Alternatives to Cove Identity
Compare Cove Identity alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Cove Identity in 2026. Compare features, ratings, user reviews, pricing, and more from Cove Identity competitors and alternatives in order to make an informed decision for your business.
-
1
Cove Data Protection
N-able
Protect servers, applications, databases, workstations, and Microsoft 365 data with Cove Data Protection (formerly N-able Backup). Cloud storage in one of 30 worldwide data centers is included, with the option to keep a local copy of your backups using the hardware of your choice. Flexible recovery options include bare-metal restore, virtual restore, and file/folder-level recovery. Reduce administrative time by managing backups for all your customers, and all their device and data types, from a single dashboard. Automated recovery testing provides screenshot backup verification. TrueDelta deduplication, compression, and WAN optimization make daily backups lightweight and fast. Find out how easy fast, reliable data protection can be, with Cove Data Protection. -
2
SecureDocs
Onit
SecureDocs is a virtual data room platform designed to help organizations securely store, manage, and share sensitive documents. It provides a centralized environment where users can organize files, control access, and monitor document activity in real time. The platform is known for its quick setup, allowing users to launch a data room in minutes without complex configuration. SecureDocs includes features like audit trail reporting, activity alerts, and dashboards to track user engagement and document usage. It offers strong security measures such as encryption, multi-factor authentication, and role-based permissions to protect confidential information. The system supports collaboration through tools like Q&A and document sharing, making it ideal for transactions and due diligence processes. Overall, SecureDocs delivers a simple, secure, and efficient solution for managing sensitive business documents.Starting Price: $250.00/month -
3
Cove Drive
Cove
Our cloud storage solutions are the perfect choice for anyone looking for a secure, reliable, and convenient way to store and access their important files. Safely share your files with others using Cove's secured links feature. With encrypted links and access control, you're always in control of who can access your data. Easily transfer large volumes of documents securely with Cove's bulk upload feature. Our end-to-end encryption keeps your data protected at all times. Stay connected with your files and folders anytime, anywhere with Cove's seamless cloud storage integration. Access your data on the go and never miss an important update or file again. Syncing your Cove Web account with the Cove app allows you to easily access all your files and folders from any device. With this integration, you can save time and be more productive, ensuring that all your important data is always at your fingertips.Starting Price: $0.59 per month -
4
Cove
Cove
Cove is a new way to explore, plan, and work together with AI. Cove is not a chatbot, it’s a new type of AI collaborator. Cove delivers answers to a shared workspace rather than trapping them in a chat thread, so you and AI can build off each other’s ideas. Cove actually edits content with you, like multiplayer editing with a colleague. It can even make precise edits without having to re-stream a whole answer. Everything in the space becomes a shared context between you and the AI. At every step of your journey, Cove suggests many possible directions, so you’re never stuck. Cove has access to the freshest data from the web and accelerates your work by doing many searches in parallel. With our Chrome extension, no special integration is needed to use Cove alongside all your favorite websites and apps, email, docs, CRM, and more. Cove uses a combination of models to ensure you get high quality and low latency every time.Starting Price: $10 per month -
5
Cove Markets
Cove Markets
Cove Markets is your one-stop hub to connect and trade smarter across multiple crypto exchange accounts. Cove Markets supports a variety of the most popular exchanges such as Coinbase Pro, Kraken, Bitfinex, Bitstamp, and more! Create and fund account at one or more supported exchanges. Open free Cove Markets account and connect exchange API keys. Buy a basket of coins with pre-defined allocations, such as DeFi. Build your own basket with our do-it-yourself portfolio tool. Use Stop Loss and Trailing Stop to protect your downside if the market tanks. Use Take Profit to automatically reduce exposure if the market pumps. Apply Protection to market orders to avoid trading at a terrible price. Trade even if an exchange website or app is down. Add real-time crypto market data to your site in less than a minute! Our widgets are the no-code solution for blogs and web applications that want to display rich market data and analytics. Integration is as simple as copy & paste. -
6
Measure Desktop
Cyncly
Craft precise estimates and manage projects seamlessly with Measure Desktop’s flooring-specific functionality. Developed for flooring professionals, Measure Desktop simplifies complex estimations. Transform conceptualization with precise drawing capabilities for rooms of any shape and size, ensuring every estimate begins with the right foundation. Employ advanced tools to create detailed tile patterns and estimations, giving your projects a competitive edge in both design and cost. Streamline the complete estimate creation process, enabling accurate project calculations and cost management for enhanced bid accuracy. Provide immersive project visualizations, enhancing client engagement and supporting confident decision-making for both designers and clients. Use and edit tile patterns, define custom tile patterns, estimate coving and ceiling tile. Define tiles of any shape and size, control tile placement, and pattern start. -
7
DeskCove
DeskCove
Employee time tracking software with screenshots, webcam, analytical reporting, and more. Track and see how much your team spends on activities, tasks, projects, apps, URLs, and more! See where your team's time goes, analyze the data you get and improve your team's time management skills. Have bigger control over the company's time, direct the resources of your company to the right place and grow! Check out the features you can use to increase your team’s productivity. See who worked on what project or task, how much money you spent, and analyze your team's time and productivity. Track productivity, attendance, and billable hours with a simple time tracker and timesheet. Categorize time by apps, projects, and tasks. Understand where your time and money are being wasted. With DeskCove employee monitoring software, you can see work in progress as it happens. Random screen capture and webcam capture can be customized for each person.Starting Price: $10 per month -
8
NectarVet
NectarVet
NectarVet is an all-in-one, cloud-based veterinary practice management software designed to help veterinary teams spend less time on paperwork and more time caring for their patients. Developed by a team comprising clinic owners, veterinarians, practice managers, technicians, receptionists, veterinary wellness advisors, software engineers, and business leaders, NectarVet understands the unique needs of veterinary practices. The platform offers AI-assisted patient exams, enabling voice dictation to complete SOAP notes in under five minutes, and provides an AI assistant to answer questions about a patient's medical history. Integration with VetCove allows seamless connection with the leading inventory management system, simplifying the re-ordering of supplies. The comprehensive client portal facilitates two-way SMS communication, and appointment requests with optional deposit collection to reduce no-shows, prescription refill requests, etc. -
9
DL3ARN
DL3ARN
Discover data ownership, privacy, personalized insights, and more in one user-focused solution. Decentralizing database storage bolsters data security, protecting information from centralized vulnerabilities. Ensure your information is secured with verification, robust security features, and a traceable data system, protecting it from unauthorized access or alterations. Our platform's interoperability connects data from multiple sectors, offering a comprehensive view and empowering informed decisions. Securely monetize your data by sharing it with researchers, organizations, and marketers while retaining ownership. Take control of your data ownership, deciding who has access and how it's used, ensuring privacy and autonomy. -
10
Bloom
Bloom
Securely prove that your personal information is verified with blockchain technology. You choose what data to include in your BloomID. You determine exactly how it’s used. Re-use your verified data to prove who you say you are in seconds. Verify once, re-use anytime. Use your BloomID to access apps and services anywhere in the world. Secure verifiable credentials are issued to you by trusted providers via the Bloom app. These credentials are stored securely via the Bloom app with end-to-end encryption, meaning you stay in control of the data. The Bloom app allows you to seamlessly share your credentials with third parties, allowing you to stay in control of your data and share the minimum amount of your personal information required to establish trust. -
11
Accredify
Accredify
Simplify the exchange of digital identity and data whilst augmenting trust in your organization with Accredify’s globally recognized and award-winning technology, TrustTech. Our society is powered by data shared through digital channels, but not all information can be relied on. With the rise of AI-driven deepfake data and documents, establishing digital trust in their services has become essential to every organization. The world is experiencing a crisis of trust where individuals, businesses, and governments globally are experiencing the consequences of a rise in unreliable information. However, legacy systems of information sharing face a trade-off between accessibility and security. Enhanced accessibility means relaxing security protocols, opening more avenues for malicious actors to obtain and tamper with sensitive data. -
12
Cognito
Cognito
Smarter identity verification services and compliance solutions. Our APIs are easy to integrate and our dashboards are built to simplify workflows, not clog them. With robust documentation and hands-on support, you will be integrated in days not months. We've verified and screened millions of customers and have learned a thing or two about what works. Our APIs are built to make doing the right thing the default so you can focus on your business. Extensive API documentation, a dedicated Slack room for your company, and clients SDKs for the most popular programming languages make Cognito quick and easy to integrate. Data security and compliance sit at our core. Sensitive values like SSNs are encrypted on disks with AES-256 and we engage in regular organizational (SOC 2) and app-level security audits.Starting Price: $0.99 per identity -
13
Peer Mountain
Peer Mountain
Peer Mountain goes beyond providing users with ownership and control over their cryptographically secure identities. It is an end-to-end application ecosystem that facilitates secure commerce and exchange of digital and physical services. Gain assurance of reliable and secure independent audits and claim verification. Only share and validate encrypted data according to transaction requirements. Segment services across Peer Mountain deployments securely and transparently. Control your data in a distributed system that makes hacking unfeasible. Peer Mountain serves consumers who want self-sovereign identity, service providers who need continuous, reliable compliance, and trust providers offering validation services who need trust interoperability and portability. -
14
Qypt AI
Qypt AI
With features like on-device AI-powered document search and granular access control, Qypt AI enhances productivity while safeguarding confidential information. Whether you're handling personal documents like tax recChat & Discuss Documents: Securely, Without Sharing. Qypt AI provides a secure and efficient solution for team communication and collaboration. Designed for both individuals and businesses, Qypt AI offers encrypted messaging, secure file sharing, and advanced document redaction, ensuring sensitive data is protected at every step.ords or business-critical files such as contracts and financial statements, Qypt AI ensures that data breaches and inefficient workflows are a thing of the past.Starting Price: Free -
15
Metadium
Metadium
Metadium powers identification, authentication and crypto transaction management, providing AML compliance and risk management solutions. Our technology is compatible with EVM and provides standard API/SDK, making the integration process fast and convenient. Metadium provides high security features appropriate for corporate compliance like setting node permissions and data encryption for privacy protection. As blockchain technology continues to be accepted and integrated into multiple industries, the need for compliance grows. Metadium’s second generation uses its advanced technology and experience to provide a new ecosystem of compliant services and solutions that serve as the bridge to blockchain’s true potential. Our evergrowing ecosystem includes identity and data protection, innovative metaverse platforms, and highly secure payment and asset management services. -
16
Megadisk
Megadisk
Megadisk is a trusted cloud storage solution that redefines the way individuals and businesses store, manage, and access their valuable data. With our cutting-edge technology and robust features, we provide a secure and reliable platform for seamless file storage and sharing. Key Features: 1Ample Storage Capacity: Store all your files in one secure location without limits. 2. Robust Security: Your data is protected with advanced encryption protocols. 3. Effortless File Sharing: Collaborate effortlessly using our intuitive sharing tools. 4. User-Friendly Interface: Easily navigate, organize, and find files. 5. Multi-Platform Access: Access your files from any device, anywhere. 6. Flexible Plans: Choose the perfect package to fit your needs and budget. 7. Reliable Customer Support: Our dedicated team is always here to assist you.Starting Price: $0 -
17
AnySecura
AnySecura
AnySecura is an enterprise-grade information security solution that helps organizations protect sensitive data, manage digital assets, and monitor user activity from a unified platform. By integrating Data Loss Prevention (DLP), Endpoint Protection, and comprehensive Activity Auditing, it secures—and makes traceable—both internal and external data interactions without compromising operational efficiency. One standout capability is Transparent Encryption. Based on predefined policies (e.g., by file type or user group), files are encrypted and decrypted automatically, allowing authorized users to access and edit documents seamlessly. Unauthorized users or external parties, however, see only unreadable content—preventing potential leakage at its source across the file’s entire lifecycle. Beyond encryption, AnySecura provides a full suite of Endpoint Management features, including Removable Media Control, Print Control, Document Control, Web Access Control, and real-time alerts.Starting Price: $216/month -
18
[D/Wallet]
Desmo Labs
Manage your digital identity, verifiable credentials, and digital assets, benefiting from a streamlined experience. Our blockchain-based platform securely manages infrastructure without exposing credential-generating data, allowing access only to permitted participants, and ensuring all actions and business processes are tamper-proof, and permanently recorded as blockchain transactions. Eliminating the often fluctuating and unpredictable fees associated with blockchain operations, making it ideal for widespread adoption. Additionally, it simplifies the user experience by removing the need to manage gas fees, enabling users to focus on their transactions and interactions within the blockchain ecosystem. Users benefit from the strong encryption of digital signatures ensuring their data is protected, while the use of social log-ins simplifies the access process. This integration provides a seamless, yet highly secure user experience, reducing potential friction. -
19
WWPass
WWPass
No need to remember, manage, reset, protect or exchange. Consolidation of all logins in one protected authentication token. Easy self-management of the authentication token. Log in with a universal, international digital identity, trusted if required and anonymous if allowed. All data is encrypted by the user with WWPass Key. No need for OTP, SMS, or other extra costly adaptive authentication and login support. User identity is protected by WWPass Key. WWPass MFA is a strong customer authentication compliant with GDPR and NIST. Each user gets a unique key, which helps to log in to an unlimited number of accounts and services without usernames and passwords. Log in to a growing number of online services with your WWPass Key as a universal key to the digital world. Enable next-generation strong multi-factor authentication without usernames and passwords. Simplify and streamline secure access to any business application without a username and password.Starting Price: Free -
20
GlobaliD
GlobaliD
Portable, private, and secure identity. Claim your GlobaliD, get verified, create and join groups, communicate, pay and get paid online. At GlobaliD, we’re building a universal identity solution that is easy to use, ties users to unique names and transcends borders and institutions. We build a self-sovereign identity platform that enables everyday action for people and businesses. GlobaliD's privacy and security solutions help you protect your customers and win their trust, without compromising experience. Our platform delivers a convenient onboarding and single sign-on experience, while empowering users to build digital reputations and to maintain consent-based control over their personal data. Our solutions free our partners from the burden of data storage and security, while providing data integrity and maintaining compliance. From identity management to data security to messaging, GlobaliD’s full-fledged platform does it all. -
21
SNote
SNote
SNote is the privacy focused workspace designed for exceptional productivity and collaboration. Privacy without Compromises State-of-the-art end-to-end encryption keeps your notes and files secure. We can't read your notes or access to your files, and no one else can either. Privacy isn’t an optional mode - it’s just the way that SNote works. Every note, every file, every time. Collaborate Without Insecurity Privately collaborate with only the people you want on Projects, To-Dos, Tasks and Shared Files. All with an unexpected focus on privacy, combined with all of the features you expect. All with a realtime end-to-end encryption. We call it eye-to-eye. Infinitely Configurable Data Smart, encrypted, and customizable data tables offer endless possibilities for efficient and secure work processes. Using data tables, you and your team can easily tailor tables to your specific needs while ensuring sensitive information remains protected.Starting Price: $8 -
22
VIDchain
Validated ID
Digital identity is not a new challenge. Since the beginning of the online revolution, validating with complete confidence the real identity of people in a digital environment has been a problem both for users, who have had their privacy and control over their personal data removed and for companies that have suffered the cost of inefficient and constant identification security failures. With VIDchain, we offer a decentralized self-rule identity (SSI) service based on Blockchain to provide people control over their identity and facilitate secure user access to online services. It improves processes and reduces identity verification costs. It implements secure identification processes and improves anti-fraud measures in compliance with eIDAS and GDPR. Based on standards that eliminate the need for hundreds of credentials. You can easily validate your digital identity with anyone you want. -
23
ONTO
Ontology
One-step management of decentralized identity and data. Self-sovereign Verifiable Credentials powered by Ontology Network. It is a statement to confirm a claim made by one entity about another. The claim is accompanied by a digital signature that can be used by other entities for authentication. ONT Score is a decentralized review system for ONT ID user trust and can assess ONT ID users from multiple dimensions, including identity information, verification information, digital assets, and behavioral features. ONTO helps users create a decentralized digital identity built on Ontology blockchain which fully protect their privacy data through an encryption algorithm, aiming to provide a safe and convenient one-stop service for users worldwide. -
24
Sudo Platform
Anonyome Labs
Sudo Platform is an API-first, developer-focused ecosystem that delivers the tools necessary to empower our partners to quickly and completely deliver to end-user consumers the necessary capabilities to protect and control their personal information while navigating the digital world. It provides a modular, quick to implement, and powerful collection of the most important digital privacy and cyber safety tools. including safe and private browsing, password management, VPN, virtual cards, encrypted and open communications, and decentralized identity. This developer-focused platform includes: Developer-focused documentation API-first ecosystem SDK source code via GitHub Sample applications for test-to-deploy of various capabilities Vendor-brandable (white-label) apps for quick go-to-market deployments. -
25
Wrapsody eCo
Fasoo
Wrapsody eCo is an all-in-one secure collaboration platform. The solution is designed to enhance productivity and security for external collaboration. It facilitates seamless content sharing and synchronization with features including real-time updates, version control, advanced encryption, and access controls. Wrapsody eCo provides a wide range of collaboration tools, from enterprise messaging and video conferencing to comprehensive monitoring and auditing features to track document usage and user activities. Additionally, its robust security framework with advanced file encryption and access controls ensures that sensitive data remains protected at all times (at rest, in transit, and even in use). With Wrapsody eCo, organizations can share documents internally and externally while maintaining security, regardless of where the files are viewed in a browser, downloaded, or edited locally. The protection is applied to data and travels with them throughout their entire lifecycle. -
26
DropSecure
DropSecure
With DropSecure, the keys to unlock your data are never shared with anyone you didn't intend to share with, including us. That means you get real privacy behind our military-grade encryption and file transfer technology. Discover the most secure way to share your documents. At DropSecure, it is our mission to empower you with technology that protects your digital valuables in a hassle-free manner. DropSecure protects your privacy and safeguards your data using military-grade algorithms before they leave your device. With end-to-end encryption, encrypted uploads, decrypted downloads, two-factor authentication, cryptographic keys, and zero knowledge transfers, we offer the ultimate technology to keep your data safe from the data centers. So whether you are an individual, business or enterprise, you are always aware of who has access to your sensitive documents. Most importantly, no one owns the keys to your documents apart from you, not even us.Starting Price: $10 per month -
27
Microsoft Entra
Microsoft
Confidently enable smarter, real-time access decisions for all identities across hybrid, multicloud, and beyond. Safeguard your organization by protecting access to every app and every resource for every user. Effectively secure every identity including employees, customers, partners, apps, devices, and workloads across every environment. Discover and right-size permissions, manage access lifecycles, and ensure least privilege access for any identity. Keep your users productive with simple sign-in experiences, intelligent security, and unified administration. Safeguard your organization with the identity and access management solution that connects people to their apps, devices, and data. Discover, remediate, and monitor permission risks across your multicloud infrastructure with a cloud infrastructure entitlement management (CIEM) solution. Create, issue, and verify privacy-respecting decentralized identity credentials with an identity verification solution. -
28
MYDOCSONLINE
MYDOCSONLINE
Upload. Share. Edit. Receive Files. Helping businesses and professionals exchange files securely and easily. Easily share and track files like Word documents, spreadsheets, PDFs, QuickBook data, images and more with colleagues, clients and suppliers. Share files from your account or through a secure link using your email app. It’s simple to use. No training required to get started. We make your data and your account access safe with high grade data encryption. And with powerful administrative controls and a secure infrastructure you are able to protect your file transfers and your confidential information with peace of mind. Trust your business and data to meet industry regulations. We’ve got you protected. Industry-leading security and offsite data storage mean your files are safe. No matter what happens- flood, fire, or crash – you can recover your data anytime. You have the tools and full support to get back to business quickly.Starting Price: $9.95 per month -
29
Ontology
Ontology
Ontology supports identity authentication and data collaboration between users, vehicles, and third parties. Data can only be accessed, used and stored with the consent of the owner. Through the Ontology Trust Framework and Self-Sovereign Data Storage, a number of cryptographic algorithms are implemented to protect user identity and data privacy security. Each data exchange operation requires authorization and selective exchange can be achieved through authorization protocols and cryptographic algorithms. Traceability, authorization and authentication of personal data is possible through blockchain. In some cases, we integrate TEE technology to support data analysis and processing without privacy disclosure. It's time to reclaim control of your digital identity. ONT ID enables autonomous control of your private data. You decide if and when your data is accessible by others. -
30
Trust Stamp
Trust Stamp
Mitigate fraud, retain customers, and reach a broader base of users worldwide with AI-powered identity solutions at the intersection of biometrics, privacy, and cybersecurity. Trust Stamp delivers trusted identity systems at the heart of how organisations and individuals transact in the connected world and beyond. Trust Stamp's radical innovations in biometrics and data protection empower people to access more with identity that can be safely shared and stored. When our identity technology is used to open a bank account or access a public service, both the individual and organisation achieve higher levels of protection and confidence in the security of their data and the integrity of their systems. Trust Stamp's solutions elevate all sides of an identity system. -
31
VeriDoc Certificates
VeriDoc
VeriDoc Certificates offer you an end-to-end solution to store and send your certificates without thinking about how to send them, or will your certificates be secure, and also assures you 100% data transparency. You can now secure your certificates using blockchain technology, keeping your valuable certificates safe forever. With VeriDoc Certificates, your certificates become completely tamper-proof and safe from any scams & fraudsters. You can track, send, and verify the authenticity of any certificates without moving an inch from where you are. Now you can verify, send, and store certificates with ease. With VeriDoc Certificates, you can now store your certificates securely, send them to anyone and anywhere in the world, and verify the authenticity of all certificates whenever needed. VeriDoc Certificates store all your valuable documents in the blockchain which makes them tamper-proof and safe from any fishy activities.Starting Price: $30 per month -
32
SelfKey
SelfKey
Self sovereign identity means your data belongs to you. The SelfKey wallet is non-custodial, you are in full control of your data, documents and digital assets. SelfKey can never steal or lose your identity data or digital assets. Securely store and manage your identity documents and digital assets. Access multiple marketplaces to compare and sign up for. Start a new business, open a new bank account, or get documents notarized through the SelfKey Marketplace. Powered by the KEY token and priced against USD, the SelfKey Marketplace provides access to a variety of services with full transparency on documentation requirements, cost, and total processing time. Explore global options for banking, corporate, individual and wealth management. Apply for an international bank account directly from your SelfKey wallet. Send your identification documents and data (KYC) with a single click. -
33
Open Web Systems
Open Web Systems
We will never sell your data to anyone else. Secure your data with powerful file access control, multi-layer encryption, machine-learning based authentication protection and advanced ransomware recovery. Enjoy constant improvements from a thriving and transparent, entirely open-source community development model, free from lockins, paywalls, advertising and covert surveillance. Open Web Systems is a collaboration between The Open Co-op and Collective Tools and is governed by its members as a cooperative. Together we are building the regenerative, commons economy. Your personal, customisable, welcome screen where you can place quick links to your most important tools and resources – and search across all of your files and applications at the same time. Create documents and spreadsheets and collaborate with others via desktop, mobile and web. Find files with powerful search, share your thoughts in comments or lock files until you are done with them.Starting Price: $4.94 per month -
34
Dock Certs
Dock Certs
Convert verified ID data into reusable digital credentials, reduce verification friction without compromising security and enable secure data exchanges with fraud-proof data. -
35
Curity
Curity
The Curity identity server is a standards-based identity and API security platform designed to provide robust authentication and authorization for digital services. It combines identity and API security, enabling scalable customer identity and access management to accelerate digital transformation, growth, and customer loyalty. It offers a range of features, including multi-factor authentication, user journey orchestration, decentralized identity, and secure access management. It supports various identity-related standards such as OAuth, OpenID Connect, and SCIM, ensuring interoperability and compliance with industry protocols. Curity's architecture is built on the principle of separation of concerns, enhancing security, flexibility, and scalability. It provides advanced configuration management with transaction-based changes, rollbacks, and backups, accessible through a web UI, CLI, RESTCONF API, and XML config files. -
36
BitMark
BitMark
A blockchain is a new type of computer that can be shared by anyone without having to ask permission. It’s open and yet secure — protected with cryptography and consensus technology. Bitmark was established in 2014, after we saw glimpses of how this could lead to a better society. Institutions require accountants, lawyers, regulators, and police. This increases bureaucracy, risk, and stress to society. Regulation can be captured. In short, our existing institutions are expensive to scale. The breakthrough idea behind the blockchain is that trust can be built through excess computing resources, Code can implement data integrity. Since computing follows Moore’s law, society will have more computing resources for less money over time. Simultaneously, we can increase individual autonomy and reduce corruption. Blockchain programs, known as smart contracts, create and manage data called tokens. -
37
Gataca
Gataca
Gataca provides simple, compliant, and secure decentralized identity management technology, also known as self-sovereign identity (SSI) technology. Create and digitally sign identity credentials in a standardized format. Design customizable verification templates for on boarding and sign-in processes to offer frictionless access to digital services. Let your users authenticate seamlessly in digital services and control their data with the Gataca Wallet. User data and ID credentials are issued by trusted authorities and protected with biometrics and post-quantum cryptography to ensure they are tamper-proof, allowing instant identity verification without relying on centralized systems.Starting Price: €12 per month -
38
IdRamp
idRamp
Turn your digital identity strategy into a business asset, not a liability. Stop spending time, money, and headcount replatforming insecure identity technology. Simplify authentication complexities with decentralized zero trust Identity from Idramp. Bring order to your identity management chaos. Accelerate delivery of services to meet the speed of business. Eliminate expensive platform upgrade projects with rapid modular deployment. Relieve the pain of bespoke integration with rapid integration that automatically interoperates with existing infrastructure. Tailor your customer experience with a modular architecture that eliminates vendor stack lock-in. Add zero trust identity with automated security policies and adaptive access controls. Control extensible ecosystems with state of the art data protection. Never trust but always verify that your applications and people are safe. -
39
EaseFilter
EaseFilter Technologies
Track file change, control file access in real time, prevent your sensitive data from being accessed by unauthorized users or processes. Secure file sharing with digital rights management(DRM), share files with fully control, grant or revoke the file access at any time. Implement file audit, file access control, file protection and encryption Windows applications with C#,C++ demo source code.Starting Price: $1500 -
40
CREDEBL
CREDEBL
Effortlessly define and tailor credentials with our user-friendly schema template. Customize credentials for employees, customers, students, citizens, or any user, incorporating detailed schema information and intuitive controls for seamless management. Seamlessly issue digital credentials and explore a comprehensive overview on the platform for efficient credential verification and management. Securely connect with and receive credentials from diverse organizations & ecosystems with a simple tap on your screen. Instantly share the verifiable proof of your digital credential certificates. Empower your identity with selective (partial) disclosure on our SSI mobile wallet. Seamlessly present only the data you choose with confidence. Alternatively, you can share your personal milestones (e.g. achievements in sports) on social media directly. -
41
DAtAnchor
DAtAnchor
Anchor It™ for Absolute Data Security. In the old days sensitive data was protected with firewalls, shared drives, and a whole lot of user trust. Now the security is baked right into the data itself. Stop worrying about files being copied, shared, or stolen. Anchored files remain secure, access controlled, and auditable even after they've left your network. All without changing how users work. Sensitive data? Anchor it™. DAtAnchor Platform in a nutshell. Agents On Windows, iOS and Android. Provides Transparent Encryption with no change in existing workflows. Contextual Access & Dynamic Revocation. Monitors User Actions. SDKs On linux, macOS, iOS, Android & Raspberry Pi. Simple to integrate APIs. Functions to encrypt/decrypt any type of data. Integrates with AWS Lambda. Third-Party Sharing One-Click sharable link. Web based View, Edit and Download. Password and Time based links. App Integrations on Box and Egnyte platforms. Key Management Military Grade -
42
SOURCE.ID
Desmo Labs
Offering secure, private, flexible, and auditable identity verification solutions. Empowering individuals to curate their profiles, control data sharing, and offer issuers the ability to swiftly verify credentials, thereby fostering a trusted platform for all participants. Built-in AML and KYC solutions with standardized interfaces, allowing for open ledger identification verification. Digital signatures for universal authentication and provide tamper-proof with verifiable credentials. Decentralized Identity (DID) technologies streamline the verification process, reducing the time from weeks to mere seconds for tasks ranging from accessing public services to opening a bank account. Simultaneously, they provide easily verifiable credentials, significantly minimizing the manual labor required from front-desk employees. Digital signatures and tamper-proof can be operated with no seed phrases and gas fees. -
43
EDUFIED
EDUFIED
Tamper-proof document issuance & verification system for issuing authorities to issue verifiable documents to recipients, allowing them to store & share them securely from their digital wallet. -
44
MATCHAIN
MATCHAIN
Matchain is a decentralized AI blockchain focused on data and identity sovereignty, utilizing advanced AI for data aggregation, analytics, and user profiling to enhance decentralized identity solutions and data management. Its MatchID system offers a secure decentralized identity solution, streamlining access across platforms and providing opportunities to monetize personal data while ensuring privacy with advanced security technologies. MatchID is interoperable, allowing single sign-in across any decentralized application and chain, and supports binding multiple multi-chain wallets as well as Web2 social logins such as email, Twitter, Telegram, and Discord. The platform indexes public data without collecting non-public information, with personal data protected to ensure privacy. MatchHub, a unified front-end platform, utilizes sophisticated analytics to enhance user engagement and provide tailored experiences using MatchID. -
45
Conjurers Encrypter
Brainasoft
Conjurers encrypter 4 or simply CE 4 is a powerful and easy to use freeware file encryption utility. It can be used to encrypt files and folders easily and secure your important and confidential data. Encryption is the process of encoding information so that is cannot be accessed by others unless they have the secret key. CE is normally used to protect sensitive documents, but encryption is also a good way to stop people from looking at your personal stuff. You can also send important file(s) after encrypting it to others over the internet without worrying about the contents being read by anybody other than the recipient even bypassing attacks like Network Sniffing. -
46
FileAgo
FileAgo Software Services
FileAgo is the world's only software to have a combination of Waterfall and Granular Permission model, which enables users to implement precise access control and restriction over their data like never before. Organizations and users get the best of both worlds in FileAgo - control and ease of use. Manage data of your teams at a centralised storage on cloud, while securely allowing/restricting access and file sharing. Co-edit office documents with your co-workers in real-time using our builtin Collabora Online editor or Microsoft Office for the web. Our top priority is always to protect your sensitive files, and FileAgo's unique and flexible granular file and folder permission model is designed just for that. Also, the data is encrypted using AES-256 encryption and stored in datacenters which has passed various industry compliances and security certifications.Starting Price: $4 per user per month -
47
DocSend
DocSend
Never send another attachment again. Securely share your documents with real-time control and insights—no matter where you're working. The secure document sharing platform everyone can use. Managing, sharing and tracking your important files is as easy as sharing a link. Increase security, control file downloads, and turn off access anytime. Be prepared for your next meeting with real-time intelligence. Update a file even after hitting send. And everyone automatically has the latest version. Our Gmail and Outlook plugins make uploading documents and sharing links a breeze. Protect your documents with passcodes and email verification, track if links are forwarded, or simply turn off access to take back control. Seamless, on-brand viewing experience. View on any device. No file downloads. Investors and business partners love DocSend’s easy, browser-compatible, mobile-first, viewing experience. Sharing Powerpoint? Keynote? Pdf? Gifs? We’ve got you covered.Starting Price: $10 per user per month -
48
Veres One
Veres One
Veres One is a secure, privacy-preserving, and cost-effective way for you to control and manage your identity on the web. Ledgers enable us to reduce identifier management costs through shared common infrastructure. Veres One is optimized for identity, which further reduces costs. As a result, network operating costs and fees are a fraction of those of general-purpose ledgers like Bitcoin and Ethereum. Unlike many other networks, Veres One does not use a scarce network token. This removes price volatility and regulatory risks associated with speculative token networks. Veres One charges low, stable fees that decrease as the network scales. Distributed systems enable competitors to cooperate on common infrastructure. These systems naturally resist centralization, surveillance, and censorship, which are threats to identity. Veres One utilizes decentralized technology and governance to protect your identifiers. -
49
Confidencial
Confidencial
Built-in protection that follows your unstructured data everywhere, always. Confidencial is a data-centric security solution that automatically finds and secures sensitive content within documents to maximize data utility and collaboration. We invented and patented selective protection, a groundbreaking technology that embodies our core mantra, protect sensitive content without compromising usability. Our comprehensive and intelligent solution gives you unparalleled flexibility through granular controls, allowing you to protect sensitive information in files and documents. Our patented technology lets you choose exactly what you need to protect and who can access it, down to the word, paragraph, or image inside of a file. Your data never leaves your infrastructure. We do not store your files or data, nor can we access it. Confidencial secures unstructured data across on-prem and multi-cloud environments. -
50
Remme Auth
Remme
Create a unique Auth ID, fill in your first login profile with data like name and email and you're ready to go. Add as many profiles as you need to fit the websites and apps you use most. Auth allows you to build ecosystems where physical and digital experience blend together. Shop online and in store, log in to websites, unlock a car – all with a click of a button. Select flexible recovery options with biometric hardware-based security. Simply packaged to enhance protection. Every single day our digital identities are used to chat, order snacks, and buy stuff. It requires dozens of logins, new accounts, strong passwords, and personal info sharing.