Menu

Stolen passwords are at the heart of more than 80% of data breaches

Compromised credentials are the leading cause of data breaches. Groove.id combines strong device authentication with context-based variable friction to eliminate the need for passwords. With no credentials to steal, Groove.id makes things hard on attackers and easy for end users.

Passwordless

Passwords are frustrating for users and provide weak security. With nothing to remember and nothing for attackers to steal, Groove.id customers are confident their data are protected.

Strong Device Authentication

Every login request starts with a strong cryptographic identification of the device being used. Over time, devices build credibility and trust with Groove.id.

Passive Factors

Groove.id calculates a confidence level for each authentication request using passive factors including GPS location, IP address, user history, device fingerprint, keystroke cadence, mouse movements and more.

Learns Your Habits

Over time, Groove.id learns your habits including the devices you use, your usual locations and typical working hours.

Context-based Variable Friction

During each login attempt, Groove.id determines an appropriate level of friction based on what’s known about the user, the user's device, and the sensitivity of the application. This allows you to deploy multi-factor authentication without exceeding the frustration budget of your users. Groove.id supports a number of high integrity MFA options.

Easy to deploy

Many single sign on tools are “all or nothing,” you have to switch all your users at once. With Groove.id you can roll out slowly, allowing users to get configured at their own pace. This reduces risk and user frustration.

Multi Factor Authentication Methods

Groove.id Mobile App

Users are able to quickly and simply verify their identities using the Groove.id mobile app.

Rotating Codes

Groove.id users can authenticate using time-based one time passcodes (TOTP).

Security Key

Groove.id supports the U2F standard and users can authenticate with hardware security keys.