Ubisecure References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (605)
    14+ References
  • 4.8 / 5.0 (2289)
    Verified75+ References
  • 4.8 / 5.0 (1968)
    Verified46+ References

Ubisecure Case Studies

  • Self - service and SSO for local government services

  • The Award-Winning Telia Identification Broker Service

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References14 total
    About

    Athenian is a Data-Enabled Engineering platform that helps engineering leaders build a continuous improvement culture by leveraging insights and aligning teams with company goals.

  • Reference Rating
    4.7 / 5.0
    Customer References75 total
    About

    Identity Automation has focused on intelligently automating provisioning, access, and account management from the start. They’ve never stopped improving, making their solutions even more powerful and seamless for organizations of all types and sizes. Today, RapidIdentity is the most powerful and complete IAM platform available, managing millions of identities for more than 675 organizations worldwide. RapidIdentity addresses not only web single sign-on needs, but also fully automated lifecycle management and provisioning for ALL users, integrated privileged access management, delegated identity administration, password management, comprehensive multi-factor authentication, and more.

  • Reference Rating
    4.7 / 5.0
    Customer References46 total
    About

    My1Login is an enterprise grade workforce identity management solution that enables organisations to transition from being password-based to passwordless. Its market-leading zero knowledge encryption is making it the choice for highly secure organisations, with customers across policing, defence, banking, local authorities and healthcare. My1Login’s workforce identity solution is cloud-based, making it easy to implement and easy to use, and is helping organisations realise quick time to value in protecting against credential theft, account takeover, phishing and ransomware attacks, as well as providing end users with simple and secure access to their applications without requiring passwords.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked