- Overview
- Alternatives
- Pros & Cons
- Compare
Authy is a two-factor authentication (2FA) for protecting yourself online. With Authy you can defeat cyber criminals & avoid account takeovers with stronger security. Authy is created by Twilio and avalible for Android, iOS and Google Chrome. .. read more.
Google Authenticator
Google Authenticator is a software-based authenticator used for secure account management. The software is developed at Google and is a two-step verification services, using a time-based one-time password algorithm. When using Google Authenticator to secure an online account or service, your risk of getting compromised is drastically reduced. When an account is protected with Google Authenticator an attacker must not only know your original password but also has access to any of your Google Authenticator enabled devices to gain access to your account.
Enpass
Enpass provides a secure vault to store everything at one place using a single master password. Enpass is a commercial, cross-platform password manager that can be used to store and access your credit cards, bank accounts, licenses or any kind of attachment and form data. With Enpass, accessing your accounts is a hassle-free experience.
Dashlane
Dashlane is a cross-platform subscription-based password manager, digital wallet application and VPN service available on macOS, Windows, iOS and Android. Everything you store in Dashlane is encrypted (converted to an unreadable code) using your Master Password as the key. Without it, your data remains safely indecipherable. The VPN services are provide through a third-party's technology, called Pango's Hotspot Shield. With the free version of Dashlane you can securely store and autofill up to 50 account passwords plus all your personal and payment information, where as with the premium version you have unlimited access to all services provided by Dashlane.
FreeOTP
FreeOTP is a token-base two-factor authentication application available for Android and iOS. The application provides implementations of HOTP and TOTP which means that there is no proprietary server-side component used to generate two-factor authentication. Tokens used for authentication can easily be added by simply scanning a QR code.
How Are These Authy Alternatives Generated?
Information found on this page is crowd-sourced by the community and contains the most agreed upon Authy alternatives. You can use this information to find similar software to Authy for specific platforms with various pricing options and licenses. Anyone that have previously used Authy can suggest alternatives, vote on the accuracy of other users claims, and help more people in the process of doing so.
This page was last updated on Sun 23 Jan 2022 (3 weeks, 1 day ago).