Define: Access control?
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource while access management describes the process. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.
Top Access control Companies and Solutions
This article showcases Threat.Technology’s top picks for the best Access control solutions. We selected these companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
Verkada builds modern security solutions that help enterprises run safer, smarter buildings. Our mission: Modernize the world of enterprise building security.
Verkada’s enterprise security solution combines easy to install security cameras and access control with intelligent, cloud-based software—all in a scalable, user-friendly system. More than 3,500 organizations, including 30 Fortune 500 companies, use Verkada to protect people and assets, secure facilities, and gain new insights that improve the efficiency of their operations.
Verkada’s vision is to be the operating system that runs every building in the world. The company was founded by computer scientists and security experts from Stanford University, and Hans Robertson, the former co-founder and COO of Cisco Meraki.
Verkada’s vision is to be the operating system that runs every building in the world. .
Netskope is a software company that helps organizations understand online activities, protect data, stop threats, and respond to incidents. The company provides context-aware governance of all cloud usage in the enterprise in real-time, whether accessed from the corporate network, remote, or from a mobile device.
It also helps companies protect data and protect against threats in cloud applications, cloud infrastructure, and the web. Netskope patented Cloud XD technology eliminates blind spots by going deeper than any other security provider to quickly target and control activities across thousands of cloud services and millions of websites.
It offers different deployment options for traffic steering for analysis and policy control. The company can enforce policies including data loss prevention (DLP), access control, anti-malware, encryption, and incident management services on the cloud and web traffic it inspects.
It offers different deployment options for traffic steering for analysis and policy control. .
The proliferation of digital access has made the world more connected than ever before. Trust is the common thread that connects today’s elastic enterprise–trust that your identity solution will be there when you need it most and trust that your end-users know their information is safe.
The OneLogin Trusted Experience Platform is the identity foundation to build secure, scalable and smart trusted experiences that connect people with technology. With OneLogin, seamlessly manage digital identities for your workforce and customers, so you can focus on what matters most–growing your business.
With OneLogin’s complete solution, you can easily connect all of your applications, leverage our proprietary machine learning to identify and analyze potential threats and act quickly using contextual authentication requirements. Secure: Security is the cornerstone of trust.
With OneLogin’s complete solution, you can easily connect all of your applications, leverage our proprietary machine learning to identify and analyze potential threats and act quickly using contextual authentication requirements. The OneLogin platform protects your organization against threats by securing and centralizing your applications, devices, and end-users all in one, easy-to-access place.
Additionally, through our advanced machine learning capabilities, OneLogin can deliver real-time threat intelligence to help automate the process of keeping your business secure. Scalable: The OneLogin Trusted Experience Platform was built for performance and reliability at scale.
With a wide breadth of extensible functionality, we can expand and retract according to the changing needs of your business. Through our enterprise-grade change management solutions, like our Enterprise Sandbox and API Access, you can quickly test large-scale changes before going live in your production instance.
PlainID offers an advanced Authorization Platform, a policy-based access control solution that simplifies authorization to one point of decision, one point of control, and one point of view across cloud, mobile, and legacy applications. This intuitive policy-based decision solution is quickly replacing traditional role-based and attribute-based authorization solutions.
Companies that use PlainID benefit from a scalable, graph database authorization platform that meets the demands of enterprise growth without worry. Founded in 2015, it is headquartered in Tel Aviv, Israel..
Founded in 2016 by cybersecurity industry veterans from the Israeli Intelligence community, Sepio HAC-1 is the first hardware access control platform that provides visibility, control, and mitigation to zero trust, insider threat, BYOD, IT, OT and IoT security programs. Sepio’s hardware fingerprinting technology discovers all managed, unmanaged and hidden devices that are otherwise invisible to all other security tools.
Sepio is a strategic partner of Munich Re, the world’s largest reinsurance company, and Merlin Cyber, a leading cybersecurity federal solution provider.. .
Ionic Security, a data security platform, provides access control, intellectual property monitoring, data encryption, and policy management. Ionic Security (formerly Social Fortress) enables the use of cloud services by protecting sensitive data anywhere it travels and wherever it resides, whether on the corporate network, in the cloud or on mobile devices.
The first unified data security platform of its kind, Ionic Security takes a comprehensive approach to secure data in today’s borderless enterprise by providing access control, intellectual property monitoring, data encryption, and policy management, without proxies or gateways or changes in user behavior. The company is headquartered in Atlanta, Georgia, and is backed by leading venture firms such as Kleiner Perkins Caufield & Byers, Google Ventures, TechOperators, and ff VC as well as industry experts Christopher Klaus, Ken Levine, Phil Dunkelberger, and Dr.
Paul Judge.. . Paul Judge.. .
SecureAuth is the leader in adaptive access control solutions, empowering organizations to determine identities with confidence. SecureAuth™ IdP provides authentication security, Single Sign-On, and user self-service tools together in a single platform, allowing strong identity security while minimizing disruption to the end-user.
Flexible Adaptive Authentication workflows can protect on-premises, cloud, mobile, and VPN applications that can detect the use of compromised credentials allowing our customers to quickly respond a security breach. Currently protecting over 5 million users worldwide including Western Union, Unisys, FBI, Toshiba, Ticketmaster, General Mills, and more, SecureAuth provides adaptive access control to some of the largest and most respected companies in the world..
Powered by proprietary Artificial Intelligence models and uniquely built on billions of real-world data points, CUJO AI portfolio of products is designed to gain a clear insight on how data moves across networks and digitally protect people and devices, creating a safer smart-living experience in homes, businesses, and connected communities. Network, mobile and public Wi-Fi operators around the world utilize the CUJO AI portfolio of products to provide their customers with a seamlessly integrated suite of value-added services, covering: advanced connected device identification, real-time network security, privacy protection, and content access control.
HIGHLIGHTS – Highly Commended award in the Security Solution of the Year category, Global Telecoms Awards 2019. – Winner: the Most Innovative Security Strategy, Leading Lights 2019 Awards.
– Winner: 2019 Lithuanian-American Innovation Award for cutting-edge technology. – Selected among the world’s most promising growth-stage companies for GSMA 100 program.
– Winner: 2019 Lithuanian-American Innovation Award for cutting-edge technology. – Recognized as a Technology Pioneer 2018 by the World Economic Forum – Listed as a “Vendor to Watch” and a “Cool Vendor in IoT Security” by an acclaimed research company Gartner.
– Official Member of Forbes Los Angeles Business Council.. .
Aporeto offers comprehensive cloud-native security for containers and microservices. It secures all workloads across any infrastructure with identity-based access control for a Zero Trust posture.
Aporeto was founded in 2016 and is based in San Jose, California.. .
Alcatraz AI replaces badging as an access point identification method by leveraging facial recognition, 3d sensing, and AI. The company builds a facial authentication platform using AI and 3D sensing to enable a highly secure and frictionless entry into physical locations.
Alcatraz AI was founded in 2016 and is headquartered in California, USA.. .
Cloudentity is a provider of Identity-Aware Authorization and Application Security solutions for the API first economy such as Open Banking. API Access Control has emerged as the next generation of Identity security allowing enterprises to protect APIs, users, and services from misuse and abuse.
Security and infrastructure teams at Fortune 500 organizations across the world rely on Cloudentity to keep their applications safe from attack. For more information visit Cloudentity.com, on Twitter at @CloudentityTEAM, or connect on LinkedIn at www.linkedin.com/company/cloudentityteam/..
NXT-ID provides a comprehensive platform of technology products and services that enable the Internet of Things (IoT). With extensive experience in access control, biometric and behavior-metric identity verification, security and privacy, encryption and data protection, payments, miniaturization and sensor technologies, NXT-ID develops and markets groundbreaking solutions for payment and IoT applications.
Its industry-leading technology products and solutions include MobileBio®, a suite of biometric solutions that secure consumers’ mobile platforms, the Wocket™, a next-generation smart wallet and the Flye, a digital credit card developed in collaboration with WorldVentures.. .
Nexkey provides a platform to change the way people experience access to physical spaces, indoor and out. They do this through a combination of an intuitive app, secure cloud, and beautifully designed hardware to give businesses the ability to make any door smart, and manage access in real-time.
Nexkey is headquartered in San Mateo, was founded in 2013, and is led by CEO Eric Trabold.. .
Interface Security Systems
Interface Security Systems is a leading managed service provider delivering business security, managed network, UCaaS, and business intelligence solutions for distributed enterprises. We improve security, streamline connectivity, optimize operations and reduce IT costs, maximizing ROI for the nation’s top brands.
Our managed service offerings include implementation and maintenance of SD-WAN, wireless WAN, cloud-based enterprise communications, interactive remote video monitoring, lone worker safety, managed access control, intrusion alarm systems, cloud video management, video analytics and POS exception reporting. Our technology partnerships and world-class command and control centers operated by our team of experts give our customers a significant competitive advantage.
We eliminate the hidden costs and complexities of dealing with multiple vendors and charge a flat monthly rate with a single invoice for security, network, communications, and business intelligence. Our culture of complete transparency and relentless focus on customer success has made Interface a trusted partner for leading enterprises.. We eliminate the hidden costs and complexities of dealing with multiple vendors and charge a flat monthly rate with a single invoice for security, network, communications, and business intelligence. .
Avigilon is a motorola solutions company provides trusted security solutions to the global market. Avigilon designs, develops, and manufactures video analytics, network video management software and hardware, surveillance cameras, and access control solutions.
Avigilon’s solutions have been installed at thousands of customer sites, including school campuses, transportation systems, healthcare centers, public venues, critical infrastructure, prisons, factories, casinos, airports, financial institutions, government facilities, and retailers. Avigilon systems protect and monitor various locations worldwide including major corporations, government institutions, stadiums, retail environments, casinos, critical infrastructure, transportation stations, and more, providing the best evidence possible..
Sequr is automating physical security management for the modern enterprise and commercial office building. Sequr is breaking the tradeoff between security and convenience that has defined the access control industry for decades.
Their combination of enterprise level security, beautiful management portal and limitless scalability means that their customers can access the security and features normally reserved for the Fortune 500 at an affordable price. Even more, Sequr turns everyone’s phones into their access card.
No more retractable badges, no more getting locked out of the office.. . No more retractable badges, no more getting locked out of the office.. .
AOptix Technologies, Inc. develops free space optical communications and iris biometrics based identification solutions for government and commercial markets.
It offers advanced biometric iris recognition systems and ultra-high bandwidth laser communication solutions. Its products are used in advanced biometrics applications, such as border security, national and regional ID cards, aviation security, governmental and commercial access control, and law enforcement; defense applications, including network-centric operation and ground and air nodes; and commercial applications comprising outdoor sporting event remotes, wireless ad-hoc networks, and wireless breakthrough delivers uncompressed HD video..
InstaSafe is a security solutions organisation that has been redefining cloud based security by introducing disruptive and cost effective solutions that seek to alter the cybersecurity spectrum altogether. InstaSafe was founded in 2012 by cybersecurity experts Sandip Kumar Panda, Biju George, and Prashanth Guruswamy.
As a Gartner recognised Zero Trust Network Access solutions provider, InstaSafe seeks to leverage ZTNA based concepts to ensure a seamless, secure internet experience for all users in an organisation, irrespective of the device or location from which they use these resources. InstaSafe uses the neoteric conception of Software Defined Perimeters (SDP) to deploy a network centric zero trust architecture that leverages the cloud to provide unprecedented security to its users, along with granular level network access control.
As one of the pioneering players in the SDP industry, InstaSafe has made an impression among organisations looking to switch to security setups that aid their migration to the cloud. Unlike appliance-based solutions, InstaSafe offers a hardware-free, Zero configuration, Self-service style, Fully redundant Security-as-a-Service, which could be deployed in minutes with comprehensive reporting.By effectively eliminating the need for on-premise hardware appliances, InstaSafe provides a viable, scalable, simpler, and more secure alternative to existing legacy based security setups.. As one of the pioneering players in the SDP industry, InstaSafe has made an impression among organisations looking to switch to security setups that aid their migration to the cloud. .
Foxpass increases your organization’s server and network security by ensuring employee accounts have access only to what they need. Their cloud-hosted LDAP, RADIUS, and server access control systems help you bring best practices to your infrastructure.
And they’re backed by your existing Google Apps or Office 365 accounts.. .
Building Intelligence Inc.
Winner of the 2014 Best New Product in Security; SV3. Building Intelligence develops innovative solutions for the security industry.
Our cloud-based products are Shortpath, SV3 (Secure Visitor, Vehicle, Vendor) and Secure Vendor. SV3 is used for managing entrances, loading docks and buildings.
The product verify credentials and schedules upon entry. Secure Vendor provides a means for organizations and individuals to manage their credentials for expedited entrance.
The product verify credentials and schedules upon entry. Every facility that manages their entrance is a potential customer for SV3.
Every person or business that enters a facility is a customer for Secure Vendor. SV3 is used in some of most influential buildings in the World such as the MTA Headquarters, World Trade Center and The Time Warner Center.
Operating in over 30 million sq. ft.
Axiomatics is the leading independent supplier of attribute based access control (ABAC) solutions. With a global customer base within healthcare, finance, manufacturing, insurance and the public sector the company offers proven authorization solutions that can be tailored to meet the demands of virtually any organization.
The company, which is headquartered in Stockholm, Sweden and has offices in the US, has been a driving force behind standardized access control through its suite of XACML 3.0-based products. These are utilized by everything from Fortune 50 companies, national health authorities to universities, to securely share information across and/or within borders and boundaries, while complying with complex and ever-evolving regulations.
By implementing these standardized solutions Axiomatics customers can also reduce IT development costs and time-to-market. The Axiomatics product suite includes the Axiomatics Policy Server, (APS) the Axiomatics Policy Auditor (APA) and the Axiomatics Reverse Query (ARQ) among others.
By implementing these standardized solutions Axiomatics customers can also reduce IT development costs and time-to-market. Axiomatics also provides security solutions for big data and cloud.
Its solutions enable dynamic data masking and dynamic data filtering for a wide range of databases. Axiomatics solutions can be used to implement security controls such as Export Control legislation, privacy, GDPR, toxic combinations, and conflicts of interest policies..
Vidder’s Trusted Access Control technology mitigates network-based attacks by making servers invisible to everyone except authorized users. Vidder offers managed services that protect high-value networked assets.
Vidder’s unique solution is based on a new standard called the Software-Defined Perimeter (SDP) that is being developed by the Cloud Security Alliance. It was incorporated in 2009 and is based in Campbell, California..
baimos technologies is the company behind award-winning BlueID technology – the digital key ring for your smartphone. Innovative products of baimos technologies enable the use of smartphones in identification, access control, authentication, secure command execution as well as in the sharing of jointly used goods by smartphone.
BlueID technology integrates seamlessly into apps, backend systems and existing hardware. Solutions of baimos technologies are known to be simple, smart and secure.
The origin of baimos technologies lies in the development of security technology for the automotive industry. In past years, the product portfolio has also expanded to facility management and IT.
The origin of baimos technologies lies in the development of security technology for the automotive industry. The client base includes customers such as Daimler, Sixt, Pango Mobile Parking and LMU Munich..
EdgeWave (formerly St. Bernard Software, Inc.), a software development company, engages in the design, development, and marketing of Internet security appliances and service.
It offers secure content management and policy compliance solutions. The company’s solutions enable its customers to manage their employee usage policy for Internet access, email, and instant messaging.
Its products include iPrism, a Web content filtering appliance that enables organizations to enforce Internet use policies by providing multi-protocol Web filtering and access control; iPrism Enterprise Reporting Server, a non-filtering appliance that enables organizations to aggregate user activity reporting and archiving across multiple iPrism appliance deployments in one centrally managed reporting solution. The company products also consist of OEM Software Development Kit that allows the OEM partners the ability to leverage the Web filtering database; and ePrism, an email filtering and content inspection appliance, which protects against spam, viruses, and other unwanted email content, and against outbound data leakage through message content and attachment inspection and policy enforcement.
Its products include iPrism, a Web content filtering appliance that enables organizations to enforce Internet use policies by providing multi-protocol Web filtering and access control; iPrism Enterprise Reporting Server, a non-filtering appliance that enables organizations to aggregate user activity reporting and archiving across multiple iPrism appliance deployments in one centrally managed reporting solution. The company is headquartered in San Diego, California..
Viakoo delivers performance, security and compliance management for Enterprise IoT Applications and Devices. Video cameras, access control systems, intercoms, and other IoT systems typically are managed piecemeal or manually.
Viakoo’s SaaS offering automates the verification of these heterogeneous systems to confirm they are working properly and are secure from end-to-end. Enterprises literally have 1 Billion+ of these IoT devices from 100s of vendors with a virtually unlimited combination of end-to-end configurations.
In many cases an endpoint device can be functioning correctly but the IT infrastructure that supports a class of device can be down or slow, causing a problem. For example, a video camera can be on but the video footage may not be recorded.
In many cases an endpoint device can be functioning correctly but the IT infrastructure that supports a class of device can be down or slow, causing a problem. An access control system may appear to be on-line until employees attempting to enter a facility are stuck outside and are unable to start working.
74% of the time service providers will send a truck to fix a problem that can be resolved remotely in minutes. This is both expensive and risky for service providers and their customers.
Viakoo’s 750+ million hours of experience with 100s of applications and 1000s of device types ensures Enterprise IoT applications are available, performant and secure 24×7. Enterprises see value from Viakoo in minutes as Viakoo detects configurations automatically..
The journey of securing lives began in 1994 for Zicom. With years of expertise and experience, Zicom etched a name for itself in the field of Electronic Security Surveillance in India.
Over the last two decades, Zicom has expanded its reach to 5 countries, 1023 cities, and over a million happy customers, with an annual turnover of 926 crores.. .
Amberbox Gunshot Detection
AmberBox provides instant gunshot detection, automating emergency processes to significantly reduce response time and remove human error, saving lives and mitigating liability. AmberBox detectors utilise a patented gunshot detection algorithm to respond immediately following a firearm discharge.
With tri-factor authentication (percussion, audio and infrared), detectors are able to instantly determine a firearm signature with a near-zero false alarm rate. Upon activation, detectors alert first responders through our reporting network, and can integrate with other security systems, such as cameras, access control systems and mass notification to initiate..
SuperTokens provides open source authentication and authorization for web and mobile apps. This includes login, email verification, 2FA, SSO, secure session management, access control and more.
SuperTokens aim to be the simplest and quickest to implement. .
Nokē is reinventing commercial security by creating hardware and software solutions that do more than just secure your company’s assets. We are dedicated to simplifying security management while offering heightened control to better protect your employees, buildings and resources.
Our intuitive analytics dashboard, wireless locks and integrated solutions offer a more advanced method of access control and asset tracking than any other. Nokē was founded by David Gengler and Cameron Gibbs and is headquartered in Lehi, Utah..
NETSHIELD is a breach prevention company that offers intranet breach prevention appliances and advanced mobile and IoT security. Its mission is to be a trusted provider of cost-effective, proactive security solutions to enhance the organization’s cyber-risk mitigation strategies.
NETSHIELD delivers critical network access control to ensure only trusted assets access corporate networks. Additionally, zero-day malware and phishing attack real-time quarantine, mac-spoof detection, TLD blocking, comprehensive auditing, vulnerability assessments, and compliance reporting and enforcement make this a comprehensive and compelling offering.
NetSHIELD is available as a hardware appliance that scales from 25 to 10,000 protected assets per appliance. In addition, an embedded command center allows administrators to manage up to 1000 remote sites.. NetSHIELD is available as a hardware appliance that scales from 25 to 10,000 protected assets per appliance. .
Torsion Information Security
Torsion delivers Confident Data Access Control. It helps you get control of who has access to what, why and when – among massive collections of files, folders and sites.
Access to files and folders sprawls much faster than it is controlled. Constant sharing with little visibility or control of who has access to what, leads to significant security and compliance challenges.
Torsion integrates with your existing collaboration systems, working with business users to monitor and control access as circumstances constantly evolve. Working across Microsoft Teams, SharePoint, Office 365 and File Share systems – to improve data security and simplify compliance.
Torsion integrates with your existing collaboration systems, working with business users to monitor and control access as circumstances constantly evolve. Business users, not IT, are best positioned to understand who needs access to their information, and so we empower them without slowing them down.
Torsion’s unique solution is cloud-first, smooth to deploy and affordable for businesses of all sizes.. .
Great companies are built by great people. Pulse Secure has a global team of talented individuals dedicated to keeping your business and end-users secure and connected.
They are driven to ensure that you and your end users get the safest on-premise and off-premise mobility solutions that are also incredibly simple and intuitive to use. Pulse Secure, LLC is a leading provider of access and mobile security solutions to both enterprises and service providers.
Enterprises from every vertical and of all sizes utilize the company’s Pulse virtual private network (VPN), network access control and mobile security products to enable end user mobility securely and seamlessly in their organizations. Pulse Secure’s mission is to enable open, integrated enterprise system solutions that empower business productivity through seamless mobility.. Enterprises from every vertical and of all sizes utilize the company’s Pulse virtual private network (VPN), network access control and mobile security products to enable end user mobility securely and seamlessly in their organizations. .
StoneLock is a security company that specializes in designing and manufacturing secure biometric access control solutions. It features biosecure, reliable, and user-friendly access control products for both government and commercial customers.
The company was founded in 2011 and headquartered in Olathe, Kansas.. .
Untethered Labs is a revenue generating start-up focused on bringing wireless technology based security solutions to small and large enterprises. Their product – GateKeeper – is a Bluetooth 4.0 based keyfob that automatically locks and unlocks the user’s computer based his proximity.
The GateKeeper Enterprise solution enables large organizations to modernize company-wide computer access control on their network. Their products fulfills the urgent need for hardware based authentication and privacy, whether it is for healthcare facilities which must observe HIPAA regulations, or for multi-million dollar companies where data integrity and security are paramount..
EyeLock researchers and scientists are working in labs and in the field to create technology to improve every facet of identity based product and technology, from access control, border solutions and transportation to advanced banking and payments applications. EyeLock Corporation is at the forefront of providing the most secure and cost effective ways in which to reduce identity theft and fraud.
Innovation doesn’t stop with todays’ technology. The future possibilities are endless and Their world class researchers are working on a wide range of projects – from technology that can identify people in motion at distances greater than 50 feet – creating endless possibilities for Identification in Anonymity®, to embedding Their industry leading technology in a form factor smaller than a USB drive, to incorporating the most advanced privacy components and delivering security with all the privacy preferences required to satisfy today’s digitally driven consumers..
Allied Universal provides security solutions. Allied Universal provides unparalleled service, systems, and solutions to serve, secure, and care for the people and businesses in their communities.
They are responsible for protecting more than 42,000 client sites across North America covering multiple specialty sectors such as higher education, healthcare, and corporate campuses. Technology like access control, intrusion and alarm detection, and IP-based video systems allows Allied Universal to customize every level of security to your needs.
Through Allied Universal’s integrated approach to security, the best trained officers are supported by the latest technology like CyCop, their mobile incident reporting platform. That union enables both proactive planning and the most responsive security programs in the business.
Through Allied Universal’s integrated approach to security, the best trained officers are supported by the latest technology like CyCop, their mobile incident reporting platform. .
Verifyoo is based on non intrusive BehavioMetrics which are hard to forge and can be revoked, unlike fingerprints, facial recognition and other physiological biometrics. Next generation 3-Factor authentication, by utilizing the user’s device, memory and BehavioMetric characteristics Verifyoo significantly reduces account hijacking.
Verifyoo Provide your customers with a significantly improved user experience and reduce cost by minimizing password recovery call center requests.. .
Cydarm is secure by design. They know that cybersecurity is a team sport, and success requires collaboration at different levels of trust.
Cydarm’s attribute-based access control model provides flexible collaboration. The value of a collaborative incident response platform increases with the number of users.
They believe in providing fair and predictable licensing that won’t surprise you with a cost overrun, so they charge per user. Contact an expert to learn how Cydarm can provide value in your SOC.
They believe in providing fair and predictable licensing that won’t surprise you with a cost overrun, so they charge per user. Every organization has a different cybersecurity technology stack and they know you will want to customize your workflows.
Cydarm has an open API, and is easy to integrate with your existing technology stack. Cydarm can be deployed anywhere.
Whether you prefer to maintain your security stack on-premises or in the cloud, Cydarm will meet your requirement. Cydarm is deployed using Docker containers, so all you need is a Docker host environment..
CloudCodes is provider of cASB solution. The solution includes Single Sign On(SSO), Identity Access Management(IAM), Access Control, Cloud DLP, Shadow IT and Workload Security.
It has more than 400+ customers across the world. It provides SaaS based solution for cloudn security.
It’s customers include pharmaceutical, bank, manufacturing, aviation, travel, ecommerce etc-etc.. . It’s customers include pharmaceutical, bank, manufacturing, aviation, travel, ecommerce etc-etc.. .
IperLane offers businesses and organizations with mobile monitoring and access controlling solutions. It provides its services through an API.
IperLane offers solutions that enable businesses to collect data about network connections and file-related actions from their employees’ work applications. IperLane was founded by Kelly Shortridge and Vincenzo Iozzo in March 2015.
It is based in New York.. . It is based in New York.. .
Sera4 protects critical infrastructure in remote places around the globe. They have created a keyless platform for physical access control that is both easy to use and highly secure.
They now operate across four continents, made possible by their relentless focus on a great customer experience.. .
HID Global is the trusted source for secure identity solutions for millions of customers around the world. Recognized for robust quality, innovative designs and industry leadership, HID Global is the supplier of choice for OEMs, system integrators, and application developers serving a variety of markets, including physical and logical access control, card personalization, eGovernment, cashless payment and industry and logistics.
Headquartered in Irvine, California, HID Global has over 1,700 employees worldwide and operates international offices that support more than 100 countries. HID Global is an ASSA ABLOY Group brand..
100% Agentless & non-intrusive way, we provide security to BYOD-enabled Enterprises by detecting & fingerprinting all personal devices, complete security scan & analysis of the devices, protecting Corporate Network from BYOD specific infections and intrusions and doing a thorough granular access control using device attributes as well as Apps. Detailed Value proposition: 100% Agentless-way (ZERO-Touch) of detecting all personal devices, secure quadrupled fingerprinting (US patent-pending), DPI & thorough security scan & analysis (Vulnerability check, associated risks, thorough BYOD specific intrusion alerts, Device compromise check (jailbroken, rooted), BYOD specific network behavioral analysis to see patterns, anomalies & zero-day attacks.), posture check (anti-malware software is installed on the device? latest signatures?) and then deny infected personal device connecting to the network as well as do a thorough granular access based on device attributes as well as apps.
We do it irrespective of how you get onto the network – from Corporate Wi-Fi or VPN. We also detect enterprise-worry apps (such as dropbox, box.net, Facebook etc.) on the wire and we can even stop them.
We also provide granular access control based on any of the attributes of the devices that we discover (such as macid, ip address, OS, OS version, SSID, office location, time, form factors, device class & type & manufacturer etc.) – all done at real-time! We protect BYOD-enabled Enterprise from the BYOD specific threats. We have developed lot of technologies which are mobile specific and are innovations by itself be it “Agentless discovery & fingerprinting” of all personal devices or the malicious/intrusion detection which are specific to again BYOD.
We also provide granular access control based on any of the attributes of the devices that we discover (such as macid, ip address, OS, OS version, SSID, office location, time, form factors, device class & type & manufacturer etc.) – all done at real-time! We protect BYOD-enabled Enterprise from the BYOD specific threats. .
YouBase makes it safe and easy for consumers to access, control and share valuable health and personal information. YouBase enables individuals to maintain their data and identity across various places where they have health care encounters in their daily life, and share as they like too.
YouBase combines blockchain compatible technologies which together deliver a secure and flexible container for data that is independent of control by any one single entity, except the patient. YouBase enables organizations to decentralizes sensitive consumer and personal information while creating a source of anonymous population data, with consent in-built..
RSA, the security division of EMC, is the premier provider of security solutions for business acceleration. As the chosen security partner of more than 90% of the Fortune 500, they help the world’s leading organizations succeed by solving their most complex and sensitive security challenges.
RSA’s information-centric approach to security protects the integrity and confidentiality of information throughout its lifecycle no matter where it moves, who accesses it or how it is used. RSA offers industry-leading solutions in identity assurance & access control, encryption & key management, compliance & security information management, and fraud protection.
These solutions bring trust to millions of user identities, the transactions they perform, and the data that is generated. With RSA, customers are confident their information assets are protected, and free to realize new business possibilities.. These solutions bring trust to millions of user identities, the transactions they perform, and the data that is generated. .
Keychain is the decentralized authentication blockchain platform for finance, IoT, and enterprise. Keychain provides a Decentralized Authentication Platform ™ that allows clients to solve concrete business problems related to authentication and access control in a way that enhances and integrates cleanly into existing systems and processes.
Seamless integration, instead of replacement, is a key advantage to achieving wide adoption of this powerful innovation. They are a technology company that believes in fortifying operational integrity in finance, IoT, and enterprise through well-engineered, business solutions.
They do that by applying the blockchain concept in a new way to concrete business problems that they understand through long experience in financial technology infrastructure.. . They do that by applying the blockchain concept in a new way to concrete business problems that they understand through long experience in financial technology infrastructure.. .
Sandstorm operates as an open-source platform for self-hosting web apps. It features apps for document editing, chat, task management, file storage, email, music playing, code hosting, forums, games, and more.
The platform also enables unified sharing of access control and connects apps with powerbox.. .
Biodit Global Technology JSC
Biodit Global Technology is a tech company that specializes in development of state-of-the-art biometric security systems. BIODIT means innovation, comfort, design but above all, it means the highest level of SECURITY.
Endless areas of application – healthcare industry, business and office centers, commercial and residential buildings, hospitality, banking and automotive industries. The areas of application of our unique biometric technology for access control, time attendance monitoring and management of operations, just to name a few, are endless – healthcare industry, business and office centres, commercial and residential buildings, hospitality industry, university centres, banking industry, automotive industry, security companies etc..
Dowley Security Systems
Dowley Security Systems, Inc. provides electronic security and network integration solutions to critical infrastructure and commercial markets.
It specializes in the design, installation, service, and support of security solutions for industrial, government, and commercial organizations. The company’s services include access control, intrusion detection/monitoring, video surveillance, fire alarm and fire suppression, locksmithing, network infrastructure and integration, project management, service on-call, and budgeted maintenance.
Dowley SecuSystems, Inc. was formerly known as Infrastruct Security, Inc.
Dowley SecuSystems, Inc. in April 2010.
The company was founded in 1986 and is based in Houston, Texas with locations in Oklahoma City and Tulsa, Oklahoma.. .
JolPi Electronics Ltd.
JolPi, design and develops electronic devices to make life better. Its primary focus is on household IoT products i.e.
Gas Leakage Alarms, Home Appliance Control, Access Control and Security devices, Health-Care devices etc. JolPi is rapidly prototyping on electronic products to build a global brand.
JolPi is committed to create life changing products that will provide innovative solutions to critical problems. “We put meaning into things and that give people a reason to own our product and feel proud of it”, this is how Reza Ul Kabir the founder and CEO of JolPi summarized the company.
JolPi is committed to create life changing products that will provide innovative solutions to critical problems. That means in every two hours one accident is taking place at homes across major cities of Bangladesh.
The country has seen a very low progress in the development of electronics industry. This can be attributed to our reluctance in venturing into electronics industry to produce advanced and original products locally.
Solution ————- We have rolled out our very own gas leakage detector called “Sniffer” in three different variations which can avert potentially fatal accidents by detecting gas leakage within the quickest possible time. To address our people’s lack of passion to pursue electrical engineering in Bangladesh, we are assiduously working to build a completely local electronics company that will instill the belief in others that we possess the capacity to produce advanced and original electronic hardware in Bangladesh.
Cloudkeyz offers cloud secured access into multi-tenant commercial and residential buildings replacing access cards and keys. It also offers real-time mobile access control, enhanced security and liability mitigation, tenant retention, and more.
Property managers use a simple web-admin to manage property access and key rights from the cloud and give their tenants and guests the power to move about the property key-free with a cellular-based mobile app and touchscreen interface.. .
Fortem develops advanced physical security information management (PSIM) technologies for improved public safety and private security. Omnipresence 3D is an advanced Command & Control software for leading security conscious cities, military facilities, mass transit systems, airports, utilities, and large facilities.
With its unique 3D interface, Omnipresence 3D provides a common monitoring and alarm platform for multiple security and safety sub-systems, including CCTV, fire, access control, and other third-party systems.. .
LockState, the parent company of RemoteLock cloud platform for smart locks, has been at the forefront of internet-connected devices and cloud access control solutions for rental properties and businesses for over seven years, servicing tens of thousands of customers worldwide. Through partnerships with Airbnb, HomeAway, and other listing partners, RemoteLock provides the ability for property owners to centrally and remotely manage property access from anywhere in the world.
RemoteLock is headquartered in Denver, CO and backed by KKE, Iron Gate Capital, Nelnet, and Service Provider Capital.. .
BeyondTrust is the global leader in privilege authorization management, access control and security solutions for virtualization and cloud computing environments. BeyondTrust empowers IT governance to strengthen security, improve productivity, drive compliance and reduce expense.
The company’s products eliminate the risk of intentional, accidental and indirect misuse of privileges on desktops and servers in heterogeneous IT systems.. .
Datasparc offers data security, database management, data governance and data analytics – all in one solution. With Datasparc’s flagship product DBHawk, users only receive access to the data they need.
DBHawk provides secure access to on-premise and cloud databases. DBHawk supports a wide array of SQL and NoSQL databases, including AWS Athena, Amazon Redshift, Cassandra, Greenplum, MongoDB, MySQL, Oracle, Microsoft SQL Server, SAP Hana, and Teradata.
DBHawk integrates with SAML, LDAP, SSO, and OKTA. Its comprehensive object access control policy and auditing features allow logging all database activities, making it ideal for organizations seeking to comply with data protection regulations such as GDPR and HIPAA.
DBHawk integrates with SAML, LDAP, SSO, and OKTA. .
VKANSEE is ushering in a new age of mobile security with its revolutionary, patented new breed of UTFiS fingerprint sensors. Our fingerprint capture and matching technology enables mobile security for payment applications, data storage, access control and more.
They’re headquartered in Beijing, with an R&D office in Shenzhen and sales / support offices in New York City.. .
To keep pace with the proliferation of mobile devices, applications, and data, the world must move beyond passwords and PINs toward more sophisticated security measures. First generation external biometrics including fingerprint, voice and Iris are now commonplace.
B-Secur represents the next generation of internal biometrics. Their patented ECG technology reads an individual’s heartbeat pattern to verify their identity with a wide variety of applications for consumers and enterprises including mobile banking, building access control and health and wellness.
Their advanced technology and processes are already winning awards and accolades in the Financial Services industry. With beginnings in Belfast, Northern Ireland, B-Secur has a long history of security technology solutions.
Their advanced technology and processes are already winning awards and accolades in the Financial Services industry. Their team comprises a number of highly experienced people from a variety of industry backgrounds with deep expertise in technology, science, biometrics, mobile, security and consumer marketing.
Their ambition is to create truly innovative and world-class solutions that are desperately needed to influence how they use technology in the future.. .
StereoVision Imaging, Inc. is a 3D facial recognition company which has developed patented binocular optics and proprietary image enhancement software enabling users to obtain significant improvements in the accuracy and range of existing facial recognition engines.
Our powerful imaging software algorithms work under challenging environmental conditions, indoors or outside,in shade or direct sunlight; the technology works with uncooperative subjects – ideal for covert surveillance. We have two groundbreaking products which are ready for commercialization.
3DMobileID™ is our Wireless Face Recognition Binocular System. With a range of up to 200 meters, and weighing less than 2 lbs.
3DMobileID™ is our Wireless Face Recognition Binocular System. It is also wireless – so images that are captured are wirelessly transmitted to back-end servers.
The System is Secure, as it uses Military grade encryption for data protection. The technology is Accurate – delivering up to 40% improvement in image quality, reducing the risk of “false-positive” matches.
And it is Fast – response time < 15 seconds. This technology has been tested and validated by various agencies within the Department of Justice and the Department of Defense.
We work together to provide a hack-proof security to our clients that will keep them safe from malicious hackers. We provide advanced techniques to manage cyber security risks, access control, network and system infrastructure and other components of technology.
Sustaining efficiency of monitoring system and security operations in an organisation, cyber security solutions play the role in automated mode that provides the advantages to cyber security professionals and for this reason incident response process pushed forward and faster to recover the affected systems.. .
QuardLock is a global front runner in trusted security solutions with three-factor authentication (something you know, something you have, something you are). QuardLock has developed an ISO 7810/7816 compliant smart card with onboard biometric verification that releases one-time-passwords (OTP) for secure access control, data transaction signing and document e-signature.
Together with our QuardLock verification server we provide secure access to data and applications, both in-house and in the cloud, in order to protect high value assets and systems. Quardlocks vision for the future is a world where the overwhelming and increasing problems with credit card fraud and identity theft are gone once and for all.
It aims to find the fastest and most efficient way of integrating the security benefits of QuardCard into the existing financial ecosystem while changing as little as possible in the infrastructure for a successful market entry and not only solve all issues with the demand for strong authentication as required by ECB for e-commerce (Card-not-present), but also secure the same strong authentication for physical transactions (Card-present) and e-banking, all within the same back-end integration and card solution. QuardLock exists to help the financial, public and commercial ecosystem to fight and get rid of problems with credit card fraud, identity theft, hacking, spoofing and other criminal attempts to destroy our world.
It aims to find the fastest and most efficient way of integrating the security benefits of QuardCard into the existing financial ecosystem while changing as little as possible in the infrastructure for a successful market entry and not only solve all issues with the demand for strong authentication as required by ECB for e-commerce (Card-not-present), but also secure the same strong authentication for physical transactions (Card-present) and e-banking, all within the same back-end integration and card solution. .
Telcred provides offline physical access control systems based on NFC. The unique feature of Telcred’s system is that the lock controllers do not need to updated when users or users’ access rights change.
Time-limited “digital keys” are sent to an NFC phone or a contactless smart card, which can then be used to gain access. The company is a spinoff from SICS, Swedish Institute of Computer Science, and primarily targets infrastructure companies such as telecom operators, power companies, and operators of public transportation..
QBRICS is an enterprise blockchain platform that provides data governance through quantum computing resistant encryption, attribute-based access control, and interoperability among disparate versions of blockchain protocols. Because of the comprehensive nature of the QBRICS platform, the enterprise can accelerate the deployment of blockchain, focusing on the business application rather than the underlying technology.
Because of our interoperability of our platform, developers will be able to build once, knowing their applications will work with any QBRICS enabled flavor of blockchain.. .
ASSA ABLOY Group
ASSA ABLOY Group has a complete range of door opening products, solutions, and services in areas such as mechanical and electromechanical locking, access control, identification technology, entrance automation, and hotel security for the institutional, commercial, and consumer markets. The company delivers access solutions, trusted identities, entrance automation, and service for institutional and commercial customers, as well as for the residential market.
ASSA ABLOY Group was founded on 1994 and is headquartered in Stockholm, Sweden.. .
Traka is a company full of creative ideas. The Traka system has evolved from many years working closely with some of the world’s largest corporations.
Tried and tested, it is in use 24 hours a day every day of the year all around the world. Yet its development is still ongoing as new opportunities arise.
Read about the Traka Immobilisor which makes the Traka key fob into an intelligent key for Mechanical Handling Equipment, Plant, Commercial vehicles and many other business assets. If your business needs key control, talk to us, the experts.. Read about the Traka Immobilisor which makes the Traka key fob into an intelligent key for Mechanical Handling Equipment, Plant, Commercial vehicles and many other business assets. .
Genetec Inc. is a leading innovator in IP-based security systems and has helped transform the industry by providing customers with a unified portfolio of video surveillance, access control, and automatic license plate recognition solutions.
Designed to leverage the benefits of network technology, GenetecTM products are built on an open architecture, allowing customers to choose from a wide range of edge devices and third party systems, and providing unsurpassed flexibility to allow the system to evolve and grow with the needs of customers. The core of their technology is Security Center, the unified security platform from Genetec..
Ekey Biometric Systems
Ekey Biometric Systems provides a networkable access control system for up to 80 finger scanners and features user-friendly software. It was launched in 2002 and is today Europe’s number one in fingerprint access solutions.
Ekey puts authorization into the customer’s hands. Its wide range of products includes finger scanners for doors, gates, alarm systems, and time recording.
All ekey products undergo a rigorous endurance test before they reach the market. The test involves intensive simulations of blazing heat, biting cold, and high humidity, and every finger scanner is subjected to these conditions, along with all of its components, countless times before reaching the customer.. All ekey products undergo a rigorous endurance test before they reach the market. .
Brivo is a SaaS-focused company that offers centralized security management systems for global enterprises. Offering hosted access control facilities, users can control their systems from anywhere in the world through cloud-based technology.
Brivo is headquartered in Bethesda, Mary Land.. .
Dahua Technology is a world-leading video surveillance solution provider. Their company enjoys the world’s second largest market share according to the IHS 2015 report, and 5th ranking of a&s Security 50 in 2015.
They believe on investing and building strong R&D capabilities for new technology and innovation. Their company invests almost 10% of sales revenue every year.
They have more than 3000 professionals in their R&D team, dedicated to providing cutting edge products with high quality and performance. Dahua’s solutions are designed to be scalable and modular to provide flexible configuration options.
They have more than 3000 professionals in their R&D team, dedicated to providing cutting edge products with high quality and performance. Meanwhile, numerous Dahua products have been acknowledged and awarded by professional associations and organizations in security industry.
Their company’s product portfolio includes: Advanced Video Surveillance Equipment and Software, Access Control Hardware and Software, Intrusion Hardware, and Intelligent Building Management Systems. Dahua’s products are widely used in many fields, such as banking, public security, energy infrastructure, telecommunication, intelligent-building, and intelligent-transportation.
Many significant projects have been installed with Dahua’s solutions including: Lulu mall in Oman, Luxury hotel in Italy, Peruvian LAN airline, APEC in China and Safe city in Brazil as well as many others. Dahua has established sales, marketing and service networks globally.
SALTO Systems provides innovative access control solutions that give customers the reliability and security they need. Based in Oiartzun (SPAIN), SALTO’s customers include airports, hospitals, government buildings, military bases, colleges, hotels and more.
SALTO is the selected access control option on over 3,000,000 doors worldwide. SALTO’s pioneering XS4 SVN platform provides stand-alone networked locking solutions.
With its online and real-time technology, their market-leading XS4 platform enhances the usability of every building environment by securing virtually every door and enabling the monitoring and control of every user. SALTO hardware and software can be networked without wires to provide real-time intelligence and instant control, whilst enabling integration with existing systems to improve manageability and enhance end-user experience.. With its online and real-time technology, their market-leading XS4 platform enhances the usability of every building environment by securing virtually every door and enabling the monitoring and control of every user. .
Veridt manufactures radio isotope detection devices for homeland security, force protection, and other applications. Its products include secure physical access control, handheld, mobile, wireless security and fingerprint capture and identification, radio isotope detection, identification, and analysis systems, and a weatherproof and portable radionuclide detection system called Ranger designed to meet various nuclear spectroscopy requirements.
Quantrad that began operation in 1999 later became Veridt. Its headquarters is in Middleton in Wisconsin..
Founded in 2007, Portnox is a market leader for network access control and management solutions that scale from small to medium businesses through to large-scale government and enterprise organizations. By spanning the diversity of network technologies and devices in-use today, the Portnox platform allows companies to grow, optimize and evolve their infrastructure while ensuring security and compliance.
The IT landscape of today continues to challenge organizations to accommodate an ever changing landscape of users, devices, locations and environments. As the variety and complexity grows, the challenge to maintain policy and compliance while delivering productivity and efficiency amplifies..
Applied Wireless Identifications Group, Inc. provides RFID products and solutions for embedded markets, security industries, and value-added RFID solutions.
It offers RFID modules, readers, and tags/cards with low, high, and ultra-high frequency technology, as well as provides professional engineering services. The company also offers automatic vehicle identification and vehicle entry products, such as UHF RFID reader systems with an integrated fine-tuned antenna for automatic vehicle identification and access control applications, such as parking entry, gate control, and asset monitoring and tracking.
In addition, it provides SCM and asset management, and WIP and document tracking products, as well as handheld readers; and security and access control products, such as proximity readers to the access control industry. The company was founded in 1997 and is based in Morgan Hill, California.. In addition, it provides SCM and asset management, and WIP and document tracking products, as well as handheld readers; and security and access control products, such as proximity readers to the access control industry. .
Axis Communications AB
Axis offers intelligent security solutions that enable a smarter, safer world. As the global market leader in network video, Axis is driving the industry by continually launching innovative network products based on an open platform – delivering high value to customers through a global partner network.
Axis has long-term relationships with partners and provides them with knowledge and ground-breaking network products in existing and new markets.. .
Zuul IoT integrates IoT device security with an existing enterprise IT security systems. It provides IIoT authorization and access control for normal and COOP missions, eliminating backdoor vulnerabilities.
It is a software solution for strong PKI credential management, enforced both at the server or cloud and at the device. The company was founded in 2016 and is headquartered in Columbia, Maryland..
Device Authority provides simple, innovative solutions to address the challenges of securing the Internet of Things (IoT). We help our customers simplify the process of establishing a robust, end-to-end security architecture within the IoT and deliver efficiencies at scale through security automation.
IoT brings new security challenges introduced by the scale and pace of adoption, as well as the physical consequences of compromised security. These challenges cannot be effectively addressed by traditional Information Technology (IT) security solutions.
The Device Authority IoT security platform is purpose-built to address these challenges through automated device provisioning, credential management, secure updates and policy-driven data encryption. The IoT promises countless efficiencies, increased competitiveness, improved customer service and even brand new market opportunities.
The Device Authority IoT security platform is purpose-built to address these challenges through automated device provisioning, credential management, secure updates and policy-driven data encryption. Deploying strong IoT security is even harder.
According to Gartner, by 2020, around 25% of all identified security breaches will involve IoT. To address this, Device Authority introduces a new paradigm of IoT Security Automation that accelerates and simplifies the deployment of strong IoT security.
Advanced, policy driven security automation is critical for industrial, healthcare, transportation and other large scale security sensitive IoT environments. Our patented dynamic key technology provides the essential device-based trust anchor for IoT devices, enabling policy-driven provisioning, access control and data protection for mission-critical IoT applications and services.
With GuestOf, companies can launch faster and spend less by integrating our scalable platform and hardware into whatever product they’re building to automate and manage authentication, access control, event logging and other processes. They can then kick off actions, enable analytics, and more in their own software.
Our highly customizable back-end does the heavy lifting, providing a customer solution with the data and control it needs.. .
Kastle Systems has been leading the security industry since 1972 with advanced managed security solutions and services, protecting commercial real estate, multi-family residential, global enterprises, educational institutions, and critical government facilities. Kastle’s state-of-the-art security solutions include access control, video surveillance, visitor management and identity management, as well as a suite of mobile security applications, all integrated on an open, standards-based platform and supported by a team of experts 24x7x365.
Headquartered in Falls Church, Virginia, Kastle is on CIO Review’s 2019 List of Top 10 Physical Security Providers.. .
Cossack Labs provides easy-to-use and pragmatic customised data security solutions to large enterprises, startups, and tech-savvy SMEs from healthcare, traditional and innovative financing, modern fintech, critical infrastructures, banking and unbundled banking, and other industries. Cossack Labs takes on complete sensitive data protection and mitigating data leakages, without hindering their customers’ operations.
Cossack Labs’ products include a high-level open-source cryptographic library Themis, a database security suite Acra, and a security framework for enabling multi-user end-to-end encrypted data storage Hermes. Cossack Labs’ services are built around building secure software: information security advisory, security and cryptography engineering, secure software development training and consulting.
Its headquarters is in London, United Kingdom, with R&D in Kyiv, Ukraine. —– Find more about Cossack Labs products: Themis is a cross-platform high-level open-source cryptographic library for mobile, web, and server platforms.
Its headquarters is in London, United Kingdom, with R&D in Kyiv, Ukraine. https://github.com/cossacklabs/themis Acra is a database security suite with searchable field-level encryption and leakage prevention.
https://github.com/cossacklabs/acra Hermes is a security framework for enabling multi-user end-to-end encrypted data storage, sharing and access control in the application. https://github.com/cossacklabs/hermes-core.
Armatix is a gun safety company that offers intelligent radio-controlled, wireless locking, and access control systems for guns. The company’s product portfolio offers QuickLock, BaseLock, Smart System, and TrustLock.
Armatix is based in Unterföhring, Germany.. .
Inside Secure (formerly INSIDE Contactless S.A.), a fabless company, provides open-standard contactless payment and near field communication (NFC) semiconductors and software for payment, transit, identity, and access control applications. It offers contactless reader Interface Chips, service enabling NFC interface circuit, contactless payment platform, contactless memory chips, USB desktop contactless readers, and proximity and long range couplers.
INSIDE Contactless also provides professional integration and adoption services, such as application development, packaging services, pre-personalization and personalization, and system integration. The company offers its products for use in smart cards, key fobs, mobile phones, handheld devices, POS, and PC peripherals.
It serves payment card and mobile phone manufacturers, systems integrators, and financial institutions. Inside Secure was formerly known as INSIDE Contactless S.A.
It serves payment card and mobile phone manufacturers, systems integrators, and financial institutions. It has offices in Shanghai, China; Singapore, Singapore; Warsaw, Poland; Seoul, South Korea; San Francisco, California; and Boston, Massachusetts..
Icar is world leader in identity fraud prevention and document management solutions. Based in Barcelona and boasting more than 10 years’ experience in the market, Icar has sales offices in Paris and Sao Paulo and is present in over 20 countries.
The company was created in 2002 to meet the Peralada Group’s need to improve access control in their casinos and as a spin-off of the Computer Vision Center of the Autonomous University of Barcelona.. .
Allthenticate is an early-stage cybersecurity startup that is changing the way people authenticate themselves by creating a distributed authentication ecosystem that is both more secure and easier to use. Allthenticate enables users to authenticate with everything (e .g.., physical doors, laptops, and websites) using their smartphones in a seamless way.
The company’s patented architecture consists of a portable security module, which can be purely software or leverage hardware-based security mechanisms, that provides secure and flexible interactions with any resource. Moreover, Allthenticate offers an easy-to-use cloud-based interface for company administrators to manage all of their employees, digital resources, and physical access control in a single interface, with aggregated, comprehensive logs.
We are confident that with our expertise, and your help, we can create a better tomorrow — one without passwords, keys, hardware tokens, or authentication-based security breaches.. . We are confident that with our expertise, and your help, we can create a better tomorrow — one without passwords, keys, hardware tokens, or authentication-based security breaches.. .
This article was written by Benjamin Skute from Threat.Technology. The editor for this article was Tess Page. If your company is featured in this article and you want to have amendments made please contact us on: [email protected].
Alternatively you may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.