Latka logo

Top LogDog Alternatives, Competitors & Similar Software

Founded 2013

Find 20 competitors in the Identity and Access Management (IAM) Software. Compare other SaaS such as CodeShield, Join Ploy Ltd and SendForensics. These LogDog competitors have raised $2.2M and together serve more than 599 customers and employ over 370 team members.

Compare LogDog with CodeShield
1
CodeShield

Identity and Access Management (IAM) Software

CodeShield is a SaaS that helps software developers and security teams secure IAM in the public cloud. With us, you detect IAM privilege escalations easily and achieve least privilege. Brands that trust us: Northmill Bank, Tempest Security Intelligence, Syracom, Hanko, handly. CodeShield’s cloud model and full-stack analysis just need 15 minutes to generate the results. The results are shown in a dashboard and a graph model of the account is generated automatically. The single graph empowers cloud and security teams to identify, prioritize, and fix the most relevant attack vectors with ease. CodeShield’s algorithms were already able to detect security vulnerabilities in the Corona-Warn-App and have received multiple research awards.

Revenue
$440K
Customers
-
Year founded
2020
Funding
-
Team size
4
Location
Germany
Compare LogDog with Join Ploy Ltd
2
Join Ploy Ltd

Identity and Access Management (IAM) Software

Ploy is the most intuitive way to manage all access to your cloud environments, empowering organizations to gain complete visibility and turn any type of access into temporary access. From initial onboarding to full lifecycle management, Ploy makes access governance simple and effective. With thoughtfully designed workflows and robust automation, teams can streamline their approach to managing user access, reducing risk, and ensuring compliance across the board. Trusted by forward-thinking, tech-driven companies, Ploy transforms how businesses handle access to critical systems, facilitating smoother audits and enhancing security without the administrative burden. Ploy helps teams stay secure, compliant, and focused on scaling their core operations efficiently.

Revenue
$440K
Customers
-
Year founded
2023
Funding
-
Team size
4
Location
United Kingdom
Compare LogDog with SendForensics
3
SendForensics

Identity and Access Management (IAM) Software

SendForensics is a global provider of advanced email analysis, quality-assurance and anti-phishing solutions for marketing, compliance and security applications. Trusted by responsible senders worldwide.

Revenue
$440K
Customers
-
Year founded
2013
Funding
-
Team size
4
Location
Singapore
Compare LogDog with Preava
4
Preava

Identity and Access Management (IAM) Software

Preava Prevent in an cloud email plugin that stops emails and attachments from being sent to the wrong people. Through minimizing unintended emails, your organization safeguards proprietary and sensitive information including privileged client data and PII/PHI. Preava is funded and advised by VeraSafe — one of the largest boutique privacy-compliance consultancies in the U.S. For over a decade VeraSafe has been re-imagining privacy and data protection compliance services. VeraSafe's team of attorneys, privacy professionals, and IT security experts provide Preava with world class guidance.

Revenue
$440K
Customers
-
Year founded
2020
Funding
-
Team size
4
Location
United States
Compare LogDog with Cyber Risk Aware
5
Cyber Risk Aware

Identity and Access Management (IAM) Software

We rapidly reduce cyber security risks for companies of all sizes by helping them to create a human firewall through Active Human Error and Phishing Mitigation. 95% of security issues are caused by human error. 23% of staff are opening phishing emails with 11% opening email attachments or clicking on links, leading to Ransomware infections, Data Breaches and Financial fraud. This is costing businesses a lot of money in downtime, incident response and knee jerk purchases that are not addressing the root cause. Founded in 2016, by a team of information security professionals with over 80 years of combined experience, we know the answer is not just about buying the latest security defense. The answer lies in addressing the root cause of all incidents. Human error. We excel at educating your staff, your last line of defense, who then become your greatest security asset in preventing future incidents. Our Phishing Mitigation training takes just under 10 mins to set up and is delivered straight to your staff. No security people are needed. No hardware. Just one administrator to access our website, add your staff email addresses, choose a mock phishing email template and send to your staff to start raising awareness with instant user feedback. Apart from our scheduled training, we can deliver training or company policy reminders to staff directly in response to "real-time"​ detected risky user behaviour by your existing security defenses.

Revenue
$440K
Customers
-
Year founded
2016
Funding
-
Team size
4
Location
Ireland
Compare LogDog with IronWiFi
6
IronWiFi

Identity and Access Management (IAM) Software

IronWifi is a Cloud-based RADIUS AAA and Captive Portal platform protecting Wired and Wireless Networks of any size. Open an Account Today and get: - WPA-Enterprise protection for your Network - Captive Portal for guest control - Advanced User and Device Management - Comprehensive Reports - Flexibility by using a Rest API interface

Revenue
$440K
Customers
-
Year founded
2014
Funding
-
Team size
4
Location
United States
Compare LogDog with truthsystems
7
truthsystems

Identity and Access Management (IAM) Software

Automatically blocking risky behavior with real-time governance agents

Revenue
$440K
Customers
-
Year founded
2023
Funding
-
Team size
4
Location
United States
Compare LogDog with Cyber Risk Aware
8
Cyber Risk Aware

Identity and Access Management (IAM) Software

We rapidly reduce cyber security risks for companies of all sizes by helping them to create a human firewall through Active Human Error and Phishing Mitigation. 95% of security issues are caused by human error. 23% of staff are opening phishing emails with 11% opening email attachments or clicking on links, leading to Ransomware infections, Data Breaches and Financial fraud. This is costing businesses a lot of money in downtime, incident response and knee jerk purchases that are not addressing the root cause. Founded in 2016, by a team of information security professionals with over 80 years of combined experience, we know the answer is not just about buying the latest security defense. The answer lies in addressing the root cause of all incidents. Human error. We excel at educating your staff, your last line of defense, who then become your greatest security asset in preventing future incidents. Our Phishing Mitigation training takes just under 10 mins to set up and is delivered straight to your staff. No security people are needed. No hardware. Just one administrator to access our website, add your staff email addresses, choose a mock phishing email template and send to your staff to start raising awareness with instant user feedback. Apart from our scheduled training, we can deliver training or company policy reminders to staff directly in response to "real-time"​ detected risky user behaviour by your existing security defenses.

Revenue
$440K
Customers
-
Year founded
2016
Funding
-
Team size
4
Location
Ireland
Compare LogDog with Hyperstack
9
Hyperstack

Identity and Access Management (IAM) Software

Hyperstack Credential Cloud is the future of digital identity, delivering next-generation trust with ease and precision. Hyperstack Credential Cloud is an innovative Web 3.0 platform favored by enterprises and educational institutions for its transformative credentialing approach. Its no-code framework streamlines the issuance, management, and verification of digital credentials, ensuring efficiency and scalability. By leveraging Blockchain and Hedera Hashgraph, Hyperstack provides tamper-proof, decentralized credentials that enhance trust and transparency while safeguarding organizational integrity and promoting positive societal impacts. It is the future of digital identity, delivering next-generation trust with precision.

Revenue
$440K
Customers
-
Year founded
2021
Funding
-
Team size
4
Location
United States
Compare LogDog with Teceze
10
Teceze

Identity and Access Management (IAM) Software

Teceze enables sustainable growth by delivering customized value driven solutions with a global reach. Our agile approach and commercial flexibility help businesses of all sizes navigate change and scale confidently in the digital age. We specialize in modern Workplace solutions that help enterprises scale from local to global success. Our services including Managed IT, Cybersecurity, Field Support Operations, and Global Sourcing—harness advanced technology to optimize costs, increase productivity, and drive growth.

Revenue
$500K
Customers
-
Year founded
2012
Funding
-
Team size
250
Location
United Kingdom
Compare LogDog with Kryptaxe
11
Kryptaxe

Identity and Access Management (IAM) Software

Owner and operator of cyber security company intended to protect users from getting hacked online. The company's services protect social media, email and file hosting accounts from getting hacked 24/7, enabling users to get protection for their social media and email accounts.

Revenue
$510.3K
Customers
-
Year founded
2016
Funding
-
Team size
1
Location
United States
Compare LogDog with Kryptaxe
12
Kryptaxe

Identity and Access Management (IAM) Software

Owner and operator of cyber security company intended to protect users from getting hacked online. The company's services protect social media, email and file hosting accounts from getting hacked 24/7, enabling users to get protection for their social media and email accounts.

Revenue
$510.3K
Customers
-
Year founded
2016
Funding
-
Team size
1
Location
United States
Compare LogDog with VeriClouds
13
VeriClouds

Identity and Access Management (IAM) Software

Provider of a credential verification service intended to detect compromised credentials before hackers do. The company's services mainly focus on monitoring the dark web and systematically reducing user-centric risk and eliminating data breaches which are done through weak and stolen password, enabling clients to access their services to detect leaked credentials as part of the logon process or offline.

Revenue
$413.6K
Customers
-
Year founded
2014
Funding
-
Team size
8
Location
United States
Compare LogDog with VeriClouds
14
VeriClouds

Identity and Access Management (IAM) Software

Provider of a credential verification service intended to detect compromised credentials before hackers do. The company's services mainly focus on monitoring the dark web and systematically reducing user-centric risk and eliminating data breaches which are done through weak and stolen password, enabling clients to access their services to detect leaked credentials as part of the logon process or offline.

Revenue
$413.6K
Customers
-
Year founded
2014
Funding
-
Team size
8
Location
United States
Compare LogDog with inBay Technologies
15
inBay Technologies

Identity and Access Management (IAM) Software

Developer of access authorization software designed to provide password-less mutual identity assurance. The company's access authorization software, idQ Trust as a Service (TaaS), offers easy to use, safe and secure access to enterprise services and applications, enabling companies of all types and sizes to employ leading edge multi-level, multi-factor password-less authentication and delegated authorization systems.

Revenue
$400.6K
Customers
-
Year founded
2009
Funding
-
Team size
8
Location
Canada
Compare LogDog with Brandle Inc.
16
Brandle Inc.

Identity and Access Management (IAM) Software

The Brandle® Presence Manager delivers social media governance, security, and compliance. It gives any company with a digital presence the power to discover, inventory, monitor and manage its points of presence (POPs) that exist across the Web. Whether a point of presence is created by an employee, fan, advocate, channel partner or some other related or unrelated party, authorized or not, Brandle can help you find it and take appropriate action. At Brandle, we are dedicated to providing a comprehensive system for companies to manage and protect the properties which represent their brands, identities, and relationships across web and social media sites.

Revenue
$550K
Customers
-
Year founded
2011
Funding
-
Team size
5
Location
United States
Compare LogDog with Anvil Works
17
Anvil Works

Identity and Access Management (IAM) Software

Anvil Works, LLC, stands at the forefront of technological innovation and IT security, specializing in a comprehensive suite of Amazon Web Services (AWS) and IT security services. Our expertise is deeply rooted in AWS services, cloud migration, Connect Call Center solutions, and AWS FinOps cost optimization for businesses aiming to leveraging AWS’s cloud computing's scalability, efficiency, and cost-effectiveness. Our commitment to world-class IT security services sets us apart in the industry. We offer an extensive range of security solutions including cloud security, outsourced Security Operations Center (SOC) services, breach remediation, and Governance Risk and Compliance (GRC) automation and compliance with stringent standards for HIPAA, SOC2, PCI and others. This comprehensive approach to security allows our clients to safeguard their critical assets against evolving threats and vulnerabilities, ensuring business continuity and protecting their reputation. Anvil Works has carved a niche in the State, Local Government, and Education (SLED), and Healthcare markets, understanding the unique challenges and requirements of these sectors. Our unique approach is designed to meet the specific needs of organizations within these fields, providing them with the tools and support necessary to achieve their objectives efficiently and securely. Anvil is proudly recognized as a disabled veteran and woman-owned business, Anvil Works embodies the principles of diversity, resilience, and excellence. Our leadership and team's diverse backgrounds enrich our organizational culture and perspective. Our designation not only reflects our commitment to inclusivity and social responsibility but also aligns with the values of our clients who prioritize diversity in their partnerships. At Anvil Works, LLC, we are more than just a service provider; we are a dedicated partner committed to empowering our clients through technology and security.

Revenue
$550K
Customers
-
Year founded
2021
Funding
-
Team size
5
Location
United States
Compare LogDog with Email Hippo
18
Email Hippo

Identity and Access Management (IAM) Software

Email Hippo provides fast, accurate and secure email verification software, accessed via web app or API. Check a list of up to 500,000 emails, or use our API to screen emails in real time to prevent spam and service abuse. With our ASSESS product, anti-fraud teams can also detect fraud risks at the point of sign up - checking emails for common signs of compromise or malicious intent. Email Hippo has provided email verification since 2000 and became ISO27001 certified in 2017. #emailvalidation #emailverification #fraudprotection #emailsecurity #datasecurity #emailmarketing #databroker #softwaredevelopment #eCommerce #datacleansing

Revenue
$550K
Customers
-
Year founded
2015
Funding
-
Team size
5
Location
United Kingdom
Compare LogDog with QuickLaunch
19
QuickLaunch

Identity and Access Management (IAM) Software

QuickLaunch is the only AI-first identity and integration platform-as-a-service platform (IDaaS and iPaaS) that transforms how cloud-savvy institutions and companies manage human and device authentication, authorization, access control, and integration. QuickLaunch leverages AI to autodetect threats and step up authentication. More than 500 institutions and companies such as Jenzabar, Unifyed, OculusIT, New Mexico State University, Colorado Community College System, BlackBeltHelp trust QuickLaunch to protect and manage over 2,000,000 identities and integration to over 3,000 applications such as Salesforce, Adobe Creative Cloud, Box, Canvas, Blackboard, G Suite and Office 365.

Revenue
$550.1K
Customers
249
Year founded
2013
Funding
-
Team size
42
Location
United States
Compare LogDog with Metacert
20
Metacert

Identity and Access Management (IAM) Software

Data loss detection and prevention for companies that use Team Collaboration services. Protection against malicious and unwanted URLs.

Revenue
$362.1K
Customers
350
Year founded
2013
Funding
$2.2M
Team size
1
Location
United States
Top LogDog Alternatives, Competitors & Similar Software | GetLatka