126 Companies

Access all companies

Find technology partners quickly.

Spotfolio tracks over one million companies in technology industries.

There are 126 companies in the field of Biometrics on spotfolio that produce or deliver products, that utilize or research technologies or that are otherwise engaged in topics such as Biometric, Authentication, Biometric-Authentication, Identity, Fingerprint, Authenticate, Security, Recognition .

Start-ups (24)

Early-stage companies (38)

Established companies (52)

The majority of these companies is located in the following countries.

United States (51)

United Kingdom (12)

Canada (7)

Spain (7)

Example Companies

Find companies in your area

SensiPass Ltd. SensiPass Ltd. and SensiPass Inc.

early-stage

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

SensiPass Connect is our flagship product that enables your end users to authenticate themselves to a mobile device or mobile application by interacting with ...

Connect, but turns the user’s smartphone into a data capturing device to authenticate them to different computing system such as a webapp, kiosk or ATM, or

organization’s infrastructure and assets rely heavily upon how well you authenticate users and safeguard credentials. Those credentials are also the target ...

Institute of Standards and Technology (NIST) has categorized the way we authenticate our digital identity into three factors, each presenting a unique challenge

Privaris

established

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

device is a fingerprint-based, personal, mobile fob that can be used to authenticate users to access computers, networks, websites, software, VPNs, secured ...

software and data. Newer systems use smartcards or other security tokens to authenticate users. Both password and token-based systems are susceptible to security

and developed a family of key-fob sized, personal, mobile devices that authenticate an individual's identity before interacting with their existing security

Solus

early-stage

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

user tying to log in. The combined risk rating allows organisations to authenticate repeat customers with less stringent authentication. On the other hand ...

sensitive information, etc. or to determine whether a user should re-authenticate (or ‘step-up’) before being allowed to perform a specific task. The ...

liveness attributes are also compared to the enrolment data to securely authenticate the user. The Solus Connect Platform can utilize the data captured from ...

Workflow Solus's Workflow functionality engine is used to enroll and authenticate users as well as build user-specific workflows and calculate their associated ...

liveness attributes are also compared to the enrolment data to securely authenticate the user. Solus Connect can then utilise the data captured from the ...

Workflow Solus Workflow functionality is the engine used to enrol and authenticate users as well as build user-specific workflows and calculate their associated

Mobile App to Authenticate into Web Service Authenticate User on Mobile App Using Mobile App to Authenticate into Web Service Authenticate User on Mobile

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

hotels, rental car companies, or AirBNB apartments. All these need to authenticate users in random, physical locations. And wouldn’t it be nice to enjoy ...

risking your users’ privacy and security? With Anonybit, your users can authenticate themselves anywhere and anytime - securely. The users maintain full ownership

hotels, rental car companies, or AirBNB apartments. All these need to authenticate users in random, physical locations. And wouldn’t it be nice to enjoy ...

risking your users’ privacy and security? With Anonybit, your users can authenticate themselves anywhere and anytime - securely. The users maintain full ownership

Uniphore Uniphore Software Systems Private Limited

established

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

patterns, including behavioral and physiological ones, to automatically authenticate them on an ongoing basis during the call and day. Ask for a demo Business ...

Identity Theft Reduce Operational Cost Enable Frictionless Experience Authenticate Continuously Enhance Trust get in touchDownload brochure Related Resources

Min Read How Does Voice Biometrics Work? Using voice biometrics to authenticate if the person is who he/she is claiming to be is very much in... Conversational

Use detailed technology terms.

Only spotfolio allows for searching with detailed technology terms, as we provide you with all topics that technology companies talk about.

All companies in this field address the following more general topics.

Use Cases

Register now

Why Technology Scouting?

Technology scouting is the basis for your innovation management, identifies new technological developments as early as possible and protects you from disruptive business models.

Identify technology partners

Boost your market research

Look beyond major players

Build long and short lists

Collect technology leaders, providers, start ups and potential new partners in lists via simple tagging to take further steps with your team.