Search results for
Authkit
(4535)
Star Rating
Categories
Categories(4)
Sellers(64)
Solutions(0)
Discussions(0)
Articles(7)
Advanced FiltersClear Filter
Star Rating
Categories
The next elements are filters and will change the displayed results once they are selected.
Product Description

BrandChamp helps digital marketers to harness the power of influential, authentic brand champions at scale, across marketing channels and multiple marketplaces. BrandChamp gives marketers the ability to take a people centric approach to marketing across all channels. This builds lasting relationships with customers, promotes brand loyalty and leads to a significant improvement in performance across marketing channels.

Not seeing what you're looking for?

Dive deeper into "Authkit" on G2 AI

Product Description

LibreNMS is an open-source, fully featured network monitoring system that provides real-time visibility into network performance, device health, and security. It supports a wide range of devices using SNMP and other protocols, making it a flexible solution for IT teams managing complex networks. Key Features and Functionality: - Automatic Network Discovery: Automatically detects and adds new devices, reducing manual setup. - Customizable Alerts & Notifications: Alerts via email, Slack, Mi

Product Description

HelloID is a modern and secure cloud-based Identity & Access Management (IAM) solution. With one powerful cloud solution, you have an answer to the increasingly complex Identity Management issues within your organization.

Product Description

Crowdly's advocate marketing software helps brands increase brand advocacy and word-of-mouth by making it easy to identify and connect with their authentic, passionate advocates.

Product Description

Orange Tree Employment Screening offers a comprehensive Education Verification service designed to confirm the educational credentials of job candidates. This service ensures that employers can trust the qualifications presented by applicants, thereby facilitating informed hiring decisions. Key Features and Functionality: - Degree Confirmation: Verifies the degree, diploma, or certificate claimed by the candidate, including the type of degree and major or field of study. - Attendance an

Product Description

Google Cloud VPN is a service that securely connects your on-premises network to Google's Virtual Private Cloud (VPC) network through an IPsec VPN tunnel. This encrypted connection ensures that data traveling between your networks remains protected over the public internet. Cloud VPN is particularly beneficial for low-volume data connections and is designed for secure communication between private networks, not for routing traffic to the public internet. Key Features and Functionality: - High

Product Description

OAuth.io handles identity infrastructure, maintenance, and security overhead with Social Login, Token Authentication, Multi-Factor Authentication, and more. OAuth.io allows you to choose identity providers, add custom attributes, customize your login page or use OAuth's widget and integrate with its app in minutes.

Product Description

VODIUM is a native desktop teleprompter designed for today's hybrid professionals, enabling seamless and confident virtual communication across platforms like Zoom, Teams, and Meet. Key Features and Functionality: - Platform Agnostic: Compatible with various video conferencing tools, including Zoom, Teams, and Meet. - Customizable Interface: Allows adjustments to font, size, colors, and transparency to suit individual preferences. - Autonomous Scrolling: Offers both manual and automatic scro

Product Description

Survey Point is an in-house data collection and analytics platform developed by Sambodhi to revolutionize the way organizations gather and utilize data for problem-solving. Designed to support high-quality data collection with precision and efficiency, Survey Point offers advanced features such as role-based access controls and activity logging to maintain data integrity and security. Key Features and Functionality: - Role-Based Access Controls: Ensures that only authorized personnel have acce

Product Description

Syrvi AI is a UK-based B2B lead generation consultancy that delivers AI-powered outreach and appointment setting services for small and medium-sized businesses. The company combines cold email campaigns, LinkedIn outreach, and an AI voice agent for inbound call handling and warm lead nurturing. Core services include multi-channel outreach campaigns using AI-personalised messaging, a voice agent named Rachel for 24/7 inbound qualification and appointment booking, and content marketing to support

Product Description

DynaFont, developed by DynaComware Taiwan Inc., is a pioneering digital font solution established in 1987. As a leader in the Asian font industry, DynaFont offers a diverse range of high-quality, multi-platform, and multilingual typefaces, catering to various digital and print media needs. Their extensive collection includes over 100 Chinese fonts, encompassing styles from traditional to contemporary, ensuring versatility for designers and businesses alike. Key Features and Functionality: - E

Product Description

Warmforge is an advanced email warm-up and deliverability platform designed to enhance the effectiveness of cold email campaigns. By simulating human-like interactions within mailboxes, it gradually increases sending volumes and engages in AI-driven exchanges, signaling to email service providers that the inbox is active and trustworthy. This process significantly improves sender reputation, ensuring that emails reach recipients' primary inboxes rather than being filtered into spam folders. Warm

Product Description

Thankster helps businesses and nonprofits automate personalized direct mail, especially for mailing handwritten cards or notes to customers or donors. Note: While primarily designed for businesses, our customized service is also perfect for adding a personal touch to your individual communications. * Complements Digital Strategies - Higher open rate campaigns that are longer lasting and surprise and delight. * Authentic Handwriting - Choose one of our many styles (with character variation), or c

Product Description

We offer identification of individuals and businesses in real time with the least amount of friction.

Product Description

Boku provides a best-in-class mobile identity solution that will protect your business from account takeovers, synthetic identities, and compromised numbers, all through a seamless user experience.

Product Description

Powertech Multi-Factor Authentication is designed to simplify identity and access management through centralized administration and an intuitive self-service portal, allowing users to secure their system without burdening their IT staff.

Product Description

OneSpan Mobile Authenticator generates one-time passwords with just a touch enabling your users to securely log on to their applications. Mobile Authenticator supports additional PIN protection, fingerprint recognition, FaceID, and device binding capabilities to ensure the highest level of security.

Product Description

Ver-ID Authenticator for Enterprise is a robust face recognition-based authentication solution designed to enhance security within existing access control systems. By integrating seamlessly with legacy network infrastructures, it provides a cost-effective and user-friendly method to eliminate the vulnerabilities associated with password-dependent access. This solution not only strengthens multi-factor authentication but also offers a superior user experience compared to traditional methods. Ke

Product Description

The WiKID Strong Authentication System uses asymmetric encryption to securely deliver one-time passcodes to software tokens running on PCs or smart phones.

Product Description

iSecurity Authority on Demand provides an advanced solution for emergency access to critical application data and processes, which is one of the most common security slips identifiable to auditors in IBM i audits. Current manual approaches to such situations are not only error-prone, but do not comply with regulations and auditor’s often stringent security requirements.