Top 15 Portier Alternative and Similar Softwares | May 2024

Portier (pronounced "Por-tee-ay") is a self-hostable login service that you can use instead of passwords. Portier sits between your website and third-party services like Google Sign-In to provide your users the fastest and easiest login experience, without ever needing a new password.

Best of all, Portier works for everyone, because it can fall back to traditional "click the link" methods of email confirmation.

1. UNLOQ

UNLOQ UNLOQ comes in the shape of a widget, which you can easily embed into your site, and a companion mobile app that your users will need, in order to authenticate. The default authentication mechanism is a multi-factor system that uses out of band communication to authenticate a user. After a......

2. Google Authenticator

Google Authenticator Google Authenticator generates 2-step verification codes on your phone.Enable 2-step verification to protect your account from hijacking by adding another layer of security. With 2-step verification signing in will require a code generated by the Google Authenticator app in addition to your account password.Features:* Generates codes even in airplane mode!*......

3. Keycloak

Keycloak Keycloak is an open source identity and access management solution......

4. VSUsbLogon

VSUsbLogon VSUsbLogon allows to login Windows in a secure way via USB device, replacing the password based Windows login. You don’t need to remember and type your Windows password (but your system is still password protected). Users can be automatically logged into Windows as they insert the USB flash drive into......

5. IBM QRadar

IBM QRadar IBM® Security QRadar® SIEM consolidates log source event data from thousands of devices endpoints and applications distributed throughout a network. It performs immediate normalization and correlation activities on raw data to distinguish real threats from false positives. As an option, this software incorporates IBM Security X-Force® Threat Intelligence which supplies......

6. Securonix

Securonix Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track......

7. Palo Alto AutoFocus

Palo Alto AutoFocus ACTIONABLE INTELLIGENCE HAS ARRIVED.Introducing AutoFocus™. Available exclusively to Palo Alto Networks customers through a limited-time Community Access program.The challenge with too much dataSecurity practitioners have been inundated with an overwhelming volume of security data and alerts, making it virtually impossible to quickly identify and respond to advanced, targeted threats before......

8. FireEye Threat Analytics Platform

FireEye Threat Analytics Platform Information technology systems and applications produce a continuous stream of event and log details that can reveal suspicious behavior. Threat analytics offers the ability to proactively filter through huge amounts of data and identify real threats. The Threat Analytics Platform (TAP) applies threat intelligence, expert rules, and advanced security data......

9. Authy

Authy Authy is a simple way to manage Two-Factor Authentication accounts. Authy supports GMail, Dropbox, Lastpass and thousands of other sites.......

10. Fortscale

Fortscale Fortscale is an innovative cyber security company, comprised of an enthusiastic team of cyber security, big data analytics and intelligence experts.While you are reading these lines, we are working hard on developing a new analytics platform to help you protect your organization better than ever. Chances are, your organization is......

11. Tokenlock

Tokenlock TokenLock - The ultimate Mac Locking App. Automatically Lock your computer using USB, Bluetooth (iPhone) Proximity or your Apple Remote, from the menu, by clicking the icon or using a Hotkey. Check out www.map-pin.com for demos and......

12. Authomator

Authomator With Authomator, you can quickly generate two-factor authentication codes for your favorite services that use two-step verification on your BlackBerry 10 device. Simply scan the QR codes provided by the service, or manually enter the generated code, and you'll easily increase the security of your online identity. With two-step verification......

13. Gigya

Gigya Gigya is one of the leading social choice for websites, integrating online businesses with the top social networks such as Facebook, Twitter and LinkedIn and consolidating the most powerful social features in a single solution.......

14. 10Duke Indentity Provider

10Duke Indentity Provider 10Duke Identity Provider is an enterprise identity management solution, provides seamless SSO access, supports federated identity, AD, Azure AD, LDAP, social sign-in and others.Popular online services such as Google ID or Facebook Login have changed expectations regarding the ease with which a user expects to be able to access your......

15. Qualys Cloud Platform

Qualys Cloud Platform Qualys, Inc., is the most widely-deployed information security and compliance cloud solution in the world with over 7,700 customers including a majority of the Forbes Global 100 and a majority of the Fortune 100. The Qualys Cloud Platform and integrated suite of solutions helps organizations simplify security operations and lower......