98% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More
What is WorkOS and how does it work?
WorkOS is a developer platform that helps make SaaS applications enterprise ready in a faster, more efficient way. Instead of spending months developing features such as Single Sign-on or automated user provisioning, WorkOS allows developers to implement these features in just a few hours or days with simple APIs. With WorkOS, developers can create the perfect enterprise-ready application for their users.
Read MoreSW Score Breakdown
94% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More
What is NetIQ Access Manager and how does it work?
NetIQ Access Manager is an intuitive web and cloud access management software providing single sign-on and access control over multiple resources. Company-specific users - remote, internal, mobile or contractor can depend on the particular with a simple control experience, besides delivering secured access for partnered personnel across their mobile devices and extending web applications on the go. Further, NetIQ Access Manager provides adequate support to a variety of advanced federation use cases, accompanied by a toolbox that can be used to fulfil obscure requirements. Organisations can even upgrade their working environment with continuous authentication tools that will confirm user identities, before letting users get access to protected resources. Organisations related to industries like healthcare, energy finance, public sector and government, telecommunications and transportation depend on NetIQ Access Manager to get their tasks streamlined. Its intuitive product suite comes loaded with modules like A-Z product index, artificial intelligence, application security, data privacy and protection, security operations.
Read MoreSW Score Breakdown
94% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More
What is Passly and how does it work?
Passly, identity security, and access management software, help organizations with their corporate resource management in an efficient manner. The software comes with a secure password server containing a shared password vault, within which users can store their important passwords for personal, shared, and business accounts. They can also streamline secure access to other third-party or business applications with the single sign-on option. Further, the multi-factor authentication feature within Passly helps users deploy a variety of security methods, such as one-time passwords, push-notifications, U2F devices, and more. Admins can use the software to get access to full-featured, cost-effective security solutions in real-time. The Dark Web ID integration within Passly can be used to identify endangered accounts across recorded customer domains. Moreover, the solution assists enterprises in meeting multiple administrative challenges and in assuring compliance for their next audit, whether it be PCI-DSS, CJIS, HIPAA, or FFIECC.
Read MoreSW Score Breakdown
91% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More
What is Crowd and how does it work?
Crowd is a cloud-based single sign-on software. Map any combination of directories to a single application perfect for managing users not in your main directory and manage authentication permissions in the same place. Provide your users with uninterrupted access to Crowd and the other systems connected to it with its active-active clustering model. Define multiple failover directories to reduce the impact on your team's login experience when an external directory fails.
Read MoreSW Score Breakdown
90% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More
What is Descope and how does it work?
Descope is the future-proof identity solution for developers. Built for scalability and never compromised on security, descope provides powerful platform features to make sure that the users stay safe and secure. In just a few lines of code, can rely upon the host of user management solutions such as passwordless authentication, drag-and-drop workflows, and dynamic APIs—perfect for making onboarding enjoyable and straightforward. No need to customize complex infrastructure or be an expert in authentication protocols; descope’s preconfigured solutions take the hassle out of getting started. With dynamic motion detection and built-in risk mitigation tools managing user identities has never been easier.
Read MoreSW Score Breakdown
89% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More
What is PingFederate and how does it work?
PingFederate® is the leading enterprise federation server for user authentication and standards-based single sign-on (SSO) for employee, partner, and customer ID types. As companies embrace digital business initiatives, security and user experience concerns come to the fore. PingFederate frees organizations from expensive and inflexible legacy IAM solutions and leverages modern identity and access management solutions designed to meet complex business needs. PingFederate enables you to: The PingFederate can be easily integrated into your existing IAM system integration and easily configured for rapid deployment. Seamlessly integrates with other parts of the Ping Identity Platform to provide a comprehensive enterprise solution for employees, partners, and customers to provide a secure and seamless digital experience.Ping Federate works with modern-day applications like SaaS and cloud applications. It brings Multifactor Authentication with various simplified authentication mechanisms. It also supports native .net and Java-based applications too.
Read MoreSW Score Breakdown
85% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More
What is Hanko and how does it work?
Hanko is the ultimate tool for user authentication and onboarding, transforming the way company secures its customers. As an open-source solution, can build or customize a reliable and secure login process tailored to the business needs. With Hanko, can go beyond passwords to provide multi-layered security for all of the users. Using smart biometrics and NLP technology, frictionless access is granted with a single click, improving user experience and reducing drop offs during registration. It provides advantages like Higher conversion rates, improved security protocols that meet international standards, greater customer confidence when it comes to data sharing, and improved customer loyalty overall.
Read MoreSW Score Breakdown
84% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More
What is Oracle SSO and how does it work?
Oracle SSO is an intuitive suite offering real-time access to a plethora of best in class products, simplifying unified sign-on deployments for system administrators, besides extending ESSO benefits to remote and mobile users alike. The software also comes loaded with a centralised framework for security and compliance enforcement, besides using an LDP directory, SQL database server or an Activ Directory as its credential repository and user profile. Oracle SSO is also capable of bringing down deployments and operational costs, allowing enterprises to offer secure and fast access to integrated applications, for partners and employees. Also, a real-time integration facility made available with the Oracle Identity Management platform helps with compliance reporting across multiple applications and common security policy enforcement simultaneously. Oracle SSO is completely secure, enabling seamless retrofitting of robust multifactor authentication services to the desktop and related legacy applications. Thus complying with industry mandates HSPD-12 besides positioning the enterprise for upcoming physical and logical securities.
Read MoreSW Score Breakdown
83% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More
What is miniOrange Single Sign-On and how does it work?
miniOrange Single Sign-On is a modern solution allowing users to create a single set of login credentials to get access to multiple applications. This platform not only saves time by providing multi-use login credentials but also delivers highly secured facilities across all integrations to keep user data secure and unbreachable. It provides a plethora of powerful features to boost users’ productivity and eliminates inconvenience. miniOrange Single Sign-On delivers a simple and unified user access mechanism with a customisable dashboard containing information for all configured applications. It further offers an editable registration and login page, allowing users to easily personalise their self-service portal to accommodate essential needs and requirements. Delivery login facilities provided by the platform helps users to log in to their multiple social media accounts like Facebook, LinkedIn, Twitter, etc using a single password. Furthermore, miniOrange Single Sign-On offers shared login facilities that help admins share access with multiple users in a secured way. Also, seamless integration with third-party applications like Google Suite, Zoom, AWS, Office 365 etc facilitates accurate outcomes.
Read MoreSW Score Breakdown
miniOrange Single Sign-On Pricing
82% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More
What is AWS Single Sign-On and how does it work?
SSO allows you to centrally manage access to various AWS accounts and business applications, as well as give users with single sign-on access to all of their allocated accounts and applications from a single location. You can easily manage access and user rights to all of your AWS Organizations accounts using AWS SSO. SSO automatically configures and maintains all necessary rights for your accounts, with no further configuration required in the individual accounts. User rights can be assigned based on typical job functions, and these permissions can be customised to match your individual security needs. Many commercial applications, such as Salesforce, Box, and Microsoft 365, have built-in connections with AWS SSO.You can create and maintain user IDs in AWS SSO's identity store, or connect to an existing identity source such as Microsoft Active Directory, Okta Universal Directory, or Azure Active Directory, using AWS SSO (Azure AD). AWS SSO allows you to choose user attributes from your identity source, such as cost centre, title, or locale, and then use them for AWS attribute-based access control. AWS SSO works with AWS Organizations, allowing you to choose one or more accounts from your organisation and offer users access to them. AWS SSO uses AWS Identity and Access Management (IAM) roles and rules to enable you manage access across all of your AWS accounts in one place. Individual accounts do not require any additional settings. You may provide people access to all of the AWS accounts utilised by an application or a team with just a few clicks.
Read MoreSW Score Breakdown
82% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More
What is SafeNet Trusted Access and how does it work?
SafeNet Trusted Access is an authentication and access management service that allows users to remotely access their applications from anywhere. Because it allows users the ability to govern entry to all applications with the proper policy, the right authentication mechanism for the right user can be enforced. SafeNet Trusted Access also makes it easier for users to access cloud services and enterprise agendas, automates cloud authentication mechanisms, and removes password headaches for both IT and individuals. It shows access events in a single pane across the app estate, ensuring that the correct individual has access to the proper app at the right degree of trust. As a result, individuals may use this software to speed up their cloud transformation while also securing their hybrid infrastructure. Furthermore, the software provides relevant, adaptable, and latest authenticating capabilities using strong devices, allowing users to connect anywhere, regardless of their conditions.
Read MoreSW Score Breakdown
SafeNet Trusted Access Pricing
79% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More
What is Zerotek and how does it work?
Zerotek is a multitenant, pay-as-you-go platform to empower MSPs to deploy and manage modern identity management. With these services they secure their customers'" workforces and establish the essential foundation to modernize their business in the digital age.
Read MoreSW Score Breakdown
70% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More
What is BoxyHQ Audit Logs and how does it work?
Introducing BoxyHQ’s Audit Logs: the simplest way to guarantee the application is compliant. With Audit Logs by BoxyHQ, user can track user activity and store, process, protect and access records that are vital to the business easily, quickly, and in a highly secure environment. Audit Logs ensures the sensitive documents and data remain safe from unauthorized use or access all while keeping up with changing regulatory requirements such as GDPR, HIPAA, CCPA or Sarbanes-Oxley. Not only does this program keep information secure; it helps users to save time and resources when keeping up with updated regulations. They will have complete control over who has access to specific audit logs and was able to review user activity. Audit Logs also provides robust customization of log fields, alerts for malicious activities, and full system reporting so users can stay informed of any changes made in-app. Plus, if there’s ever a need for speedy problem solving, think of Audit Logs as an ‘undo button’ so user can quickly track down the source of an issue before it becomes a larger problem. Achieve peace of mind knowing that Audit Logs gives you the ultimate power over the application’s compliance all integrated into one easy-to-use platform. Get started today with BoxyHQ’s Audit Logs!
Read MoreSW Score Breakdown
The Average Cost of a basic Single Sign-on (SSO) Platforms plan is $9 per month.
23% of Single Sign-on (SSO) Platforms offer a Free Trial
, while 30% offer a Freemium Model .PRODUCT NAME | SW SCORE | AGGREGATED RATINGS |
---|---|---|
WorkOS | 98 | 0 |
NetIQ Access Manager | 94 | 3.5 |
Passly | 94 | 4.1 |
Crowd | 91 | 3.7 |
Descope | 90 | 0 |
PingFederate | 89 | 0 |
Hanko | 85 | 0 |
Oracle SSO | 84 | 0 |
miniOrange Single Sign-On | 83 | 4.4 |
AWS Single Sign-On | 82 | 0 |
Looking for the right SaaS
We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.
Want more customers?
Our experts will research about your product and list it on SaaSworthy for FREE.