Transmit Security References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (1395)
    66+ References
  • 4.8 / 5.0 (1067)
    Verified20+ References
  • 4.8 / 5.0 (1662)
    Premium33+ References

Transmit Security Videos

  • currently locked
  • currently locked
  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References66 total
    About

    FusionAuth is a single-tenant CIAM solution that deploys on-premises, in your private cloud, or on their fully-managed FusionAuth Cloud. Their JSON REST API provides advanced identity management that is easy for developers to deploy and implement on any platform or framework.

  • Reference Rating
    4.7 / 5.0
    Customer References20 total
    About

    Secret Double Octopus is the passwordless authentication solution for the enterprise. They liberate end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication. The Octopus Passwordless Enterprise™ technology provides a unified user experience and a consistent way to access workstations, remote services, cloud applications and on-prem systems while providing stronger protection against cyber-attacks. From being named a Gartner “Cool Vendor” in 2016, their 4th generation platform is now serving mid-sized to Fortune 50 customers around the globe.

  • Reference Rating
    4.7 / 5.0
    Customer References33 total
    About

    WinMagic provides application aware Intelligent Key Management for enterprise controlled grade encryption, with robust, manageable and easy-to-use data security solutions. WinMagic SecureDoc secures data wherever it is stored, providing enterprise grade data encryption and key management policies across all operating systems while enabling a unified encryption strategy across any end point and virtualized or Cloud IaaS environment. SecureDoc is trusted by thousands of enterprises and government organizations worldwide to minimize business risks, meet privacy and regulatory compliance requirements, while protecting valuable information assets against unauthorized access.

  • currently locked