Identity Management Software
Identity management software keeps track of user access and authentication details. It records login credentials, user groups, and access permissions to ensure that only authorized individuals can use sensitive systems.
EmpowerID Application GatewayEmpowerID
EmpowerID Application Gateway secures legacy apps with SSO and MFA, enhancing security without code changes.
1NCE OS Device Authenticator1NCE
Simplifies IoT device authentication and provisioning by leveraging SIM card identification for secure cloud integration.
1Password Extended Access Management (XAM)1Password
1Password Extended Access Management is a comprehensive security solution designed to secure user access across identities, devices, applications, and locations in modern, SaaS-centric hybrid work environments. It extends beyond traditional identity and access management (IAM) systems to address the challenges of managing unmanaged applications and devices.
- 2F Suite
Second Front Systems
The 2F Suite supports every step of software delivery to government and regulated networks, including development, accreditation, operation, and extensibility.
- 2FA
BSG
Secure user access with scalable 2FA via SMS, voice, or email—compliant with global standards.
- ABIS for Law Enforcement
Innovatrics
An on-premise or cloud ABIS for law enforcement delivering latent fingerprint, facial and iris identification with case management.
Access AIVeza
Veza helps organizations strive towards the principle of least privilege, with Generative AI-powered capabilities to help Security & Identity teams prevent, detect, and respond to identity-based threats. Access AI brings GenAI based capabilities to all Veza products.
Access ComplianceImprivata
Risk analytics for PHI access and medical workflows
Access Context ManagerGoogle
Access Context Manager offers attribute-based access control for Google Cloud resources.
- Access Control & Building Security
Innovatrics
Innovatrics Access Control & Building Security Platform integrates biometric identification for seamless, secure, and touchless access, enhancing threat detection.