DetectID Expands Frictionless Mobile Authentication and Enrollment Capabilities

Share Button

DetectID, Easy Solutions’ flexible authentication platform, just made strong mobile authentication for businesses and their users even simpler. The newest version of DetectID expands the functionality of the SDK-based mobile authentication solution. Mobile Authentication is built from the ground up to provide frictionless authentication using native push notifications, soft token and QR Code. The new features in the latest edition of DetectID include:

Frictionless Mobile AuthenticationInformational Push Alerts: Notify end-users on the home screen of their mobile devices with targeted, useful information that increases engagement and fosters customer loyalty. In addition to enabling push message for authentication and transaction signing requests, DetectID now permits banks and other organizations to leverage push notifications for alerts messages such account balances, new product alerts and much more. DetectID’s Push Alerts can be easily deployed by embedding SDK within the mobile application.

Simplified Mobile Device Provisioning and Management: All mobile authentication provisioning processes included in DetectID have now been merged together. This means that organizations can start protecting their customers’ online transactions with all the mobile authentication factors that DetectID offers using a single activation process. This allows financial institutions, community banks and enterprises to introduce new mobile authentication methods at their own pace, without the need to change any code later on. Also, for additional security, all mobile devices will be bound to specific users, enabling the organization to get visibility into the devices where the authentication is being performed.

If you would like to find out more about Easy Solutions’ convenient and trusted DetectID two-factor authentication platform, check out our website at or drop us a line at

Related Posts

Coronavirus and Cyberattacks: Tips to Keep your Customers Secure Fraud attacks are now on the rise, with malicious actors launching targeted phishing and malware attacks, capitalizing on the Coronavirus pandemic. Having a strong cybersecurity strategy in place has never been more critical.  
How to Adopt DMARC in 6 Steps Though you may never have heard of Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and email-authentication protocols, the people making sure the emails you receive are safe are quite familiar with them. 

Leave a Reply

Your email address will not be published. Required fields are marked *