Secure remote access without the headaches & complaints.
Groove.id can be used alongside traditional passwords to provide an additional layer of security.
Strong device authentication reduces attack surface.
Every login request starts with a strong cryptographic identification of the device being used. Over time, devices build credibility and trust with Groove.id.
Background telemetry builds confidence.
Groove.id calculates a confidence level for each authentication request using passive factors.
- GPS location
- IP address
- user history
- device fingerprint
- keystroke cadence
- mouse movements
- network timing
- ...and many more
While not enough to prove your identity, these factors build confidence without introducing friction.
User behavior analytics
Groove.id learns your habits to smooths the way in.
Groove.id studies your behavior and habits, and varies the friction accordingly.
Checking email at your favorite coffee shop?
You'll be signed right in.
Signing in from the other side of the world?
You'll encounter a little more challenge.
Choose the second factor that works for you
You and your users can choose the multi-factor authentication methods that are right for you, including the Groove.id mobile app, FIDO U2F compatible security keys such as a Yubikey, SMS messages, X.509 smart cards, TOTP such as Google Authenticator, and more.
Multi-factor for Virtual Desktop
Groove.id can integrate with Virtual Desktop (VDI) software to provide a second authentication factor for local or remote staff. With a simple configuration change, VMWare Horizon users can authenticate using Groove.id as the second factor.
Protect virtual private networks with strong authentication
When you allow your users sign in to a VPN concentrator using only a password it creates significant risk of attack. A single compromised account could open up your whole network to attack from outside. Groove.id integrates with VPN concentrators like Sonicwall, Cisco and Juniper to provide a second strong authentication factor. Configuration takes only a few minutes.
Protect network infrastructure devices
Many network devices use the (ancient) RADIUS protocol to delegate authentication. Groove.id's support for RADIUS allows you to retrofit modern, secure authentication onto legacy network devices.
Protect corporate assets with Active Directory integration
Many devices and software use the LDAP protocol to delegate authentication to a central directory. Indeed, many systems that allow you to sign in using Active Directory credentials are really using LDAP under the hood. When Groove.id acts as your LDAP server, you can plug modern multi-factor authentication into any device that supports Active Directory or LDAP.