AI Tools

Search and filter curated AI tools. Find the right tool for your task.

AccessMatrix

Checked 1h agoDead linkPro

AccessMatrix implements fine-grained role-based access control across your applications and infrastructure. Teams define roles and permissions using a visual policy builder without coding. Dynamic access decisions incorporate context like device posture and network location. Audit logs prove access decisions for compliance reviews. Organizations use AccessMatrix to implement least-privilege access at scale.

AnomalyDetect

Checked 1h agoDead linkPro

AnomalyDetect identifies unusual login patterns suggesting account compromise or credential theft. The platform learns normal user behavior including typical login times, locations, and devices. Statistical models flag deviations as potential threats. Analysts review anomalies and adjust models to reduce false positives. SOC teams use AnomalyDetect to catch account takeover early.

ApiGatewayAuth

Checked 1h agoDead linkPro

ApiGatewayAuth provides centralized authentication and authorization for API calls across microservices. The platform supports OAuth, SAML, and custom authentication schemes. Rate limiting and abuse detection prevent credential stuffing and API abuse. Token management with automatic rotation and revocation improves API security. Development and security teams use ApiGatewayAuth to secure API ecosystems.

AuditCertify

Checked 1h agoDead linkPro

AuditCertify generates compliance certifications and audit reports for identity and access controls. The platform collects evidence from identity systems to build audit-ready documentation. Custom reports map controls to compliance frameworks like SOC2 and ISO27001. Audit findings suggest remediation to improve security posture. Compliance officers use AuditCertify to prepare for external audits.

AuthLog

Checked 1h agoDead linkPro

AuthLog maintains immutable audit logs of all authentication events for security and compliance investigations. The platform stores logs with cryptographic signatures to prove integrity. Retention policies automatically enforce regulatory requirements. Fast search enables quick investigation of security incidents. Compliance teams rely on AuthLog to prove authentication controls.

BiometricAuth

Checked 1h agoDead linkPro

BiometricAuth integrates fingerprint, facial recognition, and voice recognition for passwordless authentication. The platform uses liveness detection to prevent spoofing attacks. Biometric templates are encrypted and stored locally on devices for privacy. Fallback authentication methods ensure access when biometrics fail. Organizations provide convenient and secure authentication with BiometricAuth.

BotDetect

Checked 1h agoLink OKPro

BotDetect uses machine learning to distinguish between human users and automated accounts during login. The system adapts detection rules based on your user population and attack patterns. CAPTCHA fallback provides manual verification when bot probability is high. Analysts review flagged activity to tune detection. Organizations reduce account takeover attacks with BotDetect.

CertificateHub

Checked 1h agoDead linkPro

CertificateHub manages digital certificates for authentication and encryption across applications and infrastructure. The platform provides certificate provisioning, renewal, and revocation at scale. Automated monitoring alerts teams before certificate expiration. Integration with certificate authorities streamlines certificate issuance. Operations teams rely on CertificateHub to prevent certificate-related outages.

ConsentGate

Checked 1h agoLink OKPro

ConsentGate implements consent-based access controls where users must approve data sharing with applications. The platform provides a user dashboard to review and revoke application permissions. Compliance with privacy regulations like GDPR is enforced through consent tracking. Audit logs prove user consent decisions to regulators. Organizations reduce privacy risks by implementing ConsentGate.

DeprovisionalCleanup

Checked 1h agoDead linkPro

DeprovisionalCleanup automatically revokes access when users leave the organization or change roles. The platform tracks access across hundreds of systems to ensure cleanup completeness. Workflows notify system owners of access that needs removal. Compliance reports prove timely de-provisioning to auditors. Organizations reduce insider threat risk with DeprovisionalCleanup.

FederationBridge

Checked 1h agoDead linkEnterprise

FederationBridge enables secure authentication federation across multiple organizations and identity providers. The platform supports complex trust relationships for B2B scenarios and partnerships. Single token exchange reduces latency in federated authentication flows. Audit trails track cross-organization authentications. Enterprises managing multiple subsidiaries rely on FederationBridge.

GeoRestrict

Checked 1h agoDead linkPro

GeoRestrict enforces geographic access policies to restrict logins from specific countries or regions. Teams define policies by country, region, or city based on business needs. VPN and proxy detection prevents policy bypass. Risk-based exceptions allow legitimate traveling users while blocking suspicious locations. Organizations use GeoRestrict to maintain geographic compliance.

IdentityCore

Checked 1h agoLink OKEnterprise

IdentityCore is a cloud-native identity platform that manages authentication and authorization across applications and services. The system provides single sign-on for employees and partners to reduce password fatigue. Multi-factor authentication policies enforce security based on risk, user role, and device compliance. Integration with HR systems auto-provisions and de-provisions user access. Organizations use IdentityCore to simplify identity management while strengthening security.

IdentityRecovery

Checked 1h agoDead linkPro

IdentityRecovery helps users regain access to accounts through secure recovery processes. The platform supports multiple recovery methods including security questions, backup codes, and recovery emails. Recovery attempts trigger identity verification to prevent unauthorized account access. Administrators can reset recovery credentials for locked-out users. Organizations balance account recovery convenience with security.

LdapSync

Checked 1h agoDead linkPro

LdapSync synchronizes user and group data from Active Directory and LDAP into cloud applications and SaaS platforms. The system maintains real-time sync to ensure accounts are provisioned and de-provisioned consistently. Password policy sync enforces security requirements across all identity systems. Change notifications trigger automatic access reviews. IT departments use LdapSync to reduce manual account management.

MfaFortress

Checked 1h agoDead linkPro

MfaFortress provides multiple factor authentication methods including push notifications, TOTP, biometric, and hardware keys. The platform adapts MFA requirements based on risk assessment of the login attempt. Passwordless authentication options reduce user friction while maintaining security. Integration with identity providers makes deployment straightforward. Organizations reduce phishing attacks by 99 percent with MfaFortress.

OidcProvider

Checked 1h agoDead linkPro

OidcProvider implements the OpenID Connect standard to allow applications to delegate authentication to your identity platform. The system supports dynamic client registration for rapid onboarding of new applications. Token signing with asymmetric keys prevents token forgery. Introspection endpoints allow real-time token validation. Development teams use OidcProvider to standardize authentication across applications.

PasswordPolicy

Checked 1h agoDead linkPro

PasswordPolicy enforces security requirements like minimum length, complexity, and expiration across all identity systems. The system prevents users from reusing old passwords and detects compromised passwords. Policy exceptions support business needs while maintaining security. Compliance reporting proves password policy enforcement. IT departments use PasswordPolicy to reduce password-related breaches.

PasswordVault

Checked 1h agoDead linkEnterprise

PasswordVault securely stores credentials for applications and APIs with encryption and automatic rotation. Users request temporary access to passwords through approval workflows. All password accesses are logged and immutable for audit trails. Integration with applications supports password auto-fill through browser extensions. IT and security teams use PasswordVault to eliminate shared passwords and improve password security.

PrivilegeEscalate

Checked 1h agoDead linkEnterprise

PrivilegeEscalate manages temporary privilege elevation with audit and approval workflows. Administrators request elevated permissions for specific tasks with automatic expiration. Approval policies ensure separation of duties and prevent unauthorized access. Session recording captures all activities during elevated sessions for compliance. Organizations reduce privilege-related breaches by implementing PrivilegeEscalate.