Tailored Security for Post-Onboarding

Caf's Multi-Factor Authentication (MFA) solution collects information to verify that the user is who they claim to be when performing a specific action in your system/application after onboarding.

With our solution, if a password is compromised, fraudsters will need to bypass one or more authentication factors to access an account or perform an action, making the system much more difficult to breach.

HOW IT WORKS

Three elements form the foundation of our multi-factor authentication process:

Unmatched identity verification

Authentication Policies

Our clients configure their authentication policies based on risk using an intuitive dashboard. They select the contexts to be validated and define the authentication methods to be used. Each policy is directly linked to a specific user action, ensuring a personalized and secure approach to protecting their platforms.

Unmatched identity verification

Identity Database

We establish an identity database where each user is represented by a unique identity (CPF), with their known contexts (biometric data) associated with it. This database enables secure and effective user authentication, ensuring that their identities are pre-registered for authentication.

Unmatched identity verification

Two-Factor
Authentication (2FA)

We implement a two-step authentication process (2FA). In the first step, we analyze biometric contexts to verify the user's identity without requiring additional actions. In the second step, when necessary, an additional action from the user is required, providing an extra layer of security for account access.

Focus on User Experience

Our two-factor authentication (2FA) model is designed to minimize inconvenience for users by prioritizing passive authentication methods over active ones. These methods operate quietly in the background without requiring direct action from the user.

Passive Methods

Devices

Capture of device model, brand, operating system, and date/time.

Location

Geolocation identifies the first authentication and sets a radius for future ones.

Networks

Collection of IP address, provider, and date/time of user authentications.

If the passive methods are not sufficient to validate the user's identity, an active method will be required.

Active Methods

Face

Capture a selfie and automatically compare it with the existing record in the database.

SMS

Send an SMS with a code for the user to validate in the app.

E-mail

Send an email with a code for the user to validate in the app.

When to Use

Multi-factor authentication can be triggered whenever necessary to revalidate the user's identity after onboarding.

Unmatched identity verification

Purchases

Unmatched identity verification

Money Transfers

Unmatched identity verification

Password Changes or
Profile Updates

Unmatched identity verification

Any Risky Transactions

Unmatched identity verification

Login

Unmatched identity verification

Betting

Benefits of Choosing Our Solution

Real-Time Detection

We use advanced technology for swift detection and immediate action in mitigating fraud risks.

Long-Term Protection

Continuous monitoring to ensure security throughout the customer's ongoing journey.

Superior User Experience

Reduced friction in the user experience to prevent account cancellations and drive your business forward.

Risk-Based Authentication

Ability to create customized authentication rules based on access context and risk level.

Easy Management

Intuitive and user-friendly dashboard for configuring rules and viewing user information.

Proven Results

A technology platform for services faced an increase in Account Takeover (ATO) attacks, impacting customers with fraud losses and high support costs. The Caf authentication solution was implemented in phases to better understand user behavior and mitigate attacks, and the benefits were evident:

- 100% reduction in fraud losses.

- Decrease in customer support calls, improving overall user experience.

- Business sectors that did not adopt the solution continued to face fraud issues.

Enhance Your Business Protection Today

Consult a specialist to prevent account takeover incidents in your company.
BOOK A DEMO