Multi-factor Authentication

Secure remote access without the headaches & complaints.

  • can be used alongside traditional passwords to provide an additional layer of security.

Trusted devices

Strong device authentication reduces attack surface.

Every login request starts with a strong cryptographic identification of the device being used. Over time, devices build credibility and trust with

Passive factors

Background telemetry builds confidence. calculates a confidence level for each authentication request using passive factors.

  • GPS location
  • IP address
  • user history
  • device fingerprint
  • keystroke cadence
  • mouse movements
  • network timing
  • ...and many more

While not enough to prove your identity, these factors build confidence without introducing friction.

User behavior analytics learns your habits to smooths the way in. studies your behavior and habits, and varies the friction accordingly.

Checking email at your favorite coffee shop?
You'll be signed right in.

Signing in from the other side of the world?
You'll encounter a little more challenge.

Over time, learns your habits including the devices you use, your usual locations and typical working hours.

Two-factor choice

Choose the second factor that works for you

You and your users can choose the multi-factor authentication methods that are right for you, including the mobile app, FIDO U2F compatible security keys such as a Yubikey, SMS messages, X.509 smart cards, TOTP such as Google Authenticator, and more.


Multi-factor for Virtual Desktop can integrate with Virtual Desktop (VDI) software to provide a second authentication factor for local or remote staff. With a simple configuration change, VMWare Horizon users can authenticate using as the second factor.


Protect virtual private networks with strong authentication

When you allow your users sign in to a VPN concentrator using only a password it creates significant risk of attack. A single compromised account could open up your whole network to attack from outside. integrates with VPN concentrators like Sonicwall, Cisco and Juniper to provide a second strong authentication factor. Configuration takes only a few minutes.


Protect network infrastructure devices

Many network devices use the (ancient) RADIUS protocol to delegate authentication.’s support for RADIUS allows you to retrofit modern, secure authentication onto legacy network devices.

Active Directory

Protect corporate assets with Active Directory integration

Many devices and software use the LDAP protocol to delegate authentication to a central directory. Indeed, many systems that allow you to sign in using Active Directory credentials are really using LDAP under the hood. When acts as your LDAP server, you can plug modern multi-factor authentication into any device that supports Active Directory or LDAP.

Get started in five minutes

Stop wasting time managing user accounts today. In just five minutes you'll have your first app connected.

Try for free orLearn more