Featured 

EID Authentication

Software
iDownloader
rating
686
iPubsoft
This application allows you to save videos to your hard disk for offline enjoyment. Multiple downloading...
This application allows you to save videos to your hard disk for offline enjoyment. Multiple
SecureCRT
rating
432
VanDyke Software
SecureCRT for Windows, Mac, and Linux provides rock-solid terminal emulation, secure remote access...
other protocols, with authentication via password, public key...support for larger authentication k
SharePlusLite
free rating
345
SouthLabs
Access your SharePoint's data from anywhere with SharePlus. Browse all your SharePoint's knowledge assets easily...
configuration sharing ★ Multi factor authentication ★ Custom Features & Features trimming
iActivate Mdm Bypass
free rating
234
iActivate
iActivate Mdm Bypass is a robust and easy-to-use iActivate tool that can remotely delete MDM profiles...
just 1 click, bypass MDM Authentication Screen during device's activation
Citrix Secure Access
free rating
86
Citrix Systems Inc
Citrix Secure Access enables Zero Trust Network Access with adaptive...
Network Access with adaptive authentication to all IT sanctioned
MQTTX
free rating
77
EMQ Technologies Co., Ltd.
MQTTX is a simple and elegant MQTT 5.0 client tool. It offers a convenient solution to quickly...
single/two-way SSL authentication
IPinator VPN
rating
30
PopNet Media LLC.
Surf anonymously, prevent hackers from acquiring your IP address...
Surf anonymously, prevent hackers from acquiring your IP address, send anonymous email, and encrypt
Bluebird
rating
23
13bold
Bluebird 1...
which uses the basic authentication scheme
Secure Access
free rating
20
Société Générale
Secure Access is a security application without any physical support...
your orders using strong authentication and validation. Therefore
SimpleAuthority
free rating
19
simpleauthority.com
SimpleAuthority is a fully functional Certification Authority (CA) that is designed to be very easy to use...
secure two factor authentication - using...server SSL authentication - to authenticate
HackerEvolutionDuality
rating
15
exosyphen studios
Hacker Evolution Duality starts in the early days of Brian Spencer...
to sophisticated voice print authentication systems
ArmorLock
free rating
10
Western Digital Corporation
ArmorLock lets you unlock and manage ArmorLock SSDs. You can use the app to unlock the drive with a tap – no password...
leveraging your phone’s biometric authentication to simply and quickly
Remote Connections Manager
rating
4
Jan Cinert LightNETcom
Remote Connections Manager...
ssh sessions with password authentication in different terminal applications
Bluetooth Screen Unlock
rating
4
Chris Vallis
Lock and unlock your screen when an associated bluetooth device, like your phone, goes out and back...
for Two-Factor authentication...hotspot. Two-factor authentication requires
USB Screen Lock
rating
4
Chris Vallis
Lock and unlock your screen with a usb storage device. Features: Screen turns black or displays selected image when locked...
Two-Factor authentication. Two-factor authentication requires...use of two authentication factors
GSI-SSHTerm
free rating
1
Leibniz-Rechenzentrum
GSISSH-Term is a Java based terminal client application for accessing the Grid. It supports the use of grid...
of grid certificates for authentication. Users have to place
MiriToken-ID Vault
free rating
1
Miri Systems, LLC
MiriToken-ID Vault allows users the convenience of storing up to eight of their MiriToken...
the correct password for authentication
MiriToken
free rating
1
Miri Systems, LLC
MiriToken allows secure access to computer systems and/or...
It verifies the authenticity...that requires positive authentication, such as government
Confidant Mail
free rating Mike Ingle
Confidant Mail is an open-source non-SMTP cryptographic email system optimized for large...
) for content encryption and authentication, and TLS 1.2 with ephemeral
AgileSSHClient
rating Ronald LO
Agile SSH Client is a client application in which you can connect with multiple servers with the SSH protocol...
/password or a private key authentication through SSH. It can