Phishing-Resistant MFA
We do not use phishable knowledge factors such as passwords, PINs, or OTPs. Instead, we combine proprietary facial biometrics and device verification to authenticate users.
Unlike device-native (or ’local’) biometrics, our technology authenticates users as well as their registered devices, rather than through them.
Organizations using true biometric MFA will experience a dramatic reduction in account takeovers and SIM-swapping attacks.Unparalleled User Experience
We are device-agnostic and multi-device. Users can authenticate on any device with a front-facing camera. Multiple users can use the same device, and a single user can authenticate on multiple devices.
Users are protected throughout the user journey. With a single enrollment selfie, users can authenticate at the login, payment, step-up, and account recovery steps.
We offer self-service account recovery. With a recovery selfie, we match a user's biometric profile with the data created during account registration.Immediate ROI
We are more cost-effective than traditional authentication methods. With self-service account recovery, users do not need to re-enroll or contact the support center or IT helpdesk.
This significantly reduces the administration costs associated with credential management, password resets, and lost tokens.Truly Privacy-Preserving
We process data in the cloud, but user biometric data is protected even if a server is compromised. Biometric data is not stored anywhere - neither on device or on the cloud.
This is because we use PKI-based biometrics and secure them with Privacy-Enhancing Technologies (PETs) - the only company in the world to do so.
We operate on a Zero Trust cloud computing model, meaning the cloud service can perform computations without seeing the actual data - a process unique to Keyless known as Zero-Knowledge Biometrics™.Complete Compliance
We meet all global data protection and sovereignty requirements. By using PETs, all data processed by Keyless is fully GDPR-compliant.
We also help businesses comply with PSD2 SCA. We combine possession (device) with inherence (face) to provide two distinct authentication factors.
We also offer built-in dynamic linking by creating a unique confirmation code for each transaction.Get In Touch
Find out how our private-by-design MFA can help your organization prevent ATOs, improve UX, and protect your bottom line.