Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Frontegg Reviews & Ratings
    378 Ratings
    Company Website
  • Auth0 Reviews & Ratings
    1,003 Ratings
    Company Website
  • 1Password Reviews & Ratings
    16,511 Ratings
    Company Website
  • Plaid Reviews & Ratings
    138 Ratings
    Company Website
  • HiveMQ Reviews & Ratings
    66 Ratings
    Company Website
  • FusionAuth Reviews & Ratings
    174 Ratings
    Company Website
  • GoAnywhere MFT Reviews & Ratings
    598 Ratings
    Company Website
  • WiseStamp Reviews & Ratings
    700 Ratings
    Company Website
  • RaimaDB Reviews & Ratings
    10 Ratings
    Company Website
  • Sumsub Reviews & Ratings
    202 Ratings
    Company Website

What is Intrinsic ID?

Intrinsic ID is recognized as a leading digital authentication company worldwide, providing hardware-based root-of-trust security specifically designed for the Internet of Things, offering unique and unclonable identities for a wide range of IoT-connected devices. Utilizing their patented SRAM PUF technology, they ensure that their security solutions can be effortlessly integrated into both hardware and software environments. The offerings from Intrinsic ID are versatile and can be utilized at any stage of a product’s lifecycle, playing essential roles in validating payment systems, securing connectivity, authenticating sensors, and protecting sensitive systems utilized by government and military applications. With their technology now found in over 150 million devices, the company has received multiple prestigious awards, such as the Cyber Defense Magazine InfoSec Award, the IoT Breakthrough Award, and the IoT Security Excellence Award, among others. Furthermore, Intrinsic ID's security solutions have been rigorously validated in millions of devices that comply with the demanding standards set by Common Criteria, EMVCo, Visa, and various governmental organizations, further enhancing their standing in the industry. Their relentless pursuit of innovation and security not only reinforces their market position but also propels significant advancements in digital authentication technology. As they expand their impact, Intrinsic ID continues to lead the charge in the evolving landscape of IoT security solutions.

What is Dune Security?

Combatting sophisticated social engineering threats requires a focus on user-oriented security awareness initiatives, red team evaluations, and customized protective measures. This endeavor has consistently presented a daunting challenge to enterprise security teams, particularly as new trends exacerbate the complexity and magnitude of attacks aimed at end users. Cybercriminals increasingly utilize AI advancements to create highly convincing phishing tactics, enhancing the sophistication and scope of their operations. Moreover, advanced persistent threats and state-sponsored groups utilize complex social engineering strategies to gain and maintain extended access to their targets' networks. Business Email Compromise schemes trick individuals into transferring funds or disclosing sensitive information by impersonating high-ranking executives or trusted associates. Our tailored solutions enable the development of a program that fits your organization’s unique needs, thereby fortifying your defenses. The training modules are designed to adapt to user behavior and ongoing risk evaluations, significantly improving engagement and learning results. By cultivating an environment of security mindfulness, organizations can equip their staff to identify and counter these evolving threats more effectively. Ultimately, this proactive approach not only enhances individual awareness but also strengthens the overall security posture of the organization.

Media

Media

No images available

Integrations Supported

Cornerstone LMS
CrowdStrike Falcon
Gmail
Google
Jamf Executive Threat Protection
Microsoft Defender for Endpoint
Microsoft Entra ID
Microsoft Outlook
Microsoft Purview
Okta
Proofpoint Email Protection
Workday Extend

Integrations Supported

Cornerstone LMS
CrowdStrike Falcon
Gmail
Google
Jamf Executive Threat Protection
Microsoft Defender for Endpoint
Microsoft Entra ID
Microsoft Outlook
Microsoft Purview
Okta
Proofpoint Email Protection
Workday Extend

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Intrinsic ID

Date Founded

2008

Company Location

United States

Company Website

www.intrinsic-id.com

Company Facts

Organization Name

Dune Security

Date Founded

2023

Company Location

United States

Company Website

dune.security/

Categories and Features

Authentication

Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On

IoT

Application Development
Big Data Analytics
Configuration Management
Connectivity Management
Data Collection
Data Management
Device Management
Performance Management
Prototyping
Visualization

Categories and Features

Security Awareness Training

Analytics / Reporting
Certification Training
Custom Test Building
Gamification
Industry Benchmarking
Non-Email Based Testing
Online Courses
Phishing Simulation
Pre-Assessments
Prebuilt Training Library

Popular Alternatives

Intrinsic CTMS Reviews & Ratings

Intrinsic CTMS

Intrinsic Clinical Systems

Popular Alternatives

motivationWorks Reviews & Ratings

motivationWorks

Immersyve
processWare Reviews & Ratings

processWare

processWareDSS