Stytch References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (1112)
    Verified25+ References
  • 4.8 / 5.0 (1069)
    54+ References
  • 4.8 / 5.0 (1080)
    21+ References

Stytch Case Studies

  • Improved conversion by 62% by switching from Auth0 to Stytch

  • Turns flexible and scalable auth into seamless logins for a growing startup community

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References25 total
    About

    Secret Double Octopus is the passwordless authentication solution for the enterprise. They liberate end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication. The Octopus Passwordless Enterprise™ technology provides a unified user experience and a consistent way to access workstations, remote services, cloud applications and on-prem systems while providing stronger protection against cyber-attacks. From being named a Gartner “Cool Vendor” in 2016, their 4th generation platform is now serving mid-sized to Fortune 50 customers around the globe.

  • Reference Rating
    4.7 / 5.0
    Customer References54 total
    About

    Teleport is the easiest, most secure way to access all your infrastructure. The open-source Teleport Access Plane consolidates connectivity, authentication, authorization, and audit into a single platform. By consolidating all aspects of access for engineers and the software they write, Teleport reduces attack surface area, cuts operational overhead, easily enforces compliance, and improves productivity.

  • Reference Rating
    4.7 / 5.0
    Customer References21 total
    About

    Trusona removes passwords from the user experience across your organization. Since 2015, they've helped companies achieve higher levels of assurance in digital identity by moving beyond the vulnerabilities of traditional username/password authentication to passwordless identity authentication. Trusona enables customers to instantly mitigate eight of the most common attack vectors used by bad actors to infiltrate their most trusted accounts.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked