Descope

Descope

软件开发

Los Altos,California 6,625 位关注者

? Drag & Drop CIAM. Add AuthN, AuthZ, MFA, SSO, and bot protection to your app with no / low code workflows.

关于我们

Hi, we're Descope! Our visual workflows and SDKs help developers create and customize their apps' entire user journey. Customers like GoFundMe, Navan, Branch, AEG Presents, and CARS24 use Descope to reduce user friction, stop account takeover attacks, and get a 360 degree view of their user journey.

网站
https://www.descope.com
所属行业
软件开发
规模
51-200 人
总部
Los Altos,California
类型
私人持股
创立
2022
领域
Authentication、User Management、Authorization、Passwordless、Developer Tools、User Provisioning、User Onboarding、SAML single sign-on、FIDO Authentication、Magic Links、OTP Authentication、TOTP Authentication、Social Logins、Login Fraud Prevention、Account Takeover Prevention、Credential Stuffing Prevention和Bot Protection

产品

地点

Descope员工

动态

  • 查看Descope的公司主页,图片

    6,625 位关注者

    In April 2024, the UK banned default username-password combinations for certain IoT devices. While a good move in theory, this made Rishi wonder if industry focus should be on: ? Banning passwords or ?? Fewer passwords For SC Media, here's our take: https://lnkd.in/gztzXgGm #passwords #CIAM #IAM #authentication #userexperience #security #compliance

    Instead of banning weak passwords, let’s embrace fewer passwords

    Instead of banning weak passwords, let’s embrace fewer passwords

    scworld.com

  • 查看Descope的公司主页,图片

    6,625 位关注者

    Today marks the one-year anniversary of the tragic October 7th terrorist attacks in Israel. As we reflect on this day, our thoughts are with our team, customers, and the communities that have been affected by this senseless act and the ceaseless conflict that has followed in the past year. Despite the circumstances, the Descope team - like many other companies - has remain steadfastly focused on doing what it takes for our customers. On this tragic day, we continue standing with Israel and reaffirm our commitment to being our customers' trusted CIAM partner through darkness and light.

    • 该图片无替代文字
  • 查看Descope的公司主页,图片

    6,625 位关注者

    ?? Descope + Telesign = Seamless phone verification and MFA With our plug-and-play connector, you can: ? Easily send SMS messages to end users ? Verify phones with granular user and carrier data ? Add adaptive MFA with phone intelligence risk scores ?? Learn more in our connector spotlight blog: https://lnkd.in/g9Eg8H_5 Other links in the comments ?? #CIAM #IAM #fraudprevention #adaptiveMFA #phoneauthentication #phoneverification #authentication #accesscontrol

    • Descope Flow collecting risk signals from Telesign for adaptive MFA.
  • 查看Descope的公司主页,图片

    6,625 位关注者

    Is your login flow working, or do you just think it's working? Descope imbues your user journeys with agility and empathy: ? Impersonate end users' login experience ? A / B test different methods and hierarchies ? Study step-by-step drop offs All with drag & drop workflows. Docs and video links in the comments ?? #authentication #userexperience #CIAM #customerexperience #developers #devtools #IAM #security

    • 该图片无替代文字
  • 查看Descope的公司主页,图片

    6,625 位关注者

    ?? One of the many benefits of passkeys is the ability to power cross-device auth flows The good news - these flows are easy to add with Descope Flows! This blog from?Pallak Srivastava goes through: ? Implementing passkeys on a laptop and testing the passwordless flow ? Authenticating existing users by creating passkeys on a smartphone ? Signing in on a laptop with passkeys present on a phone Read more: https://lnkd.in/gJGsQz65 #passkeys #fido2 #webauthn #CIAM #IAM #authentication #devtools #security #developers #passwordless #biometrics

    • Add Cross-Device Passkeys With Descope
  • 查看Descope的公司主页,图片

    6,625 位关注者

    ?? In this corner, we have email authentication. Low-cost, tried and trusted, and relatively phishing-resistant. Also prone to fake users, causes noisy inboxes, and makes your email provider a single point of failure. ?? And in this corner, we have phone number authentication. Mobile-friendly, higher open rates, and more verifiable. Also prone to SIM swapping and bypass, and leads to high variable costs. The right answer to "Which auth method should I use?" is always "It depends on your app". Alex Brown compares email and phone based authentication in detail here: https://lnkd.in/drPFeD_D #authentication #CIAM #IAM #emailauthentication #phoneauthentication #userexperience #security #magiclinks #otpauthentication

    • Phone vs Email

相似主页

融资