1,179 Companies

Access all companies

Find technology partners quickly.

Spotfolio tracks over one million companies in technology industries.

There are 1,179 companies in the field of Augmented Reality on spotfolio that produce or deliver products, that utilize or research technologies or that are otherwise engaged in topics such as Reality, AR, Augmented, Augmented-Reality, VR, Virtual-Reality, Virtual, Immersive, User .

Start-ups (443)

Early-stage companies (429)

Established companies (240)

The majority of these companies is located in the following countries.

United States (391)

United Kingdom (88)

India (75)

Canada (71)

Example Companies

Find companies in your area

ARJeannie Ltd.

start-up

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

ARJeannie Rapid Augmented Reality Authoring for User Manuals Our Product Everything you Need for AR Manuals Rapid AR Creation ARJeannie has been developing ...

Augmented Reality authoring tool to create user manuals. Manuals and training with augmented reality provide a superior user experience with products. Unlike current ...

existing CAD models, graphics and animation to deliver appealing, real AR-based user-friendly content All-in-one solution with no need for third-party tools

Win Win

start-up

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

the description is displayed so the user doesn't need to load images to get the idea. It creates a link so the user can click to view (or they can click

the description is displayed so the user doesn't need to load images to get the idea. It creates a link so the user can click to view (or they can click

SensiPass Ltd. SensiPass Ltd. and SensiPass Inc.

early-stage

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

systems, thereby greatly reducing fraud and insider threats. Understanding user behavior in context is a key element in authenticating the identity of a

multifactor identity. Innovating in the knowledge factor or “secret” in user authentication, users register a secret interaction with their own biometric

Hipster Bait

early-stage

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

Movers Position Position Change Last Week Weeks on Chart Baits Found User Image User Name 01 > Last Week-- Wks on Chart1 Baits Found5 Brendan Crawford 02 ...

Audrey Position Position Change Last Week Weeks on Chart Baits Hidden User Image User Name 01 > Last Week-- Wks on Chart1 Baits Hidden4 Brendan Crawford ...

Sporleder Position Position Change Last Week Weeks on Chart Points Gained User Image User Name 01 > Last Week-- Wks on Chart1 Points Gained1,225 Brendan Crawford ...

Evans Position Position Change Last Week Weeks on Chart Badges Earned User Image User Name 01 > Last Week-- Wks on Chart1 Badges Earned6 Donovan DeWitt 02 ...

Martinez Position Position Change Last Week Weeks on Chart Distance Moved User Image User Name 01 > Last Week01 Wks on Chart3 Distance Moved142 Greg Reynolds

Proxy Proxy, Inc.

start-up

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

Request Setting Up a User With a Unique ACS Credential - Proxy Help Center - I am a Proxy Administrator - Proxy Dashboard Setting Up a User With a Unique ACS ...

ACS Credential This article explains how to add a user that has a unique ACS credential to the Mobile Access Manager. 1. Select INVITE COLLEAGUE and ...

GROUPS.3. Add the user(s) to the necessary group(s). Again, un-check "Send email invitation" 4. Go back to PEOPLE and locate the user that was just added ...

added. 5. Click on the gear that appears when hovering over the user. 6. Un-check "Use default org credential", select the appropriate "Card Format" and ...

and SAVE. 7. Go back to PEOPLE and hit "Resend Invitation" for each added user. Was this article helpful? Yes No 0 out of 0 found this helpful Related

Administrator Basics Proxy Security Overview Credentials User credentials - User verification via email; user credentials are not stored on the phone, but exchanged ...

and device keys (AES-256-GCM with rotating keys). - User verification via email or password; user credentials are exchanged for tokens that authenticate ...

articles - Using Key Cards & Fobs with a Proxy Mobile Reader - Add / Delete a User - Mobile Reader Edge Visual and Audible Indicators - How to Deactivate a

Use detailed technology terms.

Only spotfolio allows for searching with detailed technology terms, as we provide you with all topics that technology companies talk about.

Use Cases

Register now

Why Technology Scouting?

Technology scouting is the basis for your innovation management, identifies new technological developments as early as possible and protects you from disruptive business models.

Identify technology partners

Boost your market research

Look beyond major players

Build long and short lists

Collect technology leaders, providers, start ups and potential new partners in lists via simple tagging to take further steps with your team.