Beyond passwords. Verify identity with high assurance factors that resist phishing, replay attacks, and social engineering.
Risk-based authentication flow.
Push Notifications. A frictionless "Are you trying to sign in?" prompt sent directly to your trusted mobile device with location context.
Hardware Keys. Support for YubiKeys, Titan Security Keys, and biometric sensors (Touch ID, Windows Hello) for maximum security.
Behavioral Analysis. Automatically block login attempts that originate from geographically distant locations faster than physical travel allows.
Managed Device. Require that the authenticating device is managed, patched, and compliant with corporate security policies before allowing access.