Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • FusionAuth Reviews & Ratings
    168 Ratings
    Company Website
  • Auth0 Reviews & Ratings
    957 Ratings
    Company Website
  • Frontegg Reviews & Ratings
    361 Ratings
    Company Website
  • Plaid Reviews & Ratings
    116 Ratings
    Company Website
  • Veriam Reviews & Ratings
    3 Ratings
    Company Website
  • Sumsub Reviews & Ratings
    199 Ratings
    Company Website
  • Hubstaff Reviews & Ratings
    3,165 Ratings
    Company Website
  • Keeper Security Reviews & Ratings
    1,695 Ratings
    Company Website
  • Iru Reviews & Ratings
    1,380 Ratings
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    2,109 Ratings
    Company Website

What is Everykey Echo?

Everykey provides a secure access platform that is touchless, frictionless, and based on proximity. By offering passwordless authentication and multi-factor authentication, it integrates smoothly with identity management systems to ensure easy and secure access. This innovative solution enables IT leaders to implement zero-trust strategies that are both secure and user-friendly for employees. As a result, organizations can enhance their security measures while maintaining a seamless experience for their users.

What is ActivID?

A flexible and highly scalable platform is engineered to guarantee secure access to government and corporate systems, along with online consumer services. It incorporates multi-factor authentication to protect remote access for employees who connect to corporate VPNs and other enterprise resources. This innovative solution accelerates the development and deployment of reliable identity and compliance authentication systems. Moreover, it features a smart card solution that offers robust authentication to safeguard workstations, mobile devices, and networks. The platform also streamlines the issuance and management of PIV and PIV-I cards, enterprise access cards, and mobile credentials. HID PIV IDMS not only provides identity proofing but also securely issues credentials, even for users operating remotely. In addition, it facilitates the efficient and secure use of service bureau card issuance, ensuring a seamless process for all credentialing requirements. Overall, this platform revolutionizes how organizations manage identity and access, enhancing security across various operational environments.

Media

No images available

Media

Integrations Supported

Active Directory
AuthPoint
Cisco Duo
Microsoft Entra
Qumulex QxControl

Integrations Supported

Active Directory
AuthPoint
Cisco Duo
Microsoft Entra
Qumulex QxControl

API Availability

Has API

API Availability

Has API

Pricing Information

$1.99 per user
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Everykey

Date Founded

2015

Company Location

United States

Company Website

www.everykey.com/product

Company Facts

Organization Name

HID Global

Company Location

United States

Company Website

www.hidglobal.com

Categories and Features

Authentication

Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On

Categories and Features

Authentication

Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Popular Alternatives

Popular Alternatives

Keyless Authenticator Reviews & Ratings

Keyless Authenticator

Keyless Technologies