Strata Identity References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (985)
    32+ References
  • 4.7 / 5.0 (4072)
    Premium238+ References
  • 4.8 / 5.0 (1785)
    Premium33+ References

Strata Identity Case Studies

  • Breaking free from legacy identity

  • Modernizing at identity quickly, at scale

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References32 total
    About

    Beyond Identity is the first and only company to provide passwordless identity management. The Beyond Identity team is composed of cybersecurity and identity management professionals who are passionate about restoring digital trust and building a fundamentally secure way to authenticate and authorize users while protecting privacy.

  • Reference Rating
    4.7 / 5.0
    Customer References238 total
    About

    At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. That's digital freedom. We let enterprises combine our best-in-class identity solutions with third-party services they already use to remove passwords, prevent fraud, support Zero Trust, or anything in between. This can be accomplished through a simple drag-and-drop canvas. That's why more than half of the Fortune 100 choose Ping Identity to protect digital interactions from their users while making experiences frictionless.

  • Reference Rating
    4.7 / 5.0
    Customer References33 total
    About

    WinMagic provides application aware Intelligent Key Management for enterprise controlled grade encryption, with robust, manageable and easy-to-use data security solutions. WinMagic SecureDoc secures data wherever it is stored, providing enterprise grade data encryption and key management policies across all operating systems while enabling a unified encryption strategy across any end point and virtualized or Cloud IaaS environment. SecureDoc is trusted by thousands of enterprises and government organizations worldwide to minimize business risks, meet privacy and regulatory compliance requirements, while protecting valuable information assets against unauthorized access.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked