Glide Identity Competitors

Best Glide Identity Competitors: 8 Top Alternatives for Advanced Authentication Solutions in 2026

 

Editor choice 1 Entro Security review
More details +

Entro Security Review

Entro Security Review: Complete Analysis of the Leading NHI Management PlatformEntro Security has emerged as a frontrunner in the rapidly evolving field of Non-Human Identity (NHI) management and secrets security. This comprehensive review …
8.8
Secrets tamed at last
Entro Security delivers automated discovery and real time control for non human identities and secrets across modern stacks. It stands out for fast time to value strong compliance reporting and highly rated customer support.
Features
9
Usability
9
Benefits
9
Ease of use
8
Support
9
PROS:
  • Best for complex environments
  • Integration effort varies
  • Enterprise focused pricing
  • Learning curve for workflows
CONS:
  • Best for complex environments
  • Integration effort varies
  • Enterprise focused pricing
  • Learning curve for workflows
2 Clutch Security review
More details +

Clutch Security Review

Clutch Security Comprehensive Review: Enterprise Security Platform Analysis 2026Clutch Security has emerged as a significant player in the enterprise security landscape, offering comprehensive solutions for organizations seeking to protect their …
8.6
Spot every asset fast
Clutch Security delivers strong enterprise visibility by automatically discovering and correlating non human identities across hybrid and multi cloud environments. It is best as a complement to existing security tools, but needs extra controls to secure the platform itself.
Features
8
Usability
9
Benefits
8
Ease of use
9
Support
9
PROS:
  • Automatic NHI discovery
  • Unified multi cloud visibility
  • Security focused risk context
  • Improves compliance efficiency
CONS:
  • No built in MFA
  • Needs careful legacy integration
  • Implementation can take months
3 Token Security review
More details +

Token Security Review

Token Security Review: Complete Analysis of the Machine Identity Protection PlatformToken Security has emerged as a leading solution in the rapidly evolving landscape of machine identity protection and non-human identity management. As …
8.6
Machine identities finally tamed
Token Security delivers strong discovery visibility and continuous monitoring for non human identities like certificates API keys and service accounts. It is a focused platform that helps reduce risk and operational overhead across cloud and hybrid environments.
Features
8
Usability
9
Benefits
9
Ease of use
9
Support
8
PROS:
  • Deep machine identity discovery
  • Continuous monitoring and visibility
  • API first integrations
  • Low ongoing maintenance
CONS:
  • Enterprise rollout can take time
  • Niche focus not broad IAM
4 Glide Identity review
More details +

Glide Identity Review

Glide Identity Review: Revolutionary SIM-Based Authentication Platform Transforming Digital SecurityDigital identity verification stands at a critical crossroads in 2026. Traditional authentication methods, particularly SMS one-time passwords …
8.4
Ditch OTPs Upgrade to Glide
Glide Identity replaces passwords and SMS codes with SIM based cryptographic authentication to cut fraud and improve login security. It is best suited for enterprises needing scalable modern verification.
Features
8
Usability
9
Benefits
8
Ease of use
9
Support
8
PROS:
  • Eliminates passwords and SMS OTP
  • Strong SIM based security
  • Major carrier partnerships
  • Fast enterprise deployments
CONS:
  • SDK integration required
  • Deployment can take months
  • Depends on carrier coverage
5 Oasis Security review
More details +

Oasis Security Review

Comprehensive Oasis Security Review: The Ultimate Guide to Non-Human Identity ManagementIn today’s rapidly evolving cybersecurity landscape, organizations face unprecedented challenges in managing digital identities. Traditional security solutions …
8.4
Tame every bot identity
Oasis Security brings enterprise grade control to non human identities with automated discovery and continuous monitoring. It fits modern cloud and DevOps teams needing lifecycle security for service accounts and API keys.
Features
8
Usability
8
Benefits
9
Ease of use
9
Support
8
PROS:
  • Purpose built for non human identities
  • Automatic discovery and cataloging
  • Continuous monitoring and threat detection
  • Strong multi cloud coverage
CONS:
  • Best for larger environments
  • Pricing scales with identity volume
  • Implementation may take weeks
6 Linx Security review
More details +

Linx Security Review

Comprehensive Linx Security Review: AI-Driven Identity Management for Modern EnterprisesIn the rapidly evolving cybersecurity landscape of 2026, identity and access management (IAM) has become the cornerstone of enterprise security strategies. …
8.2
Smarter access less admin hassle
Linx Security is an AI driven IAM platform built for modern enterprises needing automated access control and strong compliance. It fits best for hybrid environments where reducing manual identity work matters.
Features
8
Usability
8
Benefits
9
Ease of use
7
Support
9
PROS:
  • AI driven risk assessment
  • Automated provisioning workflows
  • Strong compliance reporting
  • Handles non human identities
CONS:
  • Geared to larger enterprises
  • Implementation takes weeks
  • Subscription pricing can scale
7 Permit.io review
More details +

Permit.io Review

Permit.io Review: Comprehensive Analysis of the No-Code Authorization PlatformAuthorization and permission management remains one of the most complex challenges in modern software development. Organizations struggle to balance security …
8.2
No code access control hero
Permitio streamlines authorization with a visual policy builder on top of opa while keeping audit and compliance in reach. It fits teams with complex access needs but can feel heavy for simple apps and adds vendor dependency.
Features
7
Usability
8
Benefits
8
Ease of use
9
Support
9
PROS:
  • Powerful policy as code
  • Visual no code builder
  • Real time policy sync
  • Strong audit compliance tools can feel heavy for simple apps and adds vendor dependency
CONS:
  • Overkill for simple projects
  • Limited on premises options
  • Some vendor dependency
8 Transmit Security review
More details +

Transmit Security Review

Transmit Security Review: Comprehensive Analysis of the Leading CIAM Platform in 2026In today’s digital landscape, businesses face unprecedented challenges in securing customer identities while delivering seamless user experiences. Transmit …
8.2
Passwords out Security in
Transmit Security delivers a strong CIAM platform built for passwordless and risk based authentication with a focus on smooth customer experiences. It is best for large customer bases that want modern security plus better conversion.
Features
8
Usability
8
Benefits
9
Ease of use
7
Support
9
PROS:
  • Passwordless login experience
  • Risk based protection
  • Strong compliance certifications
  • Responsive expert support
CONS:
  • Pricing depends on usage
  • Advanced setup takes longer
  • Best for large scale teams

Glide Identity has established itself as a prominent player in the advanced authentication platform market. Their multi-layered approach to user identity verification combines network signals and analytics to deliver robust security solutions. However, businesses seeking alternatives have numerous compelling options to consider.

The competitive landscape for identity verification and authentication platforms continues to evolve rapidly. Companies require solutions that balance security strength with user experience. Modern organizations demand platforms that can integrate seamlessly with existing infrastructure while providing comprehensive protection against sophisticated threats.

This comprehensive analysis examines eight leading Glide Identity competitors that offer innovative approaches to identity security. Each platform brings unique strengths, from cryptographic authentication to behavioral biometrics. Understanding these alternatives helps organizations make informed decisions about their identity security investments.

Understanding the Identity Authentication Landscape

The identity authentication market has transformed dramatically in recent years. Traditional password-based systems no longer provide adequate protection against modern cyber threats. Organizations increasingly adopt multi-factor authentication, biometric verification, and behavioral analytics to secure user access.

Market leaders differentiate themselves through innovative approaches to identity verification. Some focus on passwordless authentication, while others emphasize risk-based authentication or zero-trust architectures. The most successful platforms combine multiple verification methods to create comprehensive security ecosystems.

Enterprise buyers evaluate solutions based on several critical factors. Integration complexity, user experience, and security effectiveness top the priority list. Cost considerations, compliance requirements, and scalability also influence purchasing decisions significantly.

Evaluation Criteria for Authentication Platforms

Our analysis employs standardized criteria to ensure fair comparison between platforms. Security features encompass authentication methods, encryption standards, and threat detection capabilities. Implementation complexity measures how easily organizations can deploy and maintain each solution.

User experience evaluation considers authentication speed, interface design, and accessibility features. Integration capabilities assess API quality, third-party compatibility, and existing system connectivity options.

Additional factors include:

  • Scalability – Platform ability to handle growing user bases
  • Compliance support – Meeting regulatory requirements
  • Customer support – Training, documentation, and technical assistance
  • Pricing structure – Cost transparency and value proposition

Clutch Security: Comprehensive Identity Protection Platform

Clutch Security positions itself as an enterprise-focused identity protection platform. Their approach emphasizes real-time threat detection combined with adaptive authentication mechanisms. The platform excels in environments requiring stringent security controls without sacrificing operational efficiency.

Security Features: Clutch Security implements machine learning algorithms for behavioral analysis. Their platform detects anomalous access patterns and responds with appropriate authentication challenges. Multi-factor authentication options include biometric verification, hardware tokens, and mobile push notifications.

The platform’s risk engine evaluates multiple data points for each authentication attempt. Location analysis, device fingerprinting, and user behavior patterns contribute to dynamic risk scoring. High-risk scenarios trigger additional verification steps automatically.

Integration Capabilities: Clutch Security offers robust API connectivity for custom integrations. Pre-built connectors support popular enterprise applications including Microsoft 365, Salesforce, and AWS services. Single sign-on implementation typically requires minimal configuration changes.

Implementation complexity remains moderate due to comprehensive documentation and professional services support. Organizations can deploy basic functionality within weeks, while advanced configurations may require additional customization time.

User Experience: The platform prioritizes seamless authentication for legitimate users. Adaptive authentication reduces friction for trusted access patterns while maintaining security for suspicious activities. Mobile applications provide consistent experiences across devices and platforms.

Entro Security: Next-Generation Access Management

Entro Security delivers sophisticated access management through their cloud-native platform. Their solution emphasizes zero-trust principles with continuous verification throughout user sessions. The platform particularly appeals to organizations migrating from legacy identity systems.

Core Capabilities: Entro Security’s architecture supports passwordless authentication as a primary authentication method. Biometric verification, cryptographic keys, and device attestation replace traditional password mechanisms. Session management includes continuous monitoring and dynamic privilege adjustment.

The platform’s analytics engine processes authentication events in real-time. Machine learning models identify potential security threats and automatically adjust access policies. Administrative dashboards provide comprehensive visibility into user activities and security events.

Technical Architecture: Cloud-native design enables rapid deployment and scaling. Microservices architecture ensures high availability and performance under varying load conditions. API-first development approach facilitates custom integrations and workflow automation.

Multi-tenant capabilities support complex organizational structures. Granular policy controls enable different security requirements across departments, locations, or user groups. Compliance reporting features assist with audit requirements and regulatory obligations.

Deployment Considerations: Entro Security requires minimal on-premises infrastructure. Cloud deployment options include major public cloud providers and hybrid configurations. Migration tools help transition existing user directories and authentication policies.

Identiq: Advanced Biometric Authentication Solutions

Identiq specializes in biometric authentication technologies that enhance security while improving user convenience. Their platform combines multiple biometric modalities for comprehensive identity verification. The solution particularly excels in high-security environments requiring strong authentication assurance.

Biometric Technologies: Identiq supports fingerprint, facial recognition, voice analysis, and behavioral biometrics. Multi-modal authentication combines different biometric types for enhanced accuracy. Liveness detection prevents spoofing attempts using photographs or recordings.

The platform’s biometric engines utilize advanced neural networks for pattern recognition. Template storage employs encryption and fragmentation for privacy protection. Biometric data never leaves the user’s device in their privacy-focused implementation model.

Privacy and Compliance: Identiq addresses privacy concerns through their distributed architecture. Biometric templates remain encrypted on user devices rather than centralized storage. This approach complies with strict data protection regulations including GDPR and CCPA.

Audit trails capture all authentication events with immutable logging. Compliance dashboards help organizations demonstrate adherence to industry standards and regulatory requirements. Regular security assessments validate ongoing protection effectiveness.

Integration Flexibility: Software development kits support multiple programming languages and platforms. RESTful APIs enable integration with existing applications and identity providers. Mobile SDKs facilitate native app integration with consistent user experiences.

Linx Security: Enterprise Identity Orchestration

Linx Security focuses on identity orchestration for complex enterprise environments. Their platform manages authentication across diverse applications, systems, and user populations. The solution particularly benefits organizations with heterogeneous technology stacks and complex access requirements.

Orchestration Capabilities: Linx Security’s workflow engine coordinates authentication across multiple systems. Policy engines evaluate access requests against organizational rules and compliance requirements. Dynamic provisioning ensures users receive appropriate access based on role and context.

The platform supports federated identity management across organizational boundaries. Partner access, contractor management, and customer authentication scenarios benefit from flexible policy configuration. Cross-domain authentication maintains security while enabling collaboration.

Administrative Features: Centralized dashboards provide unified visibility across all connected systems. Role-based administration enables delegated management without compromising security. Automated reporting supports compliance audits and operational analytics.

Self-service capabilities reduce administrative overhead while improving user satisfaction. Password reset, access requests, and profile updates can be handled through intuitive user portals. Approval workflows ensure appropriate authorization for sensitive access changes.

Scalability and Performance: Distributed architecture supports global deployments with local authentication processing. Load balancing and redundancy features ensure high availability during peak usage periods. Performance monitoring identifies optimization opportunities and capacity requirements.

Oasis Security: Cloud-Native Identity Platform

Oasis Security delivers comprehensive identity security through their modern cloud platform. Their approach emphasizes simplicity without compromising security effectiveness. The platform appeals to organizations seeking rapid deployment and minimal maintenance overhead.

Platform Architecture: Cloud-native design eliminates infrastructure management requirements. Automatic scaling handles varying authentication loads without manual intervention. Multi-region deployment options ensure low latency and high availability globally.

Security features include adaptive multi-factor authentication and risk-based access controls. Machine learning algorithms continuously improve threat detection accuracy. Integration capabilities support popular business applications and development frameworks.

User-Centric Design: Oasis Security prioritizes user experience in their authentication flows. Single sign-on reduces password fatigue while maintaining security standards. Mobile-first design ensures consistent experiences across devices and form factors.

Self-service features empower users while reducing support overhead. Account recovery, device management, and preference configuration operate through intuitive interfaces. Progressive authentication adapts to user behavior patterns over time.

Operational Simplicity: Minimal configuration requirements accelerate initial deployment timelines. Automated policy suggestions based on industry best practices reduce setup complexity. Continuous monitoring and alerting identify potential security issues proactively.

Permit.io: Developer-First Authorization Platform

Permit.io targets developers with their authorization-focused platform. Their solution simplifies complex permission management while maintaining fine-grained access controls. The platform particularly benefits organizations building custom applications with sophisticated authorization requirements.

Developer Experience: Code-first configuration enables version control and collaborative development. SDKs support popular programming languages with consistent APIs across platforms. Documentation includes comprehensive examples and integration guides for common scenarios.

Policy as Code approaches allow developers to define authorization rules using familiar tools. Git integration enables collaborative policy development with review and approval workflows. Testing frameworks validate authorization logic before production deployment.

Authorization Models: Permit.io supports multiple authorization paradigms including RBAC, ABAC, and relationship-based access control. Policy engines evaluate complex rules with high performance for real-time authorization decisions. Audit capabilities track all authorization decisions for compliance and debugging.

Fine-grained permissions enable precise access control at the feature and data levels. Dynamic permissions adjust based on context, time, and business logic. Delegation features allow temporary privilege escalation with appropriate oversight.

Enterprise Features: Multi-tenant architecture supports complex organizational structures. Policy inheritance and overrides enable hierarchical permission management. Analytics dashboards provide insights into access patterns and policy effectiveness.

Token Security: Blockchain-Based Identity Verification

Token Security leverages blockchain technology for decentralized identity verification. Their platform provides tamper-proof identity records while giving users control over their personal data. The solution appeals to organizations seeking innovative approaches to identity management.

Blockchain Integration: Distributed ledger technology ensures identity credential integrity. Cryptographic proofs enable verification without revealing underlying personal information. Smart contracts automate credential issuance and verification processes.

Self-sovereign identity principles give users control over their credential sharing. Zero-knowledge proofs enable verification without data disclosure. Interoperability standards facilitate cross-platform credential recognition.

Technical Innovation: Token Security’s architecture supports multiple blockchain networks for redundancy and performance. Layer-2 scaling solutions reduce transaction costs and improve response times. Privacy-preserving technologies protect user information while enabling verification.

Credential lifecycle management includes issuance, renewal, and revocation capabilities. Multi-signature schemes prevent unauthorized credential manipulation. Backup and recovery mechanisms protect against key loss scenarios.

Adoption Considerations: Blockchain-based solutions require user education and change management. Integration complexity may be higher compared to traditional platforms. Regulatory considerations vary by jurisdiction and use case.

Transmit Security: Passwordless Authentication Leader

Transmit Security leads the passwordless authentication movement with their comprehensive platform. Their solution eliminates password dependencies while maintaining strong security assurance. The platform excels in consumer-facing applications requiring seamless user experiences.

Passwordless Technologies: Transmit Security supports FIDO2, WebAuthn, and proprietary passwordless methods. Biometric authentication, device-based keys, and behavioral analysis replace traditional passwords. Cross-device authentication enables consistent experiences across user devices.

Risk-based authentication adjusts security requirements based on threat assessment. Machine learning models analyze user behavior patterns for anomaly detection. Continuous authentication monitors sessions for ongoing verification.

Platform Capabilities: Orchestration engines coordinate complex authentication workflows. Policy management enables dynamic authentication requirements based on context. Analytics provide insights into user behavior and security effectiveness.

Developer tools include comprehensive SDKs and APIs for custom integrations. Pre-built components accelerate implementation timelines. Testing environments enable thorough validation before production deployment.

Market Position: Transmit Security maintains strong market presence with significant funding and customer adoption. Industry recognition validates their technological approach and market execution. Strategic partnerships extend platform reach and capabilities.

Comparative Analysis: Security Features and Capabilities

Security feature comparison reveals distinct approaches among these platforms. Biometric authentication capabilities vary significantly, with Identiq leading in multi-modal support. Blockchain integration distinguishes Token Security from traditional approaches.

Risk assessment methodologies differ across platforms. Machine learning sophistication ranges from basic rule engines to advanced behavioral analytics. Real-time threat detection capabilities vary in accuracy and response speed.

Compliance support varies by platform focus and target market. Enterprise-oriented solutions typically provide comprehensive audit trails and regulatory reporting. Developer-focused platforms may require additional compliance tooling.

PlatformPrimary FocusAuthentication MethodsIntegration ComplexityTarget Market
Clutch SecurityEnterprise ProtectionMFA, Biometrics, Risk-basedModerateLarge Enterprise
Entro SecurityZero-Trust AccessPasswordless, ContinuousLowCloud-Native Orgs
IdentiqBiometric AuthenticationMulti-modal BiometricsModerateHigh-Security Environments
Linx SecurityIdentity OrchestrationFederated, Multi-systemHighComplex Enterprises
Oasis SecuritySimplicityAdaptive MFA, SSOLowSMB, Mid-Market
Permit.ioAuthorizationPolicy-based, RBACLowDevelopers, SaaS
Token SecurityBlockchain IdentityCryptographic, Self-sovereignHighInnovation Leaders
Transmit SecurityPasswordlessFIDO2, BiometricModerateConsumer-Facing Apps

Implementation Considerations and Best Practices

Successful authentication platform implementation requires careful planning and stakeholder alignment. Technical requirements assessment should precede vendor evaluation. User experience testing validates authentication flows before full deployment.

Phased rollout strategies minimize disruption while enabling feedback incorporation. Pilot programs with limited user groups help identify potential issues. Change management programs ensure user adoption and support organizational transformation.

Integration testing validates compatibility with existing systems and applications. Performance testing under realistic load conditions prevents production issues. Security testing confirms protection against known attack vectors and vulnerabilities.

Key implementation factors include:

  • User training – Ensuring smooth adoption of new authentication methods
  • Backup systems – Maintaining access during platform maintenance or issues
  • Monitoring setup – Tracking performance and security metrics
  • Incident response – Preparing for potential security events or platform issues

Cost Analysis and ROI Considerations

Authentication platform costs extend beyond initial licensing fees. Implementation services, training, and ongoing maintenance contribute to total cost of ownership. Hidden costs may include integration development and system modifications.

ROI calculations should include security incident reduction and productivity improvements. Reduced help desk calls for password resets provide measurable savings. Compliance automation reduces manual audit preparation time and costs.

Pricing models vary significantly across vendors. Per-user licensing remains common, while some platforms offer transaction-based pricing. Enterprise agreements may provide volume discounts and predictable cost structures.

Cost optimization strategies include:

  • Phased deployment – Gradual user migration to spread costs
  • Feature prioritization – Implementing essential capabilities first
  • Vendor negotiations – Leveraging competition for better terms
  • Internal development – Building some integration components internally

Industry-Specific Requirements and Use Cases

Different industries have unique authentication requirements based on regulatory obligations and risk profiles. Financial services demand the highest security standards with multi-factor authentication mandates. Healthcare organizations must balance security with clinical workflow efficiency.

Government agencies require solutions meeting specific certification standards like FedRAMP or Common Criteria. Educational institutions need platforms supporting diverse user populations with varying technical sophistication levels.

Manufacturing and industrial environments present unique challenges with operational technology integration. Remote access scenarios require robust authentication without compromising operational efficiency. Legacy system integration often poses significant technical challenges.

Retail and e-commerce applications prioritize user experience while preventing fraud. Authentication friction directly impacts conversion rates and customer satisfaction. Scalability requirements vary dramatically during peak shopping periods.

Future Trends in Identity Authentication

Identity authentication continues evolving toward passwordless and continuous verification models. Behavioral biometrics gain prominence as accuracy improves and implementation complexity decreases. Artificial intelligence enhances threat detection while reducing false positive rates.

Zero-trust architectures drive demand for continuous authentication throughout user sessions. Traditional perimeter-based security models prove inadequate for modern distributed environments. Identity becomes the new security perimeter requiring sophisticated verification methods.

Emerging technologies include:

  • Quantum-resistant cryptography – Preparing for quantum computing threats
  • Decentralized identity – User-controlled credential management
  • AI-powered fraud detection – Advanced threat identification
  • Invisible authentication – Seamless continuous verification

Privacy regulations continue influencing authentication platform design. Data minimization principles require sophisticated approaches to verification without excessive data collection. Cross-border data transfer restrictions impact global deployment architectures.

For additional insights into the evolving identity security landscape, visit Juniper Research’s identity security analysis.

Conclusion

The authentication platform market offers diverse solutions for organizations seeking Glide Identity alternatives. Each platform brings unique strengths addressing different use cases and organizational requirements. Success depends on matching platform capabilities with specific business needs and technical constraints.

Careful evaluation using standardized criteria ensures informed decision-making. Implementation planning and change management significantly impact project success regardless of platform selection.

Frequently Asked Questions About Glide Identity Competitors

  • Which Glide Identity alternative offers the best biometric authentication capabilities?

    Identiq leads in biometric authentication with multi-modal support including fingerprint, facial recognition, voice analysis, and behavioral biometrics. Their privacy-focused architecture keeps biometric data on user devices while maintaining high accuracy.

  • What makes Transmit Security different from other Glide Identity competitors?

    Transmit Security specializes in passwordless authentication using FIDO2 and WebAuthn standards. Their platform eliminates password dependencies entirely while maintaining strong security through biometric and device-based authentication methods.

  • Which platform provides the simplest implementation for small to medium businesses?

    Oasis Security offers the most straightforward implementation with cloud-native architecture requiring minimal infrastructure. Their automated scaling and simplified configuration make it ideal for organizations with limited technical resources.

  • How does blockchain-based Token Security compare to traditional authentication platforms?

    Token Security provides tamper-proof identity records through blockchain technology and self-sovereign identity principles. However, implementation complexity is higher, and user education requirements exceed traditional platforms.

  • Which Glide Identity alternative works best for complex enterprise environments?

    Linx Security excels in complex enterprises with their identity orchestration capabilities. The platform manages authentication across diverse applications and supports federated identity management for multi-organizational scenarios.

  • What authorization capabilities does Permit.io offer compared to authentication-focused competitors?

    Permit.io focuses specifically on authorization with policy-as-code approaches and fine-grained permission management. While other platforms emphasize authentication, Permit.io specializes in determining what authenticated users can access.

  • How do these Glide Identity competitors handle compliance requirements?

    Enterprise-focused platforms like Clutch Security and Linx Security provide comprehensive audit trails and regulatory reporting. Cloud-native solutions like Entro Security and Oasis Security typically require additional compliance tooling for complex requirements.

  • Which alternative offers the best developer experience for custom integrations?

    Permit.io provides the strongest developer experience with code-first configuration, comprehensive SDKs, and Git integration for collaborative policy development. Their documentation and testing frameworks support rapid custom integration development.

References:

Crunchbase – Glide Identity Company Profile

We will be happy to hear your thoughts

      Leave a reply

      Stack Insight
      Logo
      Compare items
      • Total (0)
      Compare
      0