All plans feature Authy's amazing security.
Simple REST API.
Free mobile apps.
Powerful management dashboard.
A free & simple way to get started.
Great when you are developing.
Great for small to medium
Perfect for most applications,
large or small.
Fits any size.
For the most demanding apps.
To prevent abuse and ensure quality we require a valid credit card. We'll only apply a $0.50c verification charge.
When a user enters a token on your site, you call the Authy /verify API to validate this token. These are Auth API Calls. Adding users is not counted as an Auth call.
Most people own a Smartphone and use the mobile app, but some don't. For those users we allow you to send them a token as text-message on every login. We have world-wide text-message support.
Everyone now has a cellphone, why bother with the extra cost and inconvenience of a hardware token? With Authy you can get the same level of security through our mobile apps (Android and iPhone) or via text-messages.
We offer several Enterprise plans with premium features such as reporting, compliance and policies, hardware tokens, premium API's and white glove installation. Contact us for details.
With Authy there are absolutely no setup fees, software licenses or any hidden cost. Everything is pay as you go and you can cancel anytime.
Authy is distributed across different geographical areas. We've maintained 99.9999% uptime since 2011.
Management is a critical part of a scalable and secure Two-Factor Authentication model. Authy includes a powerful management console where you have full control of your user's security.
Security is our first priority. We are deployed on PCI DSS Level 1 and ISO 27001
service providers. All of our systems have been designed with a series of technologies to prevent and detect unauthorized access.
Further, we designed the system so that even in the case of unauthorized access there are minimal consequences. Most importantly Authy is designed so that even if it was compromised your systems would still be secure. Think about it.
Your passwords are always on your systems. If Authy was compromised, it would only mean the attacker has access to the Authy tokens. But to hack your systems they would also require to know your passwords, which only you have.