Strata Identity References Capped?

Access even more references from these marketplace competitors

  • 4.7 / 5.0 (4101)
    Premium237+ References
  • 4.8 / 5.0 (828)
    20+ References
  • 4.8 / 5.0 (1626)
    Premium33+ References

Strata Identity Videos

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References237 total
    About

    Auth0 is a cloud service that provides a set of unified APIs and tools that instantly enables single sign-on and user management for any application, API or IoT device. It's modern identity infrastructure, built for developers. Auth0 provides open source SDKs for all popular platforms, all popular operating systems, all popular devices and all popular programming languages. It allows connections to any identity provider from social to enterprise to custom username/password databases. Auth0 is obsessed with making identity, authentication and authorization simpler for modern applications.

  • Reference Rating
    4.7 / 5.0
    Customer References20 total
    About

    Beyond Identity is the first and only company to provide passwordless identity management. The Beyond Identity team is composed of cybersecurity and identity management professionals who are passionate about restoring digital trust and building a fundamentally secure way to authenticate and authorize users while protecting privacy.

  • Reference Rating
    4.7 / 5.0
    Customer References33 total
    About

    WinMagic provides application aware Intelligent Key Management for enterprise controlled grade encryption, with robust, manageable and easy-to-use data security solutions. WinMagic SecureDoc secures data wherever it is stored, providing enterprise grade data encryption and key management policies across all operating systems while enabling a unified encryption strategy across any end point and virtualized or Cloud IaaS environment. SecureDoc is trusted by thousands of enterprises and government organizations worldwide to minimize business risks, meet privacy and regulatory compliance requirements, while protecting valuable information assets against unauthorized access.