works by detecting availability for the authentication devices (mobile, wearables, USB tokens, etc) and leveraging their capabilities. It comes with flexible policies on the administrator level and choices of authentication methods by the end users, achieving high degree of usability and user adoption. ...
10Duke Identity Provider is an enterprise identity management solution, provides seamless SSO access, supports federated identity, AD, Azure AD, LDAP, social sign-in and others.Popular online services such as Google ID or Facebook Login have changed expectations regarding the ease with which a user expects to be able to access your......
LemonlLDAP::NG is a modular Web-SSO based on Apache::Session modules. It simplifies the build of a protected area with a few changes in the application. It manages both authentication and authorization and provides headers for accounting. So you can have a full AAA protection for your web space as described below.......
OpenAM provides open source Authentication, Authorization, Entitlement and Federation software. Through OpenAM, the community actively continues development of OpenSSO.OpenAM provides core identity services to simplify the implementation of transparent single sign-on (SSO) as a security component in a network infrastructure. OpenAM provides the foundation for integrating diverse web applications that......
Application that joins Linux, Unix, and Mac machines to Microsoft Active Directory and securely authenticates users with their domain credentials.* Joins non-Windows systems to Active Directory* Authenticates users with single user name / password* Enforces same policies for all Active Directory users* Supports multiple forests with one-way and two-way cross......
TeleSign delivers account security and fraud prevention with two-factor authentication based on each user’s Mobile Identity (phone number, device and behavior) and driven by real-time, global intelligence, including reputation scoring and device data.TeleSign solutions address the full spectrum of account security – registration, access, usage and recovery – while it......
With a click of your camera, organize your wallet on your smartphone • Store ID, payment & other cards• Lost wallet? No problem. We’ll help cancel or replace credit & debit cards*• One-time single bureau credit score for $0.99• Easy access with Touch IDPaid LifeLock members can access identity protection......
Fortscale is an innovative cyber security company, comprised of an enthusiastic team of cyber security, big data analytics and intelligence experts.While you are reading these lines, we are working hard on developing a new analytics platform to help you protect your organization better than ever. Chances are, your organization is......
Qualys, Inc., is the most widely-deployed information security and compliance cloud solution in the world with over 7,700 customers including a majority of the Forbes Global 100 and a majority of the Fortune 100. The Qualys Cloud Platform and integrated suite of solutions helps organizations simplify security operations and lower......
Information technology systems and applications produce a continuous stream of event and log details that can reveal suspicious behavior. Threat analytics offers the ability to proactively filter through huge amounts of data and identify real threats. The Threat Analytics Platform (TAP) applies threat intelligence, expert rules, and advanced security data......
Threats are going unnoticed. SIEM technologies today aren’t capable of detecting subtle anomalies and tracking entire attack chains — missing threats and flooding you with false positives.Introducing User Behavior Intelligence. By combining session tracking, behavior analysis and risk scoring, we help you automatically detect cyber attacks and improve operational security......
Cntlm - Fast NTLM authentication proxy accelerator with tunneling, written in pure C......
Keycloak is an open source identity and access management solution......
VBLock is a secure, customization alternative to the built-in Windows lock screen. Its exclusive highlights not found in other programs include securely signing in with two-step authentication, a beautiful Aero Glass background, and a simple, clean interface.......
Facebook Connect is a set of APIs from Facebook that enable Facebook members to log onto third-party websites, applications, mobile devices and gaming systems with their Facebook identity. While logged in, users can connect with friends via these media and post information and updates to their Facebook profile. Developers can......
IBM® Security QRadar® SIEM consolidates log source event data from thousands of devices endpoints and applications distributed throughout a network. It performs immediate normalization and correlation activities on raw data to distinguish real threats from false positives. As an option, this software incorporates IBM Security X-Force® Threat Intelligence which supplies......
About | Terms |
About UsContact Us | TpSort ScorePrivacy PoliceDMCA Policy |
© 2015-2016 www.tpsort.com, Inc