Mobile Identity Software

All Products

(1-25 of 51)

1
Okta

Okta is an enterprise grade identity management service, built in the cloud. IT can manage access across any application, person or device. Whether the people are employees, partners or customers or whether the applications are in the cloud, on premises or on a mobile device, Okta…

2
Dashlane Password Manager

Dashlane is a credential manager that secures every credential, every user, and every employee device to proactively protect against breaches. Brands worldwide can use Dashlane to stay ahead of evolving threats.

3
ComplyCube

ComplyCube is an identity verification platform that automates Anti-Money Laundering (AML) and Know Your Customer (KYC) compliance for businesses. It offers features that enable businesses to verify customer identities through ID documents, biometrics, and government databases.

The SaaS solution combines trusted data sources and expert human reviewers to enable businesses to achieve global AML/CTF compliance, convert more customers, and prevent fraud.…

4
KENT CamAttendance

KENT CamAttendance is a comprehensive time & attendance management system built for large to small organizations. It includes a robust cloud-based time & attendance software and an intuitive employee mobile app. KENT Ca…

5
OneLogin by One Identity

OneLogin is an identity and access management (IAM) product from One Identity since the October 2021 acquisition, featuring single sign-on (SSO), multi-factor authentication, provisioning, cloud directory, and more.

6
Amazon Cognito

Amazon Cognito is a mobile identity product that allows users to add user sign-up and sign-in to mobile and web apps, and authenticate users through social identity providers.

7
Persona
0 reviews

Persona enables businesses to verify customer identities with a drop-in widget that can be integrated in less than 10 lines of code. From selfie videos to government-issued IDs to database lookups, Persona offers a suite of automated identity verification components with worldwide…

8
ID.me

ID.me is a digital identity network that aims to simplify the user's indication verification experience.

9
cidaas
0 reviews

cidaas, a European cloud identity and access management system from Widas ID GmbH, delivers an out-of-the-box solution for federated identities, single sign-on and multi-factor authentication. With cidaas, companies create unique user identification for security across all channels.…

10
IBM Cloud App ID

IBM Cloud App ID helps developers who are not security experts to add authentication to their apps, and protect their APIs and app back-ends running on IBM Cloud.

Developers can add a variety of login-in types:

  • Email or username and password
  • Enterprise
  • Social
App ID includes a cloud user repository to on-board new users, so they can log-in with email/username & passwords, with pre-built self-service workflows (password reset, email validation etc.) App ID also manages user specific data that developers can use to build personalized app…

11
Veridas Digital Onboarding

Veridas is a SaaS company headquartered in Pamplona, Navarra, that provides solutions to verify people's real identities in the digital space. They do this with face biometrics, voice biometrics and identity document verification. Veridas solutions are modular and scalable, adapting…

12
Veriff
0 reviews

Veriff, a software company headquartered in Estonia, offers highly automated, mobile identity verification solutions so users always know their customers.

13
Cognito Identity Verification

Cognito, formerly BlockScore and a Plaid company since the January 2022 acquisition, is focused on simplifying identity verification through technology integrations and partnerships. Cognito empowers customers with technology for optimizing the customer signup experience, developer-…

14
DIRO Original
0 reviews

DIRO's document verification technology is built to mitigate risks of financial fraud, reduce manual team costs and reduce friction on KYC and AML compliance. Using DIRO’s technology, Banks, and FinTechs can use the technology for these features.

The technology helps organizations make the customer onboarding process smoother, and improve the overall customer experience. Organizations of all scales can use DIRO’s document verification technolo…

15
Token of Trust

Token of Trust presents a way to verify people and view their reputations. Organizations can use Token of Trust to screen transactions, customers and users across more than 130 countries. Token of Trust’s platform enables organizations to screen sensitive transactions for safety…

16
Truecaller for Business

Truecaller’s Verified Business Caller ID aim…

17
ABBYY Proof of Identity

ABBYY Proof of Identity combines document-centric identify proofing and identify affirmation into a single solution. It’s built on ABBYY’s mobile capture and intelligent document processing technology that is designed to be both easy for customers to use and secure for the business.…

18
Prove Identity
0 reviews

Prove enables their customers to prove their identities with just a phone. Prove offers phone-centric solutions that enable its customers to acquire new consumers and engage with their existing consumers by removing friction while bolstering security and enhancing consumer privacy…

19
SheerID
0 reviews

SheerID’s digital verification platform verifies the identity of individuals and businesses, enabling enterprises to deliver gated offers and experiences to high-value customer segments while mitigating fraud and minimizing friction. By using authoritative data sources to verify…

20
Oracle Identity Governance

Oracle Identity Governance (OIG) -formerly Oracle Identity Manager or OIM- is an enterprise identity management system that automatically manages users' access privileges within enterprise IT resources.

21
TrustID

TrustID are experts…

22
Brivo

Brivo offers mobile, cloud-based access control for commercial real estate, multifamily residential, and large distributed enterprises. Their product ecosystem and open API provide businesses with digital tools to increase security automation, elevate employee and tenant experience, and improve the safety of all people and assets in the built environment. Having created the categor…

23
ProID Multifactor

ProID Multifactor are tools and methods for workforce identity authentication (2FA, MFA) and simple login to compu…

24
HID Mobile Access

With HID Mobile Access, a mobile device can be used as a credential to access doors, networks, services and more. Leveraging Seos® as its underlying credential technology, HID Mobile Access is used to increase convenience, boost efficiency and maximize security.

25
DocuSign Identify

DocuSign Identify makes identity proofing and authentication a part of eSignature. This helps users to protect important agreements, and customer experience. The solution helps meet requirements with Know Your Customer (KYC), Anti-Money Laundering (AML) and regional regulations.…

Learn More About Mobile Identity Software

What is Mobile Identity Software?

Mobile identity software is, as its name suggests, a mobile-centric form of identity management proper, providing identity and access features for mobile platforms. The emergence of cloud and BYOD has brought a lot of confusion with large numbers of employees who wish to access web-based and mobile apps from Gmail to Workday on their mobile devices. Mobile identity software is designed to extend identity management to mobile apps that reside outside a company’s firewall. These products are often not designed to replace well-known directory protocols like LDAP and Active Directory, but rather take advantage of these existing identities and extend them to cloud and mobile apps.


Mobile device-focused identity solutions tend to focus either on internal or external use cases, although some can serve both. Internally-focused products emphasize securing employee devices that interact with internally-facing applications and systems. In contrast, customer-focused solutions prioritize delivering a safe, secure, frictionless experience for end-users or customers of the organization.


There are some unique identity threats and possibilities posed by mobile devices. On one hand, mobile devices have unique vulnerabilities, such as a compromised phone number that may be used to login/validate other systems. However, mobile devices can also offer additional authentication methods that other devices and interfaces do not. For instance, multi-factor authentication systems can more easily use fingerprinting or facial recognition as unique identifiers, since those capabilities have become standard on most modern mobile devices.



Mobile Identity Software Comparison

When comparing different mobile identity products, consider these factors:
  • Employee vs. Customer Focus: Does each solution have a greater focus on managing internal employee identities or customer-facing authentication? The former is more likely to have more prebuilt and streamlined functionality for internal use, while the latter may be more customizable by in-house developers for an easy and painless customer experience.

  • Identification Methods: What authentication methods does each app have? Mobile identity management solutions offer some methods as standard, such as temporary password validation, but more advanced products will offer mobile-specific methods like fingerprinting and facial recognition.

  • Point Solution vs. Identity Management Suite: Does the organization need an entire identity management solution to handle end-to-end identity and authentication process? Or does the organization already have a suite that lacks in mobile-specific features? If the latter is the case, then buyers should prioritize point solutions that integrate well with their existing identity management system.


Start a mobile identity software comparison here

Pricing Information


Mobile identity pricing will vary primarily based on whether the product is a point solution or broader identity management suite. In the former case, pricing can start at $2-3/device/month, and scale up to $10+/device/month.


Related Categories

Frequently Asked Questions

How is mobile identity software used?

Mobile identity software is used to ensure users have secure and authenticated access to business systems and applications.

What are the benefits of using mobile identity software?

Mobile identity software provides more specialized security than some broader identity management solutions, including improved access to mobile-accessible authentication methods like facial recognition. Mobile identification can also be easier for businesses’ customers to use.

What’s the difference between mobile identity software and identity management solutions?

Mobile identity software is specialized for mobile devices like smartphones, while identity management solutions are meant to provide more robust identity infrastructure for the entire enterprise.

Who uses mobile identity solutions?

Mobile identity solutions are used most by organizations whose users need to access secure systems via mobile devices beyond the firewall. They are administered by IT specialists.

How much does mobile identity software cost?

Mobile identity software pricing is often tailored to each company, usually with costs ranging from $2-10+/device/month.