ID Agent References Capped?

Access even more references from these marketplace competitors

  • 4.7 / 5.0 (3931)
    Premium237+ References
  • 4.7 / 5.0 (4047)
    Premium235+ References
  • 4.8 / 5.0 (5699)
    421+ References

ID Agent Case Studies

  • How Computer Concepts USA protects and educates clients with dark web monitoring from Dark Web ID and security awareness training from BullPhish ID

  • How Thiry Tech helps defense contractors maintain security and compliance with IT Complete

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References237 total
    About

    Auth0 is a cloud service that provides a set of unified APIs and tools that instantly enables single sign-on and user management for any application, API or IoT device. It's modern identity infrastructure, built for developers. Auth0 provides open source SDKs for all popular platforms, all popular operating systems, all popular devices and all popular programming languages. It allows connections to any identity provider from social to enterprise to custom username/password databases. Auth0 is obsessed with making identity, authentication and authorization simpler for modern applications.

  • Reference Rating
    4.7 / 5.0
    Customer References235 total
    About

    Duo Security is a cloud-based access security provider protecting the world’s fastest-growing and largest companies and thousands of organizations worldwide, including Box, Etsy, Facebook, K-Swiss, The Men’s Wearhouse, NASA, Palantir, Paramount Pictures, Random House, Toyota, TripAdvisor Twitter, Yelp, Zillow, and more. Duo Security’s innovative and easy-to-use technology can be quickly deployed to protect users, data, and applications from breaches, credential theft and account takeover. Duo Security is backed by Benchmark, Google Ventures, Radar Partners, Redpoint Ventures and True Ventures.

  • Reference Rating
    4.7 / 5.0
    Customer References421 total
    About

    One Identity solutions eliminate the complexities and time-consuming processes often required to govern identities, manage privileged accounts and control access. Their solutions enhance business agility while addressing your IAM challenges with on-premises, cloud and hybrid environments.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked