Facebook Icon Facebook Icon Twitter Icon Twitter Icon Linkedin Icon Linkedin Icon Blog Icon Blog Icon Checkmark Icon Checkmark Icon Small Checkmark Icon Small Checkmark Icon Small Checkmark Icon Small Checkmark Icon Clock Icon Clock Icon Cloud Icon Cloud Icon Cloud Upload Icon Cloud Upload Icon Compass Icon Compass Icon Medium count 1 Icon Medium count 1 Icon Medium count 2 Icon Medium count 2 Icon Medium count 3 Icon Medium count 3 Icon Medium count 4 Icon Medium count 4 Icon Medium count 5 Icon Medium count 5 Icon Medium count 6 Icon Medium count 6 Icon Medium count 7 Icon Medium count 7 Icon Medium count 8 Icon Medium count 8 Icon Medium count 9 Icon Medium count 9 Icon Medium count 10 Icon Medium count 10 Icon Medium count 11 Icon Medium count 11 Icon Medium count 12 Icon Medium count 12 Icon Medium count 13 Icon Medium count 13 Icon Medium count 14 Icon Medium count 14 Icon Medium count 15 Icon Medium count 15 Icon Device with a checkmark Icon Device with a checkmark Icon Device Icon Device Icon Documentation Icon Documentation Icon Dollar Sign Icon Dollar Sign Icon Extend Icon Extend Icon Eye Icon Eye Icon Gear Icon Gear Icon Globe Icon Globe Icon Graph Icon Graph Icon Guidelines Icon Guidelines Icon Laptop Icon Laptop Icon Layers with checkmark Icon Layers with checkmark Icon Key Icon Key Icon Lock Icon Lock Icon Paper Airplane Icon Paper Airplane Icon Pencil Icon Pencil Icon Phone Icon Phone Icon Reliability Icon Reliability Icon Reset Icon Reset Icon Shield with Checkmark Icon Shield with Checkmark Icon Timer Icon Timer Icon Tools Icon Tools Icon Tutorial Icon Tutorial Icon Upload Icon Upload Icon User with Checkmark Icon User with Checkmark Icon User Icon User Icon Wallet Icon Wallet Icon Case Study Icon Case Study Icon Video Icon Video Icon Webinar Icon Webinar Icon White Paper Icon White Paper Icon

AUTHY HITS THE ROAD IN Q416

When it comes to cybersecurity, the weakest link might be something that no amount of code or encryption can fully protect: your users. If they have poor password hygiene it…

AUTHY OneTouch Mobile SDK NOW IN BETA

Can security get any simpler? With our Mobile SDK, yes it can. Authy has been leading the way towards simpler security since our inception. In a previous blog post, we…

DON’T build your own 2FA. Integrate a cloud-based API solution

A few weeks back was Twilio’s user conference, SIGNAL. I was fortunate enough to present with one of our customers, Andy Fleming from Zesty.io, about why integrating a cloud API…

AUTHY PEOPLE: Behind the Scenes: Working at Authy, Bogota

I wrote my first program in 1987, when the number of Internet hosts barely exceeded 10,000. This seems like eons ago. Since then, software has been steadily eating the world…

Using Authy to add 2-Factor Authentication To Your Auth0 Applications

We at Authy are always looking to make it easier for our clients to add 2FA to their applications. In fact, with just a few API calls you can be…

AUTHY HELPS VMWARE PAVE WAY FOR TRUE DIGITAL ENTERPRISE MOBILITY

The 2016 launch of Workspace ONE signals a new era in enterprise mobility by harmonizing identity, device management, and app delivery on a single, integrated platform. For businesses, it unifies…

AUTHY TO BE PART OF SIGNAL LONDON

When it comes to geeking out over code & tech, why should the San Francisco have all the fun? We all had such a wild ride at this past Spring’s…

Authy OneTouch Fixes The Customer Service Phone-Tree

Think about the last time you called a Customer Service agent for your bank, cable or telephone service. Does the process typically go smoothly? Or is it something you dread?…

Degrees Of Security: What to Look For in Your 2FA

We’re all familiar with single-factor authentication—even though we never called it that—where we’re asked to enter a username and a password to gain access to a website. And more and…

Authy Supports Rails Girls Bogotá As They Build Great Things

For the second year in a row, Authy is sponsoring an excellent cause in Bogota, Colombia. Rails Girls Bogotá promotes deeper engagement and involvement of women in technology and the developer…