Security Authentication Vendors

Security Authentication Vendors – Full list

Authentication Vendors – Full list

CyberDB provides scouting services for companies who are looking for technology partnership or M&A opportunities in the Cyber Industry.

The following is the full list of Authentication Vendors. Vendors in this domain cover one or more of the following Cyber Security capabilities: Authentication, Contextual authentication, Tokens Authentication, Biometric, Two-Factor Authentication and Multi-factor Authentication.

This Authentication vendors list is managed and maintained by CyberDB, including additional information on their Cyber Security and Cyber Authentication products.
Please contact CyberDB for any further clarifications.

Vendor 

Website

Country

Akamai Technologieshttps://www.akamai.com/
AuthLitehttp://AuthLite.com
Watchdata Technologieshttp://www.watchdata.com.cn
BlackBerryhttp://www.BlackBerry.com
Bundesdruckerei GmbHhttp://www.bundesdruckerei.de/en
Centrifyhttp://www.centrify.com
Daonhttp://www.daon.com
Detack GmbHhttp://www.detack.de/
Digitronic Computersysteme GMBHhttp://www.digitronic.net/
Egis Technology Inc.http://www.egistec.com
Engage Communicationhttp://www.engage-black.com/
ENTERSEKThttps://www.entersekt.com/
Entrust Datacardhttps://www.entrust.com/
Feitian Technologieshttp://www.ftsafe.com/
ForgeRockhttps://www.forgerock.com/
Fortinet, Inc.https://www.fortinet.com/
GlobalSignhttps://www.globalsign.com/en/
IBM Corporationhttps://www.ibm.com/us-en/
HID Globalhttp://www.hidglobal.com
HOB GmbH & Co. KGhttp://www.hobsoft.com
Interrmedia.net, Inc.https://www.intermedia.com/
iovation – TransUnionhttps://www.transunion.com/solution/truvalidate
Keypascohttps://www.keypasco.com/
Early Warninghttps://www.earlywarning.com/
Oktahttps://www.okta.com/
OneLoginhttps://www.onelogin.com
Ping Identityhttps://www.pingidentity.com/en.html
QGroup GmbHhttps://www.qgroup.de/security/index.php/de/
SecureAuthhttp://www.secureauth.com
SecurEnvoyhttps://www.securenvoy.com/
SecuTech Solutionshttps://www.esecutech.com/
Swivel Securehttp://www.swivelsecure.com
TeleSign Corporation (Acquired by BICS)http://www.TeleSign.com
Thaleshttps://cpl.thalesgroup.com/
Trustwavehttps://www.trustwave.com
Utimaco Inc.http://hsm.utimaco.com
OpenSpan VASCOhttps://www.onespan.com/
WatchGuard Technologieshttps://www.watchguard.com/
FUDO Securityhttps://fudosecurity.com/en/
Yubicohttps://www.yubico.com/
AdNovumhttp://www.adnovum.ch/
Alladin-RDhttp://aladdin-rd.ru/en/
BioCatchhttp://www.biocatch.com/
BKAVhttps://www.bkav.com/
Revelockhttps://www.revelock.com/en/
CionSystemshttp://www.cionsystems.com/
Clavisterhttps://www.clavister.com/
Cloud Flarehttps://www.cloudflare.com/
Digital Handshttps://www.digitalhands.com/
EMC (RSA)https://www.rsa.com/en-us
Wave Systemshttp://wavesys.com/products/wave-self-encrypting-drive-management
AuthenTrendhttp://authentrend.com/
Cardinal Commercehttps://www.cardinalcommerce.com/
CDNetworkshttps://www.cdnetworks.com/
Device Authorityhttp://www.deviceauthority.com/
Exostarhttps://www.exostar.com/
Identity Automationhttps://www.identityautomation.com/
ilantushttps://www.ilantus.com/
imprivatahttps://www.imprivata.com/
infingate UKhttps://www.infinigate.co.uk/
information security exchangehttp://www.infosecurityeurope.com/
MENTIS Softwarehttps://www.mentisinc.com/
Mi-Tokenhttp://mi-token.com/
my1loginhttps://www.my1login.com/
NuCaptchahttp://www.nucaptcha.com/
saaspasshttps://www.saaspass.com/
Securemetric Technologyhttp://www.securemetric.com/
Sensible Visionhttp://www.sensiblevision.com/home.aspx
Tascenthttps://tascent.com/
Technology Nexushttps://www.nexusgroup.com/en/
TrustedSechttps://www.trustedsec.com/
vkeyhttps://www.v-key.com/
CyberfyTech Ltdhttp://cyberfytech.com/
Hermetic Security Ltd.http://hermetic.io
Huntsman Identity Assurancehttps://www.huntsman.mobi
IsItYou Ltd.http://www.isityou.biz
SecuredTouch Ltd.http://www.securedtouch.com
Silverfort Ltd.https://www.silverfort.com/
Verifyoo Ltd.http://www.verifyoo.com
AU10TIXwww.au10tix.com
AGAT Software Solutions Ltd.https://agatsoftware.com/
I Am Real Ltd.http://ww12.iamreal.me/
Paygilanthttp://www.paygilant.com/
Direct Risk Managementhttp://www.directrm.com/
UnifyIDhttps://unify.id/
Veridifyhttps://www.veridify.com/
Qubitekkhttp://qubitekk.com/
Ipsidyhttps://www.ipsidy.com/
Identiv (INVE)https://www.identiv.com/
IDpendant (Acquired by Sandpiper)http://www.idpendant.de/
ImageWare Systems (IWSY)https://www.iwsinc.com
inBay Technologieshttps://idquanta.com/
Intensity Analyticshttp://intensityanalytics.com/
Laserlock Technologies VerifyMe, Inc.http://ww6.laserlocktech.com/
Mirae Technology Companyhttp://www.mirae-tech.co.kr/
OneVisagehttp://onevisage.com/
Open Limit Holding (Acquired by WiseKey)https://www.openlimit.com/en/
Oxcepthttp://oxcept.com/
Oxford BioChronometricshttps://oxford-biochron.com/
Secure Channels Inc.http://www.securechannels.com/
TokenOnehttps://www.tokenone.com/
uQontrolhttps://qkey.com/
LastPasshttps://www.lastpass.com/
CallSignhttps://callsign.com/
Assured Enterprisesassured.enterprises
BehavioSecbehaviosec.com
BIO-key International, Inc.bio-key.com
CensorNetcensornet.com
Fingerprintsfingerprints.com
Vanguard Integrity Professionalsgo2vanguard.com
i-Sprinti-sprint.com
Mitek Systems, Inc.miteksystems.com
Nok Noknoknok.com
Precise Biometricsprecisebiometrics.com
Sterling Identityhttps://sterlingidentity.com/
Transmit Securitytransmitsecurity.com
Trusonatrusona.com
ValidSoftvalidsoft.com
VKANSEEvkansee.com
Bluink Ltd.www.bluink.ca
Hypersecu Information Systems, Inc.www.hypersecu.com
itWatchwww.itwatch.de
Jumiowww.jumio.com
NXP (Acquired by Qualcomm)www.nxp.com
Privakeywww.privakey.com
Intrinsic IDwww.intrinsic-id.com
LogMeOncewww.LogMeOnce.com
SecuGen Corp.www.secugen.com
Veridiumhttps://www.veridiumid.com
Protectimushttps://www.protectimus.com/
Swivelsecurehttps://swivelsecure.com/
Futuraehttps://futurae.com/
TypingDNAhttps://www.typingdna.com
Covr Security ABhttps://www.covrsecurity.com/
IDenfyhttps://www.idenfy.com/
NuIDhttps://nuid.io/
TruGridhttps://www.trugrid.com
AppsPickethttp://www.appspicket.com
iProovhttps://www.iproov.com/
Hideez Group Inchttp://hideez.com
Tu Identidadhttps://www.tuidentidad.com/
Shufti Prohttp://www.shuftipro.com
Solushttps://www.solus.net/
Corshahttp://www.corsha.com
YAXAhttps://yaxa.io/
Forticodehttp://www.forticode.com/
Groove.idhttps://www.groove.id
PixelPinhttps://www.pixelpin.io/
Signicathttps://www.signicat.com/
TRUSFORT.COMhttp://www.trusfort.com
Systanciahttp://www.systancia.com
Rublonhttps://rublon.com/
Tricerionhttps://www.tricerion.com/
Axiadohttps://axiado.com/
Beyond Identityhttps://www.beyondidentity.com/
Cloudentityhttps://cloudentity.com/
Plurilockhttp://www.plurilock.com
TASCEThttps://tascet.com/
Unbound Techhttps://www.unboundsecurity.com/
1Kosmos – BlockIDhttps://www.1kosmos.com
LoginIDhttps://loginid.io
VU Securityhttp://www.vusecurity.com

Glossary
For your convenience, here are some definitions to Key elements in this list-

Authentication-  Authentication is the action of verifying the identity of a user or process.
Contextual Authentication- Contextual Authentication is where the context around a user’s login are considered and assessed, to then decide whether the person is who they say they are. Like – Location, IP address, Device, Time – which are usually consistent.
Tokens Authentication- Token Authentication requires users to obtain a computer-generated code (or Token) before they’re granted network entry.
Biometric Authentication- Biometric Authentication refers to security processes that verify a user’s identity through unique biological traits such as retinas, irises, voices, facial characteristics, and fingerprints
Two-Factor Authentication (2FA)- Two-Factor Authentication (2FA) is a security system that requires two separate, distinct forms of identification in order to access something. The first factor is a password and the second commonly includes a text with a code sent to your smartphone, or biometrics using your fingerprint, face, or retina.
Multi-factor Authentication (MFA)- Multi-factor Authentication (MFA) is an authentication method that requires users to verify identity using multiple independent methods, and using information from the following categories:  Something the user knows,  Something the user has, Something the user is.

Our Newsletter



    Main Office — Israel

    56 Hahagana Street Herzlya 46325 Israel

    Tel: +972-52-3670513
    Email: info@cyberDB.co

    Contast US

    Follow US