Browse Software
List Your Product
Loading...
Showing 1 - 20 of 31 Products
Google Authenticator logo

Google Authenticator

Google Authenticator - Apps on Google Play Write a Review
Visit Website

Google Authenticator generates 2-Step Verification codes on your phone. 2-Step Verification provides stronger security for your Google Account by requiring a second step of verification when you sign in. In addition to your password, you’ll also need a code generated by the Google Authenticator app on your phone. Learn more about 2-Step Verification: https://g.co/2step Features: * Generate verification codes without a data connection * Google Authenticator works with many providers & accounts * Dark theme available * Automatic setup via QR code * Transfer accounts between devices via QR code Permission notice: Camera: Needed to add accounts using QR codes

Read more
Visit Website
Azure Multi-Factor Authentication logo

Azure Multi-Factor Authentication

Azure Active Directory | Microsoft Azure Write a Review
Visit Website

Azure Active Directory provides an identity platform with enhanced security, access management, scalability, and reliability.

Visit Website
Salesforce Authenticator logo

Salesforce Authenticator

Mobile App Security Write a Review
Visit Website

Salesforce Authenticator is an intelligent, mobile two-factor authentication app that delivers enterprise-class security, while providing simplicity and convenience to your end users. With Salesforce Authenticator, it’s even easier for employees to access business-critical apps through simple push notifications.

Visit Website
Google Security Key Enforcement logo

Google Security Key Enforcement

Titan Security Key  |  Google Cloud Write a Review
Visit Website

Provides phishing-resistant 2nd factor of authentication for high-value users. Works with many devices, browsers & services. Supports FIDO standards.

Visit Website
ESET Secure Authentication logo

ESET Secure Authentication

Company identity & data protection | ESET Write a Review
Visit Website

ESET Secure Authentication is an easy-to-use and effective mobile-based multi-factor (MFA) authentication solution. It protects organizations from weak passwords and unauthorized access. The solution provides smooth management of users and fast roll-out.

Visit Website
Authy logo

Authy

Authy | Two-factor Authentication (2FA) App & Guides Write a Review
Visit Website

Two-factor authentication (2FA) adds an additional layer of protection beyond passwords. Download our free app today and follow our easy to use guides to protect your accounts and personal information.

Visit Website
RSA SecurID® Access logo

RSA SecurID® Access

Identity Management – Access Management – RSA Write a Review
Visit Website

RSA SecurID Access is an enterprise-grade multi-factor authentication and access management solution. It protects all of your resources with a wide range of authentication methods.

Visit Website
Yubico logo

Yubico

Discover YubiKeys | Strong Two-Factor Authentication for Secure Login Write a Review
Visit Website

Meet the YubiKey. The #1 Security Key, loved by millions around the world. YubiKey makes secure login easy. Just plug it in and touch the gold button.

Visit Website
HID DigitalPersona logo

HID DigitalPersona

HID® DigitalPersona® Software Write a Review
Visit Website

DigitalPersona leverages an array of easily deployable authentication methods. Users can quickly and easily gain access to their cloud applications, such as Microsoft 365.

Visit Website
AuthPoint Multi-Factor Authentication logo

AuthPoint Multi-Factor Authentication

Multi-Factor Authentication | WatchGuard Technologies Write a Review
Visit Website

AuthPoint multi-factor authentication (MFA) from WatchGuard provides the security you need to protect your assets, accounts, and information. Try it now.

Visit Website
Centrify Multi-factor Authentication logo

Centrify Multi-factor Authentication

Multi Factor Authentication | MFA Solution | Centrify Write a Review
Visit Website

Centrify supports multi-factor authentication (MFA) for various vault operations such as account password checkout or privileged account login. Learn more!

Visit Website
Rublon logo

Rublon

Secure All Your Users, Applications Using Rublon Multi-Factor Authentication - Rublon Write a Review
Visit Website

Last updated on December 9th, 2020Protect your data by ensuring secure access to your networks, servers and applications for all users, on all their devices, anywhere they are. Reduce the risk of a data breach and meet regulatory compliance requirements. Rublon is modern multi-factor authentication for organizations of all sizes. Maximize Security, Minimize Risk – […]

Read more
Visit Website
TeleSign Phone Number Verification API logo

TeleSign Phone Number Verification API

TeleSign Phone Number Verification API for SMS & Voice Write a Review
Visit Website

Delivers patented phone-based verification and two-factor authentication using a time-based, one-time passcode sent over SMS or voice message.

Visit Website
Micro Focus NetIQ Advanced Authentication logo

Micro Focus NetIQ Advanced Authentication

NetIQ History and Product Links | Micro Focus Write a Review
Visit Website

NetIQ Advanced Authentication is a standards-based framework built to meet today's authentication challenges. Its open architecture is designed to enable organizations to protect their applications and assets.

Visit Website
SecurEnvoy Multi-Factor Authentication (MFA) logo

SecurEnvoy Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA) | SecurEnvoy Write a Review
Visit Website

SecurEnvoy's MFA solution is a secure and flexible solution for layered data and privacy security, Our Multi-Factor Authentication solution integrates seamlessly with Microsoft’s Active Directory and other LDAP solutions.

Visit Website
Protectimus logo

Protectimus

Two Factor Authnetication Made Simple Write a Review
Visit Website

Protectimus two-factor authentication solution can be integrated quickly and easily with any business, enabling secure access to an unlimited number of web systems or applications. With built-in features such as Geographic Filter and Time Filter, administrators have the ability to control when and where users are allowed access to specific resources. Notifications about important events in the system can also be received via SMS-messages or email. In addition, Protectimus supports a variety of tokens for various platforms, including its own mobile multi-token Protectimus for both Android and iOS devices, as well as tokens from other manufacturers. This ensures that businesses have the most secure authentication solution available that is both user friendly and cost effective. Start protecting business today with Protectimus two-factor authentication solution.

Read more
Visit Website
Hydra Identity Management logo

Hydra Identity Management

ORY - Open Source OAuth2 and OpenID Connect Access Control & API Security Write a Review
Visit Website

Implement OAuth 2.0 and OpenID Connect in minutes with open source from ORY. Works in both new and existing systems.

Visit Website
BehavioSec logo

BehavioSec

Supercharge your Multi-factor authentication Write a Review
Visit Website

BehavioSec analyzes behavior so your users can authenticate just by being themselves, while you pinpoint bots, breached credentials and prevent criminals from compromising accounts. Protect new applications and existing accounts from fraud and theft without friction or churn.Achieve strong multifactor authentication without challenges, step-ups, OTPs, pushes or friction.​

Read more
Visit Website
Tecalis Authentication logo

Tecalis Authentication

Login, Identify, Confirm, Protect Write a Review
Visit Website

A strong multi-factor authentication solution with advanced biometrics. Maximum security and frictionless access to products, services and systems. Manage credentials and provide fast, secure access to your customers, users and collaborators with the Tecalis KBA (Knowledge-Based Authentication) solution. The authentication process for product, service, and digital platform access must be robust and agile at the same time.

Read more
Visit Website
CryptoPhoto logo

CryptoPhoto

Features - cryptophoto.com Write a Review
Visit Website

Easily protect all customers against modern attacks and scams.

Visit Website

Overview

Multi-Factor Authentication (MFA) Software is a security technology designed to enhance the protection of user identities and access to systems, applications, and data. It requires users to provide two or more verification factors to gain access, significantly increasing the security threshold compared to traditional single-factor authentication methods like passwords alone. Multi-factor authentication software significantly improves security compared to traditional password-only authentication by adding additional layers of verification. MFA enhances security by requiring multiple forms of verification, making it much more difficult for attackers to gain unauthorized access compared to relying solely on passwords. While traditional passwords are easy to use, they are vulnerable to various threats, whereas MFA provides a robust defense against modern cyber threats.

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed