Introducing G2.ai, the future of software buying.Try now
GateKeeper Proximity Authentication
Sponsored
GateKeeper Proximity Authentication
Visit Website
Product Avatar Image
Peig

By Peig, Inc.

0 out of 5 stars

How would you rate your experience with Peig?

GateKeeper Proximity Authentication
Sponsored
GateKeeper Proximity Authentication
Visit Website
This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review

Peig Reviews & Product Details

Profile Status

This profile is currently managed by Peig but has limited features.

Are you part of the Peig team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Peig Media

Peig Demo - User Dashboard Interface
User Dashboard: A home screen with user's work applications and bookmarks keeping your workflow organized and in control.
Peig Demo - Access Manager Interface
Access Manager: For governing user access rights to work applications and associated devices, ensuring secure and efficient permission management across the organization.
Peig Demo - Configuration Manager Interface
Configuration Manager: A developer tool for configuring work applications.
Product Avatar Image

Have you used Peig before?

Answer a few questions to help the Peig community

Peig Reviews (0)

G2 reviews are authentic and verified.

There are not enough reviews of Peig for G2 to provide buying insight. Below are some alternatives with more reviews:

1
LastPass Logo
LastPass
4.4
(1,928)
LastPass business solutions help teams & businesses take control of their identity management with password management, single sign-on (SSO), and adaptive multifactor authentication (MFA).
2
1Password Logo
1Password
4.6
(1,553)
1Password remembers your passwords for you — and helps you make them stronger. All your secrets are secure and always available, safe behind the one password that only you know.
3
Keeper Password Manager Logo
Keeper Password Manager
4.6
(1,178)
Securely store, share and manage your passwords, logins, credit card numbers, bank accounts and private information in your encrypted digital vault.
4
Microsoft Entra ID Logo
Microsoft Entra ID
4.5
(793)
Entra ID is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.
5
NordPass Business Logo
NordPass Business
4.5
(628)
NordPass Business is an intuitive and easy-to-use password manager for businesses created by the world’s most trusted cybersecurity brand and creators of NordVPN - Nord Security. It eases the burden of access to business accounts, making it possible for your team to work across devices and apps uninterrupted.
6
Cisco Duo Logo
Cisco Duo
4.5
(429)
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
7
IBM Verify CIAM Logo
IBM Verify CIAM
4.3
(173)
Provides identity-as-a-service (IDaaS) for every user, including single sign-on (SSO), risk-based multi-factor authentication (MFA), adaptive access, user lifecycle management, and identity analytics
8
CyberArk Workforce Identity Logo
CyberArk Workforce Identity
4.5
(127)
Today’s new reality requires a new kind of access platform. Built on Zero Trust, CyberArk Identity is creating a new era -secure access everywhere- that uniquely combines leading capabilities to seamlessly integrate SSO, MFA, EMM and UBA. Using our proven technologies, we’re ushering in a new generation of access technology that not only protects companies, but also leads to happier customers, better products and more valuable organizations.
9
FusionAuth Logo
FusionAuth
4.5
(120)
FusionAuth adds authentication, authorization, user management, reporting, analytics and much more in minutes not months.
10
Teleport Logo
Teleport
4.4
(107)
Teleport is purpose-built for infrastructure use cases and implements trusted computing at scale, with unified cryptographic identities for humans, machines and workloads, endpoints, infrastructure assets, and AI agents. Our identity-everywhere approach vertically integrates access management, zero trust networking, identity governance, and identity security into a single platform, eliminating overhead and operational silos.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.