15 Integrations with Intercede MyID
View a list of Intercede MyID integrations and software that integrates with Intercede MyID below. Compare the best Intercede MyID integrations as well as features, ratings, user reviews, and pricing of software that integrates with Intercede MyID. Here are the current Intercede MyID integrations in 2026:
-
1
Microsoft 365
Microsoft
Microsoft 365 for Individuals is a complete productivity suite that combines powerful applications, secure cloud storage, and AI-driven tools to help users achieve more in their daily lives. It integrates popular apps like Word, Excel, PowerPoint, Outlook, OneNote, and OneDrive, all enhanced with Copilot—Microsoft’s intelligent AI companion. The platform enables seamless collaboration, creativity, and organization across devices, including PC, Mac, iPhone, iPad, and Android. With Microsoft Designer, users can create stunning visuals, while Clipchamp adds professional-grade video editing capabilities. Built-in Microsoft Defender provides advanced security for personal data and devices. Microsoft 365 empowers individuals to imagine, create, and accomplish with greater efficiency and confidence.Starting Price: $9.99/month -
2
IBM Cloud
IBM
IBM Cloud® capabilities enable business agility and resiliency. Explore the platform that gives you 2.5x value. Designed for industry, security and the freedom to build and run anywhere. Business workflow transformation with automation and AI. Strong technology partner ecosystem that delivers value for industry needs. Industry and business domain expertise and solutions. Automated and auditable processes. Unique capabilities for the highest levels of cloud security and monitoring. Consistent security and controls posture across all applications. Containerized capabilities for DevOps, automation, data and security. Ease of integration and a consistent application development lifecycle. Advanced technologies including IBM Watson®, analytics, IoT, and edge. -
3
SafeNet Trusted Access
Thales
SafeNet Trusted Access, Identity-as-a-Service. SafeNet Trusted Access is a cloud-based access management solution that makes it easy to manage access to both cloud services and enterprise applications with an integrated platform combining single sign-on, multi-factor authentication and scenario-based access policies. Businesses and organizations looking to accelerate the deployment of cloud services for end users encounter hurdles to efficiently managing online identities and access security, while ensuring user convenience and regulatory compliance. SafeNet Trusted Access simplifies user access to cloud services, streamlines cloud identity management, and helps eliminate password hassles for IT and users, while providing a single pane view of access events across your app estate to ensure that the right user has access to the right application at the right level of trust. -
4
SailPoint
SailPoint Technologies
You can’t do business without technology and you can’t securely access technology without identity security. In today’s era of “work from anywhere”, managing and governing access for every digital identity is critical to the protection of your business and the data that it runs on. Only SailPoint Identity Security can help you enable your business and manage the cyber risk associated with the explosion of technology access in the cloud enterprise – ensuring each worker has the right access to do their job – no more, no less. Gain unmatched visibility and intelligence while automating and accelerating the management of all user identities, entitlements, systems, data and cloud services. Automate, manage and govern access in real-time, with AI-enhanced visibility and controls. Enable business to run with speed, security and scale in a cloud-critical, threat-intensive world. -
5
Keyfactor EJBCA
Keyfactor
EJBCA is an Enterprise grade PKI platform capable of issuing and managing digital certificates in the billions. One of the most used PKI platforms globally, it is used by governments and large enterprises across all sectors. PKI shouldn't be complex. Simplify it, with EJBCA® Enterprise, the only PKI platform that deploys fast, runs anywhere, and scales on-demand — so you can issue and manage thousands, even billions of certificates, no problem. Powered by the most trusted and widely used open-source PKI, EJBCA Enterprise empowers teams to establish trust with identity-first security for every human and machine, anywhere. Replace legacy CA solutions with a flexible and scalable PKI platform to issue and manage certificates for devices, workloads, and users. Embed certificate-based identity into thousands or millions of connected products with a fast and scalable PKI solution. -
6
Workspace ONE
Omnissa
Simply and securely deliver and manage any app on any device with Workspace ONE, an intelligence-driven digital workspace platform. Workspace ONE integrates access control, application management and multi-platform endpoint management into a single platform and is available as a cloud service or on-premises deployment. Enables enterprises to maximize employee engagement and productivity by empowering employees with a personalized experience and Day One access to any app on any device. Embrace a single, cloud-native solution for unified endpoint management—for any device and any use case. Eliminate silos and manage every device and app type faster, with fewer point solutions and more capabilities. Secure devices, users, and data with conditional access, automated patching, and configuration policies to achieve a comprehensive Zero Trust security approach. -
7
Symantec Advanced Authentication
Broadcom
Mitigate threats and stimulate growth with Advanced Authentication solutions from Symantec. Get real-time protection for your online and mobile applications. Our leading-edge solution can authenticate an employee, partner or contractor while providing a frictionless login experience. This ensures that legitimate users have anytime, anywhere access from any device, which builds trust and brand loyalty. Get a flexible, scalable solution with both strong multi-factor authentication and risk-based methods like device identification, geolocation and user activity. Catastrophic cyber attacks are happening every day. We make sure you’re prepared to defend your business. Earn customer trust and loyalty by providing the simple, seamless experience they’re looking for. With the right data, you can more easily distinguish between legitimate and fraudulent behavior. -
8
Pelion IoT Connectivity
Pelion
Pelion is a leading global IoT connectivity provider, offering a comprehensive platform that enables businesses to rapidly deploy, connect, secure, and manage IoT devices across various industries. With over two decades of experience, Pelion delivers high-performance, flexible multi-carrier connectivity, ensuring maximum uptime and consistent service for even the most demanding IoT use cases. Their user-friendly connectivity management platform provides complete visibility and cost control, while dedicated technical, security, and operational expertise support customers in maximizing their IoT potential. Pelion's solutions are trusted by over 1,000 enterprises worldwide, providing access to the latest 5G, 4G/LTE, CAT-M, and NB-IoT standards across 600+ networks in more than 150 countries. -
9
Yubico YubiKey
Yubico
Protect your digital world with YubiKey. Stop account takeovers, go passwordless and modernize your multifactor authentication. Get the world’s leading security key for superior security, user experience and return on investment. Designed for personal and business use, the YubiKey comes in a variety of shapes and with different features to fit your needs. Take our quick Product Finder Quiz to find the right key for you. The YubiKey works with hundreds of services and software applications. We’re here to guide you getting started whether for personal or business use. The industry's #1 security key, enabling strong two-factor, multi-factor and passwordless authentication. With a simple touch, the multi-protocol YubiKey protects access to computers, networks, and online services. No more reaching for your smartphone, or re-typing passcodes. Just plug in your YubiKey, tap, and it does the rest for you. -
10
HID IdenTrust
HID
Comprehensive lifecycle management of every certificate in your network for on-premise or cloud-based PKI deployments. Easily migrate from existing certificate authority with policy-based automated issuance, renewal and revocation, eliminating manual processes and related errors. Enterprises increasingly rely on public key infrastructure (PKI) to secure machines, devices, and human access using keys and digital certificates. In partnership with Keyfactor, HID IdenTrust offers a way to simplify PKI and automate certificate lifecycle management at scale. HID IdenTrust delivers cloud-based managed PKI to issue public, private or U.S. Government interoperable (FBCA) digital certificates to secure websites, network and IoT devices, and workforce identities. Discover every certificate across network and cloud environments with real-time inventory of public and private CAs, distributed SSL/TLS discovery tools, and direct integration with key and certificate stores. -
11
NextGen Mobile Solutions
NextGen Healthcare
NextGen Mobile Solutions (formerly Entrada) complement existing clinical workflows through their easy and intuitive cloud-based platform. By streamlining clinical documentation and collaboration, NextGen Mobile Solutions are an essential, integrated extension to your EHR solution that caregivers use to be more productive every day. Free yourself from your EHR and make your mobile device a working extension of your practice. Streamline clinical documentation and collaboration with NextGen Mobile—a user-friendly cloud-based platform that integrates with most EHRs. Alleviate the stress of administrative tasks and achieve a healthy work-life balance with our mobile app that allows you to practice anytime, anywhere. You don’t need to be tied down to your EHR software provider to take advantage of NextGen Mobile. -
12
Entrust Identity as a Service
Entrust
Cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). Secure access to apps, networks, and devices for all of your users — with cloud-based multi-factor authentication. Proximity-based login, adaptive authentication and other advanced features contribute to an optimal user experience. Happy users don’t try to circumvent security measures. Everyone wins. This is easier than anything else you’ve tried. Work-saving touches — like built-in provisioning tools and on-premises and cloud integrations — reduce the workload for IT, from deployment through everyday management. Get strong IAM to move faster into the future. Cloud-based Identity as a Service scales quickly to accommodate new users, expanding use cases, and evolving security threats. -
13
Insight Connected Platform
Insight
Connected platform for detection and prevention. Real-time information is critical to preventing the spread of disease. Leverage IoT-enabled devices, machine learning and data analysis to monitor health and safety. Monitoring public health in crowded places — from business offices to theme parks — has become a top priority around the globe. A robust disease prevention strategy is critical to helping create a more protective environment for people and ensuring business continuity. Insight’s Connected Platform for Detection and Prevention is a flexible and scalable platform to help create smarter and safer outcomes in public spaces. Our solution unifies sensor data in a single dashboard and provides real-time health visibility. Leveraging Machine Learning, the customized application can provide notifications and guidance for social interactions that align with your organization’s requirements. -
14
CipherTrust Data Security Platform
Thales Cloud Security
Thales has pushed the innovation envelope with the CipherTrust Data Security Platform to remove complexity from data security, accelerate time to compliance, and secure cloud migrations. This next-generation platform is built on a modern micro-services architecture, is designed for the cloud, includes Data Discovery and Classification, and fuses together the best capabilities from the Vormetric Data Security Platform and KeySecure and connector products. CipherTrust Data Security Platform unifies data discovery, classification, data protection, and unprecedented granular access controls with centralized key management – all on a single platform. This results in less resources dedicated to data security operations, ubiquitous compliance controls, and significantly reduced risk across your business. The CipherTrust Data Security Platform is an integrated suite of data-centric security products and solutions that unify data discovery, protection and control in one platform. -
15
Verizon Cloud
Verizon Media
Verizon Cloud is a wireless service that securely stores your files in the cloud. Files are encrypted during transfer, and only you can access and use them anytime on all your devices: phones, computers and tablets. Use it to back up your files and restore them after crashes, and transfer content in case of device damage, theft, loss or upgrade. You can access your content through the My Verizon website or the Verizon Cloud app on your Apple® iOS device, Android™ device or computer (Windows® or Mac®).Safely store photos, videos, and documents from your phone and computer to the cloud. Unlimited storage for photos, videos, and documents for up to 5 users. No limit to the number of eligible phones and computers covered. Give yourself peace of mind - back your photos and videos to the cloud. Save yourself the worry of file loss if your handheld is lost or stolen, or your desktop experiences a virus or meltdown.Starting Price: $5.99 per month
- Previous
- You're on page 1
- Next