FusionAuth References Capped?

Access even more references from these marketplace competitors

  • 4.7 / 5.0 (4026)
    Premium237+ References
  • 4.8 / 5.0 (2914)
    Premium94+ References
  • 4.8 / 5.0 (974)
    21+ References

FusionAuth Case Studies

  • Contaim adopts FusionAuth to manage their auth lifecycle

  • Cybanetix Deployed On-Prem FusionAuth As Part Of A PCI-DSS Compliant Solution

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References237 total
    About

    Auth0 is a cloud service that provides a set of unified APIs and tools that instantly enables single sign-on and user management for any application, API or IoT device. It's modern identity infrastructure, built for developers. Auth0 provides open source SDKs for all popular platforms, all popular operating systems, all popular devices and all popular programming languages. It allows connections to any identity provider from social to enterprise to custom username/password databases. Auth0 is obsessed with making identity, authentication and authorization simpler for modern applications.

  • Reference Rating
    4.7 / 5.0
    Customer References94 total
    About

    LastPass is an award-winning password manager which helps millions of registered users organize and protect their online lives. For more than 100,000 businesses of all sizes, LastPass provides password and identity management solutions that are convenient, easy to manage and effortless to use. From enterprise password management and single sign-on to adaptive multi-factor authentication, LastPass for Business gives superior control to IT and frictionless access to users.

  • Reference Rating
    4.7 / 5.0
    Customer References21 total
    About

    Trusona removes passwords from the user experience across your organization. Since 2015, they've helped companies achieve higher levels of assurance in digital identity by moving beyond the vulnerabilities of traditional username/password authentication to passwordless identity authentication. Trusona enables customers to instantly mitigate eight of the most common attack vectors used by bad actors to infiltrate their most trusted accounts.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked