Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Auth0 Reviews & Ratings
    1,029 Ratings
    Company Website
  • FusionAuth Reviews & Ratings
    178 Ratings
    Company Website
  • Frontegg Reviews & Ratings
    383 Ratings
    Company Website
  • ManageEngine ADManager Plus Reviews & Ratings
    632 Ratings
    Company Website
  • Uniqkey Reviews & Ratings
    181 Ratings
    Company Website
  • 1Password Reviews & Ratings
    16,573 Ratings
    Company Website
  • ManageEngine ADSelfService Plus Reviews & Ratings
    122 Ratings
    Company Website
  • Rippling Reviews & Ratings
    18,672 Ratings
    Company Website
  • Josys Reviews & Ratings
    204 Ratings
    Company Website
  • Proton Pass Reviews & Ratings
    31,996 Ratings
    Company Website

What is LoginTC?

Cyphercor provides a top-notch two-factor authentication solution known as "LoginTC," which is designed to be user-friendly, efficient, and affordable. This robust system enhances the security of various applications and systems, including VPNs, firewalls, remote desktop access, and active directory. With LoginTC, end-users can choose from a diverse array of two-factor authentication methods such as SMS, email, push notifications, hardware tokens, U2F, OTP, and bypass codes, ensuring flexibility and convenience. Additionally, utilizing LoginTC can assist organizations in minimizing their insurance expenses while effortlessly adhering to compliance standards. By implementing such an advanced security measure, businesses can also foster greater trust with their clients.

What is Acceptto eGuardian?

Acceptto monitors user activities, transactions, and application interactions to create comprehensive user profiles across different platforms, aiding in the assessment of access legitimacy and the identification of potential security threats. The system functions independently of traditional passwords or tokens. Its risk assessment engine evaluates the authenticity of access attempts by analyzing user and device behavior before, during, and after the authentication phase. In today's environment where identity-related threats are prevalent, we provide a system for continuous and adaptive authentication, paired with real-time threat detection capabilities. Our innovative risk scoring framework, powered by cutting-edge AI and machine learning technologies, establishes a dynamic level of assurance (LoA) for each access request. Furthermore, our approach autonomously determines the most effective security policies tailored to each transaction, thereby enhancing security while minimizing user disruption through insights derived from AI and machine learning. This enables users to experience a smooth interaction with applications, all the while ensuring robust security protocols for organizations facing an ever-changing threat landscape. Consequently, Acceptto not only safeguards critical data but also promotes trust and operational efficiency within organizations, creating a safer digital environment for all stakeholders involved.

Media

Media

Integrations Supported

Dropbox
OpenVPN
Active Directory
Barracuda SSL VPN
Check Point Infinity
Cisco Identity Services Engine (ISE)
Citrix Workspace
Microsoft Azure
Omnissa Horizon 8
Salesforce
ServiceNow
Sophos UTM
VMware Cloud
WatchGuard Firebox Cloud
WatchGuard Network Security
Windows 11
Windows 7
WordPress
pfSense

Integrations Supported

Dropbox
OpenVPN
Active Directory
Barracuda SSL VPN
Check Point Infinity
Cisco Identity Services Engine (ISE)
Citrix Workspace
Microsoft Azure
Omnissa Horizon 8
Salesforce
ServiceNow
Sophos UTM
VMware Cloud
WatchGuard Firebox Cloud
WatchGuard Network Security
Windows 11
Windows 7
WordPress
pfSense

API Availability

Has API

API Availability

Has API

Pricing Information

$3/month/user
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Cyphercor

Date Founded

2011

Company Location

Canada

Company Website

www.logintc.com

Company Facts

Organization Name

Acceptto

Date Founded

2013

Company Location

United States

Company Website

www.acceptto.com/platform/

Categories and Features

Authentication

Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On

Customer Identity and Access Management (CIAM)

Access Certification
Access Management
Analytics / Reporting
Automatic User/Device Recognition
Behavioral Analytics
Credential Management
Data Security
Multi-Factor Authentication (MFA)
Privacy / Consent Management
Real Time Notifications
Self-Service Portal
Single Sign On
User Provisioning

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Categories and Features

Authentication

Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On

PCI Compliance

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management

Popular Alternatives

Auth0 Reviews & Ratings

Auth0

Okta

Popular Alternatives

Cisco Duo Reviews & Ratings

Cisco Duo

Cisco
Auth0 Reviews & Ratings

Auth0

Okta