FusionAuth References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (1406)
    44+ References
  • 4.8 / 5.0 (777)
    50+ References
  • 4.8 / 5.0 (1548)
    Premium33+ References

FusionAuth Case Studies

  • currently locked
  • currently locked
  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References44 total
    About

    SSH.COM is the market leader in developing advanced security solutions that enable, monitor and manage encrypted networks. They have developed leading edge security solutions that enable organizations to protect against a rapidly growing threat landscape that includes both internal and external actors. Their platform based approach to Secure Shell deployment and management provides the only solution on the market that addresses the need for security, compliance and operational efficiency in today’s complex enterprise environments.

  • Reference Rating
    4.7 / 5.0
    Customer References50 total
    About

    Stytch's APIs make it simple to seamlessly onboard, authenticate, and engage users. Improve security and user experience with passwordless authentication. Vendor downtime directly impacts your ability to engage users, which is why they’ve built failover logic across multiple vendors for SMS and email. Improve security and avoid account takeovers with passwordless authentication.

  • Reference Rating
    4.7 / 5.0
    Customer References33 total
    About

    WinMagic provides application aware Intelligent Key Management for enterprise controlled grade encryption, with robust, manageable and easy-to-use data security solutions. WinMagic SecureDoc secures data wherever it is stored, providing enterprise grade data encryption and key management policies across all operating systems while enabling a unified encryption strategy across any end point and virtualized or Cloud IaaS environment. SecureDoc is trusted by thousands of enterprises and government organizations worldwide to minimize business risks, meet privacy and regulatory compliance requirements, while protecting valuable information assets against unauthorized access.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked