Verify and secure users in your application. Implement in a single sprint.
[Infographic] Is the Internet Getting Safer?
Turns out, it’s not getting any safer. The numbers don’t lie, and the threats your business and your users face are changing faster than ever.
Why Use Phone Verification?
Explore five reasons to prevent fraudulent account creation by verifying user phone numbers instead of email addresses.
Authy Now Supports Google Authenticator
Developers implementing two-factor authentication security should note that the Twilio Authy 2FA API now supports users of the Google Authenticator app.
Webinar: How to Minimize the Cost of Fraud and Account Takeovers
Fraudulent account creation and account takeovers can damage your reputation and your ROI. Protect your bottom line with 2FA and other tips from this webinar.
What is PSD2 and why does it matter?
Payment service providers in the European Union must implement stronger customer authentication as part of PSD2, the second Payment Services Directive.
Ovum Report - On the Radar: Twilio Account Security Solutions
Ovum, a leading analyst and consultancy firm, takes an in-depth look at Twilio’s Account Security solutions in their latest On The Radar report.
[Whitepaper] Account Security Best Practices Guide
Each interaction with your users is an opportunity to instill trust. Ensure proper verification & authentication in your app with these best practices.
Phone Verification: Because Email Verification is No Longer Enough
Phone verification is the most secure and simple way to verify a user's identity and protect your app or service from data loss, fraud, and malicious attacks.
Exostar Uses Twilio 2FA to Secure 600K Monthly ePrescriptions
“We always look at things from a security perspective. It's critical.”
How TransferWise Uses Twilio 2FA to Move Money Securely
Every month, TransferWise moves over £1.2 billion around the world for hundreds of thousands of people. Learn how they keep all that money safe and secure.
Webinar: Fighting Fake Account Signups with Twilio and Google
Prevent fraudulent account creation by verifying a new user’s phone number instead of an email address. Learn more in this on-demand webinar.
DVELP’s Remote-First Team is a FinTech Entrepreneur's Dream
In the heavily regulated world of finance, Twilio 2FA allows DVELP to make sign-on seamless and secure.
Strengthen Security and Reduce Risk With Phone Verification
Download this ebook to learn how to verify your users and protect your app or service from data loss, fraud, and malicious attacks.
Webinar: Owning Your 2FA With the New Twilio Authenticator SDK
Go beyond the password. Embed two-factor authentication directly into your own mobile apps. Learn about customized 2FA security in this on-demand webinar.
MercadoLibre Protects 90% of Sellers With Twilio Authentication
Phone Verification and 2FA secure Latin America's largest e-commerce infrastructure.
Upgrade 2FA By Downgrading SMS
Download this ebook to explore two-factor authentication alternatives to SMS-only authentication.
Go-Jek Helps Customers Go Cash-free With Twilio Verification
Indonesia’s fastest growing on-demand services player brilliantly leverages Phone Verification to grow their powerful payments platform
Wunderman securely delivers music show tickets to Movistar Customers
2FA ensures event tickets aren’t delivered to the general public or scalpers, but are awarded to actual Movistar customers.
Google’s Steven Soneff On Invisible Verification
Twilio Verification SDK for Android combines the best from Google and Twilio to deliver a superior global phone verification solution for mobile apps.
Twilio’s Dan Killmer Swears By His CyberSecurity Development Checklist
As the lead solutions architect with Twilio’s Account Security team, Dan has seen (and solved for) nearly every authentication challenge there is.
Twilio’s B. Byrne On Why Eliminating SMS for 2FA Is A Bad Idea
After SS7 vulnerabilities allowed attackers to intercept authentication codes and rob a bank, is there still a need for SMS-based 2FA?
Datto uses Twilio 2FA to secure 60,000 SMBs worldwide
“If we had known how easy it was to implement, we would have done it years ago.”
A logical progression: adding 2FA to SSO for extra protection
LogicMonitor pulls in more than a billion data points of customer performance data every day. Integrating 2FA into their security layers was a no-brainer.
Everybody should 2FA
Learn why everyone should change their passwords, not reuse passwords across sites, and turn on two-factor authentication (2FA) wherever it's available.
Gemini Builds a Secure Platform for Digital Assets with Twilio
Twilio 2FA Ensures High-Stakes Security for Next Generation Exchange.
Gartner’s Anne Robins on 3 Ways to Approach Cybersecurity
On-Demand Webinar: Considering the pros and cons of DIY authentication, there are clear indicators to when it’s time to call in the experts.
Gaming Forum Uses Twilio To Pwn Scammers And Rogues
EpicNPC, leading online game marketplace home to 495,000 members, uses Twilio Phone Verification to protect site and members from unwanted visitors.
Security Ain't No Game For Twitch.tv
Sage advice from the leading social video platform: There’s no excuse not to safeguard your users.
Why Using SMS in the Authentication Chain is Risky
Learn how best to deliver 2FA without relying on SMS and voice.
How to Set Up 2FA in Under Five Minutes
Keeping data safe is hard when users insist on using awful passwords.
Settrax Tracks Hospital Equipment And Keeps Patients Safe With Twilio
Safeguarding and modernizing the logistical ballet of millions of dollars of medical equipment delivered to hospitals and surgery centers every day with 2FA.
Zesty.io Delivers a Security-First Approach With Twilio
Content management leader Zesty.io seamlessly integrates 2FA and OneTouch authentication into enterprise CMS platform.
2FA...WTF? Watch Twilio in Action!
Not just for logging in, two-factor authentication can also secure high value transactions.
Twilio Helps VMware Pave The Way For True Digital Enterprise Mobility
VMware’s end user computing organization partnered with Twilio to embed authentication security into their enterprise mobility management solution Workspace One
IS Goes Places With Phone Verification From Twilio’s Service
Cross-platform location-based IS app uses Twilio verification for trust and privacy, so friends and family can easily meet up and keep up.
SendGrid Replaces Homegrown 2FA Solution With Twilio Cloud Service
How the leading email delivery platform chose the added security layer of Twilio’s two factor authentication.
Webinar: Sendgrid Moved from Homegrown 2FA to a Future Proof API
How SendGrid decided to purchase their Two-Factor Authentication (2FA) solution as a cloud API from Twilio.
Protecting The Front Door To Your Application: The Login
App Security: To Build or To Buy? - Part 1: Why trying to build your own 2FA solution from scratch is expensive, time consuming and very risky.
The Pitfalls Of Developing Your Own 2FA
App Security: To Build or To Buy? - Part 2: The challenges of development through maintaining, operating and supporting two-factor authentication in your application.
Get Total Control Over Your 2FA Implementation
App Security: To Build or To Buy? - Part 3: Building a 2FA solution yourself requires security development expertise. Or you could try Twilio 2FA.
How VMware Has Enabled Authentication Through Twilio Integration
VMware found in Twilio a battle-tested, reliable 2FA service that scales with business and customer needs.
Security In Gaming: As Simple as 1, 2, 3
Protect gamers at initial login and during deep gameplay transactions.
Strong Security In The Cryptocurrency Space
A frictionless fintech security experience offering more than a one-time password.