FusionAuth References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (1132)
    Verified25+ References
  • 4.8 / 5.0 (696)
    24+ References
  • 4.8 / 5.0 (1721)
    Premium33+ References

FusionAuth Case Studies

  • Vatix Chooses FusionAuth to Streamline Authentication and Save Developer Resources

  • Tucan Uses FusionAuth With CockroachDB

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References25 total
    About

    Secret Double Octopus is the passwordless authentication solution for the enterprise. They liberate end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication. The Octopus Passwordless Enterprise™ technology provides a unified user experience and a consistent way to access workstations, remote services, cloud applications and on-prem systems while providing stronger protection against cyber-attacks. From being named a Gartner “Cool Vendor” in 2016, their 4th generation platform is now serving mid-sized to Fortune 50 customers around the globe.

  • Reference Rating
    4.7 / 5.0
    Customer References24 total
    About

    Strata Identity is providing distributed multi-cloud identity solutions to enterprises. Its identity orchestration platform is designed specifically for hybrid and multi-cloud environments that enable users to easily manage distributed identity systems.

  • Reference Rating
    4.7 / 5.0
    Customer References33 total
    About

    WinMagic provides application aware Intelligent Key Management for enterprise controlled grade encryption, with robust, manageable and easy-to-use data security solutions. WinMagic SecureDoc secures data wherever it is stored, providing enterprise grade data encryption and key management policies across all operating systems while enabling a unified encryption strategy across any end point and virtualized or Cloud IaaS environment. SecureDoc is trusted by thousands of enterprises and government organizations worldwide to minimize business risks, meet privacy and regulatory compliance requirements, while protecting valuable information assets against unauthorized access.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked