Browse Software
List Your Product
Loading...
Okta logo

Okta

  Add to Compare

87% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Veriff logo
View Details

89% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Idaptive Next-Gen Access logo
View Details

Overview

Description Veriff is setting the standard for secure and seamless identity verification. By combining cutting-edge AI technology with human verification, Veriff offers a robust suite of solutions, including Identity and Document Verification, Proof of Address checks, and Biometric Authentication. Businesses benefit from streamlined KYC Onboarding and AML Screening processes, ensuring compliance without compromising user experience. The platform supports features like Age Validation and Age Estimation which are critical for regulatory compliance and building trusted digital communities. With Veriff, users simply capture a photo of their government-issued ID and a selfie, completing verification on any device, whether iOS, Android™, or the web. Real-time feedback and automatic document type detection minimize errors and speed up the process. Veriff’s solutions drive efficiency, fraud protection, and operational intelligence, ensuring businesses onboard genuine customers while mitigating risks using advanced Fraud protection systems and Database Verification Checks. Elevate your customer experience and protect their business with Veriff’s proven tools. Read more Idaptive provides Next-Gen Access solutions to enterprises to protect them from unauthorized data access, cyber-attacks, and data breaches. It follows a Zero Trust and Security First approach to regulate access of each of the users by verifying them and validating their devices. The Multi-Factor Authentication creates an additional layer of security before any access is granted to applications. The software can monitor the network, device, and learn user behavior context to assign risk levels to each accessed event. By securely authenticating every access with a wide range of supported factors that also includes FIDO2 keys, virtual and hardware tokens, etc, Idaptive eliminates the need of using passwords. Admins can route application access requests, create application accounts, revoke access whenever necessary, etc easily. Enterprises can frame centralized policy management and secure endpoints that are used to access enterprise resources. With device security management, institutions can also extend enterprise authentication services to the cloud without duplicating identities. One can even select trusted devices to limit access to certain information and applications. If needed, data sets can be locked and deleted within minutes in the case of cyberattacks. Besides, there are several other security features as well that can be implemented to build robust cybersecurity within an organization. Read more
Pricing Options
  • Free Trial Available
  • Starts at $0.8. Offers Custom plan.
  • Free Trial Available
SW Score & Breakdown

87% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    95%
  • Reviews
    72%
  • Momentum
    65%
  • Popularity
    80%

89% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    100%
  • Reviews
    83%
  • Momentum
    60%
  • Popularity
    75%
SaaSworthy Awards
Not Available
# 4 Highly Rated # 4 Most Popular

Features

Total Features
9 Features
11 Features
Common Features for All
    API Access Management Ensures that calls with authenticated access can enter APIs
    Access Request Management Helps to view and manage access requests submitted by the personnel
    Account Management Helps to manage user accounts within organisations
    Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed
    Multi-factor Authentication Uses more than one method to verify a user's identity for a login
    Password Management Enables the administrator to manage, authenticate and reset passwords
    Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys
    Role Management Helps regulate access to systems, based on individual roles
    Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
    Social Sign On Allows users to sign on using credentials of social networking services
    User Activity Monitoring Monitors and records user activities in the enterprise
  • + 6 More - Show Less
    • API Access Management Ensures that calls with authenticated access can enter APIs
      Access Request Management Helps to view and manage access requests submitted by the personnel
      Account Management Helps to manage user accounts within organisations
      Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed
      Multi-factor Authentication Uses more than one method to verify a user's identity for a login
      Password Management Enables the administrator to manage, authenticate and reset passwords
      Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys
      Role Management Helps regulate access to systems, based on individual roles
      Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
      Social Sign On Allows users to sign on using credentials of social networking services
      User Activity Monitoring Monitors and records user activities in the enterprise
  • + 8 More - Show Less
  • Technical Details

    Organization Types Supported
    • Individuals
    • Freelancers
    • Large Enterprises
    • Medium Business
    • Small Business
    • Individuals
    • Freelancers
    • Large Enterprises
    • Medium Business
    • Small Business
    Platforms Supported
    • SaaS/Web/Cloud
    • Mobile - Android
    • Mobile - iOS
    • SaaS/Web/Cloud
    • Mobile - Android
    • Mobile - iOS
    Modes of Support
    • 24/7 (Live rep)
    • Business Hours
    • Online
    • 24/7 (Live rep)
    • Business Hours
    • Online
    API Support
    • Available
    • NA

    Reviews & Ratings

    User Rating
    1.8/5 111 user ratings
    4.5/5 127 user ratings
    Rating Distribution
    • Excellent

      17.1%
    • Very Good

      0%
    • Average

      3.6%
    • Poor

      3.6%
    • Terrible

      75.7%
    • Excellent

      59.1%
    • Very Good

      33.9%
    • Average

      6.3%
    • Poor

      0.8%
    • Terrible

      0%
    User Sentiments

      Fast Verification Process, Seamless User Experience, Accurate Verification Results, Easy to Use

      Unreliable Verification Process, Privacy Concerns, Poor Customer Support, Limited ID Acceptance

      Secure Password Management, Single Sign-On (SSO), Easy Implementation, Extensive Integrations

      Mobile App Issues, Limited Customization Options, Inadequate Reporting Features, Occasional Technical Glitches

    Review Summary

    Veriff, an identity verification service, is a controversial choice for many users. While some reviews praise its speed and ease of use, particularly in the context of online transactions and account creation, a significant portion of user feedback is overwhelmingly negative. Veriff is criticized for its intrusive practices, requiring sensitive information like driver's licenses and selfies, leading to privacy concerns and accusations of identity theft. Users also report frequent technical difficulties, poor customer support, and difficulty verifying accounts, often resulting in lost rewards or access to services. Ultimately, Veriff appears to be a highly polarizing service with a lack of transparency and a questionable track record.

    Reviewers praise Idaptive's user-friendliness, highlighting its intuitive interface and straightforward setup process. They also commend its robust security features, including multi-factor authentication and single sign-on, which enhance overall security posture. Additionally, reviewers appreciate Idaptive's seamless integration with existing IT infrastructure, enabling smooth deployment and centralized management. However, some users have expressed concerns regarding occasional performance issues and limited customization options.

      Read All User Reviews Read All User Reviews

    AI-Generated from the text of User Reviews

    Pricing

    Pricing Options
    • Free Trial Available
    • Starts at $0.8. Offers Custom plan.
    • Free Trial Available
    Pricing Plans
    Monthly Plans Annual Plans

    Essential (Self-Serve) $0.80 $0.80

    Plus (Self-Serve) $1.39 $1.39

    Premium (Self-Serve) $1.89 $1.89

    Enterprise Custom

    Single Sign-on Others

    Multi-factor Authentication Others

    Lifecycle Management Others

    Mobile Devices Others

    Endpoint Management Others

     
    View Detailed Pricing
    View Detailed Pricing

    Screenshots & Videos

    Videos Video Thumbnail
    + 1 More
    Video Thumbnail
    + 2 More

    Vendor information

    Company Details Located in: Tallinn, Estonia Founded in: 2015 Located in: Santa Clara, California Founded in: 2018
    Contact Details

    +372 607 5050

    https://www.veriff.com/

    Not available

    https://www.idaptive.com/

    Social Media Handles

    We understand SaaS better

    SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

    icon

    Buyers

    Looking for the right SaaS

    We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

    icon

    Makers

    Want more customers?

    Our experts will research about your product and list it on SaaSworthy for FREE.

    Get Listed