Strata Identity References Capped?

Access even more references from these marketplace competitors

  • 4.7 / 5.0 (4282)
    Premium240+ References
  • 4.8 / 5.0 (915)
    64+ References
  • 4.8 / 5.0 (1073)
    21+ References

Strata Identity Case Studies

  • Migrate 80 complex apps to Okta the way a large U.S. Bank did

  • How a state government institution secured its ‘impossible to modernize’ HR application

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References240 total
    About

    Duo Security is a cloud-based access security provider protecting the world’s fastest-growing and largest companies and thousands of organizations worldwide, including Box, Etsy, Facebook, K-Swiss, The Men’s Wearhouse, NASA, Palantir, Paramount Pictures, Random House, Toyota, TripAdvisor Twitter, Yelp, Zillow, and more. Duo Security’s innovative and easy-to-use technology can be quickly deployed to protect users, data, and applications from breaches, credential theft and account takeover. Duo Security is backed by Benchmark, Google Ventures, Radar Partners, Redpoint Ventures and True Ventures.

  • Reference Rating
    4.7 / 5.0
    Customer References64 total
    About

    Stytch's APIs make it simple to seamlessly onboard, authenticate, and engage users. Improve security and user experience with passwordless authentication. Vendor downtime directly impacts your ability to engage users, which is why they’ve built failover logic across multiple vendors for SMS and email. Improve security and avoid account takeovers with passwordless authentication.

  • Reference Rating
    4.7 / 5.0
    Customer References21 total
    About

    Trusona removes passwords from the user experience across your organization. Since 2015, they've helped companies achieve higher levels of assurance in digital identity by moving beyond the vulnerabilities of traditional username/password authentication to passwordless identity authentication. Trusona enables customers to instantly mitigate eight of the most common attack vectors used by bad actors to infiltrate their most trusted accounts.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked