Verify and secure users in your application. Implement in a single sprint.
Gemini Builds a Secure Platform for Digital Assets with Twilio
Twilio’s Authy 2FA Ensures High-Stakes Security for Next Generation Exchange.
Gaming Forum Uses Twilio To Pwn Scammers And Rogues
EpicNPC, leading online game marketplace home to 495,000 members, uses Twilio’s Authy Phone Verification to protect site and members from unwanted visitors.
Security Ain't No Game For Twitch.tv
Sage advice from the leading social video platform: There’s no excuse not to safeguard your users.
Why Using SMS in the Authentication Chain is Risky
Learn how best to deliver 2FA without relying on SMS and voice.
How to Set Up 2FA in Under Five Minutes
Keeping data safe is hard when users insist on using awful passwords.
Settrax Tracks Hospital Equipment And Keeps Patients Safe With Twilio
Safeguarding and modernizing the logistical ballet of millions of dollars of medical equipment delivered to hospitals and surgery centers every day with 2FA.
Zesty.io Delivers a Security-First Approach With Twilio
Content management leader Zesty.io seamlessly integrates 2FA and OneTouch authentication into enterprise CMS platform.
2FA...WTF? Watch Authy in Action!
Not just for logging in, two-factor authentication can also secure high value transactions.
Twilio Helps VMware Pave The Way For True Digital Enterprise Mobility
VMware’s end user computing organization partnered with Authy to embed authentication security into their enterprise mobility management solution Workspace One.
IS Goes Places With Phone Verification From Twilio’s Authy Service
Cross-platform location-based IS app uses Authy verification for trust and privacy, so friends and family can easily meet up and keep up.
SendGrid Replaces Homegrown 2FA Solution With Authy Cloud Service
How the leading email delivery platform chose the added security layer of Authy’s two factor authentication.
Sendgrid Moved from Homegrown 2FA to a Future Proof API
How SendGrid decided to purchase their Two-Factor Authentication (2FA) solution as a cloud API from Twilio.
Protecting The Front Door To Your Application: The Login
App Security: To Build or To Buy? - Part 1: Why trying to build your own 2FA solution from scratch is expensive, time consuming and very risky.
The Pitfalls Of Developing Your Own 2FA
App Security: To Build or To Buy? - Part 2: The challenges of development through maintaining, operating and supporting two-factor authentication in your application.
Get Total Control Over Your 2FA Implementation
App Security: To Build or To Buy? - Part 3: Building a 2FA solution yourself requires security development expertise. Or you could try Authy.
How VMware Has Enabled Authentication Through Authy Integration
VMware found in Authy a battle-tested, reliable 2FA service that scales with business and customer needs.
Security In Gaming: As Simple as 1, 2, 3
Protect gamers at initial login and during deep gameplay transactions.
Strong Security In The Cryptocurrency Space
A frictionless fintech security experience offering more than a one-time password.